Standardize date formats across multiple documents by replacing placeholder text with instructions for entering dates in ISO 8601 format. This update enhances clarity and consistency in document metadata, including review and effective dates, ensuring compliance with established documentation standards.
This commit is contained in:
@@ -48,25 +48,114 @@ Intelligence based on:
|
||||
## CHAPTER 2: INTELLIGENCE COLLECTION
|
||||
|
||||
### Section 2.1: Collection Authority
|
||||
Intelligence collection:
|
||||
- Authorized: As authorized
|
||||
- Scope: As specified
|
||||
- Methods: Lawful methods
|
||||
- Documentation: Proper documentation
|
||||
|
||||
**Collection Authorization:**
|
||||
- **Authority:** Executive Director authorizes intelligence collection with SCC oversight
|
||||
- **Authorization Process:**
|
||||
1. Collection need identified
|
||||
2. Collection proposal prepared
|
||||
3. Legal review conducted
|
||||
4. Executive Director approval
|
||||
5. SCC notification (for significant collections)
|
||||
- **Authorization Limits:** Collection authorized only for legitimate institutional purposes
|
||||
- **Authorization Documentation:** All authorizations documented
|
||||
|
||||
**Collection Scope:**
|
||||
- **Scope Definition:**
|
||||
- Specific intelligence requirements
|
||||
- Target entities or subjects
|
||||
- Geographic scope
|
||||
- Timeframe
|
||||
- **Scope Limitations:**
|
||||
- Scope limited to authorized requirements
|
||||
- Scope reviewed and updated as needed
|
||||
- Scope documented
|
||||
- **Scope Oversight:** SCC provides oversight of collection scope
|
||||
|
||||
**Collection Methods:**
|
||||
- **Lawful Methods Only:** All collection methods must be lawful
|
||||
- **Method Authorization:** Methods authorized per collection authorization
|
||||
- **Method Documentation:** Methods documented and justified
|
||||
- **Method Review:** Methods reviewed regularly
|
||||
|
||||
**Documentation Requirements:**
|
||||
- **Collection Documentation:**
|
||||
- Collection authorization
|
||||
- Collection scope
|
||||
- Collection methods
|
||||
- Collection results
|
||||
- **Documentation Standards:** Documentation complete, accurate, and secure
|
||||
- **Documentation Retention:** Documentation retained per security classification requirements
|
||||
|
||||
### Section 2.2: Collection Methods
|
||||
Collection methods:
|
||||
- Open source: Open source intelligence
|
||||
- Technical: Technical collection
|
||||
- Human: Human intelligence
|
||||
- Other: Other lawful methods
|
||||
|
||||
**Open Source Intelligence (OSINT):**
|
||||
- **Sources:**
|
||||
- Publicly available information
|
||||
- Media reports
|
||||
- Academic publications
|
||||
- Government publications
|
||||
- Other open sources
|
||||
- **Collection:** Collection from open sources
|
||||
- **Analysis:** Analysis of open source information
|
||||
- **Documentation:** Open source collection documented
|
||||
|
||||
**Technical Collection:**
|
||||
- **Technical Methods:**
|
||||
- Signals intelligence (SIGINT) - if authorized
|
||||
- Communications intelligence (COMINT) - if authorized
|
||||
- Technical surveillance - if authorized
|
||||
- Other technical methods - if authorized
|
||||
- **Authorization:** Technical collection requires specific authorization
|
||||
- **Legal Compliance:** All technical collection complies with applicable laws
|
||||
- **Documentation:** Technical collection documented
|
||||
|
||||
**Human Intelligence (HUMINT):**
|
||||
- **Human Sources:**
|
||||
- Confidential sources
|
||||
- Informants
|
||||
- Other human sources
|
||||
- **Source Management:** Human sources managed per security procedures
|
||||
- **Source Protection:** Human sources protected per security requirements
|
||||
- **Documentation:** HUMINT collection documented (with appropriate security)
|
||||
|
||||
**Other Lawful Methods:**
|
||||
- **Additional Methods:** Other lawful collection methods as authorized
|
||||
- **Method Approval:** All methods approved before use
|
||||
- **Method Review:** Methods reviewed regularly
|
||||
- **Method Documentation:** All methods documented
|
||||
|
||||
### Section 2.3: Collection Limits
|
||||
Collection limits:
|
||||
- Legal: Compliance with law
|
||||
- Ethical: Ethical standards
|
||||
- Necessity: Necessity requirement
|
||||
- Proportionality: Proportional methods
|
||||
|
||||
**Legal Compliance:**
|
||||
- **Compliance Requirements:** All collection must comply with:
|
||||
- Applicable international law
|
||||
- Applicable domestic law
|
||||
- DBIS legal framework
|
||||
- Human rights standards
|
||||
- **Legal Review:** Legal review conducted for all collection activities
|
||||
- **Legal Documentation:** Legal compliance documented
|
||||
|
||||
**Ethical Standards:**
|
||||
- **Ethical Requirements:** All collection must comply with ethical standards:
|
||||
- Respect for human rights
|
||||
- Respect for privacy
|
||||
- Proportionality
|
||||
- Necessity
|
||||
- **Ethical Review:** Ethical review conducted for collection activities
|
||||
- **Ethical Documentation:** Ethical compliance documented
|
||||
|
||||
**Necessity Requirement:**
|
||||
- **Necessity Test:** Collection must be necessary for legitimate institutional purposes
|
||||
- **Necessity Justification:** Necessity justified in collection authorization
|
||||
- **Necessity Review:** Necessity reviewed regularly
|
||||
- **Necessity Documentation:** Necessity documented
|
||||
|
||||
**Proportionality Requirement:**
|
||||
- **Proportionality Test:** Collection methods must be proportional to purpose
|
||||
- **Proportionality Assessment:** Proportionality assessed for each collection
|
||||
- **Proportionality Review:** Proportionality reviewed regularly
|
||||
- **Proportionality Documentation:** Proportionality documented
|
||||
|
||||
---
|
||||
|
||||
|
||||
Reference in New Issue
Block a user