CISA INTELLIGENCE COURSE OUTLINE

Ambassador Rasheed Seidu Inusah
AMB. Rasheed Inusah
Lecturer

1. INTRODUCTION TO INTELLIGENCE

A. Introduction to Intelligence
B. The distinction between Intelligence and Information
C. Types of Intelligence
D. The use of Intelligence.


2. AGENT RECRUITMENT

A. Definition of an Agent
B. Distinguishing features of an Agent, Contact & Source
C. Mode of recruitment of Agents
D. Agent Circle
E. Handling of Agents
F. Termination of Agents


3. INTELLIGENCE COLLECTION METHODS

A. Types of Intelligence collection methods
B. Processes and Procedures of Collection
C. Strengths and Weaknesses


4. INTELLIGENCE CYCLE

A. Definition of Intelligence Cycle
B. Stages of the Intelligence Cycle
C. Methodologies and Techniques
D. Strengths and Weaknesses
E. General assessment of the cycle


5. INTELLIGENCE REPORT WRITING

A. Introduction to analytical intelligence report
B. Techniques of intelligence report writing
C. Practical training on intelligence report writing


6. SURVEILLANCE

A. Definition of surveillance
B. Types of surveillance
C. Methods of surveillance
D. The use of surveillance in intelligence


7. PROTECTIVE SECURITY

A. Definition of Protective Security
B. Types of Protective Security – document, physical, personal & personnel
C. General assessment of protective security
D. Risk Management and Incidence Response


8. TARGET ANALYSIS

A. Definition of target analysis
B. Profiling of target
C. Positive vetting
D. Due diligence
E. Communication and Reporting


9. SOCIAL MEDIA INTELLIGENCE (SOCMINT)

A. Definition of Social Media
B. The use of social media in intelligence gathering
C. Relevance of social media in modern intelligence
D. Knowledge and skills in assessing, managing & mitigating risks of social media.


10. FUNDAMENTALS OF COUNTERTERRORISM

A. Definition of Counterterrorism
B. The main Counterterrorism groups (Leaders & their formation)
C. Social Networking and counterterrorism
D. Overview of Counterterrorism Threats
E. Implications of Counterterrorism on Nation States
F. Counterterrorism legislation – Comparative analysis
G. Challenges and the way forward


11. ESSENTIALS OF CYBERSECURITY

A. Introduction to cybersecurity
B. Cybersecurity threats, vulnerabilities and attacks
C. Securing networks and critical infrastructure
D. Protecting Data and Systems
E. Security policies and procedures
F. Education and Case Studies


12. NATIONAL / INTERNATIONAL CONTINGENCY AND EVACUATION PLANS

A. Key essentials that give rise to national contingency and evacuation
B. The rationale for National contingency and evacuation
C. The rationale for international contingency and evacuation (foreign missions abroad)
D. The core elements of the evacuation plan
E. The role of Stakeholder engagements


13. COUNTRY RISK ANALYSIS

A. Introduction to Country Risk Analysis
B. Trend analysis
C. Threat analysis
D. Production of intelligence estimates
E. Security Risk Assessment and Management
F. Country Risk Assessment Report


14. CLANDESTINE COMMUNICATION

A. Introduction to Clandestine Communications
B. Communication Equipment as a Potential Security Threat
C. Electronic Surveillance Tools
D. Electronic Surveillance by Law Enforcement Agencies
E. Emerging Trends (Technology & AI)


15. CONTEMPORARY GLOBAL/NATIONAL SECURITY THREATS

A. Definition of National Security
B. Key terms and their definitions - Sovereignty & Territorial Integrity
C. Approaches to National Security – Traditional Security (Regime) vs Human Security
D. Traditional Security Challenges – Espionage, Sabotage & Subversion
E. Current security threats – Armed robbery, Drug trafficking, Terrorism, illegal Mining, Cybercrime/Financial sector related crimes, Unemployment & Poverty, Social media, Political Vigilantism, Maritime piracy/Illegal bunkering, Infrastructure Deficit, Small arms proliferation, irregular migration etc.


16. INTERNATIONAL LAW

A. Vienna Convention on Diplomatic Relations 1961
B. Vienna Convention on Consular Relations and Optional Protocols 1963


17. ROLE OF NGOs AND THINK-TANKS IN POLICY DEVELOPMENT

A. Introduction to policy development and the policy cycle
B. Role of NGOs and think tanks as civil society organisations
C. Grassroots participation and mobilisation
D. Case studies


18. MEDIA ROLE IN POLICY DEVELOPMENT

A. Introduction to Media and Policy
B. Media Types and Policy Impact (Traditional, Social and Digital)
C. Dangers of Misinformation and Disinformation
D. Fact checking
E. Challenges and Future Directions


19. THE SECURITY AND INTELLIGENCE COMMITTEE OF PARLIAMENT AS AN OVERSIGHT MECHANISM IN NATION-STATES

A. Introduction to Parliamentary Oversight
B. Accountability and Transparency in the Security and Intelligence Sector
C. Committee capacity and Effectiveness
D. Case studies


20. SECURITY ESSENTIALS FOR CORPORATE ORGANISATIONS

A. Introduction to Security for Corporate organisations
B. General Security Awareness
C. Intelligence Gathering and Engagement
D. Customer service and security ethics
E. Case Studies


21. VOLUNTARY PRINCIPLES ON SECURITY AND HUMAN RIGHTS

A. Introduction to VPSHR
B. Critical Issues in the mining industry
C. The Voluntary Principles and Security Challenges
D. Community Engagement and Intelligence Gathering
E. Challenges and Emerging Issues


22. HEALTH AND SAFETY TRAINING

A. Introduction to Health and Safety
B. Risk Assessment and Management
C. Emergency preparedness
D. Hazards and Incident Reporting
E. Environmental sustainability
F. Communication and safety culture


23. CROWD MANAGEMENT TECHNIQUES AND INTELLIGENCE GATHERING TECHNIQUES AND CASE STUDIES.

A. Introduction to Crowd Management
B. Crowd Dynamics, Risk Assessment and Planning
C. Crowd control techniques
D. The use of technology in crowd management


24. AVIATION SECURITY

A. Introduction to Aviation Security
B. Risks, Security Measures and Procedure
C. Security Operations Management
D. Case studies


25. WATERWAYS, COASTLINES AND BORDER CONTROL SECURITY MANAGEMENT

A. Introduction to Maritime Security
B. Waterways and Coastal Management
C. Border Security Management
D. Threats and responses in Border, Maritime and Coastline management
E. Emerging threats and future challenges


26. PRACTICAL SECURITY TRAINING - PHYSICAL SECURITY TRAINING FOR ORGANISATIONS AND PRIVATE INDIVIDUALS

A. Training in Enhanced Search Methods
B. Training in Undertaking Night Patrols
C. Practical Training in Profiling and Observation
D. Practical Training in Security Procedures and Lockdown Protocols:

• Archway Metal Detector (AMD)
• Body Search (EU Approved Standard)
• Use of the Handheld Metal Detector (HHMD)
• Luggage Search
• Vehicle Search
• Close protection
• Security sweep
• Zonal mapping and security survey