You are on page 1of 18

3.

ANALYSIS GUIDELINES
C O N F I D E N T I A L

CONTENTS

1. INTRODUCTION
1.1. What is Analysis?
1.2. What is the Purpose of Analysis?
2. ANALYSTS AND EXPECTATIONS
2.1. Recruitment of Analysts
2.2. Development of Analysts
2.3. Customer/Client/Sponsor Expectations of Analysis
2.4. Analyst Expectations of the Customer/Client/Sponsor
3. INTELLIGENCE CYCLE AND ANALYSIS CYCLE
3.1. Planning & Direction (including project or programme management and planning)
3.1.1. Tasking Definition and Terms of Reference
3.1.2. Conceptual Modelling & Scoping
3.1.3. Working Hypotheses and Indicators
3.2. Collection
3.3. Processing
3.3.1. Evaluation
3.3.2. Collation
3.4. Analysis and Peer Review
3.4.1. Analysis
3.4.2. Integration
3.4.3. Interpretation
3.4.4. Peer Review/Management Review
3.5. Analysis Products and Dissemination
3.6. Review/Feedback
4. BIBLIOGRAPHY
5. APPENDIXES
Appendix 1: Example Job Profile – Intelligence Analyst
Appendix 2: Task Form
Appendix 3: The placement of the analysis unit in the organisation
Appendix 4: Analysis Products

3-2 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

1. INTRODUCTION

T he purpose of this guidance is to provide


members of the World Customs Organisation
with a set of standard guidelines for intelligence
One of the walls however has a hole in it
(a breach) and there are invaders trying to
attack the castle in order to take control
analysis. of it and overwhelm the knights who are
The methodology that is used for analysis can be protecting the inhabitants of the castle. The
employed in both risk assessment and profiling castle is threatened by the invaders and
and targeting work. However, it should be noted there is a particular risk to the castle and
that the advice and best practice contained within its inhabitants due to the hole in the wall
this guidance provide basic guidance only. If more making the castle vulnerable. The ruler of
in depth guidance is sought in relation to analyt- the castle can protect the inhabitants of it,
ical concepts and methodology, the reader may by ensuring that there are enough knights
need to undertake further research rather than deployed around the castle to fend off the
relying solely upon the guidance contained herein. attack however the risk to the castle can
be minimised further by deploying enough
1.1. What is Analysis? knights to guard the vulnerability the castle
has – the hole or breach in its wall. To further
Analysis is the process by which information is
mitigate the risk, the ruler should ensure
evaluated, integrated and interpreted. It is the
that repairs are made to the hole in the wall
process whereby information becomes intelli-
as soon as possible so that the knights can
gence and serves to guide decision-making or
be deployed elsewhere in the castle where
action. The analyst contextualises information
there may be other perceived weaknesses.
to create actionable intelligence about threats.
Of course if there were no invaders present
Analysis, thus, creates knowledge.
around the castle, there would be no threat
1.2. What is the Purpose of Analysis? to the castle, just vulnerability (the hole
in the wall) and a potential risk that the
Intelligence analysis increases an organisation’s castle is likely to be invaded at some point
knowledge of the threats it is facing. It also iden- in the future.
tifies information gaps that the organisation may
need to fill. Understanding these concepts of threat, risk and
vulnerability means that an analyst can, by under-
In order to understand how analysis can support taking an assessment of threat and risk, identify
the aims of a Customs organisation, one must weaknesses in control or be aware of and allow a
have a greater understanding of some key terms –
Customs service to react to the threats.
risk, threat and vulnerability.
An analyst can also assist in highlighting where
An example of how threat, risk and vulnerability
an organisation may wish to make changes
are seen together in context can be described in
to lower the risk of harm through making key
this analogy:
judgements, identifying intelligence or informa-
A castle has high, thick stone walls and is tion gaps and by reaching conclusions that can
guarded by armed personnel – knights. be reported upon.

