This free web-based training is provided as an introduction to Anacapa‘s scheduled and on-site courses in intelligence analysis. Upon completion of all three training modules, you may obtain a certificate of completion.
- Introduction to Intelligence Analysis (1 to 2 hours) - This session provides an overview of the intelligence process and shows where and how intelligence analysis fits into this process. We will examine the various types of information ranging from surveillance reports to data from an internet site, from physical evidence to financial records, and from informant reports to the reports of other analysts. The purpose of the intelligence process is to develop inferences that explain the Who, What, Why, When, Where and How of the activity of interest, leading to an inference that can be acted on with confidence.
- Data Collection Tradeoffs (2-3 hours) - This session provides solutions to a common dilemma faced by intelligence analysts—whether to report an inference based on available information or to collect additional information. More information might produce a better inference but at greater costs and at a loss of timeliness. In short, the decision to seek additional information requires tradeoffs among value, cost and risk. We want to get the greatest value at the least cost and without risking the timeliness of the intelligence product.
Critical Thinking Strategies (2-3 hours) - In this third session we address critical thinking—the interpretation, assessment and reasoning skills required for success in intelligence analysis. We will, first, examine some of the types of challenges that face analysts by providing issues and problems that demonstrate critical thinking. Second, we will review the context in which critical thinking must take place. Then, we will present the types of human limitations that must be overcome and a model that illustrates the various factors and components of critical thinking. Finally, we present and discuss strategies that will lead to the most effective critical thinking.
This course provides an overview of analytical investigative tools and techniques. The course introduces the role of the analyst and the analytical process for narcotic law enforcement officers. A brief overview of drugs of abuse is followed by a set of analytical 'tools' including methods for acquiring information, techniques for representing and analyzing information, and an overview of financial investigations. Produced by MCTFT in partnership with the United States Army Military Police School, and the National Guard Bureau Counterdrug Directorate.
Course Objectives
- Understand the role of the analyst, the components of the analytical process, and the importance of critical thinking.
- Identify drugs of abuse, their primary sources and the primary methods of distribution.
- Identify sources of information, including federal state and local sources, major computer databases and confidential sources.
- Understand the purpose of flowcharting, and learn to create event, commodity, and activity flowcharts.
- Learn the purpose of link analysis, how to organize data into an association chart, and how to create a link analysis chart.
- Understand the purpose of telephone toll analysis, identify methods of electronic surveillance and procedures to perform telephone toll analysis.
- Describe the purpose of financial analysis, money laundering, and procedures to launder money.
- Learn about the Posse Comitatus Act.
Module One - Terrorism Overview: You will learn broad definitions of terrorism, specific international and domestic terrorist events that have occurred in the U.S., and historical examples of how everyday officers have made a difference in combating terrorism. You will learn to differentiate between the ordinary criminal and terrorist based motivating factors and goals. You will be able to describe the organization, composition, operations, goals and financial networks types and forms of regional, national and international terrorist groups.
Module Two - Criminal Intelligence Process: You will learn to identify standardized terms and the applicable legal authority upon which the intelligence process is based. You will identify both the characteristics and the differences between criminal information and intelligence. You will be able to describe the components of criminal information / intelligence and how they are processed and evaluated via that Intelligence Cycle. Finally, you will be able to identify the law enforcement officer‘s responsibilities in the collection and reporting of criminal information and intelligence and identify the federal agencies that are collecting the information.
Module Three - Indicators of Terrorist Activity: You will learn to identify the tools terrorists use to perpetrate terrorist activities. You will be able to describe behavioral patterns exhibited by terrorists during the planning and implementation stages. Further, you will identify media that are used by terrorists to facilitate their activities and / or circumvent discovery. You will be able to articulate instances when an indicator should be reported.
Module Four - Internet Assisted Terrorism: You will be able to identify the electronic tools and media which international and domestic terrorists use and the best practices identified for properly seizing computer hardware and peripherals.
Department of Defense anti-terrorism awareness training program. The purpose of this training is to increase your awareness of terrorism and to improve your ability to apply personal protective measures. Completion of this training meets the annual requirement for Level I anti-terrorism training prescribed by DoDI 2000.16.
This course provides students with the appropriate background, skills, and abilities to qualify as an Antiterrorism Officer (ATO) for a command or organization. The course examines ATO roles and responsibilities, vulnerability and threat assessments, creating and executing antiterrorism (AT) programs, preparing AT plans, resource management, and AT training.
