Knowledge (XXG)

FBI Special Advisor Program

Source 📝

282: 22: 118:. The work of these two merited the attention of the FBI's senior leadership and led to a proposal for a formal business school recruiting program. In 2007, executives from 25 FBI divisions participated in the three-year-old Special Advisor Program. 327: 573: 538: 102:(MBA) programs. FBI special advisors are primarily responsible for serving in an advisory capacity to the FBI Senior Executive team and completing "management" type of issues. 806: 459: 297: 317: 51: 110:
The FBI Special Advisor Program evolved from a 2002 effort by the FBI's Finance Division to recruit new talent from top business schools. Initially, one graduate of
568: 533: 441: 861: 550: 431: 544: 487: 349: 332: 312: 424: 307: 653: 618: 464: 451: 99: 73: 821: 414: 560: 235: 95: 663: 146:
leading a team to develop and implement a career path, training and development for the FBI's Intelligence Analyst workforce,
114:
was hired to work in the Director's Office. In 2003, another Harvard Business School graduate joined the FBI to work for the
419: 226: 827: 683: 623: 406: 354: 34: 688: 344: 261: 133:
restructuring the 1000-employee Human Resources division to achieve improvements in productivity and customer service,
712: 44: 38: 30: 668: 628: 436: 371: 266: 527: 243: 55: 790: 638: 603: 322: 256: 251: 732: 633: 613: 492: 384: 115: 111: 164: 842: 271: 137: 91: 717: 643: 168: 152:
implementing a consolidated contract for relocation services, resulting in a US$ 38 million savings
673: 522: 389: 678: 658: 339: 189: 143:
re-engineering the background investigation process to improve time-to-hire for new FBI employees,
361: 774: 744: 219: 754: 471: 855: 811: 722: 578: 184: 816: 769: 764: 749: 512: 212: 204: 759: 739: 517: 379: 149:
developing a leadership development strategy and succession planning model, and
696: 608: 396: 727: 130:
implementing the balanced scorecard strategic planning tool at the FBI,
598: 126:
In the past, the FBI special advisors have been responsible for:
328:
Child Abduction and Serial Murder Investigative Resources Center
208: 15: 98:(FBI). The group consists of recent graduates from the top 539:
Integrated Automated Fingerprint Identification System
837: 799: 783: 705: 587: 559: 505: 480: 450: 405: 370: 296: 289: 242: 140:(IT) system for managing crises and special events, 318:National Center for the Analysis of Violent Crime 43:but its sources remain unclear because it lacks 534:Computer and Internet Protocol Address Verifier 460:Criminal Justice Information Services Division 220: 8: 293: 227: 213: 205: 92:leadership development rotational program 74:Learn how and when to remove this message 551:National Incident-Based Reporting System 442:Weapons of Mass Destruction Directorate 432:High-Value Detainee Interrogation Group 545:Law Enforcement National Data Exchange 183:Tierney, Matthew R. (5 October 2005). 333:Violent Criminal Apprehension Program 7: 425:Communications Exploitation Section 165:"Kelman: Hiring outside of the box" 136:coordinating the development of an 654:FBI Victims Identification Project 619:Rod Blagojevich corruption charges 14: 488:Information and Technology Branch 465:National Crime Information Center 350:Special Weapons and Tactics Teams 100:Master of Business Administration 313:Critical Incident Response Group 280: 163:Kelman, Steve (14 August 2008). 20: 862:Federal Bureau of Investigation 308:Criminal Investigative Division 236:Federal Bureau of Investigation 185:"Official Describes FBI Change" 96:Federal Bureau of Investigation 664:High-Value Interrogation Group 90:is an internal consulting and 1: 452:Science and Technology Branch 828:FBI Law Enforcement Bulletin 822:FBI–Apple encryption dispute 684:Special Intelligence Service 624:FBI files on Michael Jackson 415:Counterintelligence Division 649:FBI Special Advisor Program 88:FBI Special Advisor Program 878: 669:Joint Terrorism Task Force 629:FBI files on Elvis Presley 437:Terrorist Screening Center 298:Criminal, Cyber, Response, 690:U.S. v. Scheinberg et al. 528:Combined DNA Index System 420:Counterterrorism Division 278: 639:FBI search of Mar-a-Lago 407:National Security Branch 355:Hazardous Devices School 323:Behavioral Analysis Unit 29:This article includes a 614:FBI method of profiling 385:Behavioral Science Unit 345:Crisis Negotiation Unit 116:chief financial officer 112:Harvard Business School 58:more precise citations. 807:FBI portrayal in media 372:Human Resources Branch 138:information technology 718:Delf A. 