 3. ANALYSIS GUIDELINES 3-3


C O N F I D E N T I A L

2. ANALYSTS AND EXPECTATIONS

2.1. Recruitment of Analysts 2.2. Development of Analysts

A nalysts produce useful intelligence reports


that enable the Customs organisation to
achieve its objectives.
Analysts should have access to a structured
training and development programme. The
programme should train new analysts and offer
continuous education as they progress through
All analysts, in line with international best prac-
their career. It should provide the analyst with an
tice, should be recruited on the basis of compe-
in depth understanding of analytical techniques
tence and merit – applicants for analyst vacancies
and concepts, such as the principles of the intel-
should therefore meet the required published
ligence cycle, evaluation of data, negotiation
selection criteria – normally provided in the form
skills (in order to agree customer requirements),
of an agreed Job Profile/Description (Appendix 1:
conceptual modelling, brainstorming techniques,
Example Job Profile – Intelligence Analyst).
collection, visualisation techniques like link and
Analysts need to be recruited according to event charting, assessment writing, and data
comprehensive, special criteria to ensure that manipulation.
they meet the benchmark standards of analytical
The training programme should allow time
competence expected of them. Analysts should be
for the  analyst to consolidate any learning
recruited from diverse backgrounds to ensure an
through  the practical application of techniques
even mix of skills and attributes. Diversity brings
back at the analyst’s normal place of work. Once
in a wider range of perspectives and insights,
sufficiently competent in basic analytical tech-
and improves the quality of intelligence analysis.
niques, the analyst should then be allowed to
Analysts are required to remain objective, but
move on to more complex and specialised training
their worldview is shaped by their experience. By
to meet any further training needs they may have.
employing a diverse mix of analysts, some of this
Analysts should be allowed time and financial
natural bias can be evened out.
support for their continuous professional devel-
Organisations should seek diversity in recruit- opment. Training an analyst can be costly, but
ment, but promote standardization in training. competent analysts help organisations to improve
Each analyst must be able to access training in their knowledge or threats and risks, and to allo-
analytical techniques, skills and concepts that are cate resources more effectively.
common to all analysts across the organisation.
2.3. Customer/Client/Sponsor
All recruitment for analyst positions must follow a
careful selection process to ensure that the candi-
Expectations of Analysis
dates have the skills and attributes that meet the Analysis supports decision-making and action
needs of the organisation, and to improve the by reducing uncertainty about threats. Analysts
of quality of intelligence assessment. In some work to meet the needs of Customers or Clients
organisations, this is achieved through a series (some organisations prefer the terms Sponsor or
of psychometric and occupational psychological Partner).
testing exercises followed by presentations and
Customers and clients include senior managers
interviews.
who generally want strategic level analysis that
Organisations should seek candidates with the helps them understand the broader perspective.
proper skills and attributes – intellectual curiosity, Analysts can also serve operations by highlighting
acuity in perception, critical thinking, writing abili- current trends in, say, smuggling and conceal-
ties – rather than specialised knowledge, which is ments methods. Analysis also serves targeting by
easier to inculcate. identifying indicators of risk.
The placement of the analysis unit in the organi- Customers/Clients/Sponsors have certain ex-
sation is explained in appendix 3. pectations of what they want the analysis to

3-4 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

consider and report upon. Some of these expec- 2.4. Analyst Expectations
tations are: of the Customer/Client/Sponsor
Timeliness – Analytical products should be
In order for an analyst’s time and expertise to
available in a timely fashion – there is little point
be used productively, the analyst has certain
in receiving the final analysis after the need to
expectations:
make an operational or tactical decision has
passed. Direction – When Customers/Clients/Sponsors
clearly articulate their needs, analysts are better
Focus –­ Analysis must concentrate on the issues
able to produce focussed and relevant products.
that need to be addressed. The analysis should
make key judgements and answer questions such Sources & Data Quality - Analysts must have
as what, why, where, when and how (how certain appropriate access to sources relevant to their
smuggling activity is increasing, why an organised role and the analysis they are undertaking. Any
crime group is operating in this way, when is a data that they collect and utilise needs to be of
certain target likely to travel etc.). sufficient quality so as to not call into question
the integrity of their analysis. Any data or infor-
Forward Looking – the analysis must look beyond
mation collected should be evaluated in accord-
the obvious and consider what may lie ahead.
ance with that organisation’s evaluation criteria
Depending on the context, analysts may be expect
(for example the 4x4 evaluation system). The data
to forecast – to precisely predict the future or to
should be made available in a readily accessible
conduct horizon scanning – exploring a number
format that can be readily retrieved and analysed
of alternate futures without assigning probability
by the analyst using appropriate software pack-
to them.
ages if required.
Clarity – the structure of an argumentation should
Support – Analysts should have the freedom to
be clear and logical. The analysts must clearly
produce intelligence analysis reports without
present the evidence and the reasoning behind
the interference of management, as long as the
their inferences and conclusions. The customer
intelligence products are rigorous and evidence-
must be able to understand what elements of the
based. Managers should ensure that analysts
analysis are facts and what are judgments.
have access to continuous professional develop-
Make Key Judgements – the analysis should make ment opportunities so that they can keep abreast
key judgements and answer questions such as of current analytical thinking and techniques.
what, why, where, when and how (how certain Analysts should have access to the right IT tools.
smuggling activity is increasing, why an organised Analysts perform best when they are allowed time
crime group is operating in this way, when is a and space to think, when they have access to the
certain target likely to travel etc.). right data and analytical tools, and when they are
Make Recommendations – Certain organisations allowed to interact freely with their counterparts
will expect analysts to provide recommendations in other law enforcement agencies. Managers of
to decision-makers on possible measures to analysts should create a workplace culture that
address threats, mitigate risks or improve intel- respects analytical dissent, imagination and crea-
ligence collection. Other organisations, however, tivity, while maintaining high standards of integrity
prefer to keep a wall between intelligence analysis and rigour.
and policy prescription, on grounds that policy An example of a task form that can be used as a
prescription might interfere with the objectivity of starting point for the delivery of tasks from the
the analytical process. customer to the analyst unit (Appendix 2: Task form).

