SlideShare une entreprise Scribd logo
1  sur  24
BASIC INTELLIGENCE
I. INTRODUCTION
A. Definition of Terms Intelligence – an end product (knowledge) resulting from the recording, evaluation, analysis, integration and interpretation of information concerning an enemy whether actual or potential to include weather and terrain in the area of operation. 				- the activity involved in the production of that end product which includes collection, processing, dissemination and use of the knowledge.
Counter-Intelligence – denies information to the enemy, increases the security of the command and aids in achieving surprises. It consists passive and active measures. Intelligence Cycle– Intelligence work is a continuous process. It is a repetition of what has transpired or become known. There is neither a beginning nor an end. There is no first nor last phase, hence a cycle.
II. PRINCIPLES OF INTELLIGENCE
General - intelligence operations are influenced by such element  of the operational units as the commander’s mission limitation imposed by national policy or higher commands, scale of use of weapons, the locality, the nature of friendly and enemy forces and the civil population in the area. Commander’s Need - Different Commanding Officer need information on different geographical areas. Some of their needs, however, are from overlapping areas. Plans, orders and request are concerned with definite area, particularly the area of influence of the command.
Planning 	- Intelligence requires careful and thorough planning. It includes the anticipation of intelligence needs the organization to fulfill the needs and supervision of the organization. It is continuous and must be adopted to changing conditions. Use 	- Intelligence must be adequate for the purpose for which it utilized. Timeliness 	- Intelligence must reach the user on time to serve as a basis for appropriate action.
Flexibility 	- Intelligence activities are based on reason and judgment and not on fixed procedures. Security 	- Constant security measures must be undertaken to deny unauthorized personnel information about operations, sources of information and the intelligence product. Imagination, Foresight and Resourcefulness 	- for intelligence personnel and agencies should use resourcefulness for future intelligence needs so that all available information can be developed and exploited to produce intelligence for the user.
An Integral Part of Military Operations 	- Intelligence activities are integral parts of the operations of all units, both combat and service. Continuity 	- The basic principle of intelligence operations is that intelligence activities follows a simple continuous cycle. Intelligence as a cycle 	- All intelligence activities generally follow a three phase cycle oriented to the commander’s mission. This cycle is continuous and all steps are carried out at the same time.
Intelligence Cycle is the sequence of steps that raw information has to go through before it is processed into useful intelligence ready to be disseminated and used by the units needing them. III. INTELLIGENCE 			CYCLE
1. Collection Planning and Issuance of Orders - This step involves the development of a plan for the collection effort, which is in accordance with the mission of the unit and the present enemy situation. The collection of needed information are then sent to the selected “collection agencies” which are friendly units and organization who are in a position to gather them. The intelligence collection planning must be a continuous effort and must begin even before the receipt of orders from higher headquarters.
2.Collection of information  - This step is the implementation of the collection plan and involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy and the actual situation in the area of operation. Here are the recommended procedures to be followed in reporting information collected about the enemy:
Essential Elements of Information (EEI). 	It is the responsibility of the individual soldier in the field to report quickly, completely and accurately all information, which he has gathered about the enemy. The following essential elements of the information should be included in the report: WHAT, WHERE AND WHEN. Answers to these questions will be aid the intelligence personnel in processing your information.
Example: 	What - fifteen(15) rebels in black uniform,  			traveling NE on logging road 				towards the town of Pantao,Ragat, 	Where – Temporary halted at hill 124  			GC 213524 	When- 181030H Apr 2003
B. Format 	- a more comprehensive way on how to report information about enemy is to follow the  S-A-L-U-T-E format: 	S-Size…………..Enemy Company of about 80 infantry 	A-Activity……..digging mortar emplacement  and 		       	 laying land mines 	L-Location……..On a ridge at GC 81238180 	U-Unit…………..3rd Coy, National Guard Battalion 	T- Time…………191600H Jul 2002  	E- Equipment…4 tubes 81 mm mortar 2 units .50 			Cal MG, 50 Units M16 Rifles and 			assorted anti tank weapon
3.Processing of information - It is the step of the intelligence cycle wherein all gathered information is deliberately processed to transform them into useful intelligence . The processing of information involves the following:
Recording - The process of arranging the gathered information into systematic patterns to facilitate its evaluation and interpretation. Recording is done through the entry of the information into the intelligence journals, workbooks, information or reference files and the order of the battle.
B.	Evaluation - This process involves the careful examination of the gathered information to determine its accuracy and pertinence to the desired product of the intelligence effort. Information is considered pertinent if it concerns the enemy, it relates to the characteristics of the area of operation, and it is needed immediately, or has possible present or future value.
Reliability of Information A – Completely Reliable B – Usually Reliable C – Fairly Reliable D – Not usually, Reliable E – Unreliable F – Reliability Cannot be Judge Veracity of Report 1 – Confirmed by Other Sources 2 – Probably True 3 – Possibly 4 – Doubtful 5 – Improbable 6 - Truth
Dependability of Source T – Direct Observation U – Provided by Penetration/Resident Agent V – AFP Troops Involved in Encounter/Operation W – Acquired Through Interrogation of Captured enemy X – Provided by Government Civilian Employee Y – Provided by Members of the Populace Z – Acquired from Documentary Source
C.	Interpretation -This process involves the determination of the evaluated information and the deliberate and logical drawing of its probable meaning. The interpretation process basically consists of the sub-processes of Analysis, Integration and Deduction.
D.	Dissemination and Use -The resulting intelligence will only be of value when it is promptly disseminated to and immediately received and put to use by the receiving units. It is therefore very necessary to have an efficient intelligence dissemination plan in order that all processed intelligence are provided to units who may have use for them at the soonest possible time. Proper dissemination will also provide knowledge on how newly gathered information in other intelligence units may be processed.
INTELLIGENCE CYCLE Collection, Planning and Issuance of Orders M I S S I O N  Essential Elements of Information ( EEIs) Format Recording Evaluation Interpretation Dissemination and Use Collection of Information Processing of Information
E-N-D

