Basic Intelligence

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

BASIC INTELLIGENCE

OBJECTIVES COMBAT INTELLIGENCE -is the


To orient the students about the basic knowledge of the enemy,
knowledge and understanding of what is weather and other geographical features
intelligence. required by a commander
in the planning and conduct of tactical
SCOPE operations.
Definition of terms STRATEGIC INTELLIGENCE -is
Intelligence principles intelligence that is required for the
Intelligence axioms formulation of policy and military plans at
Intelligence cycle national and international levels.
Intelligence reports/ records
Military Security PRINCIPLES OF INTELLIGENCE
Counterintelligence There are seven (7) principles of
intelligence which are as follows:
INTRODUCTION • Intelligence is continuous.
During the intelligence orientation, the student • Intelligence Operations and Tactical
should understand the different aspects of operations are interdependent.
intelligence, its characteristics, natures, • Intelligence must be useful.
principles and works, and duties, and what is • Intelligence must be timely.
its importance in the government’s drive • Intelligence must be flexible.
against insurgency and terrorism in the country • Intelligence operation requires
today. imagination and foresight.
• Intelligence requires constant security
DEFINITION OF TERMS measures.
INFORMATION- consists of facts, statistics,
Intelligence is continuous All intelligence
observations, reports, trends, opinions, rumors,
activities follow a four (4) cycle -
documents, photographs, diagrams, maps, and
planning,
other data used in the production of
collection,
intelligence.
evaluation and
INTELLIGENCE- is the product resulting
dissemination
from the collection, evaluation, analysis,
those that are oriented on the commander’s
integration, and interpretation of all available
mission. The cycle is continuous and all
information.
steps are carried out at the same time.
COUNTER INTELLIGENCE-is concerned
with the “countering”, or destroying
effectiveness of a hostile intelligence effort.
Intelligence Operations and Tactical Intelligence operation requires
operations are interdependent. imagination and foresight.
Intelligence operations are an internal part of the Policies or procedures which limit
operations of all units. The overall operations of imagination or initiative are avoided. All
any armed force in combat are measured and intelligence personnel and agencies are
greatly affected by the intelligence that it exploited to ensure that all available
develops and uses. Strategy and tactics are at the information is processed to produce
same time the cause and effect of intelligence intelligence for the user. Acceptance and
operations. satisfaction which are the continuance of the
current situation can lead to disaster.
Intelligence must be useful.
Intelligence must not only increase knowledge. Intelligence requires constant security
Useful intelligence enhances understanding of measures.
the problems to be solved resulting in assisting Security measures are necessary to ensure
the commander’s problem is essential to that unauthorized personnel is denied
determine what intelligence is useful. information and produced intelligence.
However, it is imperative that a distinction
Intelligence must be timely. be made between security and secrecy.
The best intelligence is worthless if it does not Secrecy connoted hiding from or concealing
reach the user in time for appropriate information or intelligence. The free and
consideration or action. Some sacrifice of complete exchange of information by
completeness and accuracy may have to be intelligence processing agencies is vital to
accepted because the situation requires decisions permit the production of the best and most
before complete intelligence can produce. If this timely product. Security measures must not
occurs, the user must be advised of the loss of deter the dissemination of information or
completeness and accuracy. intelligence to those who have a “NEED TO
KNOW’.
Intelligence must be flexible.
Standard procedures must make intelligence
operations more effective; however, procedures
must be responsible for changes to meet existing
requirements under any situation. Intelligence
operations are based on reason and sound
judgment. Procedures that do not readily adapt
to a given situation are generally discarded.
Intelligence Axioms Internal Development Operations -This
- Intelligence axioms are facts that require no is undertaken to improve the political,
proof because the truth of these statements is economic, and social aspects and
obvious. environments within a nation thereby
THE FOUR (4) AXIOMS OF alleviating causes of dissatisfaction by the
INTELLIGENCE: people towards the government. One of
• AXIOM No. 1 - Intelligence is crucial to the best examples of this kind of
internal security. operation is the Civil-Military Operations
• AXIOM No. 2 – Intelligence is essential to all and Special Operations Team concept
types of operations. adopted by the Armed Forces in its latest
• AXIOM No 3 - Intelligence is the drive against insurgency.
responsibility of all governmental agencies.