Successful completion of this course qualifies individuals to conduct Level 1 AT briefings.
Length: 13 hours, 30 minutes (all modules combined)
28 Code of Federal Regulations (CFR) Part 23 was developed to ensure the protection of the constitutional and privacy rights of individuals during the collection and exchange of criminal intelligence information. The standards in 28 CFR Part 23 apply to all criminal intelligence systems operating under funding from the Omnibus Crime Control and Safe Streets Act of 1968, as amended. This online training is an introductory‐level training on the regulation's core principles, which provide an understanding of privacy and civil liberties concerns related to criminal intelligence information sharing.
The FAST Foundations Course is intended to provide training in the foundational knowledge necessary to effectively deliver Psychological First Aid (PFA) to children, adolescents, adults, and families in the immediate aftermath of disaster. (6-hours)
The FBI Virtual Academy (FBIVA)is a structured, efficient, electronically delivered system of learning that adds value to the forensic science, law enforcement, and judicial communities by providing a single, comprehensive learning solution that offers a web-based means of accessing and acquiring the essential knowledge, skills, and competencies (through relevant and consistent training and materials) needed to support the worldwide criminal justice community.
- DoD Information Assurance Awareness (for DoD Personnel)
- Intelligence Community Information Systems Security Awareness (for Members of the Intelligence Community)
- Federal Information Systems Security Awareness (for Members of the Federal [Non-Intelligence] Community)
- Social Networking
- Using Public Key Infrastructure (PKI)
- Portable Electronic Devices / Removable Storage Media
- Phishing
- Personally Identifiable Information (PII)
- Information Operations (IO) Fundamentals
- Information Assurance Awareness Shorts
.. and more
Organizational cultures across the ISE vary widely, and information sharing is not viewed across the board as a required behavior. To promote a shared awareness of the ISE and encourage such behavior, on July 16, 2008, the PM-ISE issued the ISE Core Awareness Training Course to Federal departments and agencies. The course is intended to give a common understanding of the ISE to all employees who support the counterterrorism mission. This training, coupled with continued efforts to include information sharing as a formal evaluation factor in personnel performance reports and agency incentive programs, is designed to help move the traditional 'need to know' culture to one based on a 'responsibility to provide.'
The Multijurisdictional Counterdrug Task Force Training (MCTFT) program provides unique, tuition-free, courses covering all aspects of counterdrug law enforcement and training support for community anti-drug coalitions.
CD-ROM Training
- Analytical Investigative Tools
- Drugs in America: Lessons for Law Enforcement
- Explosives, Booby Traps and Bomb Threat Management
- Risk Management and Violence in Undercover Operations
- InFocus: A Clear Message About Drugs
- Airport Narcotics Investigations
- Introduction to Clandestine Laboratory Investigations
- Clandestine Laboratory Recertification
- Command & Control Overview
- Introduction to Conspiracy Investigations
- Criminal Street Gangs Overview
- Criminal Street Gangs Overview - Spanish
- Drug Identification
- Ethical Issues and Decisions in Law Enforcement
- Explosives, Booby Traps & Bomb Threat Management
- Introduction to Highway & Rural Drug Investigations
- Introduction to Interview & Interrogation
- Introduction to Money Laundering
- Introduction to Patrol Drug Investigations
- Overdose America
- Police Intelligence
- Risk Management and Violence in Undercover Operations
- Surveillance Operations Overview
The National HIDTA Assistance Center offers two CD-ROM based courses:
Introduction to HIDTA Analytical Techniques
This no cost informational distance learning CD-ROM was created through a collaborative effort between the NHAC Training and Multimedia Units. It was designed to provide the Analyst with introductory information into the intelligence cycle, the basic graphical techniques used in the analytical process, and various resources available to the HIDTA Analyst in the course of doing business.
- Document Exploitation
- Intelligence Cycle
- Analytical Techniques
- Validity and Reliability Scales
- Title III
- Criminal Intelligence Process
- Uses of DNR/Pen Register
- Intelligence Products Generation
- USC Title 18
- Statistical Comparison Formula
- Intelligence Education & Training
- Threat Analysis Elements
- Post Seizure Analysis Reports
- Briefing Techniques
So What's Next? Analysis & Critical Thinking
This no cost informational distance learning CD-ROM entitled 'So What‘s Next? Analysis & Critical Thinking' was created to provide you with introductory information regarding conceptual blockbusting, problem solving, analysis, reasoning skills, creative thinking and a mixture of games and puzzles to practice and sharpen your thinking skills.
