Professional Documents
Culture Documents
ANALYSIS GUIDELINES
C O N F I D E N T I A L
CONTENTS
1. INTRODUCTION
1.1. What is Analysis?
1.2. What is the Purpose of Analysis?
2. ANALYSTS AND EXPECTATIONS
2.1. Recruitment of Analysts
2.2. Development of Analysts
2.3. Customer/Client/Sponsor Expectations of Analysis
2.4. Analyst Expectations of the Customer/Client/Sponsor
3. INTELLIGENCE CYCLE AND ANALYSIS CYCLE
3.1. Planning & Direction (including project or programme management and planning)
3.1.1. Tasking Definition and Terms of Reference
3.1.2. Conceptual Modelling & Scoping
3.1.3. Working Hypotheses and Indicators
3.2. Collection
3.3. Processing
3.3.1. Evaluation
3.3.2. Collation
3.4. Analysis and Peer Review
3.4.1. Analysis
3.4.2. Integration
3.4.3. Interpretation
3.4.4. Peer Review/Management Review
3.5. Analysis Products and Dissemination
3.6. Review/Feedback
4. BIBLIOGRAPHY
5. APPENDIXES
Appendix 1: Example Job Profile – Intelligence Analyst
Appendix 2: Task Form
Appendix 3: The placement of the analysis unit in the organisation
Appendix 4: Analysis Products
1. INTRODUCTION
consider and report upon. Some of these expec- 2.4. Analyst Expectations
tations are: of the Customer/Client/Sponsor
Timeliness – Analytical products should be
In order for an analyst’s time and expertise to
available in a timely fashion – there is little point
be used productively, the analyst has certain
in receiving the final analysis after the need to
expectations:
make an operational or tactical decision has
passed. Direction – When Customers/Clients/Sponsors
clearly articulate their needs, analysts are better
Focus – Analysis must concentrate on the issues
able to produce focussed and relevant products.
that need to be addressed. The analysis should
make key judgements and answer questions such Sources & Data Quality - Analysts must have
as what, why, where, when and how (how certain appropriate access to sources relevant to their
smuggling activity is increasing, why an organised role and the analysis they are undertaking. Any
crime group is operating in this way, when is a data that they collect and utilise needs to be of
certain target likely to travel etc.). sufficient quality so as to not call into question
the integrity of their analysis. Any data or infor-
Forward Looking – the analysis must look beyond
mation collected should be evaluated in accord-
the obvious and consider what may lie ahead.
ance with that organisation’s evaluation criteria
Depending on the context, analysts may be expect
(for example the 4x4 evaluation system). The data
to forecast – to precisely predict the future or to
should be made available in a readily accessible
conduct horizon scanning – exploring a number
format that can be readily retrieved and analysed
of alternate futures without assigning probability
by the analyst using appropriate software pack-
to them.
ages if required.
Clarity – the structure of an argumentation should
Support – Analysts should have the freedom to
be clear and logical. The analysts must clearly
produce intelligence analysis reports without
present the evidence and the reasoning behind
the interference of management, as long as the
their inferences and conclusions. The customer
intelligence products are rigorous and evidence-
must be able to understand what elements of the
based. Managers should ensure that analysts
analysis are facts and what are judgments.
have access to continuous professional develop-
Make Key Judgements – the analysis should make ment opportunities so that they can keep abreast
key judgements and answer questions such as of current analytical thinking and techniques.
what, why, where, when and how (how certain Analysts should have access to the right IT tools.
smuggling activity is increasing, why an organised Analysts perform best when they are allowed time
crime group is operating in this way, when is a and space to think, when they have access to the
certain target likely to travel etc.). right data and analytical tools, and when they are
Make Recommendations – Certain organisations allowed to interact freely with their counterparts
will expect analysts to provide recommendations in other law enforcement agencies. Managers of
to decision-makers on possible measures to analysts should create a workplace culture that
address threats, mitigate risks or improve intel- respects analytical dissent, imagination and crea-
ligence collection. Other organisations, however, tivity, while maintaining high standards of integrity
prefer to keep a wall between intelligence analysis and rigour.
and policy prescription, on grounds that policy An example of a task form that can be used as a
prescription might interfere with the objectivity of starting point for the delivery of tasks from the
the analytical process. customer to the analyst unit (Appendix 2: Task form).
A way to overcome “group think” and other forms Table 1: Example part 1: Scope, working
of collective analytical biases is to use structured hypothesis and indicators
analytical techniques, such as:
Scope:
Analysis of Competing Hypotheses (ACH) – Analysts Perform an analysis on an OCG suspected of smuggling
identify at least two mutually exclusive hypotheses drugs through your international airport.