 3. ANALYSIS GUIDELINES 3-5


C O N F I D E N T I A L

3. INTELLIGENCE CYCLE AND ANALYSIS CYCLE


Figure 1: An Example Intelligence and Analysis analysts should inform clients and revise the
Cycle terms of reference accordingly.
Results
3.1.2. Conceptual Modelling & Scoping

During the planning and direction stage of the


Evaluation Detection
cycle, analysts might undertake “Conceptual
Modelling” to gain a clearer understanding of
Planning and the task/concept being looked at. Conceptual
direction modelling is especially important if analysts have
no prior knowledge of the issue they have been
tasked to consider. It allows them to gain a basic
Dissemination Collection insight into the issue – identifying who, what, why,
where and when factors:

Analysis and • What is happening?


Processing
peer review • Who is involved?
• Where is it occurring?
• How it takes place?

I n the following sections the steps when under-


taking intelligence analysis using an Intelligence
Cycle model as a guide will be examined, including
• Why it is happening?
• When is it likely to/will happen
In devising the conceptual model, analysts have to
a brief Customs related example in each step. The
scope the issue they have been asked to consider,
upper part of the cycle – detection, results and
evaluation - is the operational part of the process through a variety of means, such as structured
of managing law enforcement by the means of brainstorming and mind-mapping exercises;
intelligence and knowledge production. I.e. after reading policy material or guidance conferring
the information has been collected, processed, with colleagues such as other analysts conferring
analysed and disseminated it needs to be put with experts on the specific issue reading back-
into the decision making process. If the decision ground research material.
makers choose to act upon the recommendations Collaboration between analysts allows for a greater
given as a result of the lower part of the circle, stream of ideas to be generated than perhaps one
then action is undertaken (e.g. detection), which person working on their own. By working together,
yields results, which are in turn evaluated and fed a team can come up with more and smarter ideas.
back into the planning and direction of further However, collaborative teams can fall into “group
intelligence or detection work. think”, a well-know analytical pitfall.
“Group think” is a process by which a group can
3.1. Planning & Direction make bad or irrational decisions as each member
(including project or programme of the group feels a compulsion to conform to the
management and planning) collective opinion of others in the group in order to
achieve a consensus of thought.
3.1.1. Tasking Definition and Terms
of Reference “Group think” can be negative in that it reduces
the willingness of those working in a group to:
When clients tasks analysts, they should define,
• come up with alternative ideas;
by way of negotiations, the terms of reference for
the work. The terms of reference should establish • gather information that may contradict the
the scope of the work, its objectives and timelines group consensus;
for completion. Should unexpected delays arise, • be critical of hypotheses.

