• Online, Self-Paced
Course Description

All too often we see organizations receive information on threat actors only to point-and-shoot when it comes to collection. There is little to no structure in this critical task that drives all intelligence production, analysis, and analytic writing.
The collection manager works with the intelligence and priority intelligence requirements to develop the collection plan translating these into specific information requirements used to provide targeting while managing the availability and capabilities of the collection/research team. This is an 8-week online course following intelligence community standards. This course is delivered via the drip method meaning each week a new lecture and supporting documentation is released, as if you were attending a university lecture.
This course prepares the organization’s designated intelligence professional as the person in charge of managing collection planning, staffing, targeting, ensuring integrated, synchronized, and deconflicted collection actions. As information is received from internal requests for information, analysis of existing data, information, and intelligence on the subject in question, the collection manager correlates and determine gaps in preparing the collection plan. This course prepares students in the development of collection requirements, designed to maximize the effectiveness of your limited resources covering what may seem as vast areas of online targets. The course assists the collection manager in determining where to look, when to look, and what to look for. We provide students with situation and event templates, how to fill them out, how to manage the ever-changing problem iteratively, and how to establish collection priorities base on the courses of action the threat actor may likely adopt.

Learning Objectives

Collection Planning Screening Sources
Interpretation of Stakeholder Needs Data Segmentation and Prioritization
Intelligence Requirements Establishing a program of record
Essential elements of information Targeting
Analysis of requirements against the existing knowledge base Open Source Collection
Where and how will you acquire that data? Threat Intelligence Platform Use and Data Extraction
How much time do you have? Tagging strategies
STEMPLES Plus – Strategic Analysis
Mission and Requirements Management Passive Collection
Convert RFI’s to collection requirements Observables
Data Provenance
Collection Manager Communications and Sharing
Purpose of Stakeholder Analysis
Questions used to organize your products
Know your customer checklist
Getting started checklist
High-level process overview
Strategic Questioning and Listening
Stakeholder Collection and Tracking Model
Stakeholder Tracking
Priority Intelligence Requirements (PIR) – What are they?
Common Adversaries
Information Requirements Process Flow
Targeting – Intelligence Collection
Information Required Prior to Intelligence Requirements
Collector/Analyst Need to Understand
Stakeholder knowledge of their systems and data
Intelligence Team Priority Intelligence Requirements Examples
Collection – Research RACI
Indicators and Warnings
Intelligence Requirements Tracking
Get them to requirements
D3A Targeting Requirements
Bring in Stakeholder Requirements
The D3A/F3EAD Integrated Process
Logical Adversaries to Intelligence Requirement Development
Threat Matrices
Wrap-up // Q&A
The Six Categories – ASCOPE
D3A Targeting F3EAD
Indicators of change
Hofstede Principles
Strategic Analysis with STEMPLES
Indicators – Indicators of Change Matrices
STEMPLES Plus Template and Example
Requirements Management
Mission Management
Collection Planning
Collection Strategy
Collection Operations
Collection Manager Tasks
Operational Security Rules (OPSEC)
Rules of Engagement (RoE)
Cyber Persona Methods and Techniques
Request for Information
Complete a Plan
Data Provenance - Dates/Times Collection Planning Process Flow and Metrics
Credibility / Validity / Relevance After action reviews – at any time
Intelligence Risk
Confidence Levels for your findings
Collection Plan Templates
Case Study Finals

Framework Connections