SlideShare ist ein Scribd-Unternehmen logo
1 von 24
BASIC INTELLIGENCE
I. INTRODUCTION
A. Definition of Terms Intelligence – an end product (knowledge) resulting from the recording, evaluation, analysis, integration and interpretation of information concerning an enemy whether actual or potential to include weather and terrain in the area of operation. 				- the activity involved in the production of that end product which includes collection, processing, dissemination and use of the knowledge.
Counter-Intelligence – denies information to the enemy, increases the security of the command and aids in achieving surprises. It consists passive and active measures. Intelligence Cycle– Intelligence work is a continuous process. It is a repetition of what has transpired or become known. There is neither a beginning nor an end. There is no first nor last phase, hence a cycle.
II. PRINCIPLES OF INTELLIGENCE
General - intelligence operations are influenced by such element  of the operational units as the commander’s mission limitation imposed by national policy or higher commands, scale of use of weapons, the locality, the nature of friendly and enemy forces and the civil population in the area. Commander’s Need - Different Commanding Officer need information on different geographical areas. Some of their needs, however, are from overlapping areas. Plans, orders and request are concerned with definite area, particularly the area of influence of the command.
Planning 	- Intelligence requires careful and thorough planning. It includes the anticipation of intelligence needs the organization to fulfill the needs and supervision of the organization. It is continuous and must be adopted to changing conditions. Use 	- Intelligence must be adequate for the purpose for which it utilized. Timeliness 	- Intelligence must reach the user on time to serve as a basis for appropriate action.
Flexibility 	- Intelligence activities are based on reason and judgment and not on fixed procedures. Security 	- Constant security measures must be undertaken to deny unauthorized personnel information about operations, sources of information and the intelligence product. Imagination, Foresight and Resourcefulness 	- for intelligence personnel and agencies should use resourcefulness for future intelligence needs so that all available information can be developed and exploited to produce intelligence for the user.
An Integral Part of Military Operations 	- Intelligence activities are integral parts of the operations of all units, both combat and service. Continuity 	- The basic principle of intelligence operations is that intelligence activities follows a simple continuous cycle. Intelligence as a cycle 	- All intelligence activities generally follow a three phase cycle oriented to the commander’s mission. This cycle is continuous and all steps are carried out at the same time.
Intelligence Cycle is the sequence of steps that raw information has to go through before it is processed into useful intelligence ready to be disseminated and used by the units needing them. III. INTELLIGENCE 			CYCLE
1. Collection Planning and Issuance of Orders - This step involves the development of a plan for the collection effort, which is in accordance with the mission of the unit and the present enemy situation. The collection of needed information are then sent to the selected “collection agencies” which are friendly units and organization who are in a position to gather them. The intelligence collection planning must be a continuous effort and must begin even before the receipt of orders from higher headquarters.
2.Collection of information  - This step is the implementation of the collection plan and involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy and the actual situation in the area of operation. Here are the recommended procedures to be followed in reporting information collected about the enemy:
Essential Elements of Information (EEI). 	It is the responsibility of the individual soldier in the field to report quickly, completely and accurately all information, which he has gathered about the enemy. The following essential elements of the information should be included in the report: WHAT, WHERE AND WHEN. Answers to these questions will be aid the intelligence personnel in processing your information.
Example: 	What - fifteen(15) rebels in black uniform,  			traveling NE on logging road 				towards the town of Pantao,Ragat, 	Where – Temporary halted at hill 124  			GC 213524 	When- 181030H Apr 2003
B. Format 	- a more comprehensive way on how to report information about enemy is to follow the  S-A-L-U-T-E format: 	S-Size…………..Enemy Company of about 80 infantry 	A-Activity……..digging mortar emplacement  and 		       	 laying land mines 	L-Location……..On a ridge at GC 81238180 	U-Unit…………..3rd Coy, National Guard Battalion 	T- Time…………191600H Jul 2002  	E- Equipment…4 tubes 81 mm mortar 2 units .50 			Cal MG, 50 Units M16 Rifles and 			assorted anti tank weapon
3.Processing of information - It is the step of the intelligence cycle wherein all gathered information is deliberately processed to transform them into useful intelligence . The processing of information involves the following:
Recording - The process of arranging the gathered information into systematic patterns to facilitate its evaluation and interpretation. Recording is done through the entry of the information into the intelligence journals, workbooks, information or reference files and the order of the battle.
B.	Evaluation - This process involves the careful examination of the gathered information to determine its accuracy and pertinence to the desired product of the intelligence effort. Information is considered pertinent if it concerns the enemy, it relates to the characteristics of the area of operation, and it is needed immediately, or has possible present or future value.
Reliability of Information A – Completely Reliable B – Usually Reliable C – Fairly Reliable D – Not usually, Reliable E – Unreliable F – Reliability Cannot be Judge Veracity of Report 1 – Confirmed by Other Sources 2 – Probably True 3 – Possibly 4 – Doubtful 5 – Improbable 6 - Truth
Dependability of Source T – Direct Observation U – Provided by Penetration/Resident Agent V – AFP Troops Involved in Encounter/Operation W – Acquired Through Interrogation of Captured enemy X – Provided by Government Civilian Employee Y – Provided by Members of the Populace Z – Acquired from Documentary Source
C.	Interpretation -This process involves the determination of the evaluated information and the deliberate and logical drawing of its probable meaning. The interpretation process basically consists of the sub-processes of Analysis, Integration and Deduction.
D.	Dissemination and Use -The resulting intelligence will only be of value when it is promptly disseminated to and immediately received and put to use by the receiving units. It is therefore very necessary to have an efficient intelligence dissemination plan in order that all processed intelligence are provided to units who may have use for them at the soonest possible time. Proper dissemination will also provide knowledge on how newly gathered information in other intelligence units may be processed.
INTELLIGENCE CYCLE Collection, Planning and Issuance of Orders M I S S I O N  Essential Elements of Information ( EEIs) Format Recording Evaluation Interpretation Dissemination and Use Collection of Information Processing of Information
E-N-D

