Criminal Intelligence Service Canada
Integrated Threat Assessment Methodology
Version 1.0
Note: Concepts and ideas within this document, the CISC Integrated hreat Assessment Methodology, are gathered from a
wide variety of law enforcement and intelligence agencies, academic publications and open source research, both domestic and
international as well as CISC Central and Provincial Bureau best practices. hese techniques and ideas are intended as a resource
for the broader intelligence community as well as individuals involved in the integrated threat assessment process. For more
information on the sources of information within this document, see the selected bibliography.
his document is a work in process which will be updated as the CISC integrated threat assessment process evolves.
Foreword
he integrated threat assessment process has its origins in the production of the first National hreat
Assessment on Organized and Serious Crime in Canada produced by CISC Central Bureau in 2003. In
2004, the process became truly integrated, resulting in a national collection plan process and nationallevel working group meetings dedicated to establishing analytical standards for the assessments.
Continuing to build upon the foundation of previous threat assessments, both provincial and national,
in 2005 Central Bureau focused on the overall threat to Canada posed by each criminal market in terms
of its scope and magnitude and, in particular, the dynamics of organized crime groups’ involvement
within these markets. In 2007, Central Bureau will contribute further to the decision-making of senior
law enforcement by identifying significant criminal threats as part of the coordinated enforcement
targeting process to determine organized crime priorities. his process, part of the Canadian Law
Enforcement Strategy to Combat Organized Crime, was developed by the Canadian Association of
Chiefs of Police in cooperation with CISC.
As the threat assessment process has evolved over five years, there emerged a need to formalize the
processes and protocols that make up its foundation as an integral part of the Canadian Criminal
Intelligence Model. he methodology presented in this paper is the first step in gathering together key
techniques, tools and common practices currently used or of emerging interest in the integrated threat
assessment process. he integrated threat assessment process continues to be a work in progress and will
continue to evolve through practice.
Criminal Intelligence Service Canada
CISC Integrated Threat Assessment Methodology
Inquiries on this publication should be directed to:
Director General, Criminal Intelligence Service Canada
1200 Vanier Parkway
Ottawa, Ontario K1A 0R2
Canada
© Her Majesty the Queen in Right of Canada, (2007)
Table of Contents
About Criminal Intelligence Service Canada .................................................................... 4
Central Bureau Products and Services ............................................................................... 4
Strategic Intelligence Analytical Products .............................................................. 5
hree-Module Struture ..................................................................................................... 6
National hreat Assessment Structure............................................................................... 7
Criminal Group Inventory Matrix .................................................................................... 8
Measuring Levels of Knowledge ....................................................................................... 9
Harms from Organized and Serious Crime .................................................................... 10
Business Rules ................................................................................................................. 11
Flowchart of Integrated hreat Assessment Process........................................................ 13
Words of Estimative Probability...................................................................................... 14
Canadian Criminal Intelligence Model ........................................................................... 15
Terminology .................................................................................................................... 16
Selected Bibliography ...................................................................................................... 28
Integrated Threat Assessment Methodology 3 CISC
Unclassified
About Criminal Intelligence Service Canada
CISC is the voice of the Canadian criminal intelligence community. As such, it is in a
unique position to provide strategic intelligence on organized and serious crime in Canada
to senior law enforcement management and designated government departments.
Structure
Established in 1970, CISC unites the Canadian criminal intelligence community by
providing leadership and expertise to CISC member agencies. CISC consists of a Central
Bureau in Ottawa and ten Provincial Bureaus across Canada. he Central Bureau liaises
with and collects information and intelligence from the Provincial Bureaus which operate
independently while maintaining common service delivery standards.
Membership and Governance
CISC has three categories of membership. Category 1 is restricted to police agencies
that have full police authority provided under a Canadian federal or provincial police
act. Category 2 membership may be granted to those agencies that have a limited law
enforcement responsibility that grants them an authority under a specific federal and/or
provincial legislation (e.g. Customs Act, Provincial Wildlife Act). Category 3 membership
may be granted to an agency that does not have a direct law enforcement authority but
provides assistance to law enforcement agencies.
he CISC National Executive Committee is the governing body for CISC. It is chaired
by the Commissioner of the RCMP and is comprised of 24 leaders from Canada’s law
enforcement community.
Central Bureau Products and Services
ACIIS
ACIIS, the Automated Criminal Intelligence Information System, is the Canadian
law enforcement community’s national online database for criminal intelligence and
information on organized and serious crime and is only accessible to law enforcement.
Criminal Intelligence Training
CISC sponsors criminal intelligence courses every year, which are held in several locations
across the country. hese courses offer training to CISC member agency personnel in
various criminal intelligence functions.
National Criminal Intelligence Requirements, Collection and Liaison
Program & Strategic Analytical Services
he Central Bureau’s National Criminal Intelligence Requirements and Collection
Program collects and monitors information and intelligence on the organized crime
groups and their involvement within criminal markets. CISC Central Bureau’s Strategic
Analytical Services is responsible for the production of various strategic intelligence
CISC 4 Integrated Threat Assessment Methodology
products. Strategic Analytical Services also designed, developed and implemented a
‘strategic early warning’ methodology and system to enhance current law enforcement
practices with a proactive approach to crime control and prevention.
Strategic Intelligence Analytical Products
CISC Central Bureau produces the following strategic intelligence analytical products:
National hreat Assessment on Organized and Serious Crime in Canada:
he annual CISC National hreat Assessment assists informed decision
making by senior law enforcement leaders as well as providing an overarching
evaluation of organized criminality nationally for the Canadian criminal
intelligence community. In 2007, Central Bureau will also identify significant
criminal threats as an integral component of the coordinated enforcement
targeting process to determine organized crime priorities. his process, part of the
Canadian Law Enforcement Strategy to Combat Organized Crime, was
developed by the Canadian Association of Chiefs of Police in cooperation with
CISC.
National Criminal Intelligence Estimate on Organized and Serious Crime
in Canada: he primary aim of this report is to provide an overview of organized
and serious crime threats in Canada to enable informed decision making for
senior government officials.
Annual Report on Organized Crime in Canada: his report, the only national
public report on organized crime by law enforcement, is published
to inform and educate the public on the effects of organized crime as it affects
every community and region in Canada. his report is available at www.cisc.gc.ca.
Strategic Intelligence hreat Assessments: CISC periodically produces in-depth
threat assessments on specific law enforcement issues and/or threats.
Strategic Intelligence Briefs: hese reports are intended to provide CISC
member agencies with shorter strategic analytical intelligence products on
organized crime issues affecting Canada. Unclassified versions of these reports will
be posted on the internet as available.
Strategic Intelligence Précis: his product line provides an executive summary
of key findings, judgements and forecasts from products such as the National
hreat Assessment or National Criminal Intelligence Estimate.
Sentinel Watch List and Strategic Early Warning Assessments (Sentinel):
he Sentinel Watch List, produced quarterly, highlights a selection of future threat
scenarios that could have repercussions for the Canadian law enforcement
community in the coming months and years. he Sentinel is a product line that
provides strategic early warning assessments of criminal threats and developments
from within Canada and internationally.