Working hypothesis:
and review systematically all available evidence OCG named “X” has infiltrated the airport personnel and
to see if it confirms or contradicts each hypoth- uses this to facilitate drug mules’ way through the airport.
(The hypothesis includes the what, who, why and where,
esis. The analysts are actively looking to invali-
the when will be identified as a result of the analysis)
date hypotheses, not confirm them. In the end, the Indicators:
analysts may realise that the same set of evidence • We need to collect information regarding previous
seizures at the airport to establish whether there is a link
confirms a series of mutually exclusive hypotheses. to OCG “X”.
ACH is useful to counter “satisficing”, a cognitive • Seizures at other airports domestic or abroad are also
bias that leads analysts to stick with their favourite interesting.
• Also get an overview of personal at the airport and their
hypothesis and neglect alternative explanations. criminal records.
• Gather intelligence about OCG “X”.
Red teaming – An exercise where a team of – Where do they operate
analysts take on the role of the opposition and – Flights from these destinations, etc.
actively seeks vulnerabilities and weaknesses
in their organisations. By insufflating a spirit of 3.2. Collection
competition, red teaming stimulates the creativity
Collection is the process of identifying, planning and
of analysts and ensures that they consider a wider
gathering information and intelligence to support
range of possibilities in their analysis.
a tasking. Efficient collection should support the
Devil’s advocacy – A technique where some analysts indicators for the working hypotheses identified
systematically seeks arguments to contradict for testing – this is also known as the Intelligence
the consensus. This technique may be useful Requirement. The better the collection, the more
when analysts are discouraged by their peers or confident the analysts will be about their conclu-
management to contradict common wisdom. sions. If data sources are insufficient, the analysts
Once you have an idea of the issue or concern as may need to revisit the collection phase to identify
a result of the conceptual modelling process, an possible alternative sources of information.
analyst will then try to develop what are regarded The information collected may be anecdotal, descrip-
as working hypotheses and indicators. tive, quantitative or qualitative. The best analysis is
undertaken by the analyst seeking out the widest
3.1.3. Working Hypotheses and Indicators possible range of sources and then considering
their relative strengths and weaknesses as well as
Working Hypotheses and Indicators are scenarios the potential for contradictions and corroboration.
that explain what has happened or may happen. This disciplined approach will ensure that informa-
These hypotheses can be subjected to testing tion collection is comprehensive but focussed. A
through the identification, collection and analysis formally recorded data collection plan keeps track
of evidence. This technique allows the analysts to of how data collection is progressing.
avoid confining their data collection on the basis
of assumptions or preconceptions (bias). 3.3. Processing
The analysts must also identify indicators for each Processing encompasses evaluation and collation.
working hypothesis. The more indicators confirm
one hypothesis, the more confidence the analyst 3.3.1. Evaluation
is likely to have that the hypothesis itself is likely Evaluation is the assessment of the truthfulness
to be true. The indicators for the hypotheses form and reliability of the source of the information. It
the information or intelligence requirement to test is also the measurement of the validity of a partic-
each hypothesis and therefore provide the analyst ular piece of information. Evaluated information
with the basis for their data collection plan. can then be considered to be intelligence.
Law Enforcement Agencies tend to evaluate data The reliability of the source is indicated by a letter
using either a 4x4 or 5x5 evaluation coding system. (normally “A” most reliable to “X” unknown or
This ensures that the information is tested appro- untested) and there is a separate grading for the
priately and takes into account: assessed validity of the information using a numeric
scale (where 1 is usually “confirmed” down to 4).
• the motives of the source in providing the
information; Evaluation systems are tiered so a 4 x 4 system
has four layers, a 5 x 5 system has five layers (so
• the dangers of deliberately false or misleading
A, B, C, D, X may be the alphabetic values for the
information;
source reliability and 1 through to 5 may be the
• using information that is second hand or out of numeric values for the validity of the data).
date; and
The example that follows represents a simple
• other biases that may be present that could in 4x4 evaluation system which is commonly used
turn skew any analysis of the intelligence at a internationally but this does vary from country
later stage. to country.
A B C X
from it and make it into valuable intelligence for the 3.4.2. Integration
organisation to act upon. There are primarily two cate-
gories of analysis – STRATEGIC and OPERATIONAL, The aim here is to combine, manipulate and
although in some organisations/administrations compare available relevant information, from the
there is also a third category – TACTICAL. many different sources, in formats that help the
analyst both understand the information but also
STRATEGIC analysis takes a range of data sources highlight gaps where additional information may
to produce an informed judgement or judgements be required to be collected.