• AXIOM No 4 – The intelligence of the Psychological Operations -This is
government must be superior to that of the conducted to influence the attitude and
insurgent. behavior of all groups within the
populace thereby obtaining the maximum
AXIOM No. 1 - Intelligence is crucial to support for the government. Intelligence
internal security. provides all the information on where all
• It can provide us with advanced warning of these operations must be planned,
insurgent activities. Intelligence can also implemented, and evaluated if the
provide detailed knowledge of insurgent government is to be successful.
organizations, personnel, plans, and tactics. In
short, intelligence provides the information AXIOM No 3 - Intelligence is the
which the government and the Armed Forces as responsibility of all governmental agencies.
a whole need to act upon. • The covert and clandestine nature of
AXIOM No. 2 – Intelligence is essential to all subversive insurgency requires a thoroughly
types of operations. controlled and coordinated intelligence effort
• This axiom means that the government of the on the part of the government. All
nation should initiate a carefully planned, fully governmental agencies should contribute to
coordinated, and intensely executed program to the intelligence effort to collect detailed
maintain or restore internal security. information and produce the comprehensive
This overall program contains three (3) basic intelligence that is required for internal
types of operations namely: defense, internal development, and
Internal Defense Operations - It is psychological operations.
directed against insurgents, secessionist
movements, as well as the ultra-rightist,
their organizations, methods, motives, and
their support system including their human
and material resources.
AXIOM No 4 – The intelligence of the All four of these phases may take place
government must be superior to that of the concurrently. They are the lowest common
insurgent. denominator in the production of combat
• The struggle between a subversive insurgent intelligence and each is indispensable; if one
organization and the constituted government offails, the entire intelligence effort will fall. We
a nation has sometimes been called an can compare the intelligence process to a
“intelligence war”. Throughout the entire cycle; hence the descriptive title ---- “The
process of insurgency, the insurgent relies Intelligence Cycle”. The cycle picture here is
heavily upon intelligence to plan and execute merely a teaching vehicle designed to provide
measures designed to disrupt, paralyze, and a composite picture of the functions performed
overthrow the constituted government. by the intelligence officer in the production of
combat intelligence.
In the study of the intelligence cycle, it is
The Intelligence Cycle
unimportant which phase is considered first - -
• The Intelligence Cycle is the process by
“information” or “intelligence” can be inserted
which information is converted into
in any phase as appropriate. The intelligence
intelligence. It has four phases: Directing,
cycle has no beginning and no end. Any
collecting, processing, and disseminating.
sequence which logically organizes thought
• Directing determines what intelligence is
processes is workable. For the purposes of
required and who should collect it.
logical presentation, we will begin our study of
• Collecting obtains combat information,
the cycle with the planning phase. The entire
intelligence, and targets by tasked
intelligence effort is devoted to furthering the
organizations.
accomplishment of the mission; therefore, the
• Processing converts combat information into
mission is the focal point of the entire
intelligence and targets through analysis and
production effort.
determines how it fits into the situation.
• Disseminating passes the intelligence and
1. PLANNING OF THE COLLECTION
targets to users when they need them.
EFFORT
The Commander must make certain that he has
What he needs When he needs it. He is
continually wondering what the enemy is
doing, thinking, and planning for future
operations, and about the nature of the terrain
not under his control. These questions are all
part of the “fog of war”, and this “fog” does
not liftautomatically.
PLANNING OF THE COLLECTION Other Intelligence Requirements (OIR)-
EFFORT CONSISTS OF 5 STEPS: Requirements derived from command
• Determination of intelligence requirements. requirements that do not qualify as EEI and
• Determination of intelligence priorities. from staff requirements regarding the
• Determination of those enemy activities or information on other enemy capabilities,
characteristics of the area of operations which vulnerabilities, and characteristics of the
would indicate the answers to the intelligence area which also could materially affect the
requirement and determine specific items of successful accomplishment of the mission.
information.
• Selection of collection agencies to be MISSION IS RECEIVED
employed and the issuance of necessary orders Intelligence Cycle Phase: Directing
and requests for information.
• Supervising the execution of orders and Commander's
requests. Interaction with the Intelligence Cycle