Integrated Threat Assessment Methodology 5 CISC
Unclassified
Three-Module Structure
In 2003, at the beginning of the integrated threat assessment process, the Central &
Provincial Bureaus started to establish consistent format & processes for the annual
integrated provincial threat assessments (PTAs). In December 2004, the Provincial
Bureaus agreed to adopt the three-module structure for their PTAs. his template
ensures a consistent approach nationally to assessing organized crime and also facilitates
comparisons between provinces.
Module I – Strategic Threat Assessment
• his module is completed by both the Provincial and Central Bureaus.
• Components of this module can include:
Environmental scan or drivers
Linkages – legitimate or criminal
Organized crime groups (threats, capabilities, vulnerabilities & trends)
Criminal markets (scope, magnitude, dynamics & trends)
Criminal harms
Forecasts
Recommendations
Module II – Organized Crime Group Inventory
• Provincial Bureaus complete group inventories on all or a specific number of
significant criminal groups operating within their respective province.
• A group inventory template has been shared with all Provincial Bureaus to be used
as a common framework.
• Central Bureau completes a national, strategic group inventory in order to determine
significant, inter-provincial, national and international-level criminal threats.
• Components of this module can include:
Group name and size
Group structure
Group associations
Sleipnir matrix
Business associations
Money laundering
Recent law enforcement efforts
Sources of support
Criminal activities (known/suspected)
Ports of entry
Module III – Tactical Profiles of Organized Crime Groups
or Individuals
• his module links the integrated threat assessments to the coordinated enforcement
targeting process that determines intelligence and enforcement targets.
• he tactical profiles contain target-specific intelligence on groups or individuals
engaged in organized and serious crime.
• Components of this module can include:
Personal data
Criminal history and roles
Position and influence (reputation)
Finances
Capabilities (expertise and skills)
Vulnerabilities and opportunities
CISC 6 Integrated Threat Assessment Methodology
National Threat Assessment Structure
he format of CISC Central Bureau’s National hreat Assessment is complementary with
the three-module approach of the integrated provincial threat assessments. Module I
provides strategic assessments of criminal markets and significant criminal groups. In
2006, Central Bureau adopted Modules II and III to determine and classify significant
criminal threats within an organized crime group inventory.
Module I: Strategic Criminal Market Assessment
A:
B:
C:
D:
Key Findings
Drivers: International Environment and Criminality in Canada
Harms and Criminal Markets (Economic, Social & Political)
Criminal Markets
Elements of each criminal sub-market is assessed with a focus on common
themes that could include scope, magnitude, legitimate and criminal linkages as well
as trends occurring on a national or international scale.
Illicit Drugs
• cocaine (crack cocaine)
• ecstasy
• heroin
• marihuana
• methamphetamine
Financial Crime
• mass marketing fraud
• payment card fraud
• mortgage fraud
• securities fraud
• money laundering
Contraband
• firearms
• tobacco
• intellectual property rights
• humans as commodity
• vehicle theft
Module II: Strategic Criminal Group Assessment
E:
Analysis
Each criminal group identified in the integrated provincial threat assessments is
classified into threat categories based on the group’s criminal scope (international,
international (cross-border), inter-provincial, intra-provincial or local) as well as the
relative magnitude of the group’s criminal roles or activities.
Module III: Profiles of Organized Crime Groups (Interprovincial, National and International-level Threats)
F:
Analysis
CISC Central Bureau assesses key criminal groups that pose higher-level threats
with criminal scopes at the inter-provincial, national and international levels.
H:
Appendices
a) Definitions
b) Methodology
G: Assessment Evaluation Form
Integrated Threat Assessment Methodology 7 CISC
Criminal Group Inventory Matrix
(as to be used by CISC Central Bureau in the National hreat Assessment)
CISC 8 Integrated Threat Assessment Methodology
Group
Name
Category
Province or
territory
(Base of
operations)
City
Market general
Market –
subcategory
Criminal
roles
Money
laundering
Criminal
scope
Sleipnir
score
SMITH
et al.
Independent
(IND)
B.C.
Vancouver
Illicit drugs
Illicit drugs
Illicit drugs
Illicit drugs
Illicit drugs
Illicit drugs
Financial crime
Cocaine
Cocaine
Marihuana
Marihuana
Marihuana
Precursors
Mortgage fraud
Importer
Financier
Manufacturer
Transporter
Transporter
Importer
Operative
Laundering
through stock
market, real
estate & money
service businesses
International
International
Intra-provincial
Inter-provincial
Cross-border
International
Intra-provincial
576
LEE et al.
Asian
organized
crime (AOC)
Ontario
Toronto
Illicit drugs
Illicit drugs
Ecstasy
Ecstasy
524
Cocaine
Illegal gaming
Intellectual
property rights
crime
Illegal gaming
Counterfeit
goods
Laundering
through
commercial
real estate in
Canada & U.S.,
alternative
remittance
systems
Intra-provincial
Cross-border
Illicit drugs
Manufacturer
Wholesale
distribution
Wholesale
distribution
Operative
Wholesale
distribution
Illicit drugs
Crack cocaine
No laundering
detected.
Local
Illicit drugs
Marihuana
Financial crime
Payment cards
Retail-level
distribution
Retail-level
distribution
Retail-level
distribution
Financial Crime
Securities fraud
Financial Crime
Mass marketing
fraud
Service
provider
Facilitator /
broker
Laundering
through stock
market
DRAGON
KIDZ
MORTON
et al.
Street gang
(SG)
Independent
(IND)
Alberta
Quebec
Calgary
Quebec
City
Unclassified – Information is fictional and is for presentation use only
Intra-provincial
Intra-provincial
Intra-provincial
369
Local
Local
International
International
528
Measuring Levels of Knowledge
(as to be used by CISC Central Bureau)
Criminal market
Statement of knowledge
Assess components of market subcategory , ex importation
/ exportation, manufacturing & distribution of illicit
commodities, & criminal groups capabilities
Level of
knowledge
(excellent, good,
fair or poor)
Focus areas for collection
Specific intelligence gaps within each market subcategory with a
focus on criminal roles, scope and capabilities.
Integrated Threat Assessment Methodology 9 CISC
Mortgage fraud
• Identified some key criminal groups involved in mortgage Good
fraud with concentrations in B.C., Alberta & Ontario.
• Less knowledge about the scope, magnitude & harm of
Fair
this fraud.
Focus on establishing key areas/regions for mortgage fraud
& criminal groups using mortgage fraud to further other
activities like marihuana grow operations.
Payment card fraud
• Knowledge of some groups involved in the distribution
& use of smaller quantities of counterfeit cards. • Less
knowledge about the manufacture of counterfeit cards.
Fair
Poor
Focus on groups involved in large-scale manufacture
& distribution of counterfeit cards, particularly with
distribution internationally.
