StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Collection Plan for the Scenario - Coursework Example

Cite this document
Summary
"Collection Plan for the Scenario" paper contains the plan that enables the protection of the IMDEX Asia boat. The addition of COMINT enables protection from any other forces that may have objectives over the boat. The study discusses the multi-INT collection plan against different targets. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Collection Plan for the Scenario
Read Text Preview

Extract of sample "Collection Plan for the Scenario"

Collection Plan for the Scenario ID Executive Summary The application of intelligence aspects in the collection of data developed into information useful in the different command units provides the necessary information that guides teams in the battlefield. Through these, information on different intelligence aspects is collected that the teams relies on. These ranges from Human Intelligence data (HUMINT), Signals Intelligence (SIGINT), Measurement and Signature Intelligence (MASINT), Open-source Intelligence (OSINT) and Imagery Intelligence (IMINT). All these forms provide information collected for consumption with regard to the plan. These reflect the data collection process. The intelligence obtained from these sources provides the teams with abilities to handle counter terrorism aspects, counter narcotics aspects, military proliferation aspects and the weapons system performance. Through these, the teams prove ready to counter the enemy incase of any scenario that involves an attack. The information is applicable to the situation of IMDEX Asia through which the boat is protected from any activities that may signal terrorism or an attack. In conclusion, the plan enables the protection of the IMDEX Asia boat and its contents. Addition of COMINT enables protection from any other forces that may have objectives over the boat. Collection Plan for the Scenario Introduction In developing useful intelligence information for a given reason that could include the aversion of a terrorist attack or the prevention of crime, there is need to obtain facts from the ground that provide the necessary guides for the arrest of the situation or the development of the necessary control measures to protect against it (Fredbizopps.gov, 2012). For effectiveness of the intelligence, the management of the intelligence collection process from the identification of the necessary information to the collection and organization of the data, the different results yielded require through consideration before consumption. Organizing the data collected and managing it for consumption entails the whole intelligence process. In the present situation, the information provided below aims at aiding the officers develops intelligence and information useful in dealing with the situation and identifying any threats that may arise from the sale of the item to either the terrorists or any other group of individuals. The information is developed and provided to the different operational teams for positively consumption to combat the situation. In addition, ensure that the resulting effect is not of any effect of negative nature to the respective country they represent or the international community. The reaction to the data collected bases on the different validation aspects that the data satisfies. The study detailed below discusses the multi-INT collection plan against the different targets in the scenario. Describe the Collection Scenario The collection scenario will aim at gathering all the necessary data about the scenario in the case provided. The collection will have specific targets based on the relevance of the data that the team is in position to collect from these targets. The different targets that the intelligence teams aim at gathering the information on include the counterterrorism effort, the effort to combat the narcotics business and counter proliferation. For effective collection of the data for this scenario, there is need to have a well-trained resourceful team with a number of members that understand the common language in the areas that these threats are standing. These will provide the aid in translating the different information and obtaining information from the field that is necessary to add to the current intelligence knowledge available. These provide the specific targets that the INT group needs to focus on. The group will obtain more information on the scenarios provided and obtain even more information that may provide a different opinion. For proper intelligence and effective application of it, there is need to keep an open mind for the data collected to ensure that any necessary additions are made to cater for any changes that may yield. Among the specific targets, that the team will prevent these named aspects above from reaching is the IMDEX Asia boat whose guard has a problem with drinking. This will require a selection of a person to lie close to the boat and keep watch of it over a telescope. The personnel will be recruited to ensure that any approaching items are detected earlier and eliminated before encounter. Development of an alerting system around the boat’s vicinity will provide a signal incase of any item coming from the outside into the boat. The timing will require a good sense of concentration on the plan. Timing these will require an