'Jelly' Bryce 644:FBI Silvermaster File 169:Federal Computer Week 122:Past responsibilities 713:Harry "Skip" Brandon 674:Lindbergh kidnapping 679:Ruby Ridge standoff 604:Bridgman Convention 493:Intelligence Branch 472:Laboratory Division 340:Hostage Rescue Team 300:and Services Branch 190:The Harvard Crimson 634:FBI Miami shootout 31:list of references 849: 848: 775:Joseph D. Pistone 745:Joseph L. Gormley 501: 500: 84: 83: 76: 869: 791:FBI Headquarters 390:National Academy 294: 284: 283: 229: 222: 215: 206: 201: 199: 197: 179: 177: 175: 79: 72: 68: 65: 59: 54:this article by 45:inline citations 24: 23: 16: 877: 876: 872: 871: 870: 868: 867: 866: 852: 851: 850: 845: 833: 795: 779: 755:J. Edgar Hoover 701: 592: 590: 583: 574:Deputy Director 555: 497: 476: 446: 401: 366: 299: 285: 281: 276: 238: 233: 195: 193: 182: 173: 171: 162: 159: 124: 108: 80: 69: 63: 60: 49: 35:related reading 25: 21: 12: 11: 5: 875: 873: 865: 864: 854: 853: 847: 846: 841: 839: 835: 834: 832: 831: 824: 819: 814: 809: 803: 801: 797: 796: 794: 793: 787: 785: 781: 780: 778: 777: 772: 767: 762: 757: 752: 747: 742: 737: 736: 735: 725: 720: 715: 709: 707: 703: 702: 700: 699: 694: 686: 681: 676: 671: 666: 661: 656: 651: 646: 641: 636: 631: 626: 621: 616: 611: 606: 601: 595: 593: 588: 585: 584: 582: 581: 576: 571: 565: 563: 557: 556: 554: 553: 548: 542: 536: 531: 525: 520: 515: 509: 507: 503: 502: 499: 498: 496: 495: 490: 484: 482: 481:Other branches 478: 477: 475: 474: 469: 468: 467: 456: 454: 448: 447: 445: 444: 439: 434: 429: 428: 427: 417: 411: 409: 403: 402: 400: 399: 394: 393: 392: 387: 376: 374: 368: 367: 365: 364: 362:Cyber Division 359: 358: 357: 352: 347: 342: 337: 336: 335: 330: 325: 310: 304: 302: 291: 287: 286: 279: 277: 275: 274: 269: 264: 259: 254: 248: 246: 240: 239: 234: 232: 231: 224: 217: 209: 203: 202: 180: 158: 155: 154: 153: 150: 147: 144: 141: 134: 131: 123: 120: 107: 104: 82: 81: 39:external links 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 874: 863: 860: 859: 857: 844: 843:Hogan's Alley 840: 836: 830: 829: 825: 823: 820: 818: 815: 813: 810: 808: 805: 804: 802: 798: 792: 789: 788: 786: 782: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 734: 733:"Deep Throat" 731: 730: 729: 726: 724: 723:Sibel Edmonds 721: 719: 716: 714: 711: 710: 708: 704: 698: 695: 693: 691: 687: 685: 682: 680: 677: 675: 672: 670: 667: 665: 662: 660: 657: 655: 652: 650: 647: 645: 642: 640: 637: 635: 632: 630: 627: 625: 622: 620: 617: 615: 612: 610: 607: 605: 602: 600: 597: 596: 594: 586: 580: 579:Special agent 577: 575: 572: 570: 567: 566: 564: 562: 558: 552: 549: 546: 543: 540: 537: 535: 532: 529: 526: 524: 521: 519: 516: 514: 511: 510: 508: 504: 494: 491: 489: 486: 485: 483: 479: 473: 470: 466: 463: 462: 461: 458: 457: 455: 453: 449: 443: 440: 438: 435: 433: 430: 426: 423: 422: 421: 418: 416: 413: 412: 410: 408: 404: 398: 395: 391: 388: 386: 383: 382: 381: 378: 377: 375: 373: 369: 363: 360: 356: 353: 351: 348: 346: 343: 341: 338: 334: 331: 329: 326: 324: 321: 320: 319: 316: 315: 314: 311: 309: 306: 305: 303: 301: 295: 292: 288: 273: 270: 268: 265: 263: 260: 258: 255: 253: 250: 249: 247: 245: 244:Field offices 241: 237: 230: 225: 223: 218: 216: 211: 210: 207: 192: 191: 186: 181: 170: 166: 161: 160: 156: 151: 148: 145: 142: 139: 135: 132: 129: 128: 127: 121: 119: 117: 113: 105: 103: 101: 97: 93: 89: 78: 75: 67: 57: 53: 47: 46: 40: 36: 32: 27: 18: 17: 826: 817:Junior G-Men 770:Clyde Tolson 765:Peter Strzok 750:Wesley Grapp 692:(10 Cr. 336) 689: 648: 290:Organization 194:. Retrieved 188: 172:. Retrieved 125: 109: 87: 85: 70: 61: 50:Please help 42: 760:David Icove 740:Helen Gandy 589:Methods and 518:Bureaupedia 56:introducing 697:Waco siege 609:COINTELPRO 591:activities 506:Technology 397:FBI Police 262:Cincinnati 157:References 64:April 2011 784:Buildings 728:Mark Felt 523:Carnivore 267:Cleveland 856:Category 659:Guardian 569:Director 196:11 April 174:11 April 800:Related 547:(N-DEx) 541:(IAFIS) 530:(CODIS) 380:Academy 257:Buffalo 252:Atlanta 106:History 94:of the 52:improve 706:People 599:Abscam 513:Airtel 838:Other 812:G-Man 561:Ranks 272:Tampa 37:, or 198:2011 176:2011 86:The 858:: 187:. 167:. 41:, 33:, 228:e 221:t 214:v 200:. 178:. 77:) 71:( 66:) 62:( 48:.

Index

list of references
related reading
external links
inline citations
improve
introducing
Learn how and when to remove this message
leadership development rotational program
Federal Bureau of Investigation
Master of Business Administration
Harvard Business School
chief financial officer
information technology
"Kelman: Hiring outside of the box"
Federal Computer Week
"Official Describes FBI Change"
The Harvard Crimson
v
t
e
Federal Bureau of Investigation
Field offices
Atlanta
Buffalo
Cincinnati
Cleveland
Tampa
Criminal, Cyber, Response,
and Services Branch

Criminal Investigative Division
Critical Incident Response Group

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.