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Law Enforcement Administration II
Law Enforcement Administration IILaw Enforcement Administration II
Law Enforcement Administration II
 
CRIMINAL-LAW-II-BOOK-2.pptx
CRIMINAL-LAW-II-BOOK-2.pptxCRIMINAL-LAW-II-BOOK-2.pptx
CRIMINAL-LAW-II-BOOK-2.pptx
 
Lesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsLesson plan 2.1 police ethics
Lesson plan 2.1 police ethics
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
 
pnp-ethical-doctrine
pnp-ethical-doctrinepnp-ethical-doctrine
pnp-ethical-doctrine
 
Justifyingcircumstance
JustifyingcircumstanceJustifyingcircumstance
Justifyingcircumstance
 
Handling classified information
Handling classified informationHandling classified information
Handling classified information
 
Crime against property
Crime against propertyCrime against property
Crime against property
 
Police report writing
Police report writingPolice report writing
Police report writing
 
Crimes against persons
Crimes against personsCrimes against persons
Crimes against persons
 
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docxCDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
CDI-1-FUNDAMENTALS-OF-CRIMINAL-INVESTIGATION.docx
 
Military Justice SYSTEM
Military Justice SYSTEMMilitary Justice SYSTEM
Military Justice SYSTEM
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Module 1 police operational planning
Module 1   police operational planningModule 1   police operational planning
Module 1 police operational planning
 
Pnppgs
PnppgsPnppgs
Pnppgs
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and discipline
 

Ähnlich wie Basic intelligence

407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPTBrandon D'Andrea
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxvoversbyobersby
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxaisharasyidila
 
Andrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSAndrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSChris Andrews
 
Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Louison Malu-Malu
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingDavid Sweigert
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
Eric M. Belt Resume
Eric M. Belt ResumeEric M. Belt Resume
Eric M. Belt ResumeEric Belt
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxnettletondevon
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsecIT2Alcorn
 
