
Blog: Intelligence – It’s All About Information
16 October 2023
Intelligence – Key To Making Decisions
The sight of a Royal Air Force RC-135W Rivet Joint aircraft on Flightradar24, leaving its UK base and flying for extensive periods along the Ukraine border or over the Black Sea, probably epitomises overt intelligence collection. It is one part of a collection effort which employs a range of open and closed sources to produce an intelligence picture, that enables senior military officers and politicians to make informed decisions. But Intelligence is not just for the military.
Few private organisations would have the wherewithal to produce a picture on the scale of any government, but they have a need to understand, from a security perspective, the environment in which they operate. The delivery of an Intelligence product, or Threat Assessment, for an organisation is no different from that required by a government or military. It is largely about the systematic exploitation of information from a range of sources together with the immediate and ongoing analysis of that information.
Direction – The Starting Point
Threat Assessments are not undertaken in isolation but need direction from senior management on what they require. Their needs might be quite specific in that they have to understand the issues in a particular country or it could be the daily requirements for the Security Risk Management programme or in fact horizon scanning as part of the Resilience process. But whatever the task those needs must be met.
Intelligence exists to reduce the level of uncertainty in decision making.
Collection – Finding Information
There is a lot of information on the web, from specialist suppliers as well as from internal sources and depending on the task, the most appropriate and capable would have to be approached and accessed. But it is not a one stop shop with information having to be checked, sources re-tasked as necessary or new sources brought in to verify or delve deeper into information already received. And, as with all information sources their reliability would have to be proven.
Collation – Recording It
There may well be a stream of information coming in that has to be collated into a logical order. It can be a time consuming process, whether its working in analogue with a card index system or digitally with an online database. However, it is at this point that initial connections are made, trends recognised and maybe the need, as always, to re-task the original source or bring in new sources to answer what could be new questions.
Intelligence is used at a Strategic, Tactical and Operational level and to be effective must be, Timely, Accurate and Relevant.
Analysis – Making Sense of it All
Analysis is more than pattern recognition, it is being able to evaluate the information that has been gathered and this does require a depth of subject knowledge. It is analysis which gives the answer to the original requirements in the Direction phase. Threat Assessments are not a prediction, but a well thought out and reasoned judgement as to what might happen.
Dissemination – Getting the Message Out
Whether it’s through written reports or verbal briefings, analysts have to present their assessment in a structured and meaningful way. Analysts should be more than competent with their communication skills and should be open to question and challenge on what is being presented. Even with the most expert of analyst’s what is being produced is an opinion, it is a qualitative not a quantitative statement, with reports having to be read in that way.
Being able to understand what Threats there are and how they might impact on an organisation, is a key part in the role that Security plays
A Continuous Cycle – It’s Never-Ending
While some Threat Assessments might be a one off, the general business of understanding the security threat is an ongoing process. There is always a need to be aware of what is happening, tasking sources and evaluating how any changes might affect an organisation. It has, in a sense, to be baked into the Security Risk Management and Resilience process.
Intelligence – In Action
Aidan Anderson of RedLeaf Consultancy, has used the Intelligence Cycle or ongoing Threat Assessments in his work as Security Consultant and previously as a Bank Security Manager. Two examples are given below, the first in daily use as part of a Security Risk Management programme and the second on bank robberies.

Security Risk Management

Bank Robberies – Northern Ireland
RedLeaf Consultancy
Integrating Security – Bringing Transparency
Available to Meet Your Needs
Available to speak to, video conference, email or meet in person, RedLeaf Consultancy is conveniently located in Northern Ireland, to enable travel throughout the UK, Republic of Ireland and via airport hubs, internationally.
To Contact Redleaf Consultancy
Phone: +44 (0) 7720 820023
Proudly powered by WordPress