Illicit drugs – ecstasy
• Identified key criminal groups are involved in
importing chemical precursors & manufacturing ecstasy
in multi-kilogram quantities on a regular basis. • here
are numerous criminal groups involved in distributing
ecstasy at mid-level & street-level distribution quantities
throughout the country. • Varying levels of knowledge are
present regarding their criminal capabilities, sources of
ecstasy, magnitude of operations, & inter-linkages.
Good
Focus on identifying all groups involved in manufacturing
ecstasy at the higher levels of magnitude (multi-kilogram
quantities). Focus on establishing the precursors’ source
(countries, groups) & amount of precursors entering
Canada.
Illicit drugs –
methamphetamine
• Knowledge of criminal groups involved in mid- and
retail-level distribution of methamphetamine. • Less
information about the magnitude of manufacture and the
domestic usage patterns & levels.
Good
Fair
Focus on targeting the groups involved in largescale manufacture & wholesale distribution of
methamphetamine in Pacific/Prairie regions. Focus on
determining rate/extent of drug’s increase.
Human trafficking
• Some groups identified but difficult to determine scope
& magnitude of operations with Canada as a destination
or transit country. • Some knowledge of source & transit
countries & border entry points.
Poor
Focus on identifying the magnitude of trafficking
operations within & through Canada, as well as key groups
involved in the sexual/labour exploitation of the trafficked
individuals.
• Identification of some groups in B.C., Ontario &
Quebec. • Difficult to determine scope & magnitude of
operations within Canada or extending internationally.
Fair
Poor
Mass marketing fraud
Good
Fair
Fair
Unclassified – Information is fictional and is for presentation use only
Focus on scope/magnitude of key groups with large-scale
operations operating internationally, & the extent of
domestic operations.
Harms from Organized and Serious Crime
In terms of measuring threat, “harm” refers to the adverse consequences of criminal
activities. hese consequences may be direct and tangible, such as fraud or thefts, with
effects that can be quantified in terms of monetary loss. Harms also encompass a range
of intangible effects more difficult to quantify. For example, the loss of quality of life is
difficult to measure or to compare objectively against a merchant’s loss of business due to
counterfeit goods. Following the work undertaken by the London Metropolitan Police
Service in the United Kingdom, harms can be conceived of in terms of social, economic,
political or indirect consequences from organized criminality, as seen below:
Harm Type
Harm Definition
Examples
Social
Negative physical, psychological or
emotional consequences; cannot be
readily expressed in cash terms.
Homicide, intimidation &
assaults.
Economic
Negative effects on an individual,
community, business, institution,
government or country; can be
readily expressed in cash terms. Two
sub-components: economic losses to
the victims of organized crime and
economic gains to the criminal group.
heft, loss of business because
of counterfeit goods & fraud
schemes. Complicity of
associated businesses, unfair
competition.
Political
Negative effects on the political
stability of a community, institution,
region or country.
Corruption, loss of confidence
in government, or diminished
view of effectiveness of law
enforcement or government.
Indirect
Secondary adverse consequences of
criminal activities.
Environmental damage from
clandestine drug laboratory or
marihuana grow operation waste.
Harm analysis can distinguish between crimes that may have a high volume/low harm
factor (ex. break-and-enters) versus crimes that a low volume/high harm factor (ex.
counterfeit pharmaceuticals). Distinguishing between the relative negative effects of
harms contributes to determining the harm magnitude of different types of crime types
within the total volume of all criminal activity. Harm analysis on a specific criminal
subcategory would enable decision makers to prioritize specific criminal offences because
of the significant harms caused.
Within the Canadian criminal intelligence community, work on harm analysis is being
undertaken through the RCMP-led Harm Prioritization Scale which is currently in the
research and development phase. his project, with participation from the broad criminal
intelligence community through the CISC network, has the aim of ranking the relative
harms caused by specific criminal groups that will be an additional layer of analysis to
complement Sleipnir threat assessment matrices.
CISC 10 Integrated Threat Assessment Methodology
Business Rules
Business rules are standards or operating rules for analysts that are intended to provide
consistency and reliability between analytical products, regardless of product line or
agency. hese rules also provide a level of rigour to ensure that each analytical product is
timely, relevant and logical. At Central Bureau, as the integrated threat assessment process
evolved, so did the need for common practices.
he following are mandatory business rules for use by all strategic criminal intelligence
analysts at Central Bureau.
• Footnote each separate piece of information, both unclassified and classified.
Statements without footnotes will be assumed to be analytical judgements.
Each footnote must include all applicable information: the information source, date
of information and the security classification of the information.
• Each sentence should have a security classification in brackets following each
sentence: Unclassified or ‘UC’, or Protected “A” or ‘PA’, or Protected “B” or ‘PB.’
• All analysts will follow the agreed upon working terminology in order to ensure
consistent use of terms within analytical products.
• Each analyst will maintain official files (electronic or hard copy) on assigned
topics that contain official correspondence, draft submissions, and source
documents. his information must be easily retrievable for addition to the official
project file at the completion of the production as well as to answer any questions
raised during the intelligence review processes.
• For all intelligence products, analysts will focus on intelligence judgements,
implications and forecasts (ie. what will happen? why is this important?),
not on current or background intelligence. Judgements and forecasts should be
clear, concise and supported by valid and reliable information.
• here is a three-year time limit on information to be included in the National
hreat Assessment. Any information over this limit will not be included in products,
unless there are extenuating circumstances.
• Each analytical product at Central Bureau will be assigned one lead analyst
for short analytical products and two lead analysts for each national assessment.
Lead analysts are responsible for coordinating the production of the strategic
assessment at each stage in the process up to and including its translation, review
of translation, graphic design, printing and distribution. he leads function as
assistant editors and provide feedback on each draft and direction for
subsequent drafts.
Integrated Threat Assessment Methodology 11 CISC
a.
he lead analysts report on the progress of the assessment to the team
supervisor, who in turn advises the Manager, Strategic Analytical Services
who functions as the chief editor and is the final authority on its contents
and the final arbitrator, if necessary, to achieve a consensus on contentious
issues.
• Each Central Bureau analytical product will follow the Criminal Code definition
of a criminal group. Any so-called ‘white-collar’ criminal groups that meet this
definition will be determined to be part of organized crime.
• he purpose of the Intelligence Review Board (IRB) is to conduct a constructive
review of an intelligence assessment. Any proposed changes must be based
on written documentation with accompanying substantiating evidence that is sent
to CISC prior to the IRB or brought to and discussed at the IRB.
b.
Analysts involved in producing the intelligence product are required
to bring all relevant background material to the IRB in order to answer
any questions.
c.
Any significant changes to the intelligence product that result from
discussions within the IRB will result in the product being redisseminated to the IRB participants for final comments.
CISC 12 Integrated Threat Assessment Methodology
Flowchart of Integrated Threat Assessment
Process
his chart depicts the outcomes from the cyclical ITA process, namely the integrated
provincial & national threat assessments, the presentation to the coordinated enforcement
targeting process, & the subsequent Central Bureau analytical products. he national
planning meetings, steering committee & Central Bureau national intelligence
requirements assist in guiding the evolution of the ITA process.