Depending on the mission, The Commander Begin the IPB process (CHECK)
and his staff require information and
intelligence: You, the S3, the S2, and other key personnel
•To arrive at sound and timely decisions in discuss your common understanding of the
preparing plans and estimates for future battlefield. (See Figure2-1,
operations and in conducting operations. CommonUnderstanding).
•To protect the command by avoiding surprise
and denying the enemy information concerning You and the S2 determine the extent of the
his own forces. area of interest (AI).
•To assist in the processing of other
information. Identify all enemy units that you might
engage in. (CHECK)
Essential Elements of Information (EEI)-
Specific information of an actual potential The S2 identifies gaps in knowledge.
enemy and of the terrain, hydrographic and
metrological conditions a commander needs in You identify which uncertainties must be
a particular situation in order to accomplish his solved for this mission.
mission. The essential elements may also
include information required by higher, lower, Give the S2 your initial guidance for
adjacent, and support attached units. intelligence. (Focus his IPB effort.) Usually,
you have the S2 focus on analyzing COAs
and reinforcements available to the enemy
commander you're about to face. (CHECK)
Commander's Checklist Commander's Checklist
CHECK - Do you and your staff have
the same perception of the upcoming CHECK - Did the S2 discuss the kinds of
fight? operations the area of operations (AO) will
CHECK - Does the S2 know all that you support?
know about the CHECK - Did the S2 cover what is known
enemy situation? about the enemy YOU will face?
CHECK - Does the S2 understand your CHECK - Did the S2 focus the IPB per
initial guidance? your guidance?
CHECK:
- Do the situation templates make sense
given the enemy's situation and your
knowledge of his tactics
- Did the S2 prioritize the enemy
COAs logically (most likely, most
dangerous, least likely)?
- Ask yourself, "If I were the
enemy S3/G3 for that mission, which
COAs would I present to my commander?"

ACTS AND ASSUMPTIONS

Intelligence Cycle Phase: Directing

(Commander's Interaction with the


Intelligence Cycle)

