1. 2 collecting information on border control database information from border interception cases...
TRANSCRIPT
![Page 1: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/1.jpg)
IDENTIFYING THREATS AND MITIGATING RISK TO MALDIVIAN IMMIGRATION BORDER 1
![Page 2: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/2.jpg)
ENDURING THEME
BE PROACTIVE & REACTIVE
2
![Page 3: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/3.jpg)
INFORMATION COLLECTION
Collecting information on border control database Information from border interception cases
(incident report) Intelligence from foreign Intel alerts (SIGIT) Information from open source Information and intelligence collected from covert
and overt operations (HUMIT)
3
![Page 4: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/4.jpg)
INCIDENT REPORT
4
![Page 5: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/5.jpg)
5
INCIDENT REPORT
![Page 6: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/6.jpg)
DATA SHEET
6
![Page 7: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/7.jpg)
INVESTIGATING AND ANALYZING INFORMATION
Verifying information Reliability and credibility of source Investigating Classification of data Collation Analyzing data Identifying and prioritizing threats (threat & risk
assessment) Developing analytical reports
7
![Page 8: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/8.jpg)
ASSESSING AND REPORTING INFORMATION
Analysis report for policy makers Intelligence alert for border control Feedback and reassessing threats
8
![Page 9: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/9.jpg)
INTEL ALERT
9
![Page 10: 1. 2 Collecting information on border control database Information from border interception cases (incident report) Intelligence from foreign Intel](https://reader036.vdocuments.us/reader036/viewer/2022062620/551b71a0550346a10a8b49bd/html5/thumbnails/10.jpg)
STICKING A BALANCE
Facilitation & Security
10