1. 2 collecting information on border control database information from border interception cases...

10
IDENTIFYING THREATS AND MITIGATING RISK TO MALDIVIAN IMMIGRATION BORDER 1

Upload: marie-neblett

Post on 01-Apr-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

IDENTIFYING THREATS AND MITIGATING RISK TO MALDIVIAN IMMIGRATION BORDER 1

Page 2: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

ENDURING THEME

BE PROACTIVE & REACTIVE

2

Page 3: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

INFORMATION COLLECTION

Collecting information on border control database Information from border interception cases

(incident report) Intelligence from foreign Intel alerts (SIGIT) Information from open source Information and intelligence collected from covert

and overt operations (HUMIT)

3

Page 4: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

INCIDENT REPORT

4

Page 5: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

5

INCIDENT REPORT

Page 6: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

DATA SHEET

6

Page 7: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

INVESTIGATING AND ANALYZING INFORMATION

Verifying information Reliability and credibility of source Investigating Classification of data Collation Analyzing data Identifying and prioritizing threats (threat & risk

assessment) Developing analytical reports

7

Page 8: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

ASSESSING AND REPORTING INFORMATION

Analysis report for policy makers Intelligence alert for border control Feedback and reassessing threats

8

Page 9: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

INTEL ALERT

9

Page 10: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel

STICKING A BALANCE

Facilitation & Security

10