Intelligence is conducted at two levels, strategic and tactical. Strategic intelligence is information that is needed to formulate policy and military plans at the international and national policy levels. Tactical intelligence is intended primarily to respond to the needs of military field commanders so they can plan for and, if necessary, conduct combat operations. Essentially, tactical intelligence and strategic intelligence differ only in scope, point of view, and level of employment.

You will learn and develop the skill of applying critical thinking skills throughout the analytic process, Identifying and mitigating biases to reveal unstated assumptions. Refine and clarify intelligence questions, research to identify existing data, and gather new evidence. This course will prepare officers for the role of analyst. After completing the modules in this course, officers will have a good understanding of basic Intelligence Analysis and why it is a critical part of intelligence. You will learn how to create an Association Matrix and how it can be used to identify links between entities. You will also learn how to create an Association Link Chart and how it can help you identify links between persons, places, and commodities. An Event Flow Chart can be used to reconstruct the sequence of events that have taken place and predict future activity. Finally, you will learn how to develop conclusions and produce an intelligence product.

Duration: Three (3) months


Ghanaians: GHS 5,000

International: USD 600

Course Content

  • Introduction to Intelligence
  • The Analytical process
  • Collection of Information for Intelligence Analysis
  • Hypothesis and Inference Development
  • Basic Analysis Techniques (Link Analysis, Event Charting, Flow Charting & Telephone Analysis)
  • Presentation of Results
  • Strategic Intelligence for Law Enforcement
  • Ethics
  • Managing Intelligence
  • Building an Intelligence Management System (traditional & computer-based methods).
  • Intelligence from Covert Operations & Joint-commands operations
  • Utilizing Intelligence
  • Case studies
Alert: You are not allowed to copy content or view source !!