Contenu connexe

Tendances

Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Dominic Guiao
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and disciplineJoann Villareal
 
Basic signal communication
Basic signal communicationBasic signal communication
Basic signal communicationRudy Flores
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 
Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Ocpo Pcr
 
Traffic patrol operation
Traffic patrol operationTraffic patrol operation
Traffic patrol operationRyanCapuchino
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtrootJohanes Tayam
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and disciplineMary Grace Conmigo
 
Pnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guidePnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guiderengar23
 
Philippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualPhilippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualHarve Abella
 
Military symbols
Military symbolsMilitary symbols
Military symbolsRudy Flores
 

Tendances (20)

PNP MASTER PLANS
PNP MASTER PLANSPNP MASTER PLANS
PNP MASTER PLANS
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
First-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.pptFirst-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.ppt
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and discipline
 
Basic signal communication
Basic signal communicationBasic signal communication
Basic signal communication
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
Memo rhaney
Memo rhaneyMemo rhaney
Memo rhaney
 
Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)
 
Ambush revised
Ambush  revisedAmbush  revised
Ambush revised
 
Traffic patrol operation
Traffic patrol operationTraffic patrol operation
Traffic patrol operation
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and discipline
 
Crimes against public order
Crimes against public orderCrimes against public order
Crimes against public order
 
Pnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guidePnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guide
 
Philippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualPhilippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation Manual
 
Military symbols
Military symbolsMilitary symbols
Military symbols
 
Cflm 2
Cflm 2 Cflm 2
Cflm 2
 

Similaire à Basic intelligence

407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPTBrandon D'Andrea
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxvoversbyobersby
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxaisharasyidila
 
Andrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSAndrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSChris Andrews
 
Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Louison Malu-Malu
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingDavid Sweigert
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
Eric M. Belt Resume
Eric M. Belt ResumeEric M. Belt Resume
Eric M. Belt ResumeEric Belt
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxnettletondevon
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsecIT2Alcorn
 