2007
Integrated
Collection Plan Process
Integrated Provincial
Threat Assessments
(PTAs)
National Threat
Assessment (NTA)
Information from the PTAs and NTA are
presented to the Provincial and National
Executive Committees. In a coordinated
enforcement targeting process,
representatives of municipal, provincial
and federal law enforcement agencies
choose local, provincial and national
targets.
Integrated Threat Assessment Planning
Meetings (National) & Steering Committee
National Working Groups on
Criminal Harms, Analytical Tools &
Categorization of Organized Crime
CISC Central Bureau National Criminal
Intelligence Requirements (levels
of knowledge & intelligence gaps)
2008 Integrated
National Collection
Plan Process
Intelligence in the NTA
can lead to other analytical
products for CISC
Central Bureau
Sentinels
(Strategic Early
Warning)
Strategic
Intelligence Briefs
National Criminal
Intelligence Estimate
(for government)
Annual Report on
Organized Crime
(for public)
Integrated Threat Assessment Methodology 13 CISC
Words of Estimative Probability
he following table assigns percentage values to certain qualifying phrases. he
percentages are from Sherman Kent’s “Words of Estimative Probability” from the Centre
for the Study of Intelligence, CIA, 1964.
State of Probability
Phrases of Probability
100% - certainty
Almost certain
93% (Give or take about 6%)
Will
Virtually certain
Highly likely
Probable
75% (Give or take about
12%)
Likely
Probable
Chances about even
50% (Give or take about
10%)
30% (Give or take about
10%)
Unlikely
Low probability
Probably not
Almost certainly not
7% (Give or take about 5%)
Virtually impossible
Almost impossible
Slight chance
Highly doubtful
Very unlikely
Highly unlikely
Extremely unlikely
Little prospect
0% - impossibility
his table does not contain an exhaustive list of terminology that can be used to express
probability. However, some standards in regards to the phrases used will ensure greater
consistency in the language of judgements and forecasts (as well as how the analysis is
interpreted by decision makers) within the criminal intelligence community.
CISC 14 Integrated Threat Assessment Methodology
Canadian Criminal Intelligence Model
he Canadian Criminal Intelligence Model (CCIM) is an end-to-end business process
for effectively managing and integrating intelligence-led policing activity at all levels of
law enforcement across Canada: municipal, provincial, federal and international. CISC
Central Bureau is leading the coordination and implementation of CCIM with broad
consultation from the criminal intelligence and wider law enforcement community. Its
basic objective is to better inform strategic and tactical decision-making with sound
intelligence products and services. he framework for the development of the CCIM is
centred on four key pillars:
1.
Delivery of intelligence products and services. he CCIM establishes nationally
accepted standards through principal intelligence products such as the integrated
provincial and national threat assessments, strategic and tactical assessments, and
strategic early warning assessments (Sentinels and Watch List).
2.
Information/intelligence storage, retrieval and exchange. he CCIM will
establish processes and protocols to identify and prioritize critical intelligence
gaps, collection strategies and communication procedures. hese processes
will assist law enforcement to address critical knowledge gaps and mitigate
threats/risks while ensuring the delivery of timely information/intelligence
between all CISC member agencies across Canada.
3.
Tasking, coordination and application. he CCIM demands that strategic and
operational decision-making processes are intelligence-led and that the analytical
products both inform and drive tasking. his will provide both the framework and
information to align resources to priorities and to revise the latter in the light of
emerging threats or trends. An important component of this pillar is a quality
assurance or audit mechanism to measure the value and effectiveness of the
intelligence process and related products.
4.
Professionalization of the intelligence function. he CCIM’s focus on
supporting intelligence-led policing places a renewed emphasis on the requirement
for greater professionalism, ongoing training and development of intelligence
specialists. his will involve the development and delivery of new training
courses, career path development for intelligence personnel, as well as intelligence
tradecraft doctrine development.
Key tenets of CCIM are to incorporate best practices and tools that are already in
place, such as the Sleipnir threat assessment technique, Harm Prioritization Scale and
integrated provincial and national threat assessments. CCIM also focuses on identifying
and incorporating innovative processes, domestically and internationally from multiple
disciplines. he integrated threat assessment methodology, contained within this
document as a work in process, is also an important component of CCIM.
Integrated Threat Assessment Methodology 15 CISC
Terminology
hese terms are to be considered working definitions for CISC Central Bureau for the
integrated threat assessment process. hey are gathered from a variety of law enforcement
and intelligence agencies, academic publications and open source research, both domestic
and international as well as from the CISC Central and Provincial Bureaus. his
terminology will evolve as the integrated threat assessment process evolves.
Division of Canada into Regions
Yukon
Territory
Northwest
Territories
Nunavut
Newfoundland &
Labrador
Alberta
Saska
tchew
an
British
Columbia
Manitoba
Quebec
Prince Edward Island
Ontario
Nova Scotia
New Brunswick
•
•
•
•
•
•
Northern (Yukon, Northwest Territories & Nunavut),
Pacific (British Columbia),
Prairies (Alberta, Saskatchewan & Manitoba),
Ontario
Quebec
Atlantic (New Brunswick, Nova Scotia, PEI, Newfoundland & Labrador).
Criminal Scope
International Scope: A criminal group that has illicit activities that extend beyond
Canada to another country (other than bordering U.S. states – see international crossborder scope), or that has criminal linkages/presence extending to another country that
is the source or transit country for illicit commodities destined for Canada. Or, a foreign
organized crime group that criminally operates in Canada or influences the Canadian
criminal marketplace (ex. using Canada to launder money illicitly earned in another
country).
CISC 16 Integrated Threat Assessment Methodology
International (Cross-border): Criminal groups evaluated as having an international
cross-border scope are those that have criminal activities/linkages extending to U.S.
northern border states or the French islands of St. Pierre and/or Miquelon off the
Canadian east coast. (he U.S. states or French islands should have a geographic
proximity to the Canadian province/territory in which the criminal group operates).
National Scope: Criminal groups evaluated as having a scope that encompasses at
least two primary criminal hubs (ie. B.C. Lower Mainland, southern Ontario & greater
Montreal region). (See Criminal Hubs).
Inter-provincial Scope: Criminal groups evaluated as having an inter-provincial scope
within Canada are those that have criminal activities/linkages extending to two or more
provinces or territories.
Intra-provincial Scope: Criminal groups evaluated as having an intra-provincial scope
are those that have criminal activities/linkages that are localized within a single province
but encompass more than one area (city, town, or rural area) within the province.
Localized Scope: Criminal groups evaluated as having a localized scope are those that
have criminal activities/linkages that are localized within a single area (city, town, or rural
area).
Unknown Scope: Criminal scope is unknown.
Level of International Criminal Scope: Limited (2 countries), Medium (3 to 4
countries), and Extensive (five and more countries).
Structure of Criminal Organizations
he following three definitions of criminal structure are derived from the United Nations’
“Results of a pilot survey of forty selected organized criminal groups in sixteen countries”,
2002.
Criminal Network: Criminal networks are
defined by the activities of key individuals
who engage in illicit activity in often
shifting alliances. Such individuals may
not regard themselves as members of a
criminal group, and may not be regarded as
a criminal group by outsiders. Nevertheless,
they coalesce around a series of criminal
projects.