The S2 continues IPB to produce intelligence


estimates: (CHECK)
° The S2 analyzes the environmental effects
on enemy COAs. (CHECK)
° The S2 researches the known enemy
situation and how he normally fights in
similar situations (situation map, doctrinal
templates). (CHECK)
° The S2 generates situation templates for
each of the enemy's COAs. He does this by
integrating the IPB products. (See Figure 2-2,
IPB.) (CHECK)
The S2 prepares most of the intelligence
estimateat this point
ANALYSIS OF HIGHER MISSION Commander's Interaction with the
AND INTENT Intelligence Cycle Phase: Intelligence Cycle
Directing
Commanders' Interaction with the The S2 helps develop friendly COAs. He
Intelligence Cycle analyzes COAs from the enemy's
∙ The S2 helps the rest of the staff conduct perspective and ensures that each friendly
mission analysis. The S2 should analyze tasks COA is valid against all enemy COAs in
from the enemy's perspective. (CHECK) terms of force ratios, tactics, and common
∙ Except for paragraphs 5a (Effects of sense. (CHECK)
Intelligence on Friendly COAs) and 5b (Effects The S2 refines initial:
of Area of Operations on Friendly COAs), the ° The S2 develops named areas of interest
S2 should brief the intelligence estimate before (NAIs), event templates, and event analysis
the S3/XO briefs the mission analysis. matrices to confirm or deny each enemy
Paragraphs 5a and 5b requireS3-developed COA. The event template shows how to
friendly COAs and the S2 briefs these later as quickly confirm or deny the situation
part of the staff recommendation. templates. It will become the basis for the
collection or reconnaissance and
Commander's Checklist surveillance (R&S) plan.
CHECK- Did the S2 brief the status of the ° The S2 identifies enemy high-value
unit's collection assets? targets (HVTs) for each enemy COA.
(CHECK)
COMMANDERS GUIDANCE
Intelligence Cycle Phase: Directing Commander's Checklist
CHECK - Is each friendly COA valid
against each enemy COA?
Commander's Interaction with the
CHECK - Is the S2 developing indicators
Intelligence Cycle
for each NAI?
In addition to other planning guidance, give the
S2 instructions about aspects of the enemy that
you're most concerned about. Provide your
guidance on intelligence collection and target
acquisition in terms of the enemy, weather, and
terrain. The S2 should make sure your concerns
are adequately addressed in developing and
analyzing friendly COA.
Be sure to emphasize to the S2 how you intend
to employ your assets so the S2 can anticipate
the support you expect. For example, if you
plan to use cross-FLOT aviation operations, the
S2 should anticipate support for the
Suppression of Enemy Air Defense (SEAD).
COA ANALYSIS (War gaming) Commander's Checklist
Intelligence Cycle Phase: Directing CHECK - Has the S2 logically presented
probable enemy reactions to friendly
Commander's maneuver and targeting?
Interaction with the Intelligence Cycle CHECK - Do you agree with the assets
tasked by the S2? Do you or your S3 have
The S2 role plays the enemy commander during conflicting requirements for your scouts or
war gaming. The S2 makes sure the staff fully cavalry which will preclude the S2 from
addresses friendly responses for each enemy properly executing his R&S plan?
COA by trying to "win" the war game for the CHECK - Has the S2 coveredNAIs and
enemy. Each response is tied to enemy action. CHECK - Are all IRs linked to specific
The friendly action will be translated to an "ON enemy actions or reactions that require a
ORDER" or "BE PREPARED" task in the friendly response?
operation order (OPORD) or fragmentary order CHECK - Did the staff war-game against
(FRAGO). (See Figure 2-3, War gaming.) each of the possible enemy COAs?
(CHECK) CHECK - Is each friendly
As the unit's collection manager, the S2 war- response associated with a clearly defined
games the R&S plan to make sure tasked IR?
collection assets are available to report activity
in the designated NAIs. (CHECK) (CHECK)
The S2 develops and recommends a set of
intelligence Requirements, or (IRs), for each
friendly COA that is war-gamed. (CHECK)
The S2 continues to refine the initial IPB:
(CHECK)
The S2 completes the event templates and event
analysis matrices to anticipate key enemy
decisions for each friendly COA.
° An event template or analysis matrix
represents the enemy's decision support
template (DST) synchronization matrix for a
given friendly COA.
The XO directs the staff to record the war
gaming results into both a DST and a BOS
synchronization matrix for each friendly COA
that is war-gamed. (See Figure 2-4, DST and
BOS synchronization matrix.) (CHECK)
(CHECK)
COA ANALYSIS
(Targeting) Intelligence Cycle Phase: Directing
RECOMMENDATION
Intelligence Cycle Phase: Directing

DECISION
Intelligence Cycle Phase: Directing
ISSUE THE OPORD/FRAGO
Intelligence Cycle Phase: Directing

Figure 2-5
SUPERVISE
Intelligence Cycle Phase: Collecting

SUPERVISE
Intelligence Cycle Phase: Collecting
INTELLIGENCE COLLECTION PLAN
2. COLLECTION OF INFORMATION
The actual collection of information is based
on The collection plan or orders and requests.
COLLECTION- the systematic
exploitation of sources of information by
collecting agencies and the delivery of
information thus obtained to the proper
Intel section.
SOURCE OF INFORMATION- are
persons, things, or actions from which
information about the enemy, whether or
terrain is derived.
COLLECTION AGENCY- any person,
unit, or activities that collect and/or
process information by research,
surveillance, interrogation, or other
exploitation of source.
SUPERVISE
Intelligence Cycle Phase: Processing