Thomas Kelly On-line Resume
Thomas Kelly On-line ResumeThomas Kelly On-line Resume
Thomas Kelly On-line ResumeTom Kelly
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
Ch 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptCh 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptChadMayberry
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysisUnimasteressays
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist- Mark - Fullbright
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxdoylymaura
 
final res_07aug rework
final res_07aug reworkfinal res_07aug rework
final res_07aug reworkZachary Sunder
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingNicole Mitchell
 

Similaire à Basic intelligence (20)

407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptx
 
Andrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSAndrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBS
 
Incidence Response System
Incidence Response SystemIncidence Response System
Incidence Response System
 
Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information Sharing
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Eric M. Belt Resume
Eric M. Belt ResumeEric M. Belt Resume
Eric M. Belt Resume
 
Resume 10-7-16
Resume 10-7-16Resume 10-7-16
Resume 10-7-16
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsec
 
Thomas Kelly On-line Resume
Thomas Kelly On-line ResumeThomas Kelly On-line Resume
Thomas Kelly On-line Resume
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
Ch 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptCh 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses ppt
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
 
final res_07aug rework
final res_07aug reworkfinal res_07aug rework
final res_07aug rework
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume Targeting
 

Plus de Joann Villareal

Plus de Joann Villareal (9)

China
China China
China
 
Basic survival
Basic survivalBasic survival
Basic survival
 
General first aid
General first aidGeneral first aid
General first aid
 
Threats to national security
Threats to national securityThreats to national security
Threats to national security
 
Basic signal and communication
Basic signal and communicationBasic signal and communication
Basic signal and communication
 
Basic map reading
Basic map readingBasic map reading
Basic map reading
 
Basic first aid with cpr
Basic first aid with cprBasic first aid with cpr
Basic first aid with cpr
 
Military correspondence
Military correspondenceMilitary correspondence
Military correspondence
 