(often referred to as Key Judgements) about a
At this stage of the analysis, the analyst may
targeted group’s capabilities, vulnerabilities, trends
use a variety of methods such as pivot tables
or patterns seen. STRATEGIC analysis considers the
in Microsoft Excel, link/association/ANACAPA
major issues of concern to an organisation (some-
charts, plot maps to help them visualise the data
times regarded as the higher level). This allows the
and organise it in such a way for them to identify
organisation to plan for interventions to prevent
trends, patterns or anomalies and make compari-
criminal activity becoming a significant problem or
sons with other data they may hold.
if it is a significant issue already, the best ways to
tackle that issue with a view to reducing the harm it Table 3: Example part 3: Integrated information
is causing the organisation or state/country. which will be interpreted and peer reviewed
TACTICAL analysis is used to identify ways of
providing a co-ordinated response to a linked series Integrated information:
• Each seizure both domestic and abroad has been made at
of targets or organised crime groups (OCGs) that times when only one or two Customs officers are on duty.
are threatening an organisation/state due to their • The drug mules carried the drug on their body or in
illegal activity. It is aimed at minimising or removing their baggage.
• Many of the mules came from airport “Y”.
the risk of threat to an organisation that the linked • At the time of almost all seizures person “Z”, working for
series of targets or OCGs poses to that organisation. a company in the baggage claim area, has been on duty.
• Person “Z” has a criminal record, and comes origi-
OPERATIONAL analysis is used to specifically target nally from city “Y” abroad.
a known objective such as disrupting a single organ-
ised crime group or a known criminal target and it
3.4.3. Interpretation
is aimed at removing the threat that that group or
person poses to the organisation or state/country. The critical element of analysis is the applica-
The aim of the analysis is to identify patterns or tion of sound reasoning to infer meaning from
trends in the person’s modus operandi with a view the information about the nature and extent of
to disrupting or dismantling their activity. the threat. Analysts interpret the information
Operational analysis takes many forms but is usually received, refine their working hypotheses and
made up of an intelligence file that contains as a develop new ones. Using tested evidence-based
minimum a written briefing or report, association hypotheses, analysts can produce a justifiable
or networking charts and spreadsheets containing briefing or report that provides key judgements,
schedules for things like travel undertaken, telephone a level of confidence, proposes further collection
calls made and received or a schedule of events that of data/information/intelligence or makes recom-
have taken place involving the target/suspect. mendations for further action.
Within Customs administrations, the type of anal- 3.4.4. Peer Review/Management Review
ysis may be blurred with combinations of opera-
In some Intelligence Cycle models, review comes
tional/tactical and tactical/strategic being seen
after Dissemination/Production. However, before
within the same product. In order to make stra-
any product issued by an analyst is sent out to the
tegic decisions, it is important to know the tactical
Customer/Client/Sponsor, the quality and integ-
and operational level.
rity of the analysis should be subject to robust
The Analysis stage of the intelligence cycle has review by fellow analysts and where appropriate
essentially two parts – integration and interpretation. the line manager of the analyst.
The Peer Review allows for sufficient challenge to the Table 4: Example part 4: Dissemination
findings of the analyst to be made that will allow the
analyst to back up any arguments put forward and Dissemination:
• Hypothesis: OCG named “X” has infiltrated the airport
ensure that there is sufficient evidence to support personal and uses this to facilitate drug mules’ way
their findings. It also acts as a buffer to analyst bias through the airport. This is done by person “Z” giving
and “group think” bias that may have crept into the information about when Customs have few officers on
duty. The mules are coming from airport “Y”.
analysis during the production process. • Premises: The hypothesis is based on the premises
stated under integrated information.
3.5. Analysis Products • Further intelligence requirements/gaps: We need more
information before ruling out the possibility that person
and Dissemination “Z” or other persons also performs traditional “rip-
offs” by deviating baggage from Customs’ inspection.
This is where the conclusions of the analysis • Recommendations:
– Put person “Z” under surveillance while on duty at
carried out are made known and published either the airport.
by way of written report with supporting charts, – Extra staff without uniform on flights from airport
tables, graphs or other visual support or by way of “Y” and when person “Z” is on duty.
– Extra profiling on these flights.
oral briefing and presentation – depending upon – Identify probable contact between person “Z” and
both the type of analysis carried out and the crit- passengers on these flights.
ical timescales involved.
The conclusions should include the answers to the
3.6. Review/Feedback
Who, What, Where, How, Why and When questions
previously identified as Working Hypotheses and Following dissemination of the product, the analyst
Indicators. Where findings are inconclusive this or analyst manager should ensure that feedback
needs to be explained in the report including the from the Customer/Client/Sponsor has been
need for intelligence gaps to be filled and further obtained and any other views of others that have
analysis to be carried out. received the product should also be sought. In
Where written reports are published these may addition the analyst should take time to consider
be given different titles depending upon the type what went well during all stages of the process and
of analysis agreed at the start of the intelligence what they would prefer to do differently given an
cycle process – in the Planning and Direction opportunity to undertake similar work in the future.
