All the intelligence sources of information correlate in that each intelligence may attempt basic validation of the information collected before it is acted upon. Each information collection intelligence is different from the others hence the verification processes interrelate. Using the two sources in information collection is very is both very beneficial and drawbacks, it is human nature to get carried away and spend and post on social media boasting about their achievements hence open source is key here. On the other hand, interviewing people was very important it would have intimidated someone to start saying the truth. Conversely, using these forms of open sources would have alerted the victims to go into hiding.
Geospatial intelligence collection of information and measurement and signature intelligence, technical intelligence, signals intelligence and digital network intelligence were definitely under-utilized during this operation. The theory of Occam’s razor can be applied in this scenario. This theory was specifically developed to help solve problems as it may help develop the most likely assumptions thereby isolating the unlikely ones. The alternatives presented by this theory are key and can easily lead to the most appropriate solution.
Delegate your assignment to our experts and they will do the rest.
Analyzing crime in a specific geographic position is key as it opens up an entire area for scrutiny thereby incorporating other intelligence sources of information like signals intelligence which would effectively tap into any suspicious signals. This also key as it eliminates the possibility of crime in an area and helps in not just monitoring specific targeted people thereby missing some potential threat. Through doing this, the number of casualty is reduced in an area. Conducting crime analysis in an area is important as it engages the use of other technical intelligence sources of information collection.