Course Overview
Learning Objectives
Knowledge and Intelligence, Knowledge Generation, Principles of Knowledge Management, Analysis Projects, Analysis Cycle, Briefing, Management Brief, Starting the Project, Project Brief, Checklist, Collection Planning, Attributes of Sources - Source-Centered Collection Plan, Collection Plan, Segmentation of Sources, Valuation of Sources, Verification Process and Checklists
Intelligence Requirements, Prioritization, Essential Elements of Information, Indicators, Specific Information Requirements, Glossary and Taxonomy, Mission and Requirements Management, Tools to Use, Data to Collect, Iterative and Continuous Feedback Loop, The Data Collection Plan, Free-flow, Interviewing, Sampling, Networking (Cooperation, rules, benefits, risks & issues, analysis), Protecting your Sources Across Cultural Barriers, Collecting from Unsuspecting Sources, Passive Collection, Elicitation, Collection from Public Domain, Anatomy of OSINT, Applications of OSINT, Imagery Intelligence output, Analysis, Attributes of strategic analysis, Collector - Analyst Relationship, Collector-Analyst Differences, Strategic Analysis Cycle, Anatomy of Analysis, Data Credibility, Source Validity, Data and Source Relevance, Scoring Methods, Data Preparation, managing incomplete data, managing conflicting data, Misperceiving Events, Confusing causality and correlation, Flawed analogies, Functions and Responsibilities, Structured Analytic Techniques, Scenario Analysis, Mechanics/Attributes of Scenario Analysis, Estimative intelligence, Forecasting, Warning Intelligence, The Role of Warning Intelligence, Key Warning Factors in Preparations, Strategic versus Tactical Warning, Warning as an Assessment of Probabilities, Warning as a Judgment for the Stakeholder, Fundamentals of Indications Analysis, Cyber Indications and Warnings, Specifics of the Analytical Method, Presumption of Surprise, Scope of Relevant Information, Objectivity and Realism, Need to Reach Immediate Conclusions, Inference, Deduction and Induction, Understanding How the Adversary Thinks, Order of Cyber Battle Analysis in a Crisis Situation, Cyber Order of Battle Methods, Analysis of Cyber Mobilization, Recognition of Cyber Buildup, Preparation for Cyber Warfare, Key Warning Factors in Preparations, Cyber Readiness, Exercises for Preparation, Cyber Wargaming, Objectives/Success Factors, STEMPLES Plus, Considerations in STEMPLES Plus Warning, Meaning of Evidence, Hofstede Principles, Adversary Baseball Cards, Benching marking your adversary, Adversary Supply Chain, Principal Factors in Timing and Surprise, Examples of Assessing Timing, Warning is Not a Forecast of Imminence, The Problem of Deception, Infrequency and Neglect of Deception, Principles, Techniques and Effectiveness of Deception, What Do Top Stakeholders Need, and Want, to Know?, Assessing Probabilities, Improving Warning Assessments, Factors Influencing Judgments and Reporting, General Warning Principles, Scope of compliance and ethics in analysis, Organizing a Strategic Analysis Function, The right structure enables efficient/effective execution, competency building, Towards a world-class strategic analysis organization, Five Levels of Strategic Analysis Professionalism, Profile of an analyst, Functional, behavioral, measuring competencies – models, Job descriptions and hiring questions.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):