Slideshare upload
Slideshare uploadSlideshare upload
Slideshare upload
 

Dernier

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Basic intelligence

  • 3. A. Definition of Terms Intelligence – an end product (knowledge) resulting from the recording, evaluation, analysis, integration and interpretation of information concerning an enemy whether actual or potential to include weather and terrain in the area of operation. - the activity involved in the production of that end product which includes collection, processing, dissemination and use of the knowledge.
  • 4. Counter-Intelligence – denies information to the enemy, increases the security of the command and aids in achieving surprises. It consists passive and active measures. Intelligence Cycle– Intelligence work is a continuous process. It is a repetition of what has transpired or become known. There is neither a beginning nor an end. There is no first nor last phase, hence a cycle.
  • 5. II. PRINCIPLES OF INTELLIGENCE
  • 6. General - intelligence operations are influenced by such element of the operational units as the commander’s mission limitation imposed by national policy or higher commands, scale of use of weapons, the locality, the nature of friendly and enemy forces and the civil population in the area. Commander’s Need - Different Commanding Officer need information on different geographical areas. Some of their needs, however, are from overlapping areas. Plans, orders and request are concerned with definite area, particularly the area of influence of the command.
  • 7. Planning - Intelligence requires careful and thorough planning. It includes the anticipation of intelligence needs the organization to fulfill the needs and supervision of the organization. It is continuous and must be adopted to changing conditions. Use - Intelligence must be adequate for the purpose for which it utilized. Timeliness - Intelligence must reach the user on time to serve as a basis for appropriate action.
  • 8. Flexibility - Intelligence activities are based on reason and judgment and not on fixed procedures. Security - Constant security measures must be undertaken to deny unauthorized personnel information about operations, sources of information and the intelligence product. Imagination, Foresight and Resourcefulness - for intelligence personnel and agencies should use resourcefulness for future intelligence needs so that all available information can be developed and exploited to produce intelligence for the user.
  • 9. An Integral Part of Military Operations - Intelligence activities are integral parts of the operations of all units, both combat and service. Continuity - The basic principle of intelligence operations is that intelligence activities follows a simple continuous cycle. Intelligence as a cycle - All intelligence activities generally follow a three phase cycle oriented to the commander’s mission. This cycle is continuous and all steps are carried out at the same time.
  • 10. Intelligence Cycle is the sequence of steps that raw information has to go through before it is processed into useful intelligence ready to be disseminated and used by the units needing them. III. INTELLIGENCE CYCLE
  • 11. 1. Collection Planning and Issuance of Orders - This step involves the development of a plan for the collection effort, which is in accordance with the mission of the unit and the present enemy situation. The collection of needed information are then sent to the selected “collection agencies” which are friendly units and organization who are in a position to gather them. The intelligence collection planning must be a continuous effort and must begin even before the receipt of orders from higher headquarters.
  • 12. 2.Collection of information - This step is the implementation of the collection plan and involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy and the actual situation in the area of operation. Here are the recommended procedures to be followed in reporting information collected about the enemy:
  • 13. Essential Elements of Information (EEI). It is the responsibility of the individual soldier in the field to report quickly, completely and accurately all information, which he has gathered about the enemy. The following essential elements of the information should be included in the report: WHAT, WHERE AND WHEN. Answers to these questions will be aid the intelligence personnel in processing your information.
  • 14. Example: What - fifteen(15) rebels in black uniform, traveling NE on logging road towards the town of Pantao,Ragat, Where – Temporary halted at hill 124 GC 213524 When- 181030H Apr 2003
  • 15. B. Format - a more comprehensive way on how to report information about enemy is to follow the S-A-L-U-T-E format: S-Size…………..Enemy Company of about 80 infantry A-Activity……..digging mortar emplacement and laying land mines L-Location……..On a ridge at GC 81238180 U-Unit…………..3rd Coy, National Guard Battalion T- Time…………191600H Jul 2002 E- Equipment…4 tubes 81 mm mortar 2 units .50 Cal MG, 50 Units M16 Rifles and assorted anti tank weapon
  • 16. 3.Processing of information - It is the step of the intelligence cycle wherein all gathered information is deliberately processed to transform them into useful intelligence . The processing of information involves the following:
  • 17. Recording - The process of arranging the gathered information into systematic patterns to facilitate its evaluation and interpretation. Recording is done through the entry of the information into the intelligence journals, workbooks, information or reference files and the order of the battle.
  • 18. B. Evaluation - This process involves the careful examination of the gathered information to determine its accuracy and pertinence to the desired product of the intelligence effort. Information is considered pertinent if it concerns the enemy, it relates to the characteristics of the area of operation, and it is needed immediately, or has possible present or future value.
  • 19. Reliability of Information A – Completely Reliable B – Usually Reliable C – Fairly Reliable D – Not usually, Reliable E – Unreliable F – Reliability Cannot be Judge Veracity of Report 1 – Confirmed by Other Sources 2 – Probably True 3 – Possibly 4 – Doubtful 5 – Improbable 6 - Truth
  • 20. Dependability of Source T – Direct Observation U – Provided by Penetration/Resident Agent V – AFP Troops Involved in Encounter/Operation W – Acquired Through Interrogation of Captured enemy X – Provided by Government Civilian Employee Y – Provided by Members of the Populace Z – Acquired from Documentary Source
  • 21. C. Interpretation -This process involves the determination of the evaluated information and the deliberate and logical drawing of its probable meaning. The interpretation process basically consists of the sub-processes of Analysis, Integration and Deduction.
  • 22. D. Dissemination and Use -The resulting intelligence will only be of value when it is promptly disseminated to and immediately received and put to use by the receiving units. It is therefore very necessary to have an efficient intelligence dissemination plan in order that all processed intelligence are provided to units who may have use for them at the soonest possible time. Proper dissemination will also provide knowledge on how newly gathered information in other intelligence units may be processed.
  • 23. INTELLIGENCE CYCLE Collection, Planning and Issuance of Orders M I S S I O N Essential Elements of Information ( EEIs) Format Recording Evaluation Interpretation Dissemination and Use Collection of Information Processing of Information
  • 24. E-N-D