Both CD-ROM programs are open to Federal, State and Local Law Enforcement Personnel, Criminal Intelligence Analysts, Crime Analysts, Investigators, Investigative Assistants, Counterdrug Operations Supervisors at all levels and military personnel – both active and reserve components – assigned to support counterdrug activities in a HIDTA.
National Terrorism Preparedness Institute
- Access Control for Port Security
- Basic Port Security
- Advanced Port Security
- Intermodal Supply Chain Security
- Law Enforcement Guide to Understanding Islamic Terrorism and Arabic Names
- Force Protection
- Introduction to Anti-Terrorism
- Terrorism Awareness for Law Enforcement
- General Aviation
- Planning Considerations for WMD Incidents
- School Terror
- Traffic Stops
Online Statistics Education: An Interactive Multimedia Course of Study
Online Statistics: An Interactive Multimedia Course of Study is a resource for learning and teaching introductory statistics. It contains material presented in textbook format and as video presentations. This resource features interactive demonstrations and simulations, case studies, and an analysis lab. This work is in the public domain. Therefore, it can be copied and reproduced without limitation. However, we would appreciate a citation where possible. Please cite as: Online Statistics Education: A Multimedia Course of Study (http://onlinestatbook.com/). Project Leader: David M. Lane, Rice University.
Open Source Intelligence Training (Requires Intelink Access)
Module 1 - The Value and Definition of Open Source
Module 3 - Search Engines
Module 5 - The Use of RSS
Module 7 - Introduction to Anonymization
Module 9 - OpenSource.gov
Module 11 - Blogosphere
Module 13 - Research Planning
This is an interactive web-based course that provides OPSEC awareness for military members, government employees, contractors and dependents. The course provides information on the basic need to protect unclassified information about operations and personal information to ensure safe and successful operations and personal safety. The course includes a printable certificate which can serve as evidence that a student completed the course. When a student takes the course using this link, DSS will not maintain any record of that student by name or any personally identifiable information. If the student needs documentation that he or she has completed the course he or she will have to print the certificate at the end of the course. This training will take approximately 45 minutes to complete.
This course will provide law enforcement, intelligence personnel, and analysts with information necessary to understand the intelligence cycle - Direction, Collection, Processing, and Dissemination - and the techniques used to organize and analyze data. In addition to this, training will also include Federal laws applicable to the gathering of intelligence and its use.
- In this course, the student will learn about:
- Reviewing the legal direction and authority of intelligence gathering
- Collecting intelligence information
- Reporting and processing the raw information
- Analyzing gathered intelligence
- Disseminating the analyzed product
- Threat Assessment
- The potential nexus between illegal activities and criminal acts
- The way in which Police Intelligence Operations filters through the other law enforcement functions in both tactical and non-tactical environments
- The intelligence cycle
- Rules, regulation, and laws that provide the basis of intelligence operations
- The importance of the direction and planning in the intelligence operations
- Issues to consider when planning intelligence operations
- The types of intelligence resources
- The general types of intelligence information
- The purpose for intelligence collection
- Importance of reporting and processing within the intelligence cycle
- Types of reporting
- The types of data entry points
- The need for prioritizing reports
- Collecting telephone data
- Deciphering telephone records
- Intelligence Education & Training
- Analyzing telephone records
- Charting the analysis of calls
- Developing an understanding of the use and applicability of a DNR/pen register
- The role of dissemination and integration in the intelligence cycle
- Types of intelligence classification
- Reasons why some materials receive classified status
- Limitations to dissemination of intelligence products
- Types of distribution systems
Target Audience: Active military, active law enforcement, and criminal justice professionals.
Privacy Line Officer Training Video
The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public
Safety training video assists local, state, and tribal law enforcement line officers in understanding their role in the protection of privacy, civil rights, and civil liberties as they perform their everyday duties. The video provides an introductory overview of what privacy, civil rights, and civil liberties protections are; examples of these protections; and the important function line officers have in upholding these protections. The short video may be used during roll call and in-service training, incorporated into agency distance-learning capabilities, and used to complement other agency privacy-related training efforts.