infiltration into the schedules of the different situations provided. Obtaining the schedule of the event and keeping a close watch of the date will provide the team with better insight into the event. Timing requires that all activities be scheduled and synchronized earlier to give the team’s ample time to comb the area and identify any situations that may prove harmful. Through timing, the intelligence gathers information that ensures that the teams move in early to ensure that the whole area is secure and under protection free from the enemy. The methods of data collection for the intelligence information require that much emphasis be placed in the aspect of secrecy. After which the data undergoes analysis (Hall & Citrenbaum, 2009). These will require provision of digital items and the use of information technology and war satellites to help in locating the enemy and tapping into their systems to obtain any necessary information. The use of physical messengers of personnel that obtain information from one end and move it to another also aids in the collecting of data. Application of different multi sensor objects also aid in the provision of information from the ground. Securing a team member from the enemy in arrest would also provide a good source of data that will enable the team understand their plan. All these means prove applicable in the collection of data based on the different forms of data needed. These forms range from Human Intelligence data (HUMINT), Signals Intelligence (SIGINT), Measurement and Signature Intelligence (MASINT), Open-source Intelligence (OSINT) and Imagery Intelligence (IMINT). All these forms provide information collected for consumption with regard to the plan. Describe the Expected Payoff, in Terms of Answers to the Four Sets of Customer Needs The application of these new technologies into the army enables the different commanders to develop more knowledge on the enemy, develop faster and effective plans in countering their effects, enable a quick decision making process that would ensure the desired results are obtained and perform synchronization of sensors and the different shooters to ensure that the desired impacts are obtained. The development of a team that networks to provide a systematic flow of intelligence from the field to the office and from the office back to the field provides for the improvement of the effects that the army has on the enemy and its general preparedness. The network is based on three items that include the shooter, the sensors and the information gap that is filled majorly by intelligence needs (Nagra, 2013). The utilization of the different intelligence aspects has aided provides a better position for commanders in battlefields with information concerning the enemy their advances towards the troops. These have played a major role in guiding the planning aspects of the army and their positioning in relation to approaching battlefields. For the customers associated with the question, the intelligence provides the different customers with different aids as developed below: Counterterrorism For proper counter terrorism efforts to help mitigate the challenges that arise in this terrorism situation there is need for involving the different intelligence aspects to help alleviate the situation. The application of the intelligence aspects in fighting counter terrorism provides the commanders with information that helps them understand the moves of the terrorists and ensure that they are apprehended or stopped before they strike. With the increasing complexity in technology, more and more difficult terrorism acts are coming to life requiring the application of more technical means and intelligence to ensure that the terrorists remain subdued in their quest to cause different scenarios. The application of the intelligence also provides the commanders with accurate information on the targeted areas that the terrorists intend to strike providing ample time for the response to minimize on the effect of the actions of the terrorists in case they succeed in hitting their target. Counter narcotics The counter narcotics aspects will enable the use of intelligence to ensure that the narcotics are rescued in time to ensure that the harm that it would reach to the populations is averted. The application of intelligence aspects in the fight of narcotics helps the commanders and other officers understand the different narcotics channels and distribution networks aiding in the destruction of the entire team involved in the business. The commanders also obtain information on the sources and destinations that the drugs are to take making it easy to track and arrest the narcotics before they cause more harm to the populations. Military/counter proliferation For gathering of information in regard to the military provides the military with a level of secrecy and protects their secretes and approach to military aspects. Proliferation of military exposes the different aspects of the military to the army’s enemies that could result into loss of ground for the army. The pay off for such a scenario provides the military team with the necessary secrecy they need to have their strategies protected that would aid them in combating the effects of the enemy. Weapons systems performance The consumption of the intelligence requires that the weapons be placed in the right positions and the right time to