Thomas Kelly On-line Resume
Thomas Kelly On-line ResumeThomas Kelly On-line Resume
Thomas Kelly On-line ResumeTom Kelly
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
Ch 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptCh 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptChadMayberry
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysisUnimasteressays
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist- Mark - Fullbright
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxdoylymaura
 
final res_07aug rework
final res_07aug reworkfinal res_07aug rework
final res_07aug reworkZachary Sunder
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingNicole Mitchell
 

Ähnlich wie Basic intelligence (20)

407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptx
 
Andrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSAndrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBS
 
Incidence Response System
Incidence Response SystemIncidence Response System
Incidence Response System
 
Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information Sharing
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Eric M. Belt Resume
Eric M. Belt ResumeEric M. Belt Resume
Eric M. Belt Resume
 
Resume 10-7-16
Resume 10-7-16Resume 10-7-16
Resume 10-7-16
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsec
 
Thomas Kelly On-line Resume
Thomas Kelly On-line ResumeThomas Kelly On-line Resume
Thomas Kelly On-line Resume
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
Ch 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptCh 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses ppt
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
 
final res_07aug rework
final res_07aug reworkfinal res_07aug rework
final res_07aug rework
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume Targeting
 

Mehr von Joann Villareal

Mehr von Joann Villareal (9)

China
China China
China
 
Basic survival
Basic survivalBasic survival
Basic survival
 
General first aid
General first aidGeneral first aid
General first aid
 
Threats to national security
Threats to national securityThreats to national security
Threats to national security
 
Basic signal and communication
Basic signal and communicationBasic signal and communication
Basic signal and communication
 
Basic map reading
Basic map readingBasic map reading
Basic map reading
 
Basic first aid with cpr
Basic first aid with cprBasic first aid with cpr
Basic first aid with cpr
 
Military correspondence
Military correspondenceMilitary correspondence
Military correspondence
 
Slideshare upload
Slideshare uploadSlideshare upload
Slideshare upload
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Basic intelligence

