Lesson 2 - The Intelligence Process 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 37
At a glance
Powered by AI
The key takeaways are that the document discusses the intelligence cycle which consists of four phases - collection, processing, dissemination and use, and planning and direction. It goes through each phase in detail explaining the various concepts and processes involved.

The four phases of the intelligence cycle are collection, processing, dissemination and use, and planning and direction.

The steps involved in planning the collection efforts are: 1) Determination of the intelligence requirements 2) Determination of intelligence priorities 3) Determination of Intelligence indicators 4) Selection of collection agency to be employed 5) Supervision on the execution of orders and requests.

THE INTELLIGENCE

CYCLE
Lesson 2
Course: Fundamentals of Intelligence
“Nemo dat quod non
habet“
Anonymous
 The cyclical steps followed from intelligence
planning to the dissemination of processed
Intelligence information.
Cycle  It is a repetitive process used to produce
intelligence from information.
SUPERVISION

Planning and
Direction Collection

Four Phases of MISSIO


Intel Cycle N

Dissemination
and Use Processing

SUPERVISION
Steps:
1. Determination of the intelligence
1. PLANNING requirements

THE 2. Determination of intelligence priorities


COLLECTIO 3. Determination of Intelligence
N EFFORTS indicators/determination of those enemy
activities or characteristics of the area of
operations
4. Selection of collection agency to be
PLANNING THE
employed
COLLECTION
EFFORTS 5. Supervision on the execution of orders and
(contd.) requests
1. Priority Intelligence Requirements (PIRs)
or Essential Elements of Information (EEIs)
Classification Those intelligence requirements for which a

of Intelligence commander has an anticipated and stated priority in his


task of planning and decision-making. It is the highest
Requirements Intelligence requirements and are the basis for
intelligence operations and are personally approved by
the commander.
2. Other Intelligence Requirements (OIRs)
Classification Those items of information regarding the enemy
of Intelligence and his environment which need to be collected and
processed in order to meet the intelligence
Requirements requirements of the commander.
3. Specific Order Requests (SORs)
Classification Product of requirement analysis that are
of Intelligence required of collection units or agencies in the
Requirements forma of orders or requests.
Generalized theoretical action that an enemy
might be expected to take in preparation for
Indicators aggressive action that are things or events that
transpired in the past or things or events that are
presently occurring.
Refers to the systematic exploitation of
2. COLLECTION sources of information by collection agencies
OF and the delivery of the information obtained to
INFORMATION the proper intelligence unit or agency.
Steps:
1. Determine collecting agency
2. Send orders or request
Collection 3. Supervise collection efforts
Process 4. Use tools or techniques in collection
5. Ensure timely collection
• Routine patrols • Checkpoints
Police • Investigations • Informers and informants
Information • Surveillance • Cordon and search
Collection
• Search and seizures • Interrogations
Activities
• Criminal investigation • Interview and elicitation
Organizations are great information processors. They
gather, analyze, synthesize and interpret information from
their environment for their own uses and for return to the
environment. They use this information to make choices or
decision about what the organization will and will not do,
and how it will do it. In short, information and the
Sources of knowledge it represents are the lifeblood of the
Information organization. It links the organization to its environment,
and it is considered the “OIL” that lubricates the internal
operations.
No organization can exist for long if it does not have
valid and reliable information on which to base its
decisions and operations.
 Any person, object or record used by an investigator in
Sources of conducting investigation.

Information  Persons, things, or actions from which information about


the enemy, weather or terrain is derived.
The sources of information to be selected to fulfill a
given intelligence is an important consideration.

Sources of For this reason, knowledge of what sources of


Information information are available is essential to planning the
collection
effort.
A source is defined as a person, thing, or activity from
which information is originally obtained. Sources may or
Source may not be under friendly control.
1. Enemy activities 9. Imagery
2. Prisoners of war 10. Maps
3. Local residents 11. Weather forecasts
4. Refugees 12. studies and reports
Common Sources 5. Evacuees 13. Informants
of Information for 6.
7.
Displaced persons
Civilian agencies
Intelligence 8. Captured enemy
Purposes documents and material
1. Open/Overt Source
 A form of intelligence collection management that
involves finding, selecting, and acquiring
Types of information from publicly available sources and

Sources of analyzing it to produce actionable intelligence.


2. Close/Covert Source
Information  Those that are not obtained openly and requires
clandestine operation or secret activities to
acquire.
Informer - gives information in exchange of a reward or a price.

Kinds of Informer:
Informer 1. Common or ordinary
2. Confidential
Informant- gives information without any consideration.

Informant Informant Net- a controlled group of people who work through


the direction of an agent handler.
1. Anonymous – those who gives information through telephone with
the hope that the informant cannot be identified.

2. False Informant - reveals information of no consequences or value.


3. Self-Aggrandizing - moves around the center of criminals delight in
Types of surprising the police about bits of information.

Informants 4. Double Crosser - wants to get more information from the police more
than what he gives.

5. Special/legitimate informant- those who gives information


concerning specialized cases. Usually they are regarded with a special
treatment by the operatives.
6. Voluntary informant- gives information freely and willfully as a
witness to a certain act.