Integrated Threat Assessment Methodology 17 CISC
Hierarchy: his type of criminal group has
a relatively defined hierarchy and systems of
internal coordination or discipline. While social
or ethnic identities can be present, this is not
always the case. here may be a relatively clear
allocation of tasks and some form of internal
code of conduct.
Core Criminal Group: A core criminal
group generally consists of a limited number
of individuals who form a relatively tight and
structured group. Around this core group
there may be a large number of associate
members or a network that are used from
time to time. here may be an internal
division of activities among members.
Nature of Criminal Bonds
he following definitions of criminal structure are derived from the London (United
Kingdom) Metropolitan Police Service’s definitions of networks. CISC Central Bureau
added the “specialized network” to capture another dimension of criminal interactions.
Family Network: Some members or associates have familial bonds. hese bonds may be
cross-generational.
Cultural Network: he network shares bonds due to a shared culture, language, religion,
ideology, country of origin and/or sense of identity. Some of these networks may shift over
time from being culturally based to the proximal model.
Proximity Network: he network shares bonds due to certain geographical ties of its
members (ex. past bonding in correctional or other institutions, or living within specific
regions or neighbourhoods). Members may also form a network with proximity to an area
strategic to their criminal interests (ex. a neighbourhood or key border entry point). here
may be a dominant ethnicity within the group, but they are primarily together for other
reasons.
Virtual Network: A criminal network that may never physically meet but work together
through the Internet (ex. networks involved in online fraud, theft or money laundering).
Specialized Network: Individuals in this network come together to undertake criminal
activities primarily based on the skills, expertise or particular capabilities they offer.
CISC 18 Integrated Threat Assessment Methodology
Levels of Criminal Threats
Higher-Level Criminal hreats
•
Regularly conduct multiple criminal operations that involve specialized expertise
or a higher level of sophistication, particularly importing illicit commodities
directly from source location and/or exporting internationally, wholesale
and/or mid-level distribution of illicit commodities and manufacturing (and/or
directing/financing the manufacture) of illicit commodities at the wholesale level.
•
Generally operates inter-provincially or internationally and has multiple criminal
linkages to other crime groups in Canada and internationally.
•
Regularly launders large sums and maintains multiple links to legitimate
businesses for money laundering and to further legitimate and/or criminal
activities.
Mid-level Criminal hreats
•
Conduct some criminal operations with expertise such as involvement in the
mid-level distribution of illicit commodities at the intra/inter-provincial, and to a
lesser extent, international (cross-border) scope with some retail-level distribution.
Involvement in international importation/exportation is rare.
•
Criminal scope and linkages to other groups range from localized to international
(cross-border) but infrequently extend internationally.
•
Laundering of illicit proceeds occurs on a smaller and less frequent scale than
higher-level groups. Maintain links to legitimate businesses for money laundering
and to further legitimate and/or criminal activities.
Lower-Level Criminal hreats
•
Tend to have specific and/or fixed levels of criminal activity that are lower level
with little or no capability to expand the sophistication or scope of their
criminal activities. Focus on retail-level distribution of illicit commodities with
limited, if any, involvement in the importation or manufacture of illicit
commodities.
•
Limited number of criminal linkages within a restricted geographic location.
•
Few, if any, links to legitimate businesses for money laundering, or to further
legitimate and/or criminal activities. Laundering of illicit proceeds is
unsophisticated with the majority of any proceeds are directed toward property
investment and/or lifestyle maintenance.
Criminal Marketplace Roles – Illicit Commodities
Importer/Exporter: his refers to a criminal group involved in the importing/exporting
of illicit commodities to another country. Typically, the criminal group has international or
international (cross-border) scope or linkages.
Manufacturer: his refers to a criminal group involved in the manufacture, production or
cultivation of illicit commodities (ex. marihuana, methamphetamine or counterfeit goods).
Production quantities range among wholesale, mid-level or retail distribution levels.
Integrated Threat Assessment Methodology 19 CISC
Wholesale Distributor: his refers to a criminal group involved in the distribution of
illicit commodities that are purchased directly from a source of supply or manufacture and
are typically sold to mid-level distributors.
Mid-level Distributor: his refers to a criminal group in the distribution of illicit
commodities that are purchased directly from wholesalers and are sold in smaller
quantities to other mid-level distributors or to retail distributors.
Retail distributor (street-level)
his refers to a criminal group involved in the distribution of illicit commodities that are
sold directly to end users in small amounts.
Criminal Marketplace Roles – Illicit Services
Transporter: his refers to a criminal group that transports illicit commodities either for
its own benefit or on behalf of other criminal organizations.
Financier: his refers to a criminal group that is involved in funding criminal activity
whether in a controlling manner or as an arms-length investor.
Facilitator/Broker: his refers to a criminal group that acts as a facilitator or provides
necessary expertise, services, materials, or other assistance to another crime group or
network. his group also has demonstrated ability to broker or orchestrate high-value
criminal activity amongst various groups. his group can include corrupted professional
intermediaries such as accountants, lawyers, real estate agents, mortgage brokers or
commercial truck/helicopter pilots, amongst others.
Operative: his refers to a criminal group that commits core criminal functions
(substantive offences), for example, drug offences, fraud, or proceeds of crime either for its
own benefit or on behalf of other criminal groups.
General Terminology
Base of Operations: he location from which a criminal group’s activities originate.
Basic (Background) Intelligence: Background intelligence, usually encyclopedic in
nature, provides a broad range of baseline information and intelligence.
Canadian Criminal Intelligence Model (CCIM): he CCIM is an end-to-end process,
led by CISC Central Bureau, for effectively managing and integrating intelligence-led
policing at all levels of law enforcement across Canada. It is based upon four pillars:
• Delivery of intelligence products and services following accepted national
standards
• Processes and protocols for information/intelligence storage, retrieval and
exchange
CISC 20 Integrated Threat Assessment Methodology
• Intelligence-led tasking, coordination and application
• Professionalization of the intelligence function
Canadian Law Enforcement Strategy to Combat Organized Crime: his strategy,
devised and fully supported by the Canadian Association of Chiefs of Police (CACP) in
cooperation with CISC, describes the process by which law enforcement will determine
organized and serious crime priorities. Individuals representing municipal, provincial
and federal law enforcement agencies will bring municipal and provincial enforcement
priorities, established from the integrated provincial threat assessments, to the Provincial
Enforcement Coordinating Committee. Inter-provincial, national and international-level
threats identified in the National hreat Assessment, along with priorities identified at
the Provincial Enforcement Coordinating Committee will be presented to the National
Enforcement Coordinating Committee.
Capability: Capability is the function of the resources and knowledge available to a
criminal group or subject. Each element can be assigned a value, either quantitative or
qualitative.
Confidence: he confidence held by a threat that it will achieve its aim.
Categorization of Organized Crime Working Group: he cultural-geographic typology
for categorizing criminal groups has limitations, given multiple multi-ethnic groups and
groups with fluid networks or dynamic structures. In Canada, law enforcement is working
to develop a framework that more accurately and effectively assesses the state of organized
crime based on the level of threat posed by the groups.
