How to map security service command structures
A practical guide to getting started with data collection
Learn how and why to profile security services and map their command structures, gain practical advice on effective data collection, and avoid common errors in database design with this free seven-letter series.
What you will get from the series
Throughout the series, you will receive practical tips and advice on best practice in data collection. By the end, you will be able to:
- Identify the benefits and challenges facing efforts to map the command structures of the security services.
- Design and launch your own project.
- Download templates that you can use.
This will help you establish the foundations for robust, evidence-based analysis, helping you better serve your audience.
Who can benefit from this series?
This series is designed for analysts, researchers, and activists who want to build a reliable understanding of the security services.
The series will use the Chechen security services as a case study, leveraging a real-world example to showcase the benefits of profiling the security services. You’ll learn about these units and the particular challenges that accompany efforts to track them.
However, the guidance is designed to be transferable to different contexts, making it easy for you to adapt them to your own analytic needs. Indeed, many of the tips can be applied to a variety of data collection projects.
How is the series delivered?
After you sign up, you will receive an email every day for seven days. Each email is packed with useful information and advice:
- Understanding the benefits of systematic data collection
- Setting clear goals for effective data collection
- Identifying reliable sources for your project
- Structuring your data
- Best practices for processing and archiving information
- Compiling profiles and organisational maps
- Building on solid foundations