Studyspark Study Document

Analyzing Open Source Intelligence and Organized Crime Research Proposal

Pages:3 (1133 words)

Sources:4

Subject:Crime

Topic:Organized Crime

Document Type:Research Proposal

Document:#25628206


Open Source Intelligence and Organized Crime

In the words of Bell and Congram (2014), TOC-Transnational Organized Crime can be defined as a crime carried out by an enduring organization or structure created and primarily involved in pursuing profits through several illegal businesses. It shares certain traits with formal organizations: using rules and codes to coordinate activities, division of labour, and allocating tasks with the aim of actualizing some given goals. While it is appropriate to see TOC as being composed of several activities, it can be seen that some specified organized criminal activities fall into the same category. They include activities such as drug trafficking, money laundering, people smuggling, human/sex trafficking, endangered species trafficking, arms trafficking, and most significantly since the last decade, terrorism.

Structure of TOC Groups

According to Bell and Congram (2014), the domestic and transnational groups that perpetrate crimes have succeeded in modifying their structures into flexible, lively though loosely structured networks, with high fluidity which have the ability to get access to important influences, created with the aim of confusing the authorities and protecting their organization. Five distinct TOC organizational structures exist: criminal network, core group, clustered hierarchy, regional hierarchy, and standard hierarchy. However, some TOC groups do not fit into the confines of these five listed structures; nevertheless, the major frameworks (accessed through technologies) provide the needed basis to understand these structures. According to some arguments, the last three structures are believed nearest to conventional beliefs about organized crime, while the first two structures are nearest to organizations that emerge from the recent world environment.

Open Source Intelligence

Intelligence can be defined as the product of data collection, processing, analysis, integration, evaluation, and proper interpretation about foreign nations or localities, equally the data and information concerning the enemy gathered by observing, investigating, analysing and understanding. Knowing something is not enough for one to be adjudged intelligent. Intelligence has to do with a creatable product; if it lacks packaging, analysis, and filtering, then it lacks value to the policy maker (Burke, 2007).

OSINT-Open Source Intelligence is the vital information extracted from systematically collecting, processing and analysing the information that is publicly available as a way of responding to the requirements for intelligence. Open Source can be defined as any individual or group of individuals that make the needed information available without expecting any sort of privacy, while information that are publicly available includes every information made freely available following a request from any individual; legally heard or seen by an observer; or provided at a public meeting (Hayes, 2010).

According to Burke (2007), OSINT can be useful to a significant extent, and has remained the only possible means of entering unknown stealthy networks. The entire process starts with OCD-open source data, the organic information from the main source, and needs to be assembled at this point through the process of editing with the aim of filtration and validation. The outcome from this is OSIF-open source information which can be circulated in the form of books, newspaper…


Sample Source(s) Used

REFERENCES

Bell, P., & Congram, M. (2014). Communication Interception Technology (CIT) and Its Use in the Fight against Transnational Organised Crime (TOC) in Australia: A Review of the Literature. International Journal of Social Science Research, Vol 2, No. 1, 46-66. Retrieved from www.macrothink.org

Burke, C. (2007, January 5). Freeing knowledge, telling secrets: Open source intelligence and development . CEWCES Research Papers, pp. 1-23. Retrieved from http://epublications.bond.edu.au/cewces_papers

Central Intelligence Agency. (2016, May 12). About CIA. Retrieved May 13, 2016, from Central Intelligence Agency: https://www.cia.gov

Hayes, B. (2010). Spying in a see through world: the "Open Source" intelligence industry. Statewatch Journal, Vol 20, No. 1, 1-10. Retrived from https://www.ceps.eu

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Intelligence Agencies What Exactly Is

Pages: 28 (11218 words) Sources: 1+ Subject: Military Document: #71830176

Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, which would mislead the suspected threat. The United States Intelligence Community is, as stated earlier, made up a number of different agencies. The Central Intelligence Agency is one of these. Also known popularly as the CIA, this

Studyspark Study Document

Intelligence Analysis Process Have Been Discussed. This

Pages: 4 (1457 words) Sources: 6 Subject: Psychology Document: #40715020

intelligence analysis process have been discussed. This paper puts light on what basically is intelligence analysis and how can it be improved. It discusses ways via which intelligence analysis can be made more focused and more effective. It puts light on how better sharing and provision of information, collection and analysis of correct data and fact and figures can benefit the intelligence analysis process. This paper also puts light on

Studyspark Study Document

Foreign and Domestic Intelligence the

Pages: 22 (6712 words) Sources: 1+ Subject: Military Document: #5885348

S. directly. Evidently, the long-term objectives indirectly face the smooth running of the U.S. government. Priority should be given to those aspects that will pull the resources of the country to extreme levels. The U.S. As a super-power is privileged when tackling issues affecting other nations; it is mandated to help developing long-term solutions. Long-term also implies that the impacts and effects need to be widespread in order to maintain balance

Studyspark Study Document

Canada Needs a Foreign Intelligence

Pages: 13 (3712 words) Sources: 12 Subject: Terrorism Document: #88992020

Canadian forces in Afghanistan, and whatever location those forces are directed to by the Canadian Government to protect Canada at home and its interests around the world, should be supported with intelligence sources that are directly focused on Canada's security needs and objectives. Foreign intelligence is more than identifying and taking counter-terrorism defence actions. Aaron Shull, a law school graduate who also holds a master's degree in international affairs helps

Studyspark Study Document

Lisbon Treaty: Democratization and State

Pages: 20 (6166 words) Sources: 10 Subject: Government Document: #9358526

Political legitimacy derives from the peoples of the Member States and thus from the states themselves; (b) the primacy of European law: this is not 'absolute' and the Court reserves the right to block European legislation in order to protect sovereignty and 'constitutional identity', which is, moreover, enshrined in the Lisbon Treaty itself; and (c) ring-fences certain sovereign powers for the Member States: in the areas of criminal law

Studyspark Study Document

Stakeholder Map and Stakeholder Analysis

Pages: 4 (1312 words) Sources: 4 Subject: Criminal Justice Document: #37680560

This is coupled by the high unemployment rate and the current recession in the private industry. This means that jobs in the Criminal Intelligence Bureau will still be attractive. This leads to an increase in quality recruitment (Tita, Troshynski & Graves, 2007). Threats: terrorism has become a permanent and global disaster. This has taken a huge chunk of quality human resource within the Criminal Intelligence Bureau. The organizational strategy The Criminal Intelligence

Join thousands of other students and

"spark your studies".