Collection Requests: Collection requests are questions generated by analysts for
intelligence officers on intelligence gaps in order to update and further assessments of
particular criminal groups, issues or markets.
Criminal Hubs: he B.C. Lower Mainland, southern Ontario and the greater Montreal
region are the primary criminal hubs in Canada with spokes of distribution and criminal
influence extending from each hub to secondary criminal hubs. hese secondary criminal
hubs act as key mid-level distribution centres for the surrounding regions, following
established networks extending outward to the smaller, tertiary hubs. he hubs are
naturally formed around criminal markets in urban areas and are proportional in size to
the urban centres in which they are located. here is interaction between hubs in Canada
and other criminal hubs internationally.
Criminal Group of Interest: A criminal group of interest is one that, assessed in the
criminal group inventory matrix, has some attributes indicating that it may be a higherlevel criminal threat with inter-provincial or international/cross-border scope, or may
present a significant criminal harm. However, significant information gaps prevent a
determination of its capabilities, scope or harms. hese types of groups are prioritized and
become collection requests.
Integrated Threat Assessment Methodology 21 CISC
Criminal Group Inventory Matrix: his matrix is a comprehensive chart of all criminal
groups identified in the integrated threat assessment process. It contains each group’s
name, cultural-geographic category, location of operations, involvement in each criminal
market, methods of money laundering, criminal scope and Sleipnir score. Criminal groups
can then be ranked as being higher-, mid- or lower-level threats. Analysis of the criminal
harms these groups pose will complement evaluations of their capabilities.
Criminal Group or Organization: Defined in the Criminal Code of Canada, as a group,
however organized, that is composed of three or more persons in or outside of Canada,
and has as one of its main purposes or main activities the facilitation or commission of
one or more serious offences that, if committed, would likely result in the direct or indirect
receipt of a material benefit, including a financial benefit, by the group or by any of the
persons who constitute the group.
Criminal Market: he criminal market is a network in which buyers and sellers interact
to exchange goods and services for money. Within broad markets like illicit drugs, there
are market subcategories with specific geographic locations and individual components
(ex. heroin, cocaine). Each market subcategory can be analyzed in terms of suppliers,
distributors, retailers, purchasers, the networks of interaction between goods and people,
market scope, the types of goods, supply and demand for those goods, their price and their
fluctuations, the distribution of those goods to different market segments, the size and
length of the distribution chain and so on.
Criminal Scope: Criminal scope is the area in which a crime group operates,
encompassing importation/exportation, manufacturing and distribution activities. It
is assessed to range from international, international (cross-border), national, interprovincial to intra-provincial, localized and unknown.
Cultural-geographic Groupings: Historically, law enforcement used broad-based
groupings (i.e., Asian-based, Eastern European-based, Italian-based) to categorize
organized criminal groups. For some criminal groups, these broad-based culturalgeographical groupings continue to be valid; others are more multi-ethnic in their
membership and/or criminal associations. References to these groupings do not suggest
that all members of that specific ethnic group are involved in organized crime or that the
government of the country of origin or its authorized agencies permits or participates in
any illegal activities. (See Categorization of Organized Crime Working Group).
Current Intelligence: Current intelligence is related to the status of an ongoing
operational threat, event, environmental condition or indication of illicit activity.
Current hreats: Current threats are those that are actively occurring.
Drivers: Drivers (usually social, economic, political, institutional, technological or cultural
in nature) are a collection of facts, trends and forecasts used for making judgements and
recommendations regarding a particular issue or phenomenon. he drivers’ underlying
CISC 22 Integrated Threat Assessment Methodology
Unclassified
causes can typically be subdivided into enabling conditions (risk factors) or constraining
conditions (protective factors).
Estimative Intelligence: Estimative intelligence is that which provides forward
looking assessment and predictive judgments, and attempts to project probable future
developments in the law enforcement environment and analyses their implications.
Ethnographic Intelligence: his form of intelligence refers to information about
indigenous, traditional or local forms of association, organization and methods of
mobilization (ex. hawala). his information focuses on personal interactions, issues of
cultural significance and how groups of people react to certain events.
Extent: Extent is the range across which the impact of the activity occurs. he extent of
an activity should be assessed in relation to its possible occurrence.
Future hreats: Future threats are those that are not actively occurring, but have some
probability of occurring in the future.
Harm: Harm refers to the magnitude and type of negative consequences that would occur
should a threat be realized. Harm encompasses the adverse effects on the social, economic
and political interests of all levels of society and refers not only to actual data but also to
the perceive likelihood and impact of consequences.
Harm Analysis: his type of analysis involves analytical assessments using techniques to
identify and assess harm levels. It will contribute to informing the deliberations of law
enforcement management setting intelligence and enforcement priorities at the municipal,
provincial and federal levels.
Harm Prioritization Scale (HPS): he RCMP-led HPS is designed to identify
and objectively assess the harms caused by organized criminal activities in the social,
environmental and economic realms. his technique, currently in the research and
development phase, will rank the relative harms caused by specific criminal groups and
will add an additional layer of analysis to complement Sleipnir matrices.
Impact: Impact is the degree, either directly or indirectly, to which the threat issue and/or
criminal groups affects a specific area.
Impact Potential Key (from CISC Central Bureau, Strategic Early Warning)
Severe
High
Severe implications for the organized crime situation in Canada. Major impact will be felt
across provincial and national borders.
Significant impact on organized criminal activity in Canada in multiple regions.
Moderate impact on organized criminal activity in Canada. Impact will be primarily in a
Medium single region, but effects there may be significant.
Minor or highly localized impact on organized criminal activity in Canada.
Low
Negligible impact on organized criminal activity in Canada. No warning necessary.
Nil
Integrated Threat Assessment Methodology 23 CISC
Indicator: An event or action which assists in the prediction of threat.
Intelligence: Intelligence is information that has been subjected to the process of
planning direction, collection, evaluation, collation, analysis, dissemination and reevaluation.
Intelligence Gaps: Information the intelligence community does not know about a
criminal group, individual or topic of interest. Intelligence gaps should be turned into
collection requests (collection plans).
Intelligence-led Policing: Intelligence-led policing involves the collection, analysis
and sharing of information to produce an intelligence product designed to inform law
enforcement decision-making at both the tactical and strategic levels.
Intent: Intent refers to the likely desire of a group (or subject) to engage in activities and
the level of confidence of success. Intention is typically difficult to determine.
Levels of Knowledge: Levels of knowledge are formed through broad-based statements
of knowledge about specific criminal markets or groups that reflect the criminal
intelligence community’s collective available information. he completeness of that
knowledge is then evaluated as excellent, good, fair or poor. (See National Criminal
Intelligence Requirements).
Likelihood: he potential for the occurrence of an event. Used as a qualitative description
of probability and frequency.
Market Profiles: A market profile assesses the criminal market around a particular illicit
commodity (ex. stolen vehicles) or service (ex. prostitution). It evaluates market activity,
trends in availability, price, the key individuals, networks, criminal assets and associated
trends in related criminality.