  • 3. A. Definition of Terms Intelligence – an end product (knowledge) resulting from the recording, evaluation, analysis, integration and interpretation of information concerning an enemy whether actual or potential to include weather and terrain in the area of operation. - the activity involved in the production of that end product which includes collection, processing, dissemination and use of the knowledge.
  • 4. Counter-Intelligence – denies information to the enemy, increases the security of the command and aids in achieving surprises. It consists passive and active measures. Intelligence Cycle– Intelligence work is a continuous process. It is a repetition of what has transpired or become known. There is neither a beginning nor an end. There is no first nor last phase, hence a cycle.
  • 5. II. PRINCIPLES OF INTELLIGENCE
  • 6. General - intelligence operations are influenced by such element of the operational units as the commander’s mission limitation imposed by national policy or higher commands, scale of use of weapons, the locality, the nature of friendly and enemy forces and the civil population in the area. Commander’s Need - Different Commanding Officer need information on different geographical areas. Some of their needs, however, are from overlapping areas. Plans, orders and request are concerned with definite area, particularly the area of influence of the command.
  • 7. Planning - Intelligence requires careful and thorough planning. It includes the anticipation of intelligence needs the organization to fulfill the needs and supervision of the organization. It is continuous and must be adopted to changing conditions. Use - Intelligence must be adequate for the purpose for which it utilized. Timeliness - Intelligence must reach the user on time to serve as a basis for appropriate action.
  • 8. Flexibility - Intelligence activities are based on reason and judgment and not on fixed procedures. Security - Constant security measures must be undertaken to deny unauthorized personnel information about operations, sources of information and the intelligence product. Imagination, Foresight and Resourcefulness - for intelligence personnel and agencies should use resourcefulness for future intelligence needs so that all available information can be developed and exploited to produce intelligence for the user.
  • 9. An Integral Part of Military Operations - Intelligence activities are integral parts of the operations of all units, both combat and service. Continuity - The basic principle of intelligence operations is that intelligence activities follows a simple continuous cycle. Intelligence as a cycle - All intelligence activities generally follow a three phase cycle oriented to the commander’s mission. This cycle is continuous and all steps are carried out at the same time.
  • 10. Intelligence Cycle is the sequence of steps that raw information has to go through before it is processed into useful intelligence ready to be disseminated and used by the units needing them. III. INTELLIGENCE CYCLE
  • 11. 1. Collection Planning and Issuance of Orders - This step involves the development of a plan for the collection effort, which is in accordance with the mission of the unit and the present enemy situation. The collection of needed information are then sent to the selected “collection agencies” which are friendly units and organization who are in a position to gather them. The intelligence collection planning must be a continuous effort and must begin even before the receipt of orders from higher headquarters.
  • 12. 2.Collection of information - This step is the implementation of the collection plan and involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy and the actual situation in the area of operation. Here are the recommended procedures to be followed in reporting information collected about the enemy:
  • 13. Essential Elements of Information (EEI). It is the responsibility of the individual soldier in the field to report quickly, completely and accurately all information, which he has gathered about the enemy. The following essential elements of the information should be included in the report: WHAT, WHERE AND WHEN. Answers to these questions will be aid the intelligence personnel in processing your information.
  • 14. Example: What - fifteen(15) rebels in black uniform, traveling NE on logging road towards the town of Pantao,Ragat, Where – Temporary halted at hill 124 GC 213524 When- 181030H Apr 2003
  • 15. B. Format - a more comprehensive way on how to report information about enemy is to follow the S-A-L-U-T-E format: S-Size…………..Enemy Company of about 80 infantry A-Activity……..digging mortar emplacement and laying land mines L-Location……..On a ridge at GC 81238180 U-Unit…………..3rd Coy, National Guard Battalion T- Time…………191600H Jul 2002 E- Equipment…4 tubes 81 mm mortar 2 units .50 Cal MG, 50 Units M16 Rifles and assorted anti tank weapon
  • 16. 3.Processing of information - It is the step of the intelligence cycle wherein all gathered information is deliberately processed to transform them into useful intelligence . The processing of information involves the following:
  • 17. Recording - The process of arranging the gathered information into systematic patterns to facilitate its evaluation and interpretation. Recording is done through the entry of the information into the intelligence journals, workbooks, information or reference files and the order of the battle.
  • 18. B. Evaluation - This process involves the careful examination of the gathered information to determine its accuracy and pertinence to the desired product of the intelligence effort. Information is considered pertinent if it concerns the enemy, it relates to the characteristics of the area of operation, and it is needed immediately, or has possible present or future value.
  • 19. Reliability of Information A – Completely Reliable B – Usually Reliable C – Fairly Reliable D – Not usually, Reliable E – Unreliable F – Reliability Cannot be Judge Veracity of Report 1 – Confirmed by Other Sources 2 – Probably True 3 – Possibly 4 – Doubtful 5 – Improbable 6 - Truth
  • 20. Dependability of Source T – Direct Observation U – Provided by Penetration/Resident Agent V – AFP Troops Involved in Encounter/Operation W – Acquired Through Interrogation of Captured enemy X – Provided by Government Civilian Employee Y – Provided by Members of the Populace Z – Acquired from Documentary Source
  • 21. C. Interpretation -This process involves the determination of the evaluated information and the deliberate and logical drawing of its probable meaning. The interpretation process basically consists of the sub-processes of Analysis, Integration and Deduction.
  • 22. D. Dissemination and Use -The resulting intelligence will only be of value when it is promptly disseminated to and immediately received and put to use by the receiving units. It is therefore very necessary to have an efficient intelligence dissemination plan in order that all processed intelligence are provided to units who may have use for them at the soonest possible time. Proper dissemination will also provide knowledge on how newly gathered information in other intelligence units may be processed.
  • 23. INTELLIGENCE CYCLE Collection, Planning and Issuance of Orders M I S S I O N Essential Elements of Information ( EEIs) Format Recording Evaluation Interpretation Dissemination and Use Collection of Information Processing of Information
  • 24. E-N-D