In this milestone, you will work on three sections of your intelligence report: the sources, presentation of facts, and analyst’s assessment. In the section on sources, you will list both the open-source and provided intelligence sources that were analyzed to create the intelligence report. In the presentation of the facts, you will essentially summarize the “who, what, when, where, why, and how” of the threat. Finally, in the analyst assessment, you will present the conclusions of your data analysis to the intelligence community.
Specifically, the following critical elements must be addressed:
I. Sources: Explain how the different intelligence sources (e.g., SIGINT, OSINT, HUMINT) and intelligence reports you used are related to your own report. II. Presentation of Facts: Summarize the most relevant information (e.g., who, what, when, where, why, and how) that an agency doing follow-up would need to quickly understand the potential threat. III. Analyst Assessment A. Key Assumptions: Explain what the data revealed about your key assumptions regarding the potential threat and the terrorist group behind the threat. These key assumptions were previously stated in your collection and analysis plan. B. Terrorist Group: Provide a detailed description of the terrorist group involved in the suspected terrorist activity, including the group’s motivations, hierarchy, and status as domestic or international. C. Nature of Threat: Provide a detailed description of the nature of the threat, including the group’s plan, potential target(s), and means of attack. D. Prediction: Predict the terrorist activities that might occur if no action is taken to mitigate the suspected threat.