ensure any counter measures are developed prior to any aspects that may result into the need of the weapons. These will help counter the enemy at a distance well developed for the weapons and reduce on the impact that the enemy could have on the team once they strike. Through intelligence applications, the commander is in position to understand the kind of weapons used by the enemy to help understand how to counter them and the level of force and weapons to employ. The team obtains training and prepares to deal with the situations that may require weapons experts due to the training and knowledge that the team holds over the weapons to expect the enemy to carry. Assess the Risks Associated With the Collection Efforts A number of risks are associated with the collection efforts that aim at obtaining data from the field about the enemy that enables the team to combat the enemy. These stem from the different forms of data collection that the intelligence team applies. The application of sensors provides a better way of dealing with the collection of data. The risk with this method is that once discovered by the enemy, it could turn into an item that the enemy could use to their advantage and hence collecting the aspects that regard to the team. The use of an individual to obtain the information may prove more effective but incase the individual is apprehended by the enemy, they could become a source of information for them. Other risks associated with the collection efforts involve the failure to realize traps that could lead to negative effects in the plan. The utilization of wrong information could also track the enemy. Through these failures, the whole team may become compromised leading to a more negative effect to the commander and his team. The study of any persons and objects in these efforts provide the teams with a better chance of understanding the moves of the enemy hence aiding them prepare enough. Describe the Back End Requirements to Support the Collected Information The back end requirements may include the application of the different technological gadgets and systems in the interpretation of the collected data to provide the necessary information that is necessary for the team to act. The information obtained from the field guides the team in any efforts to counter the enemy. These information require application of various nature to aid in the receipt, breakdown and relaying of the information obtained from the field. The use of softwares such as the Commercial Customer Relationship Management software, Enterprise Relationship Management systems prove vital in the management of the workflow of any teams (Heffter, 1995). The lists developed in this process have no addresses to any specific collectors. The application of the above systems would provide a back end systems requirement for the team. The combination of these systems with the social networking softwares that aid in the development of ad hoc alliances provide the company with more grounds to manage the enemy. The application of these in the plan will require the close relationship between the team members in the field and those in the back end. These relay information from one point to another with the necessary communication on the HUMINT, IMINT, SIGMINT, MASINT, TECHINT and OSINT provided. Avoiding disinformation is a priority that keeps the team alive requiring more efforts. In conclusion, the application of this plan will enable the protection of the IMDEX Asia boat and its contents. Providing a better way of ensuring that the object is tracked and all its locations obtained. These will help protect it from any counter terrorism aid, counter narcotics aspects, the military proliferation aspects and the weapons system performance. Through the efforts of the team, the COMINT, securing the waters proves easy, and the whole team in conjunction with the foreign team share intelligence to ensure that security remains paramount. References Fedbizopps.gov, (2012). Multi-INT Exploitation and Correlation. Retrieved from https://www.fbo.gov/index?s=opportunity&mode=form&id=cbc15e12ad9fc9ed97952f04c39227de&tab=core&_cview=1 Hall, W. M. & Citrenbaum, G. (2009). Intelligence Analysis: How to Think in Complex Environments. Santa Barbara: ABC-CLIO. Heffter, R. C. (1995). A Fresh Look AT Collection Requirements. Retrieved from https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no4/html/v04i4a03p_0001.htm Nagra, A. S. (2013). Multi-int Intelligence: Effective Multi-sensor Data Fusion. Retrieved from http://geospatialworld.net/Magazine/MArticleView.aspx?aid=30617 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Collection Plan for the Scenario Coursework Example | Topics and Well Written Essays - 2000 words - 1, n.d.)
Collection Plan for the Scenario Coursework Example | Topics and Well Written Essays - 2000 words - 1. https://studentshare.org/law/1848128-collection-plan-for-the-scenario
(Collection Plan for the Scenario Coursework Example | Topics and Well Written Essays - 2000 Words - 1)
Collection Plan for the Scenario Coursework Example | Topics and Well Written Essays - 2000 Words - 1. https://studentshare.org/law/1848128-collection-plan-for-the-scenario.
“Collection Plan for the Scenario Coursework Example | Topics and Well Written Essays - 2000 Words - 1”. https://studentshare.org/law/1848128-collection-plan-for-the-scenario.
  • Cited: 0 times