3-6 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

A way to overcome “group think” and other forms Table 1: Example part 1: Scope, working
of collective analytical biases is to use structured hypothesis and indicators
analytical techniques, such as:
Scope:
Analysis of Competing Hypotheses (ACH) – Analysts Perform an analysis on an OCG suspected of smuggling
identify at least two mutually exclusive hypotheses drugs through your international airport.
Working hypothesis:
and review systematically all available evidence OCG named “X” has infiltrated the airport personnel and
to see if it confirms or contradicts each hypoth- uses this to facilitate drug mules’ way through the airport.
(The hypothesis includes the what, who, why and where,
esis. The analysts are actively looking to invali-
the when will be identified as a result of the analysis)
date hypotheses, not confirm them. In the end, the Indicators:
analysts may realise that the same set of evidence • We need to collect information regarding previous
seizures at the airport to establish whether there is a link
confirms a series of mutually exclusive hypotheses. to OCG “X”.
ACH is useful to counter “satisficing”, a cognitive • Seizures at other airports domestic or abroad are also
bias that leads analysts to stick with their favourite interesting.
• Also get an overview of personal at the airport and their
hypothesis and neglect alternative explanations. criminal records.
• Gather intelligence about OCG “X”.
Red teaming – An exercise where a team of   – Where do they operate
analysts take on the role of the opposition and   – Flights from these destinations, etc.
actively seeks vulnerabilities and weaknesses
in their organisations. By insufflating a spirit of 3.2. Collection
competition, red teaming stimulates the creativity
Collection is the process of identifying, planning and
of analysts and ensures that they consider a wider
gathering information and intelligence to support
range of possibilities in their analysis.
a tasking. Efficient collection should support the
Devil’s advocacy – A technique where some analysts indicators for the working hypotheses identified
systematically seeks arguments to contradict for testing – this is also known as the Intelligence
the consensus. This technique may be useful Requirement. The better the collection, the more
when analysts are discouraged by their peers or confident the analysts will be about their conclu-
management to contradict common wisdom. sions. If data sources are insufficient, the analysts
Once you have an idea of the issue or concern as may need to revisit the collection phase to identify
a result of the conceptual modelling process, an possible alternative sources of information.
analyst will then try to develop what are regarded The information collected may be anecdotal, descrip-
as working hypotheses and indicators. tive, quantitative or qualitative. The best analysis is
undertaken by the analyst seeking out the widest
3.1.3. Working Hypotheses and Indicators possible range of sources and then considering
their relative strengths and weaknesses as well as
Working Hypotheses and Indicators are scenarios the potential for contradictions and corroboration.
that explain what has happened or may happen. This disciplined approach will ensure that informa-
These hypotheses can be subjected to testing tion collection is comprehensive but focussed. A
through the identification, collection and analysis formally recorded data collection plan keeps track
of evidence. This technique allows the analysts to of how data collection is progressing.
avoid confining their data collection on the basis
of assumptions or preconceptions (bias). 3.3. Processing
The analysts must also identify indicators for each Processing encompasses evaluation and collation.
working hypothesis. The more indicators confirm
one hypothesis, the more confidence the analyst 3.3.1. Evaluation
is likely to have that the hypothesis itself is likely Evaluation is the assessment of the truthfulness
to be true. The indicators for the hypotheses form and reliability of the source of the information. It
the information or intelligence requirement to test is also the measurement of the validity of a partic-
each hypothesis and therefore provide the analyst ular piece of information. Evaluated information
with the basis for their data collection plan. can then be considered to be intelligence.

 3. ANALYSIS GUIDELINES 3-7


C O N F I D E N T I A L

Law Enforcement Agencies tend to evaluate data The reliability of the source is indicated by a letter
using either a 4x4 or 5x5 evaluation coding system. (normally “A” most reliable to “X” unknown or
This ensures that the information is tested appro- untested) and there is a separate grading for the
priately and takes into account: assessed validity of the information using a numeric
scale (where 1 is usually “confirmed” down to 4).
• the motives of the source in providing the
information; Evaluation systems are tiered so a 4 x 4 system
has four layers, a 5 x 5 system has five layers (so
• the dangers of deliberately false or misleading
A, B, C, D, X may be the alphabetic values for the
information;
source reliability and 1 through to 5 may be the
• using information that is second hand or out of numeric values for the validity of the data).
date; and
The example that follows represents a simple
• other biases that may be present that could in 4x4 evaluation system which is commonly used
turn skew any analysis of the intelligence at a internationally but this does vary from country
later stage. to country.