National Criminal Intelligence Requirements: his system provides an over-arching
framework that coordinates the collection of information or the production of intelligence
for any subject, general or specific. Within this system, there is a standardized, rigourous
process by which all information is rated for reliability and validity, key intelligence gaps
for focused collection efforts are identified, and levels of knowledge on specific issues are
ranked. Priorities are then assigned to specific collection targets. (See Intelligence Gaps and
Levels of Knowledge).
National Criminal Intelligence Requirements-based Collection vs. Traditional
Collection (he following chart is from Law Enforcement Intelligence: A Guide for
State, Local and Tribal Law Enforcement Agencies, by David L. Carter, PhD, 2004.)
CISC 24 Integrated Threat Assessment Methodology
Requirements Based
Collection Based
Analysis driven
Contemplative
Emphasizes analysis of data
Targeting/specificity on information
Selective collection based on priorities
Develops intelligence files for contingency
needs (just in case information is needed)
Statistics for decision making
Data driven
Exploratory
Emphasizes amassing data
Aggregate approach to collection
Generalized collection (dragnet)
Develops intelligence files in support of
ongoing strategic products or needs
Statistics for descriptive purposes
Operational Intelligence: Operational intelligence is the creation of an intelligence
product which supports law enforcement management in planning crime reduction
activity and deploying resources to achieve operational objectives.
Past hreats: Past threats are those that have occurred in the past, but are no longer active,
although their effects may still persist.
Permanence: Permanence is the length of time needed for the affected community,
area or market to recover from the criminal activity in question. Recovery is defined as
the restoration of the structures, functions or processes to levels that existed prior to the
activity’s occurrence or existence as a threat. he degree of permanence, which could also
be called resilience, will depend on such factors as the type of damage and the ability to
restore the resources.
Probability: Probability is the likelihood of a specific outcome occurring in the future.
Factors to consider include the degree and pervasiveness of this activity in the past, risk
and protective factors.
Probability Coding Key (from CISC Central Bureau, Strategic Early Warning)
Certain
High
hreat scenario already occurring or its eventual occurrence is “almost certain”.
Probability at or above 85%
he occurrence of the threat scenario is “probable” to “highly likely”.
Probability at or above 70% but below 85%
here is a “better than even” to “likely” chance that the threat scenario will occur.
Medium Probability above 55% but below 70%
Low
Scenario occurrence is possible but “improbable”; “little chance” to “about even” chance of
occurrence. Probability above 20% but at or below 55%
Nil
Probability of event occurrence is negligible or “highly unlikely”.
Probability at or below 20%
Resource: he material and experience the source of risk has at its disposal to take an
action or achieve an aim.
Risk: Risk refers to the uncertainty that surrounds future events and outcomes. It is
measured in terms of likelihood and harm (consequences) of an event with the potential
to influence the achievement of an important objective. Often expressed as: hreat +
Vulnerability = Risk.
Integrated Threat Assessment Methodology 25 CISC
Risk Analysis: In a law enforcement context, risk analysis assesses the scale of risks posed
by individual offenders or criminal groups to potential victims, the public at large, and to
law enforcement agencies.
Risk Assessment: A risk assessment is the process to determine risk management
priorities by evaluating and comparing the level of risk against predetermined standards
and other criteria. It describes and analyses the context within which the problem is
located, identifies gaps in knowledge and measures likelihood and impact.
Risk Assessment Matrix (RAM): RAM provides a consistent framework within which
possible sources of threat can be compared, the likelihood of threat is evaluated and
harmful impacts assessed.
Risk Attributes: he factors that constitute a specific risk.
Sleipnir: Sleipnir is an RCMP-created analytical threat measurement technique that uses
a rank-ordered set of criminal attributes (capabilities, limitations and vulnerabilities) to
assess the relative threat posed by organized criminal groups. Values are then assigned to
each attribute: high, medium, low, nil or unknown.
Social Network Analysis: Social network analysis is an analytical technique mapping
relationships between individuals, organization or resources. It examines such issues as
the prominence of particular individuals; the concept of centrality, i.e., the individual in
the network with the most—or most important—ties to other actors; and the notions of
closeness and distance based on communication paths among the actors in the network.
Statement of Knowledge: hese statements form the basis for levels of knowledge about
specific criminal markets or groups. Knowledge on the components of each market (ex.
importation/exportation, manufacturing, distribution) or each group (ex. capabilities,
intentions, threats, vulnerabilities) form broad-based statements of knowledge. (See
National Criminal Intelligence Requirements).
Strategic Analysis: Strategic intelligence provides a strategic context for understanding
emerging threats, gives a foresight capacity to allow the development of targeted
strategies, narrows the range of uncertainty and ensures that this analysis is provided in an
appropriate form to the appropriate policy makers at the right time.
Strategic Assessments: hese assessments give a high-level, long-term evaluation of a
particular issue, relevant patterns and trends and forecast likely future developments to
assist planning and policy making.
Strategic Early Warning: his type of intelligence aims to provide timely warnings to
decision and policy makers of potential or likely threats and issues by assessing the impact
of observed threats, events and trends on the criminal justice environment. CISC Central
Bureau designed, developed and implemented a ‘strategic early warning’ methodology and
system.
CISC 26 Integrated Threat Assessment Methodology
Strategic Intelligence: Strategic intelligence provides a comprehensive and current
picture of the scope and direction of criminal activity in order to assist management
decision-making and the determination of future action.
Subject of Interest: A person actively involved in criminal activities that are far-reaching
geographically and have significant harm. he subject typically operates in multiple
locations, multiple criminal commodities and is a facilitator of more than one criminal
organization.
Target Profile: A target profile is person(s) specific and contains sufficient detail to
initiate a target operation or support an ongoing operation against an individual or
networked group of individuals. he target profile includes a best course of action and
proposals to fill the gaps in the intelligence picture.
hreat: hreat is based on a group’s (or subject’s) intent and capability and is a measure of
how likely the success in carrying out some activity that may cause harm.
hreat Assessment: hreat assessments are strategic intelligence products that provide
analysis of the capabilities, intentions, vulnerabilities and limitations of groups posing
an organized crime or national security threat. heir outlook is generally long term and
future-oriented.
hreat Magnitude: hreat magnitude is a combination of criminal scope and severity of
impact.
Uncertainty: Uncertainty is a broad term to refer to things that are unknown or
incompletely understood. It is the degree to which the lack of knowledge is responsible
for hesitancy in accepting results and observations without caution.
Vulnerability: Vulnerability is defined as the probability of a successful attack.
Vulnerability of each element at risk can be measured along a continuum from total
resilience at one end to total susceptibility at the other.
Vulnerability Analysis: Vulnerability analysis is the process of calculating the
vulnerability of essential components or communities (critical nodes), understanding the
linkages and relationships among critical nodes (network analysis), and focusing on what
is critical and what is desirable to protect.
Warning Intelligence: Warning intelligence bridges the current and estimative
intelligence gap by focusing on agreed warning problems as part of a decision support
mechanism that requires rapid alert and some form of policy, intelligence or operational
response.
