Question
Respond to this post: Data collection techniques for investigating terrorism it is best served when using the information life cycle. The information life cycle contains
Respond to this post: Data collection techniques for investigating terrorism it is best served when using the information life cycle. The information life cycle contains steps that involve identifying different phases of the information cycle. These phases include when the information is received, used, and maintained. It is important that the information's disposition is documented during the process creating a chain of custody of the information. Do any investigation the gathering of this information it is important, and care of this information will be noted as pre investigatory evidence that has been collected (p. 79). Sustaining good custody of the evidence is important because in post investigation the information will be considered valuable due to what can be learned for future preventative action.
Tools are Available and Should be Used to Enhance Investigations
An investigation requires supporting documentation to conclude findings. Data collected during the investigation is imperative to determine an outcome. Evidence collected ranges from various type of documentation that begins with the first initial call which is the CAD Entry. Information gathered in this initial report should have information on who and what which will fulfill the needs of providing information on the involved individuals pedigree information. This information ensures that those responding to the incident that is reported or tracking in the right direction to respond to the concern that has been called in. On the site reports from an officer give specific information as well that includes witness statements. Throughout the immediate investigation evidence that is collected from the scene serves as vital data. Additional evidence will be incorporated investigation later which will include recordings, photos, video, and follow up interview statements. According to Prunckun (2019), the gathering of information seems pretty standard and can be approached in that manner but our readings advise that there should not be a standardized checklist to completing investigation According to (Prunckun, 2019), This is probably a great suggestion because no two investigations are alike and there will always be evolving information being presented due to this situation possibly being fluid.
Tools and or Techniques are Available to Help in Identifying and Understanding Missing Pieces of the Puzzle
In investigations, data analyst relies on various techniques to support the hypothesis such as spatial geographic information systems (GIS), temporal data, tempo data, victim and subject data and target and tactical data (p. 168). Behavioral and characteristic traits identified through this data along with uncovering patterns that can lead to information that solidifies what is suspected. The data collection adds validity to the investigation making the findings more solid.
Christian Worldview
"Each of you should use whatever gift you have received to serve others, as faithful stewards of God's grace in its various forms" (Holy Bible, New International Version, 2011, Peter 4:10).
Reference
New International Version. (2011). New International Version Bible Online. http://www.biblegateway.com/versions/New-International-Version-NIV-Bible/#booklistLinks to an external site. (Original work published 1978)
Prunckun, H. (2019). Counterintelligence theory and practice. Rowman & Littlefield Publishers.
Step by Step Solution
3.52 Rating (155 Votes )
There are 3 Steps involved in it
Step: 1
The comprehensive approach outlined for data collection in te...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started