4x4 evaluation system

Evaluation of the source


Completely Usually Not usually Reliability
reliable in reliable reliable cannot be
all instances judged

A B C X

Accuracy not in doubt 1 A1 B1 C1 X1


Evaluation of the information

Known personally to the source but not


known personally to the official passing 2 A2 B2 C2 X2
it on

Not known personally to the source but


3 A3 B3 C3 X3
corroborated by other information held

Accuracy cannot be judged or corrobo-


4 A4 B4 C4 X4
rated in any way (at this time)

3.3.2. Collation Collation is the process of gathering all relevant


information and sifting out irrelevant and incor-
Table 2: Example part 2: Collected and processed rect information. Collation also involves storing
information information in a logical manner to find relation-
ships between sets of data.
Collected and processed information:
• We have found that several previous seizures can be
linked to OCG “X”. 3.4. Analysis and Peer Review
• There have also been related seizures at other airports.
• There are a number of employees at the different 3.4.1. Analysis
companies operating at the airport that have a crimi-
nal record. The aim of analysis and the analyst carrying out the
• We have information about the working shift for most
of the companies working at the terminal.
analysis is to draw an inference or conclusion from
• OCG “X” originates from a city “Y” abroad. the information available. Without analysis, infor-
• Our airport has several arrivals from the airport “Y” a mation remains just that – information, whereas by
week.
analysing the information, one can draw conclusions

3-8 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

from it and make it into valuable intelligence for the 3.4.2. Integration
organisation to act upon. There are primarily two cate-
gories of analysis – STRATEGIC and OPERATIONAL, The aim here is to combine, manipulate and
although in some organisations/administrations compare available relevant information, from the
there is also a third category – TACTICAL. many different sources, in formats that help the
analyst both understand the information but also
STRATEGIC analysis takes a range of data sources highlight gaps where additional information may
to produce an informed judgement or judgements be required to be collected.
(often referred to as Key Judgements) about a
At this stage of the analysis, the analyst may
targeted group’s capabilities, vulnerabilities, trends
use a variety of methods such as pivot tables
or patterns seen. STRATEGIC analysis considers the
in Microsoft Excel, link/association/ANACAPA
major issues of concern to an organisation (some-
charts, plot maps to help them visualise the data
times regarded as the higher level). This allows the
and organise it in such a way for them to identify
organisation to plan for interventions to prevent
trends, patterns or anomalies and make compari-
criminal activity becoming a significant problem or
sons with other data they may hold.
if it is a significant issue already, the best ways to
tackle that issue with a view to reducing the harm it Table 3: Example part 3: Integrated information
is causing the organisation or state/country. which will be interpreted and peer reviewed
TACTICAL analysis is used to identify ways of
providing a co-ordinated response to a linked series Integrated information:
• Each seizure both domestic and abroad has been made at
of targets or organised crime groups (OCGs) that times when only one or two Customs officers are on duty.
are threatening an organisation/state due to their • The drug mules carried the drug on their body or in
illegal activity. It is aimed at minimising or removing their baggage.
• Many of the mules came from airport “Y”.
the risk of threat to an organisation that the linked • At the time of almost all seizures person “Z”, working for
series of targets or OCGs poses to that organisation. a company in the baggage claim area, has been on duty.
• Person “Z” has a criminal record, and comes origi-
OPERATIONAL analysis is used to specifically target nally from city “Y” abroad.
a known objective such as disrupting a single organ-
ised crime group or a known criminal target and it
3.4.3. Interpretation
is aimed at removing the threat that that group or
person poses to the organisation or state/country. The critical element of analysis is the applica-
The aim of the analysis is to identify patterns or tion of sound reasoning to infer meaning from
trends in the person’s modus operandi with a view the information about the nature and extent of
to disrupting or dismantling their activity. the threat. Analysts interpret the information
Operational analysis takes many forms but is usually received, refine their working hypotheses and
made up of an intelligence file that contains as a develop new ones. Using tested evidence-based
minimum a written briefing or report, association hypotheses, analysts can produce a justifiable
or networking charts and spreadsheets containing briefing or report that provides key judgements,
schedules for things like travel undertaken, telephone a level of confidence, proposes further collection
calls made and received or a schedule of events that of data/information/intelligence or makes recom-
have taken place involving the target/suspect. mendations for further action.

Within Customs administrations, the type of anal- 3.4.4. Peer Review/Management Review
ysis may be blurred with combinations of opera-
In some Intelligence Cycle models, review comes
tional/tactical and tactical/strategic being seen
after Dissemination/Production. However, before
within the same product. In order to make stra-
any product issued by an analyst is sent out to the
tegic decisions, it is important to know the tactical
Customer/Client/Sponsor, the quality and integ-
and operational level.
rity of the analysis should be subject to robust
The Analysis stage of the intelligence cycle has review by fellow analysts and where appropriate
essentially two parts – integration and interpretation. the line manager of the analyst.

