Intelligence Analysis refers to activities that take information, analyze it to provide insight, and report it to the stakeholders who need to know it. Intelligence analysis is practiced by police (Criminal Intelligence), militaries, national security agencies, and even corporations (Competitive Intelligence.)
Below are posts not just about intelligence analysis but other military and police-related subjects as well.
Table of Contents
Theory of Intelligence
- Core Competencies of Intelligence Analysis
- Indicator Development
- Logic and Inference Development
- Mill’s Cannons of Deductive Reasoning
- Sources of Intelligence Information
- The Intelligence Cycle
Intelligence Analysis Techniques
- Analysis of Competing Hypothesis (ACH)
- An Introduction to Intelligence Research and Analysis
- Association Analysis
- Delphi Technique
- Devil’s Advocacy
- Flow Analysis
- Force Field Analysis
- How to Conduct a CBRN Vulnerability Analysis
- Getting Started Checklist
- Link Analysis
- Morphological Analysis
- Premortem Analysis
- Red Hat Analysis
- Key Assumptions Check
- SLEIPNIR Assessment Tool
- Sociometry
- Terrorist Attack Pre-Incident Indicators (TAPI)
Human Intelligence
- Deception Detection
- FM2-22-3 Human Intelligence Collector Operations
- How to Disguise Yourself
- Human Intelligence Collector Course (only the links in blue have been completed right now)
- IT0471, Third World Countries
- IT0560, The Collection Effort
- IT0421, Intelligence and Electronic Warfare Operations
- IS3001, Introduction to Order of Battle
- IT0462, Intelligence Preparation of the Battlefield
- IT0606, Interrogation Operations
- IT0598, Use of Interpreters
- IT0597, Captured Document Handling
- IT0604, Screening Operations
- IT0599, Approaches
- IT0601, Questioning Techniques
- IT0596, Terminate an Interrogation
- IT0600, Supervise Interrogation, Interpretation, and Translation Operations
- IT0583, Strategic Intelligence
- IT0425, Introduction to Battlefield Technical Intelligence
- IS8700, Overview of Training Management
- IT0602, Interrogation Plan Preparation
- IT0603, Tactical Interrogation Reports
Operations Management
- Advanced Security in the Field (ASITF)
- Basic Security in the Field (BSITF)
- Case Study: Using OSINT To Unmask The Watchmen
- Introduction to Surveillance and Countersurveillance
- Introduction to Risk Management
- UN Security Level System (SLS)
Other Courses
- Advanced Intelligence Course
- 35F Intelligence Analysis Course Curriculum
- Intelligence in Combating Terrorism
- Contemporary Terrorism [ICT2A03L]
- Development Operations [ICT2A04L]
- Ideologies and Motivations [ICT2A06L]
- Anatomy of a Terrorist [ICT2A07L]
- Intelligence Support [ICT2A08L]
- Protection Against Terrorism [ICT2A09L]
- Analytical Methods [13ICTXP9]
- Analysis Automation [ICT2B02L]
- Threat Assessment of Military Installations [ICT2B03L]
- Unit Threat Assessment [ICT2B04L]