CHECK THESE SAMPLES OF Collection Plan for the Scenario

Public Library Collection Development: Weeding Library Collections

Though some people feel that in a scenario of advanced technology and many emerging trends in this field, the concept of print books and libraries to accommodate them has become irrelevant.... Public Library collection Development: Weeding Library Collections Name of Author Author's Affiliation Author Note Author note with more information about affiliation, research grants, conflict of interest and how to contact Public Library collection Development: Weeding Library Collections Introduction/Background of the Study: Library is a sacred place where people come in search of knowledge, for educating themselves, and to transform their ignorance into enlightenment....
7 Pages (1750 words) Research Paper

The Medici Collection and The Louvre

Museums are most broadly defined as a collection warehouse for a composite collection of objects which each have their own shapes, functions, designs, purposes, materials and other qualities.... ??2 The nature of the collection and the context in which the museum or collection places its artwork for display to the public can thus have a significant effect upon the interpretation and perceived value of the work.... These ideas can be seen when comparing the extensive collection of a museum such as the Louvre to the eclectic and less organized Medici collection....
12 Pages (3000 words) Essay

Business plan - (investment)

From the cash flows of the year 2011 – 2012 (Worst case scenario)Investment for the period 2011- 2012 – worst case scenarioIn the financial period 2011-2012 the cash flow on the closing balance is 1,750,766 only.... 100000 shares @ 10 1,000,000750000 in bonds 750,000Total1,750,000Investment for the period 2012–2013 worst case scenario:In the financial period 2012-2013 the cash flow on the closing balance is 2,489,948 only.... 200000 shares @ 10 2,000,000480000 in bonds 4,80,000Total2,480,000From the cash flows of the year 2011 – 2012 (Mean Case scenario)In the financial period 2011-2012 the cash flow on the closing balance is 2,335,766 only....
2 Pages (500 words) Coursework

Advantages and Disadvantages of Scenario Planning

From the paper "Advantages and Disadvantages of scenario Planning," it is clear that the disadvantages do not eliminate the fact that scenario planning can be best integrated into the prevailing plans of the organisation for its crisis management and risk management.... However, it is evident that scenario planning takes into account the varying alternative course of actions.... Therefore, scenario planning is about trying to formulate plans that are addressing the what-if scenarios in the future (Hill and Jones, 2009, p....
10 Pages (2500 words) Term Paper

Bad Planning Theory

n the criticism of physical determinism, the social issues were not ignored and the major concern was to plan for the community life according to neighborhoods.... The Monnet plan was created in 1945-6 and Cohen asserts that it overestimated the forthcoming amounts of the investment funds.... The planners and the politicians finished the first and the second plan successful and ahead of the schedule (the plans were 4).... However, the third plan which was finished in 1958 indicated hard times to come....
7 Pages (1750 words) Coursework

The Overview of the Fire Preparedness of Santa Cruz Museum of National History

The following assignment represents a case study for the fire preparedness organizes in the Santa Cruz Museum of National History.... The writer will discuss a few certain emergency scenarios and deconstruct them in terms of safety and situation evaluation planning.... hellip; The Santa Cruz Museum of Natural History is located at 1305 East Cliff Drive Santa Cruz, CA, the United States of America....
16 Pages (4000 words) Case Study

Scenario-Based Training Into Aviation Ground Schools

This paper "scenario-Based Training Into Aviation Ground Schools" focuses on the fact that it is not possible to fully recreate past situations after an incident.... The recording equipment creates a clear livid scenario of possible incidents that are analyzed and implemented.... As a result, much emphasis has been on training that should be real-world scenario-based.... The most eminent movement in these projects is that, at present, they are scenario-based....
21 Pages (5250 words) Research Paper

More Intelligence Failures Are Caused By Failures of Analysis than By Intelligence Collection

Several pieces of evidence support the fact that the unconscious psychological biases of the analysts have often created a severe effect on the proper development of an action plan.... This work called "More Intelligence Failures Is 'Caused By Failures of Analysis than By Intelligence collection" describes the security system of the nation.... Correspondingly, intelligence is defined as a process of information collection that can be converted into intelligence....
16 Pages (4000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us