 3. ANALYSIS GUIDELINES 3-9


C O N F I D E N T I A L

The Peer Review allows for sufficient challenge to the Table 4: Example part 4: Dissemination
findings of the analyst to be made that will allow the
analyst to back up any arguments put forward and Dissemination:
• Hypothesis: OCG named “X” has infiltrated the airport
ensure that there is sufficient evidence to support personal and uses this to facilitate drug mules’ way
their findings. It also acts as a buffer to analyst bias through the airport. This is done by person “Z” giving
and “group think” bias that may have crept into the information about when Customs have few officers on
duty. The mules are coming from airport “Y”.
analysis during the production process. • Premises: The hypothesis is based on the premises
stated under integrated information.
3.5. Analysis Products • Further intelligence requirements/gaps: We need more
information before ruling out the possibility that person
and Dissemination “Z” or other persons also performs traditional “rip-
offs” by deviating baggage from Customs’ inspection.
This is where the conclusions of the analysis • Recommendations:
  – Put person “Z” under surveillance while on duty at
carried out are made known and published either the airport.
by way of written report with supporting charts,   – Extra staff without uniform on flights from airport
tables, graphs or other visual support or by way of “Y” and when person “Z” is on duty.
  – Extra profiling on these flights.
oral briefing and presentation – depending upon   – Identify probable contact between person “Z” and
both the type of analysis carried out and the crit- passengers on these flights.
ical timescales involved.
The conclusions should include the answers to the
3.6. Review/Feedback
Who, What, Where, How, Why and When questions
previously identified as Working Hypotheses and Following dissemination of the product, the analyst
Indicators. Where findings are inconclusive this or analyst manager should ensure that feedback
needs to be explained in the report including the from the Customer/Client/Sponsor has been
need for intelligence gaps to be filled and further obtained and any other views of others that have
analysis to be carried out. received the product should also be sought. In
Where written reports are published these may addition the analyst should take time to consider
be given different titles depending upon the type what went well during all stages of the process and
of analysis agreed at the start of the intelligence what they would prefer to do differently given an
cycle process – in the Planning and Direction opportunity to undertake similar work in the future.
Phase. This ensures that future assessments and reports
issued are of a better quality or resources are
Published product types include:
more adequately used because lessons have been
• information reports learned. In some instances there may be a need to
• risk/intelligence assessments review previously published analytical reporting in
a year or more’s time to see what if anything has
• intelligence alerts
changed since the previous report was published).
• intelligence bulletins & briefings
Table 5: Example part 5: Review/Feedback
• target, methodology & problem profiles
• operational analysis findings reports Review/Feedback:
• The standard of recommendations meets the require-
Methods of dissemination of a product inherently ments as reflected in the agreed Terms of Reference/
rely on the intended purpose and audience. The Tasking request
• The judgements behind the recommendations are well
most efficient and effective method of dissemina- supported by the evidence presented
tion should be identified because frequently the • The Analytical Product has been presented at the end
of the process that meets the intended needs
easiest method is not the most effective.
• The Analytical Product has contributed, directly or
The most effective way to disseminate information indirectly, to an improvement in successful targeting
or interception, further law enforcement activity or
depends on the current specific circumstances of changes in legislation or policy
the department, and the analyst should continually • Has helped enhance the reputation of the Customs
organisation
pay attention to what is appropriate and effective.