3. PROCESSING OF COLLECTED
INFORMATION INTO INTELLIGENCE
Intelligence is information that has been
• Recording
processed.
If the intelligence officer is to confirm one report
Processing is the step by which intelligence is
by comparing it with another, and if he is to
created from the raw material of information.
determine the significance of evaluated
It consists of 3 distinct steps:
information, he must maintain a system of
RECORDING the information so that it
records. The recording has one purpose to
can be compared with other items on
facilitate the task of the intelligence officer. The
hand.
intelligence officer, however, must subordinate
EVALUATION of information in order
the maintenance of recording the mission of
to determine its intelligence value.
assembling, producing, and using intelligence.
INTERPRETATION of the information
Action must come first, records are of
in relation to other information and
secondarily importance.
intelligence on hand in order to draw
conclusions regarding its meaning.
RECORDING cont.:
There are three(3) general aids by which
recording is accomplished:
• The G2 or Intelligence journal.
• The G2 or Intelligence Workbook.
• The Enemy Situation Map.
EVALUATION 4. DISSEMINATION AND USE OF
Information is of small value unless it has been INTELLIGENCE
analyzed with respect to its pertinence, the Intelligence is the end result of all
reliability of the officer and agency and its intelligence activities. To be used, it must be
probable accuracy. The intelligence officer disseminated to the commander, his staff,
must examine each item of information as soon and the other who requires it in a proper form
as it is received to determine its intelligence in time to serve the purpose of the recipients.
value. This examination may be either
elaborated or instantaneous, depending upon SUPERVISE
the circumstances. Is the information needed Intelligence Cycle Phase:
immediately or at some future time? Are the
Dissemination
source and agency reliable? Is the information
confirmed or corroborated by previously
DISSEMINATION AND USE OF
received information or previously produced
INTELLIGENCE Cont.
intelligence.
Dissemination to other users is
accomplished by means of messages (radio,
Messenger, or any rapid means of signal
communications), personal contact
(telephone, personal visits, briefing), and
intelligence documents (periodic intelligence
reports, intelligence summaries, OB and PI
reports, integrating reports, operation orders
and intelligence annexes, terrain and weather
studies, and other special reports).
INTERPRETATION
Interpretation of information consists of
determining its significance with respect to
other information or intelligence already at
hand. It is accomplished by analysis of the
information, integration of significant items of
information with previously collected and
processed intelligence, and finally, drawing
conclusions as to the probable meaning of the
information. Evaluation and Interpretation
together are the essential steps in processing.
Keep in mind that the commander wants
intelligence and not merely a compilation of
information
RECEIVE MISSION (Again)
Intelligence Cycle Phase: Directing (Again)

INTELLIGENCE REPORT/RECORD
• Intelligence Report – is important in the
procedures of intelligence Cycle which must be
followed in order to get significant military
information in proper and effective manner that
can be essential to the commander who needs
to formulate and make decisions.
MILITARY SECURITY
•Military Security - encompasses those
measures taken by a command to projectitself
from espionage, hostile observation,
subversion or sabotage. It includes those active
and passivecounterintelligence measures taken
within or directly pertaining to Armed forces
and to specific military operations. At corps (or
equivalent units) and lower organization levels,
counterintelligence measures are usually
concerned with military security. Military
security embraces most of the basic
counterintelligence measures which would be
applicable to all types of military units
regardless of their type of specific mission.
COUNTERINTELLIGENCE
It consists of all activities done in peace and
war concerned with the prevention,
detection, neutralization, and destruction of
the intelligence activities of a real or
potential enemy, by planning and
developing suitable countermeasures to that
such hostile activities.
•Objective:
To safeguard information, personnel,
materials, and installations against
espionage, or subversive activities of hostile SUMMARY
foreign powers, and disaffected or dissident □ Definition of terms.
groups individuals which constitute a threat □ Intelligence principles.
to national security. In addition, it is within □ Intelligence axioms.
the realm of counterintelligence to take □ Intelligence cycle.
aggressive action to neutralize and destroy □ Intelligence reports/records
hostile efforts to engage in espionage, □ Military security
sabotage, and subversion. □ Counterintelligence
COUNTERINTELLIGENCE
MEASURES:
Passive Counterintelligence measures-
conceal information from the enemy. They
include measures such as secrecy discipline,
security of classified documents and
materials, communications and electronics
security, movement control, censorship
camouflage, the use of concealment, and
electronic countermeasures. Passive
counterintelligence measures generally are
readily standardized in the SOP regardless
of the specific nature of the unit mission.
Active counterintelligence measures-
activity blocks the enemy’s attempt to gain
information or to engage in sabotage or
subversion. They include counter-
reconnaissance, counterespionage, counter-
subversion, and the use of smoke to deny
enemy observation. Active
counterintelligence measures vary with the
mission of the units.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy