SlideShare a Scribd company logo
1 of 23
Intelligence in Security Policy
Aisha R. Kusumasomantri
What do you Think when you hear about Intelligence?
Opening Discussion
 What is intelligence?
 How does intelligence affect’s security policy?
 Who controls intelligence?
Important
Concepts
• A product of knowledge that is resulted from
the recording, evaluation, analysis, integration,
integration, and interpretation of information
concerning an enemy, whether actual or
potential to include weather and terrain in the
area of operation
• Includes the activity of collection, processing,
dissemination, and the use of knowledge
Intelligence
• An act to deny information to the enemy,
increases the security of the command and
aids in achieving surprises. Consisted of
passive and active measures.
Counter-Intelligence
Information
vs
Intelligence
Intelligence is a subset of
Information
Information CAN be
intelligence, but intelligence
CANNOT be information
Intelligence has a
specific purpose
and use:
Provide
confidential
advice to
policy makers
Types of
Intelligence
• Intelligence product that provides insights
understanding and contributing to decisions on
broad strategies, policies and resources for long
term organizational purposes (Ex: policy on SCS)
Strategic intelligence
• Supports national and regional leaders to planning
activity and developing resources to achieve
operational objectives (Ex: Operation pattern of
Chinese naval in SCS)
Operational Intelligence
• Taking a case-specific action to achieve compliance
or enforcement objective (Ex: A Specific vessel
activity of Chinese Navy in SCS)
Tactical Intelligence
Decision Maker and Intelligence
What decision-makers
require is intelligence
rather than raw
information
Decision-makers are
expected to make the best
decisions possible using
the best information and
processed intelligence
available
Political
Intelligence
Involvement
Political intelligence information
What is the role of Intelligence in the government?
Characteristics of National Intelligence
Intelligence culture
Interest and intelligence
cooperation
Intelligence Operation
Legitimation
State control over intelligence
Civilian control over intelligence Democratic surveillance
Principles of
Intelligence
General Ex: Scale of use of weapon, the nature of friendly
and enemy forces, civil population, etc.
Commander’s
Need
Tailored into the needs of each commander in a
specific operation area
Planning Requires careful and thorough planning,
anticipation of needs, and adopted to changing
conditions
Use Adequate for the purpose which it utilized
Timeliness Must reach the user on time to serve as basis for
appropriate action
Flexibility Not fixed on procedure, based on reason and
judgement
Principles of Intelligence
Security
•Constant security measures
to prevent leakage to
unauthorized personnel
01
Imagination,
Foresight and
Resourcefulness
•The use of intelligence as a
resources for future needs
02
Integral Part of
Military Operations
•Parts of operation for all
military units, combat and
service
03
Continuity
•Follows a simple
continuous cycle,
sustainable
04
Intelligence as a
Cycle
•Following phases to
produce an intelligence
products
05
Intelligence Cycle
 Sequence of steps that raw
information goes through before
it become an intelligence product
and can be disseminated by the
units that needed them
Step 1:
Collecting,
Planning,
and
Issuance of
Order
Purpose: BIN and other organisations
(producers) provide policymakers
(consumers) with information in
advance of decisions
Development plan for collection
effort, sent to the “collection agency”
Should be continuous effort, planned
before the receipt of order is given
Step 2: Collection of
Information
 Implementation of collection plan. Involves
the effort of the intelligence sections of the
unit to obtain adequate information
regarding the enemy Situation.
Recommended procedures are:
 Essential Elements of Information (EEI) –
What, Where, and When
 S-A-L-U-T-E – Size, Activity, Location, Unit,
Time, Equipment
Step 2: Collection of
Information
Types of Data Collection in Intelligence
 Technical Intelligence (TECHINT)
 Signals Intelligence (SIGNIT)
 Geospatial Intelligence (GEOINT)
 Imagery, Geospatial Analysis, and Geospatial
Information Services
 Measurement and Signal Intelligence (MASINT)
 Human Intelligence (HUMIN)
 Open-Source Intelligence
Step 2: Collection of Information – Intelligence Sources
Direct observation
Provided by
penetration or
resident agent
Troops involved in
Encounter/Operation
Acquired through
interrogation of
captured enemy
Provided by
government civilian
employee
Provided by
members of the
populace
Acquired from
documentary source
Step 3:
Processing
Information
Step in which all information is deliberately processed to
transform them to useful intelligence, following these processes:
 Recording – Arranging the gathered information into a
systematic pattern. Done through insertion of
information into intelligence workbook, journals, etc.
 Evaluation – Process to determines the accuracy and
pertinence of desired outcome (Is it reliable? How is the
veracity of it? Is the source dependable?)
 Interpretation – determination of the logical drawing and
probable meaning behind the intelligence. Sub process
of Analysis-Integration-Deduction
Step 4: Analysis
 Analysts collect, evaluate, and
produce an assessment within an
assigned field or substantive area
and then forecast future trends or
outcomes from incoming
information
Step 4:
Analysis
•Addresses current events, and seeks to alert consumers to new developments
Current intelligence
•Looks forward to potential developments that could affect national security
Estimative intelligence
•Implies urgency and the potential need for policy action in response
Warning intelligence
•In-depth studies that support both current and estimative intelligence
Research intelligence
•Information on technical developments and characteristics, performance, and
capabilities of foreign technologies, including weapons systems or subsystems
Scientific and technical intelligence
Step 5:
Dissemination
Intelligence is advising The intelligence
will ONLY be of value when it is promptly
and timely disseminated, and immediately
used by the consumer.
How is intelligence disseminated? Media,
report, books, dossier, etc.
Intelligence dissemination plan IS A MUST
to avoid intelligence politization >
Intelligence Dissemination Management
State Regime
and
Intelligence
Indonesia’s Intelligence
1945-1945
[Independence Revolution]
Militarization of intelligence
1950–1959
[Parliamentary Period] Politization of
Military Intelligence
1959–1965
[Guided Democracy] Political
Intelligence
1966–1997
[New Order] State Intelligence
1998-Present
[Reformation Period] Security
Intelligence
Transformation
of Indonesian
Intelligence
Agency 1965
Political Intelligence
• Badan Pusat Intelejen
1966–1971
Militarization of
Political Intelligence
• KIN and BAKIN
• Kopkamtib
1971–1997
State Intelligence
• Kopkamtib
• Opsus
• PusintelstratBAIS
• Barkorstanas
1998-Present
1998-Present
• BIN
• TNI dan Polri
Pop Quiz
 What are the current threats facing
Indonesia?
 How should they have ranked in terms of
importance?

More Related Content

Similar to Pt. 4 - Intelligence.pptx

Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 
Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive IntelligenceElijah Ezendu
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Martin Lawrence
 
Information security
Information security Information security
Information security razendar79
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]Luis Martín
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]Luis Martín
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramCarl C. Manion
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingDavid Sweigert
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Lecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptxLecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptxRavneet Singh Bhandari
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKATHEESKUMAR S
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsRob Arnold
 

Similar to Pt. 4 - Intelligence.pptx (20)

Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive Intelligence
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Information security
Information security Information security
Information security
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information Sharing
 
12 security policies
12 security policies12 security policies
12 security policies
 
Lecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptxLecture 1 Competitive Intelligence.pptx
Lecture 1 Competitive Intelligence.pptx
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
 
Unit 1 DSS
Unit 1 DSSUnit 1 DSS
Unit 1 DSS
 
Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & Metrics
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Pt. 4 - Intelligence.pptx

  • 1. Intelligence in Security Policy Aisha R. Kusumasomantri
  • 2. What do you Think when you hear about Intelligence?
  • 3. Opening Discussion  What is intelligence?  How does intelligence affect’s security policy?  Who controls intelligence?
  • 4. Important Concepts • A product of knowledge that is resulted from the recording, evaluation, analysis, integration, integration, and interpretation of information concerning an enemy, whether actual or potential to include weather and terrain in the area of operation • Includes the activity of collection, processing, dissemination, and the use of knowledge Intelligence • An act to deny information to the enemy, increases the security of the command and aids in achieving surprises. Consisted of passive and active measures. Counter-Intelligence
  • 5. Information vs Intelligence Intelligence is a subset of Information Information CAN be intelligence, but intelligence CANNOT be information Intelligence has a specific purpose and use: Provide confidential advice to policy makers
  • 6. Types of Intelligence • Intelligence product that provides insights understanding and contributing to decisions on broad strategies, policies and resources for long term organizational purposes (Ex: policy on SCS) Strategic intelligence • Supports national and regional leaders to planning activity and developing resources to achieve operational objectives (Ex: Operation pattern of Chinese naval in SCS) Operational Intelligence • Taking a case-specific action to achieve compliance or enforcement objective (Ex: A Specific vessel activity of Chinese Navy in SCS) Tactical Intelligence
  • 7. Decision Maker and Intelligence What decision-makers require is intelligence rather than raw information Decision-makers are expected to make the best decisions possible using the best information and processed intelligence available
  • 8. Political Intelligence Involvement Political intelligence information What is the role of Intelligence in the government? Characteristics of National Intelligence Intelligence culture Interest and intelligence cooperation Intelligence Operation Legitimation State control over intelligence Civilian control over intelligence Democratic surveillance
  • 9. Principles of Intelligence General Ex: Scale of use of weapon, the nature of friendly and enemy forces, civil population, etc. Commander’s Need Tailored into the needs of each commander in a specific operation area Planning Requires careful and thorough planning, anticipation of needs, and adopted to changing conditions Use Adequate for the purpose which it utilized Timeliness Must reach the user on time to serve as basis for appropriate action Flexibility Not fixed on procedure, based on reason and judgement
  • 10. Principles of Intelligence Security •Constant security measures to prevent leakage to unauthorized personnel 01 Imagination, Foresight and Resourcefulness •The use of intelligence as a resources for future needs 02 Integral Part of Military Operations •Parts of operation for all military units, combat and service 03 Continuity •Follows a simple continuous cycle, sustainable 04 Intelligence as a Cycle •Following phases to produce an intelligence products 05
  • 11. Intelligence Cycle  Sequence of steps that raw information goes through before it become an intelligence product and can be disseminated by the units that needed them
  • 12. Step 1: Collecting, Planning, and Issuance of Order Purpose: BIN and other organisations (producers) provide policymakers (consumers) with information in advance of decisions Development plan for collection effort, sent to the “collection agency” Should be continuous effort, planned before the receipt of order is given
  • 13. Step 2: Collection of Information  Implementation of collection plan. Involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy Situation. Recommended procedures are:  Essential Elements of Information (EEI) – What, Where, and When  S-A-L-U-T-E – Size, Activity, Location, Unit, Time, Equipment
  • 14. Step 2: Collection of Information Types of Data Collection in Intelligence  Technical Intelligence (TECHINT)  Signals Intelligence (SIGNIT)  Geospatial Intelligence (GEOINT)  Imagery, Geospatial Analysis, and Geospatial Information Services  Measurement and Signal Intelligence (MASINT)  Human Intelligence (HUMIN)  Open-Source Intelligence
  • 15. Step 2: Collection of Information – Intelligence Sources Direct observation Provided by penetration or resident agent Troops involved in Encounter/Operation Acquired through interrogation of captured enemy Provided by government civilian employee Provided by members of the populace Acquired from documentary source
  • 16. Step 3: Processing Information Step in which all information is deliberately processed to transform them to useful intelligence, following these processes:  Recording – Arranging the gathered information into a systematic pattern. Done through insertion of information into intelligence workbook, journals, etc.  Evaluation – Process to determines the accuracy and pertinence of desired outcome (Is it reliable? How is the veracity of it? Is the source dependable?)  Interpretation – determination of the logical drawing and probable meaning behind the intelligence. Sub process of Analysis-Integration-Deduction
  • 17. Step 4: Analysis  Analysts collect, evaluate, and produce an assessment within an assigned field or substantive area and then forecast future trends or outcomes from incoming information
  • 18. Step 4: Analysis •Addresses current events, and seeks to alert consumers to new developments Current intelligence •Looks forward to potential developments that could affect national security Estimative intelligence •Implies urgency and the potential need for policy action in response Warning intelligence •In-depth studies that support both current and estimative intelligence Research intelligence •Information on technical developments and characteristics, performance, and capabilities of foreign technologies, including weapons systems or subsystems Scientific and technical intelligence
  • 19. Step 5: Dissemination Intelligence is advising The intelligence will ONLY be of value when it is promptly and timely disseminated, and immediately used by the consumer. How is intelligence disseminated? Media, report, books, dossier, etc. Intelligence dissemination plan IS A MUST to avoid intelligence politization > Intelligence Dissemination Management
  • 21. Indonesia’s Intelligence 1945-1945 [Independence Revolution] Militarization of intelligence 1950–1959 [Parliamentary Period] Politization of Military Intelligence 1959–1965 [Guided Democracy] Political Intelligence 1966–1997 [New Order] State Intelligence 1998-Present [Reformation Period] Security Intelligence
  • 22. Transformation of Indonesian Intelligence Agency 1965 Political Intelligence • Badan Pusat Intelejen 1966–1971 Militarization of Political Intelligence • KIN and BAKIN • Kopkamtib 1971–1997 State Intelligence • Kopkamtib • Opsus • PusintelstratBAIS • Barkorstanas 1998-Present 1998-Present • BIN • TNI dan Polri
  • 23. Pop Quiz  What are the current threats facing Indonesia?  How should they have ranked in terms of importance?