3-10 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

4. BIBLIOGRAPHY
––Revised Kyoto Convention, General Annex, ––Risk Analysis in the Field of Commercial Ope-
Guidelines, Chapter 6 Customs Control, rations, Version 02, April 2000, École Nationale
WCO des Douanes - Neuilly, French Customs & Excise
––Revised Kyoto Convention, General Annex – ––IEC/ISO 31010, Risk Management-Risk As-
Guidelines, Chapter 7, Application of Informa- sessment Techniques, Edition 1.0, 2009-11
tion and Communication Technology
––Crime Analysis Booklet, Interpol
––WCO Global Information and Intelligence
––Crime Analysis: From First Report to Final
Strategy
Arrest, Steven Gottlieb, 1994
––WCO Handbook for Commercial Fraud In-
––Introduction to Crime Analysis, Basic Re-
vestigators; Chapter V (Updated); Intelligence,
sources for Criminal Justice Practice, Debo-
Information Collection, Analysis and Dissemi-
rah Osborne, MA, Susan Wernicke, MS, The
nation
Haworth Press, 2003
––Data Mining in the Risk Management Pro-
––McDowell, Don. Strategic Intelligence: A Hand-
cess, WCO Electronic Crime Expert Group,
book for Practitioners, Managers, and Users,
December 2007, Annex IV to Doc. EC0215
Scarecrow Press 2009.
––CEN Manual
––Introductory Guide to Crime Analysis and
––Trade Compliance Risk Management Pro- Mapping, Rachel Boba, Ph.D., Community
cess, US Customs Service, Washington, DC, Oriented Policing Services, U.S. Department of
March 1999 Justice, 2001

 3. ANALYSIS GUIDELINES 3-11


C O N F I D E N T I A L

5. APPENDIXES
Appendix 1: Example Job Profile – Intelligence Analyst
Appendix 2: Task Form
Appendix 3: The placement of the analysis unit in the organisation
Appendix 4: Analysis Products

3-12 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

Appendix 1: Example Job Profile – Intelligence Analyst

Job Profile of and Intelligence Analyst Work Involves

1. Work will primarily be concerned with the


Overall responsibilities
production of assessments and reports
1. Identifying, interpreting and evaluating all through the collection, interpretation and
relevant data, information and intelligence to evaluation of all relevant data and information.
highlight current and future risks and threats Taking the initiative in formulating ideas and
through the delivery and use of intelligence recommendations.
assessments to an agreed standard. 2. Required to develop and maintain an expert
2. Ensure the use and development of analytical level knowledge of analytical methodology,
skills, tools and methodologies to enable legislation and specific subject matter
sound judgements and recommendations
3. Required to maintain and develop intelli-
in the provision of high quality, customer
gence flows and relationships with internal
focused products that inform management
and external stakeholders in order to inform
decisions.
product development.
3. Demonstrate at all times a comprehensive
4. Will provide peer review on other analyst’s
working knowledge of all legislation, policy and
product, and seek and act on feedback on own
procedures relating to intelligence handling.
product.
4. Provide professional advice, assistance and
5. Ensure that data gathered is managed and
effective guidance so that the required stand-
stored lawfully and appropriately and in
ards and timescales for products are met in
accordance with agreed procedures.
order to inform fully local and national tactical
and strategic priorities, tasking and opera-
tional or policy activity. Professional Skills

5. Apply professional standards when dealing Communication


with individuals, external organisations/agen-
1. Persuade and Influence: persuade others
cies and other colleagues at all times.
of the benefits of proposals or the value of a
Key Responsibilities particular interpretation.
2. Write effectively: produce written informa-
1. Produce Intelligence Assessments, Problem
tion which sets out key issues options and
Profiles, and analysis on specific operations
actions.
and targets as required.
2. Within your business area support the produc- Analysis and use of information
tion of regional tactical and national strategic 1. Gather & manage information: actively share
threat assessments in support of business information with colleagues and apply infor-
planning. mation management best practice
3. Establish and develop relationships with 2. Generate & evaluate options: produce and
both internal and external stakeholders and evaluate a range of useable options for
respond to requests for information. resolving problems.
4. Support the Professional Head of Intelligence
People Management
Analysis in the organisation in the develop-
ment of intelligence analysis capability in 1. Set Direction: Ensure others understand their
accordance with intelligence principles and roles, objectives and how they contribute to
priorities. team/unit performance

 3. ANALYSIS GUIDELINES 3-13


C O N F I D E N T I A L

2. Develop good working relationships: Build Development Opportunities


co-operative relationships and encourage
participation 1. The role will offer the successful candidate
the opportunity to directly contribute to strate-
Project and Program Management (PPM)
gies for lowering the level of unmitigated risk
1. Establish and maintain good stakeholder rela- currently facing the organisation.
tionships: maintain strong relations with stake-
2. These posts will offer the opportunity to
holders internal and external, ensure that the
develop new skills in a highly specialised role.
project plan and key delivery dates are main-
Successful applicants will undergo a compre-
tained to ensure efficient use of resources.
hensive training programme which will
Where project plan is faltering, a revised plan
include analytical techniques, intelligence and
should be devised {to rectify – rephrase}
relevant IT training. Continual professional
2. Apply PPM tools: Understand and apply PPM development will be encouraged to provide
techniques relevant to delivery of business the successful candidate with opportunities to
objectives in my work area develop their analytical career.