Phase. This ensures that future assessments and reports
issued are of a better quality or resources are
Published product types include:
more adequately used because lessons have been
• information reports learned. In some instances there may be a need to
• risk/intelligence assessments review previously published analytical reporting in
a year or more’s time to see what if anything has
• intelligence alerts
changed since the previous report was published).
• intelligence bulletins & briefings
Table 5: Example part 5: Review/Feedback
• target, methodology & problem profiles
• operational analysis findings reports Review/Feedback:
• The standard of recommendations meets the require-
Methods of dissemination of a product inherently ments as reflected in the agreed Terms of Reference/
rely on the intended purpose and audience. The Tasking request
• The judgements behind the recommendations are well
most efficient and effective method of dissemina- supported by the evidence presented
tion should be identified because frequently the • The Analytical Product has been presented at the end
of the process that meets the intended needs
easiest method is not the most effective.
• The Analytical Product has contributed, directly or
The most effective way to disseminate information indirectly, to an improvement in successful targeting
or interception, further law enforcement activity or
depends on the current specific circumstances of changes in legislation or policy
the department, and the analyst should continually • Has helped enhance the reputation of the Customs
organisation
pay attention to what is appropriate and effective.
4. BIBLIOGRAPHY
––Revised Kyoto Convention, General Annex, ––Risk Analysis in the Field of Commercial Ope-
Guidelines, Chapter 6 Customs Control, rations, Version 02, April 2000, École Nationale
WCO des Douanes - Neuilly, French Customs & Excise
––Revised Kyoto Convention, General Annex – ––IEC/ISO 31010, Risk Management-Risk As-
Guidelines, Chapter 7, Application of Informa- sessment Techniques, Edition 1.0, 2009-11
tion and Communication Technology
––Crime Analysis Booklet, Interpol
––WCO Global Information and Intelligence
––Crime Analysis: From First Report to Final
Strategy
Arrest, Steven Gottlieb, 1994
––WCO Handbook for Commercial Fraud In-
––Introduction to Crime Analysis, Basic Re-
vestigators; Chapter V (Updated); Intelligence,
sources for Criminal Justice Practice, Debo-
Information Collection, Analysis and Dissemi-
rah Osborne, MA, Susan Wernicke, MS, The
nation
Haworth Press, 2003
––Data Mining in the Risk Management Pro-
––McDowell, Don. Strategic Intelligence: A Hand-
cess, WCO Electronic Crime Expert Group,
book for Practitioners, Managers, and Users,
December 2007, Annex IV to Doc. EC0215
Scarecrow Press 2009.
––CEN Manual
––Introductory Guide to Crime Analysis and
––Trade Compliance Risk Management Pro- Mapping, Rachel Boba, Ph.D., Community
cess, US Customs Service, Washington, DC, Oriented Policing Services, U.S. Department of
March 1999 Justice, 2001
5. APPENDIXES
Appendix 1: Example Job Profile – Intelligence Analyst
Appendix 2: Task Form
Appendix 3: The placement of the analysis unit in the organisation
Appendix 4: Analysis Products
TASK FORM
TITLE
(Working hypothesis)
PURPOSE OF ANALYSIS
ANALYSTS COMMENTS
COMMENTS
(E.g. resources, participants in the task group, financial frame, update meetings between client-analyst)
CLIENT/SPONSOR ANALYST
Name: Name:
Date: Date:
Signature: Signature:
Example of organisational hierarchy and the analysis unit’s location in the organisation
Management
Information
Center
Analysis Unit
Controller Unit
Customs
Administration Customs Enforcement Legal
Treasurer’s
Department Department Department Department
Department
In the example above, the Analysis Unit serve both When it comes to the placement of the intelli-
the top level management and the Departments gence functions in the organisation there are two
related to Customs and excise matters, which main solutions. The more conservative one is that
in this case are the Customs Department and the intelligence is located in each department,
the Enforcement Department. This solution which makes it specialized towards that partic-
makes it easier for the top level Management to ular departments main tasks. The more radical
use the Analysis Unit as an unbiased source of solution, and maybe the most effective in terms of
information concerning the different operational an integrated risk management system is to place
departments. In such a system it is critical that the intelligence together with the analysis unit,
the Analysis Unit has recruited experts from all covering all the different areas of detection and
different fields they are serving. In this model, enforcement. This solution also makes it easier
the Analysis Unit will both be used as a tool for for the management in the Customs organisation
the Top level Management, and for the depart- to secure that the organisations intelligence work
ment managers. Tasks can therefore be given to is focused in accordance with the risk assess-
the Analysis Unit by both top level and mid level ments in order to at all time be able to fill the
management. intelligence gaps that are identified.