S2 Safety & Intelligence Institute ($$$)Distance Learning Courses (Examples of Courses Offered)
- Anti-Terrorism Officer Program - The distance learning version of the S2 Anti-Terrorism Officer (ATO) Program is designed to prepare frontline security and police officers for deployment in environments where terrorism is a critical threat. This program provides an exploration of contemporary terrorist methods and basic anti-terrorism skills and knowledge that all officers should possess.
- Bomb Security for Executive Protection - The S2 Bomb Security for Executive Protection distance learning course provides students with essential skills for protecting individual principals against assassination by the use of explosives. In this 12-hour advanced-level course, anti-terrorism expert Craig Gundry explores IED technology, explosive assassination methods used by professional adversaries, and measures for preventing, detecting, and mitigating explosive attacks.
- Covert Surveillance for Private Investigators - In the S2 Covert Surveillance for Private Investigators course, veteran private investigator Ron Azarello and S2 Staff Instructor Craig Gundry survey the strategies, tactics, and technology available for use in conducting surveillance operations in private investigations. Although the core of this course is focused on surveillance technique and technology, considerable attention is also devoted to important parallel topics such as legal issues, teamwork, report writing, and more.
- Human Intelligence for Law Enforcement - The S2 Human Intelligence for Law Enforcement distance learning program is designed to provide new and experienced homeland security and law enforcement intelligence professionals with a deeper understanding of the HSINT intelligence process and successful strategies for solving domestic counterterrorism problems through effective use of human intelligence. The instructor, a former CIA Senior Field Operations Officer, draws on his previous experience in dismantling Al-Qaeda operations overseas to present students with practical strategies for planning and executing domestic HUMINT operations in addition to valuable advice about working in collaboration with the US Intelligence Community.
- Human Intelligence for Special Operations Personnel - The online version of the S2 Human Intelligence for Special Operations Personnel course is designed to aid US Military special forces in planning successful Title 50 HUMINT operations. In this four-hour course, a former CIA Senior Field Operations Officer, explores the HUMINT process and provides practical advice for maximizing operational success and avoiding critical mistakes.
- Human Intelligence Targeting - Experienced HUMINT professionals know that trolling for recruitment targets is a low percentage strategy that usually results in sources with little access to priority information. Nevertheless, 'trolling' and waiting for targets-of-opportunity remains a common targeting method used in law enforcement and military intelligence communities. In this two-hour program, a former CIA Senior Field Operations Officer, presents focused targeting as an alternative and superior method for identifying and prioritizing high-value targets for recruitment.
- Principles of Undercover Work - Few assignments in criminal and private investigations are as dangerous and challenging as undercover work. The key to success in undercover work is preparation, mindset, and forseeing traps of circumstance. In this two-hour distance learning program, former undercover operative Sam Hall presents practical real-world advice on planning and executing undercover investigations based on his years of experience as an undercover FBI cut-out and work with the CIA.
Statistics (UNC Center for Public Health Preparedness)- Advanced Data Analysis: Methods to Control for Confounding (Matching and Logistic Regression) (1-hour)
- Analyzing Data (I is for Investigation) (30-minutes)
- Data Analysis Basics: Variables and Distribution (1-hour)
- Data Analysis: Simple Statistical Tests (1-hour)
Survey of Critical Thinking
Lesson 1. Introduction to Critical Thinking
Lesson 2. Recognizing Arguments
Lesson 3. Basic Logical Concepts
Lesson 4. Language
Lesson 5. Logical Fallacies-1
Lesson 6. Logical Fallacies-2
Lesson 7. Analyzing Arguments
Lesson 8. Evaluating Arguments
Lesson 9. A Little Categorical Logic
Lesson 10. A Little Propositional Logic
Lesson 11. Inductive Reasoning
Lesson 12. Finding, Evaluating, and Using Sources
Lesson 13. Writing Argumentative Essays
Lesson 14. Thinking Critically about the Media
Lesson 15. Science and Pseudoscience
VAT Online is a basic victim advocacy web-based training program that offers victim service providers and allied professionals the opportunity to acquire the basic skills and knowledge they need to better assist victims of crime. Specific information is also provided to meet the needs of target populations.