3-14 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

Appendix 2: Task Form

Sample Task Form

TASK FORM

TITLE
(Working hypothesis)

OPERATIVE TACTICAL STRATEGIC

PURPOSE OF ANALYSIS

ANALYSTS COMMENTS

DATE, TASK RECEPTION:

DATE, INITIATION OF ANALYSIS:

DATE, DELIVERY OF ANALYSIS:

COMMENTS
(E.g. resources, participants in the task group, financial frame, update meetings between client-analyst)

CLIENT/SPONSOR ANALYST

Name: Name:

Date: Date:

Signature: Signature:

 3. ANALYSIS GUIDELINES 3-15


C O N F I D E N T I A L

Appendix 3: The placement common issues that need to be addressed when


of the analysis unit in the organisation considering this matter. The most important issue
within an effective risk management system is the
The placement of the analysis unit relationship between the Analysis Unit and the top
in the organisation management. Ideally the Analysis Unit should be
placed right beneath the top level management,
Careful thought and consideration should be given which secures its independence from the different
when deciding where to place an analysis unit custom fields they are supposed to serve. In the
within the Customs organisation. Naturally each example below the Analysis Unit is placed right
country has its own organisational model, and it beneath the top level management and serves
is therefore difficult to give a blueprint of how this therefore all departments related to Customs and
should be solved. Nevertheless, there are some excise matters.

Example of organisational hierarchy and the analysis unit’s location in the organisation

Management

Information
Center
Analysis Unit

Controller Unit

Customs
Administration Customs Enforcement Legal
Treasurer’s
Department Department Department Department
Department

In the example above, the Analysis Unit serve both When it comes to the placement of the intelli-
the top level management and the Departments gence functions in the organisation there are two
related to Customs and excise matters, which main solutions. The more conservative one is that
in this case are the Customs Department and the intelligence is located in each department,
the Enforcement Department. This solution which makes it specialized towards that partic-
makes it easier for the top level Management to ular departments main tasks. The more radical
use the Analysis Unit as an unbiased source of solution, and maybe the most effective in terms of
information concerning the different operational an integrated risk management system is to place
departments. In such a system it is critical that the intelligence together with the analysis unit,
the Analysis Unit has recruited experts from all covering all the different areas of detection and
different fields they are serving. In this model, enforcement. This solution also makes it easier
the Analysis Unit will both be used as a tool for for the management in the Customs organisation
the Top level Management, and for the depart- to secure that the organisations intelligence work
ment managers. Tasks can therefore be given to is focused in accordance with the risk assess-
the Analysis Unit by both top level and mid level ments in order to at all time be able to fill the
management. intelligence gaps that are identified.

3-16 3. ANALYSIS GUIDELINES 


C O N F I D E N T I A L

Appendix 4: Analysis Products Some Analysis Products:

• Alerts are warning messages highlighting, for


Analysis Products and Decision-Makers:
example, a new trend involving an unusual modus
Analysis products are used primarily by Customs operandi, new itinerary for drug trafficking,
decision-makers at all levels to support their deci- etc., and are accompanied by visual supports,
sion-making processes. where appropriate (Such as the WCO Customs
Enforcement Network (CEN) Alerts which are
Policy makers in Headquarters advise Ministers
regularly uploaded onto the WCO CEN-Website).
and officials in other Ministries and take decisions
about the overall aims and objectives of Customs • Bulletins are short documents that describe a
Administrations and about the policies required to tactical/operational short-term trend or pattern.
implement them. • Periodical Reports convey the same informa-
Managers of front-line units and Investigation tion at regular intervals (weekly, monthly or
Services and operational policy divisions within quarterly) about activities and enable problems
Headquarters take decisions on planning and to be identified.
the deployment of front-line resources to achieve • Annual Reports provide information aggregated
operational objectives in the most effective and by year and are published on a yearly basis
efficient way. (Such as the WCO Annual Reports on Drugs,
Front-line units, on the other hand, constantly take Tobacco and IPR which are regularly uploaded
decisions about whom to deal with and how. onto the WCO CEN-Website).

 3. ANALYSIS GUIDELINES 3-17

You might also like