When the intelligence collection and reporting is shaped to closely reflect your operations, you get a more useful and precise insight into the global security landscape, and its impact on your people, assets and reputation.
The first stage of the cycle is to determine the intelligence requirements and plan the collection efforts, creating a clear focus and list of priorities for the intelligence team, and ensuring that all information gathered is geared towards a clear purpose.
We aim to understand:
• If there are any gaps in your current intelligence collection
• The geographical areas you operate in and any plans for future expansion
• Any properties or assets across the globe you’ll be monitoring
• Where your people and employees regularly travel
• If there are particular routes they take, accommodation that they stay in or places they visit
• Groups of interest, including activists, terrorists and extremists
• Historical threats to your business or the industry as a whole
Once we have the intelligence requirements, we can begin our collection process – exploiting our vast range of sources with both manual collection from our 24/7 operations centre, and automated collection through data mining.
When it comes to selecting sources, we consider a number of factors, including:
• Capability – Can the source you choose complete the task?
• Suitability – On occasions more than one source may be able to answer your question. Appropriate consideration should be taken to choose the right source
• Multiplicity and balance – Where possible information should be sourced using multiple sources. This helps guard against deception and helps enhance the prospect of successful collection
• Timeliness – Sources selected must be able to carry out the task in the necessary timeframe
These considerations allow us to make sure the information collected is already as relevant and reliable as possible before it is processed into intelligence.
This phase of the intelligence cycle is key to turning information into intelligence and consists of the data being collated, evaluated, analyzed and interpreted by our team of analysts.
Information picked up as part of the collection process goes through these stages to become actionable intelligence:
1. Collation: related items of information and/or intelligence are grouped together to provide a basic record of events
2. Evaluation: the credibility of the information and reliability of the source are evaluated using the expert judgement of the analyst – information cannot simply be taken at face value, so it’s important to indicate how much confidence can be placed in each item of information.
3. Analysis: collated and evaluated information is analyzed – significant facts are identified, verified and accurately geo-located, and we can make deductions from comparing these together.
4. Integration: occurs simultaneously with the analysis process – as the information is analyzed it is combined with other information, and a pattern of intelligence can be identified, such as a sequence of events, threat level or profile of a group.
5. Interpretation: this is the final step of processing. Once we have analysed and integrated the information, we can use our expertise to make actionable interpretations. How significant the information is, and how it relates to what is already known, is judged via a process of comparison and deduction based on common sense, knowledge and experience.
The final stage of the intelligence cycle is the timely delivery of intelligence to those who need it. Intelligence must be disseminated in a way that’s appropriate for the user, highlighting the key facts and our interpretation, comment or assessment. This is why we emphasize the way incident data looks within our threat intelligence platform. Our award-winning user interface and powerful visualisation tools are vital to helping you digest the information at speed. Alongside providing a clear collection plan, the intelligence cycle ensures that the data is not only relevant but reliable.
An intelligence collection plan is a process often used by armed forces and intelligence services to ensure that the intelligence requirements of a mission or client are met.
An ICP helps to close gaps in knowledge and provides clear direction for the collection process. They also give intelligence teams a standard structure to work from and help analysts remain focused on the task at hand.
The information gathered during your ICP session is used to guide both our manual and datamining collection efforts. This means that we strengthen our internal resource, and identify new sources to extract data, to make sure that we’re always meeting your intelligence needs.
Your intelligence collection plan is a working document. So as your business evolves or your needs change, we can be reactive to new requirements.
Use cases for threat intelligence can vary significantly, which means that a standardized approach to intelligence collection puts you at risk of missing critical information. Whichever data or software solution you choose, our collection plan process promises a relevant, reliable and actionable feed of intelligence for you and your team.
©2026 Sigma7 :: All Rights Reserved :: Site by 2NDST