24 Sep 2017
3 min read
Intelligence assessment at the CIB typically involves the following: overall planning and direction, collection of information; processing of information, data collation and analysis and dissemination of data. CIB officers usually work with large quantities of information, and they always run the risk of making a decision based on information that might be inaccurate. In order to minimise such mistakes, the CIB develops a close working relationship with analysts (usually experienced senior police officers) who understand how to manage, compile and analyse such information, as well as with intelligence officers, who know of the best ways to obtain information. All the pertinent information is gathered legally--the CIB prohibits illegal methods of obtaining information.
Information is mainly collected through overt as well as covert methods. An example of overt information collection would be an investigator interviewing a witness of a crime. It's a method of collecting information through interactions with individuals, who could be witnesses to crimes, victims of crimes or suspects. It may also include obtaining information from newspaper reports and public records. On the other hand, covert methods make use of what's known as 'intelligence gathering'. An example of covert information collection would be when physical or electronic surveillance is used to gather data on criminal activities.
Once the information is collected, the intelligence unit then devotes itself into connecting the dots--by processing the available data to eliminate irrelevant, incorrect information--and putting the available information in logical order. The CIB also uses techniques like investigative analysis--one of the most critical ways of processing data--which involves telephone-record analyses; business-record analyses; case analyses; conversation analyses and so on. The intelligence team also uses software especially created for police work. In the data collation and analysis phase, CIB experts find meaning in the nuggets and patterns of data, after which they share the information with other appropriate law-enforcement agencies. This is how even the most trivial information--oftentimes born of instincts and hunches--turns into intelligence.
For part I, click here.
For part III, click here.