Integrated Threat Assessment Methodology 27 CISC
Selected Bibliography
Albanese, Jay S. he Prediction and Control of Organized Crime: A Risk Assessment Instrument for
Targeting Law Enforcement Efforts. Virginia Commonwealth University, 2002. https://www.ojp.usdoj.
gov/nij/international/programs/ukr_pred_paper.pdf
Annual Report and hreat Assessment 2006: Organized Crime in Ireland. Organized Crime Task Force,
www.octf.gov.uk.
Atkins, Ian, A/Commr. “H” Division (Nova Scotia) RCMP and A/Director Robert Fahlman, CISC.
Presentation to the CISC National Executive Committee on the Canadian Criminal Intelligence Model,
Ottawa, March 2007.
Black, Christopher and Tom Vander Beken. Reporting on Organised Crime: A Shift from Description to
Explanation in the Belgian Annual Report on Organised Crime. Antwerpen: Maklu, 2001.
Brand, Sam and Richard Price. he Economic and Social Costs of Crime. Home Office Research Study,
Economics and Resource Analysis Research, Development, United Kingdom, 2000. https://www.homeoffice.
gov.uk/rds/pdfs/hors217.pdf
Carter, David L., Ph.D. Intelligence Requirements and hreat Assessments. Law Enforcement Intelligence:
A Guide for State, Local and Tribal Law Enforcement Agencies. School of Criminal Justice, Michigan
State University, November, 2004. https://www.cops.usdoj.gov/Default.asp?Item=1404
Dolan, Paul, Graham Loomes, Tessa Peasgood and Aki Tsuchiya. Estimating the Intangible Victim Costs of
Violent Crime. British Journal of Criminology. Vol. 45, 2005, pp. 958-976.
Dolan, Paul and Tessa Peasgood. Estimating the Economic and Social Costs of the Fear of Crime. British
Journal of Criminology. Vol. 47, 2007, pp. 121-132.
Ervin, J. WWF: Rapid Assessment and Prioritization of Protected Area Management (RAPPAM)
Methodology. World Wildlife Fund. Gland, Switzerland, 2003. https://www.panda.org/about_wwf/what_
we_do/forests/our_solutions/protection/tools/rappam/index.cfm
European Organized Crime hreat Assessment 2006. www.europol.europa.eu/publications/OCTA/
OCTA2006.pdf
Guidance on the National Intelligence Model 2005. National Centre for Policing Excellence (NCPE) on
behalf of the Association of Chief Police Officers (ACPO), United Kingdom. https://www.acpo.police.
uk/asp/policies/Data/nim2005.pdf
Kent, Sherman. Words of Estimative Probability. Centre for the Study of Intelligence, Central Intelligence
Agency, 1964. https://www.odci.gov/csi/books/shermankent/6words.html
Kerr, Richard, homas Wolfe, Rebecca Donegan, Aris Pappas. A Holistic Vision for the Analytical Unit.
Studies in Intelligence, Vol. 50, No. 2. 2006. pp. 47-57. https://www.cia.gov/csi/studies/vol50no2/html_files/
index.html
Khalsa, Sundri. Forecasting Terrorism Indicators and Proven Analytical Techniques, Scarecrow Press Inc.,
2004.
Maltz, Michael. Measuring the Effectiveness of Organized Crime Control Efforts. Chicago, IL: University
of Chicago Press, 1990.
CISC 28 Integrated Threat Assessment Methodology
Organized Crime Markets in Queensland: A Strategic Assessment. Queensland Crime and Misconduct
Commission, Crime Bulletin Series, Number 6, September 2004.
www.cmc.qld.gov.au/PUBS.html
Petersen, Martin. Making the Analytical Review System Work. Centre for the Study of Intelligence,
Central Intelligence Agency, https://www.cia.gov/csi/studies/vol49no1/html_files/analytic_review_7.html
Project Krystal: A Strategic Assessment of Organized Crime in Queensland. Queensland Crime
Commission and Queensland Police Service, 1999. https://www.cmc.qld.gov.au/data/portal/00000005/
content/18651001141364539740.pdf
Quarmby, Neil. Futures Work in Strategic Criminal Intelligence. Australian Crime Commission, 2003.
https://www.aic.gov.au/conferences/evaluation/quarmby.pdf
Renzi, Fred (Colonel), U.S. Army. Networks: Terra Incognita and the Case for Ethnographic Intelligence.
Military Review. September-October, 2006. https://www.army.mil/professionalwriting/volumes/volume4/
december_2006/12_06_1.html
Smith, Dwight C. (1980). Paragons, Pariahs, and Pirates: a Spectrum-based heory of Enterprise. Crime
and Delinquency, Vol. 26, No. 3, pp. 358-386.
Strang, Steven J. Project SLEIPNIR: An Analytical Technique for Operational Priority Setting. Royal
Canadian Mounted Police. Undated. https://analysis.mitre.org/proceedings/Final_Papers_Files/135_
Camera_Ready_Paper.pdf
Strategic Early Warning For Criminal Intelligence: heoretical Framework And Sentinel Methodology.
Criminal Intelligence Service Canada (CISC), 2007.
United Nations. Results of a Pilot Survey of Forty Selected Organized Criminal Groups in Sixteen
Countries, 2002. https://www.unodc.org/pdf/crime/publications/Pilot_survey.pdf
Vander Beken, Tom. Risky Business: A Risk-based Methodology to Measure Organized Crime. Crime,
Law and Social Change, Vol. 41, No. 5 / June, 2004, pp. 471-516.
Vander Beken, Tom and Melanie Defruytier. Measure for measure: Methodological Tools for Assessing the
Risk of Organised Crime. hreats and Phantoms of Organised Crime, Corruption and Terrorism: Rhetoric
and Critical Perspectives. Petrus C. van Duyne, Matjaz Jager, Klaus von Lampe and James L. Newell (Eds.),
Wolf Legal Publishers (WLP), 2004.
von Lampe, Klaus. Making the Second Step Before the First: Assessing Organized Crime – the Case of
Germany. Crime, Law and Social Change. Vol. 42, No. 4-5 / January, 2005, pp. 227-259.
von Lampe, Klaus. Measuring Organised Crime: A Critique of Current Approaches. hreats and Phantoms
of Organised Crime, Corruption and Terrorism: Rhetoric and Critical Perspectives. Petrus C. van Duyne,
Matjaz Jager, Klaus von Lampe and James L. Newell (Eds.), Wolf Legal Publishers (WLP). 2004.
von Lampe, Klaus. Proposal for a Common European Approach to Assess Organized Crime: Assessing
Organized Crime, 2005. www.assessingorganisedcrime.net/publications/AOC-DLV22-vD1.pdf
von Lampe, Klaus. he Use of Models in the Study of Organized Crime. Paper presented at the 2003
conference of the European Consortium for Political Research (ECPR), Marburg, Germany, 2003.
https://www.organized-crime.de/modelsofoc.htm
Integrated Threat Assessment Methodology 29 CISC