Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9 11 Commission Report — Part 3
Page 35
35 / 81
Step 2 — Directing collection to fill the gaps
After the analysts have compieted this process, the next step is to collect the
information we need to resolve the intelligence gaps that remain, At Headquarters,
the Ol issues reports listing the remaining gaps. Based on these lists, investigators
on squads, in resident agencies, and on task forces are then tasked to collect the
needed information using all available investigative tools, including cultivation of
new sources. In instances where a national information gathering effort is required,
collection may be coordinated through the NJTTF, bringing the significant resources
of our federal, state, and municipal partners to bear on the problem.
Step 3 — Answering the questions
Once we have gathered sufficient information to resolve a particular gap, agents
and analysts consolidate and analyze the information collected and generate
intelligence products for the widest possible audience. Intelligence Infarmation
Reports (I/Rs) are issued to share raw intelligence. intelligence Assessments
are issued to share value-added assessments of criminal or national security
threats.
Step 4 ~ Ensuring the answers get to the right people
The final step is to share those intelligence products as widely as possible.
Dissemination is coordinated by Headquarters intelligence entities and by FIGs
in the field
Baselining of Sources
On December 15, 2003, we directed ali field offices to enter information into a database
on every collection source they have, the source’s history and motivation for working with
us, and what information that source is providing. This effort is helping us to know what
sources we have, what we should be reporting in intelligence products from those sources,
and where we have key gaps in our collection capability that must be filled through targeted
collection strategies
Analytical Assets
Since September 11, 2001, we have taken a number of important steps to build an analytic
workforce capable of addressing the new threat environment.
Hiring—We have hired 460 analysts, and we are working to hire hundreds more
in 2004 We also implemented a comprehensive recruitment strategy for analysts
that includes a targeted marketing plan, develapment of a team of 20. analysts
trained to serve as analyst recruiters, and a new tuition reimbursement plan.
Training—We created the College of Analytical Studies to provide analysts with
a formal training program. The curriculum was developed with recommendations
and participation from the CIA’s Sherman Kent School, the Joint Military
Intelligence College and private educational institutions. In FY 2003, the College
of Analytical Studies trained 932 FBI and 14 DOJ personnel. The training
cansisted of basic and advanced courses at Quantico, as well as CIA courses
for FB! personnel in the field.
29 000000368
eae
aa
“a
Be
Mee
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic