1. 2 Collecting information on border control database Information from border interception cases...

10
IDENTIFYING THREATS AND MITIGATING RISK TO MALDIVIAN IMMIGRATION BORDER 1

Transcript of 1. 2 Collecting information on border control database Information from border interception cases...

Page 1: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

IDENTIFYING THREATS AND MITIGATING RISK TO MALDIVIAN IMMIGRATION BORDER 1

Page 2: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

ENDURING THEME

BE PROACTIVE & REACTIVE

2

Page 3: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

INFORMATION COLLECTION

Collecting information on border control database Information from border interception cases

(incident report) Intelligence from foreign Intel alerts (SIGIT) Information from open source Information and intelligence collected from covert

and overt operations (HUMIT)

3

Page 4: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

INCIDENT REPORT

4

Page 5: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

5

INCIDENT REPORT

Page 6: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

DATA SHEET

6

Page 7: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

INVESTIGATING AND ANALYZING INFORMATION

Verifying information Reliability and credibility of source Investigating Classification of data Collation Analyzing data Identifying and prioritizing threats (threat & risk

assessment) Developing analytical reports

7

Page 8: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

ASSESSING AND REPORTING INFORMATION

Analysis report for policy makers Intelligence alert for border control Feedback and reassessing threats

8

Page 9: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

INTEL ALERT

9

Page 10: 1. 2  Collecting information on border control database  Information from border interception cases (incident report)  Intelligence from foreign Intel.

STICKING A BALANCE

Facilitation & Security

10