Types of 7. Recruited informant- a person who is selected, cultivated, and


developed into a continuous source of information.

Informants 8. Rival elimination informant- an informant who gives information to


eliminated rivalry.
(contd.) 9. Information Peddler/Mercenary – informant who gives information
for remuneration or compensation.
An agency is any individual or organization which
Collection exploits a source to collect and/or process information. The
distinction is made between those agencies which collect
Agency information and those which process intelligence.
1. Troops/Beat Policemen
2. Military/Base Police Unit
3. Civil Affairs Units

Collecting 4. Psychological Operating Units

Agency as 5. Military/Police Intelligence Personnel

Source of 6. Technical Intelligence Units

Information 7. Engineering Topographic Units


8. Special and Other Staff Officers
9. Deep Penetrating Agents/Undercover Agents
10.Airborne Units working behinds enemy lines
1. Capability – An agency must be physically capable of
providing the desired information in a timely manner.

2. Suitability – The collection task assigned to the unit must be


compatible with its primary mission. Only the agencies best
suited to furnish the desired information are used.
Factors in 3. Multiplicity – Evaluation of information requires that it is
Choosing compared with information received from other sources and

Collection agencies. Subject to consideration of capability and suitability,


more than one agency is used to obtain each item of required
Agency information.

4. Balance – Within the limits imposed by other consideration the


collection workload is balanced among agencies. Balance is a
minor consideration when compared with the importance of
other factors.
Steps:
1. Recording
 reduction of information to writing or some other form of graphical
representation and the arranging of information into groups of
related items.
2. Evaluation

3. PROCESSING  determination of the pertinence, reliability and accuracy of the


information.
OF  determination of the pertinence or significance of the information
INFORMATION relative to the operation, reliability of the sources or agency, and
accuracy of the information.
3. Interpretation Analysis
 determination of the significance of the information relative to the
information and the intelligence already known and drawing
deductions about the probable meaning of the evaluated
information.
1. Intelligence Journal – chronological log of significant intelligence
activities covering a stated period usually 24 hours.
2. Intelligence Workbook – a systematic arrangement of subject
heading which aids in sorting, evaluation and interpreting of
information in the preparation of intelligence reports.
3. Enemy Situation Map – a graphic representation of the current
Means of enemy situation.

Recording 4. Order of Battle Records/Watch Lists


5. Coordinate Register
6. Identification Files – files in the intelligence unit of personalities
in crimes, location of illegal or suspected illegal activities, vehicle
registry used by hoodlums, criminals, dissidents, union racketeers,
list of and data on dubious organizations, telephone numbers of
suspects, criminal and other suspicious police characters.
 Pertinence – determination of the area of
operation and who needs it, if so by whom and
when. 
 Reliability – determination of the sources of
Parameters of
information by which it was collected and
Evaluation evaluated.
 Accuracy – probable truth of the information.
A - Completely reliable

B - Usually reliable

Reliability of C - Fairly reliable

Source D - Not usually reliable

E - Unreliable

F - Reliability cannot be determined


1 - Confirmed By Other Sources

2 - Probably True

Accuracy of 3 - Possibly True

Information 4 - Doubtfully True

5 - Improbable

6 - Truth Can Not Be Judged


T – Direct observation by the commander of a unit

U – Report by a penetration agent or resident agent


V – Report by an AFP trooper or PNP personnel in encounter or

Evaluation of operation
W – Interrogation of a captured enemy agent or foreigner
Source X – Observation by a government or civilian employee or official
Y – Observation by a member of a populace
Z – Documentary
 Refers to the determination of the significance of the
Interpretation information relative to the information and the intelligence
already known and drawing deductions about the probable
Analysis meaning of the evaluated information.
Steps:
1. Assessment – sifting and sorting of evaluated information to
isolate insignificant elements with respect to the mission and
operation of the unit.
2. Integration – combination of elements isolated in analysis
Interpretation with other known information to form a logical picture on
hypothesis of enemy activities or influence of operational area
of Information characteristics on the mission of the unit.
3. Deduction – designed to answer the question “what does this
information means in relation to the enemy situation, weather
and area of operation.
 Processed information or intelligence data are transmitted,
shared or presented to its rightful end users on a “need to
know” basis only upon “authority to release.”
4.  Considerations in dissemination of intelligence data include:
DISSEMINAT 1. Timeliness – reach the user on time to be useful.
ION AND 2. Propriety – right user like national leaders or

USE commanders
3. Security – proper security measures for classified
matters.
1. Personal Contact –conferences, briefings, person to person exchanges
2. Messages – couriers, secured electrical means
3. Intelligence Documents
Intelligence Report
Intelligence Summary
Imagery Interpretation Report
Methods of Document Exploitation Report (DOCEX)

Dissemination Periodic Status Report


Tactical Interrogation Report/ACDR
Technical Intelligence Report (devices)
Technical Intelligence Bulletin
ORBAT Handbook
PACREP
Intelligence Annexes
END Hasta La Victoria Siempre!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy