SlideShare a Scribd company logo
BASIC INTELLIGENCE
I. INTRODUCTION
A. Definition of Terms Intelligence – an end product (knowledge) resulting from the recording, evaluation, analysis, integration and interpretation of information concerning an enemy whether actual or potential to include weather and terrain in the area of operation. 				- the activity involved in the production of that end product which includes collection, processing, dissemination and use of the knowledge.
Counter-Intelligence – denies information to the enemy, increases the security of the command and aids in achieving surprises. It consists passive and active measures. Intelligence Cycle– Intelligence work is a continuous process. It is a repetition of what has transpired or become known. There is neither a beginning nor an end. There is no first nor last phase, hence a cycle.
II. PRINCIPLES OF INTELLIGENCE
General - intelligence operations are influenced by such element  of the operational units as the commander’s mission limitation imposed by national policy or higher commands, scale of use of weapons, the locality, the nature of friendly and enemy forces and the civil population in the area. Commander’s Need - Different Commanding Officer need information on different geographical areas. Some of their needs, however, are from overlapping areas. Plans, orders and request are concerned with definite area, particularly the area of influence of the command.
Planning 	- Intelligence requires careful and thorough planning. It includes the anticipation of intelligence needs the organization to fulfill the needs and supervision of the organization. It is continuous and must be adopted to changing conditions. Use 	- Intelligence must be adequate for the purpose for which it utilized. Timeliness 	- Intelligence must reach the user on time to serve as a basis for appropriate action.
Flexibility 	- Intelligence activities are based on reason and judgment and not on fixed procedures. Security 	- Constant security measures must be undertaken to deny unauthorized personnel information about operations, sources of information and the intelligence product. Imagination, Foresight and Resourcefulness 	- for intelligence personnel and agencies should use resourcefulness for future intelligence needs so that all available information can be developed and exploited to produce intelligence for the user.
An Integral Part of Military Operations 	- Intelligence activities are integral parts of the operations of all units, both combat and service. Continuity 	- The basic principle of intelligence operations is that intelligence activities follows a simple continuous cycle. Intelligence as a cycle 	- All intelligence activities generally follow a three phase cycle oriented to the commander’s mission. This cycle is continuous and all steps are carried out at the same time.
Intelligence Cycle is the sequence of steps that raw information has to go through before it is processed into useful intelligence ready to be disseminated and used by the units needing them. III. INTELLIGENCE 			CYCLE
1. Collection Planning and Issuance of Orders - This step involves the development of a plan for the collection effort, which is in accordance with the mission of the unit and the present enemy situation. The collection of needed information are then sent to the selected “collection agencies” which are friendly units and organization who are in a position to gather them. The intelligence collection planning must be a continuous effort and must begin even before the receipt of orders from higher headquarters.
2.Collection of information  - This step is the implementation of the collection plan and involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy and the actual situation in the area of operation. Here are the recommended procedures to be followed in reporting information collected about the enemy:
Essential Elements of Information (EEI). 	It is the responsibility of the individual soldier in the field to report quickly, completely and accurately all information, which he has gathered about the enemy. The following essential elements of the information should be included in the report: WHAT, WHERE AND WHEN. Answers to these questions will be aid the intelligence personnel in processing your information.
Example: 	What - fifteen(15) rebels in black uniform,  			traveling NE on logging road 				towards the town of Pantao,Ragat, 	Where – Temporary halted at hill 124  			GC 213524 	When- 181030H Apr 2003
B. Format 	- a more comprehensive way on how to report information about enemy is to follow the  S-A-L-U-T-E format: 	S-Size…………..Enemy Company of about 80 infantry 	A-Activity……..digging mortar emplacement  and 		       	 laying land mines 	L-Location……..On a ridge at GC 81238180 	U-Unit…………..3rd Coy, National Guard Battalion 	T- Time…………191600H Jul 2002  	E- Equipment…4 tubes 81 mm mortar 2 units .50 			Cal MG, 50 Units M16 Rifles and 			assorted anti tank weapon
3.Processing of information - It is the step of the intelligence cycle wherein all gathered information is deliberately processed to transform them into useful intelligence . The processing of information involves the following:
Recording - The process of arranging the gathered information into systematic patterns to facilitate its evaluation and interpretation. Recording is done through the entry of the information into the intelligence journals, workbooks, information or reference files and the order of the battle.
B.	Evaluation - This process involves the careful examination of the gathered information to determine its accuracy and pertinence to the desired product of the intelligence effort. Information is considered pertinent if it concerns the enemy, it relates to the characteristics of the area of operation, and it is needed immediately, or has possible present or future value.
Reliability of Information A – Completely Reliable B – Usually Reliable C – Fairly Reliable D – Not usually, Reliable E – Unreliable F – Reliability Cannot be Judge Veracity of Report 1 – Confirmed by Other Sources 2 – Probably True 3 – Possibly 4 – Doubtful 5 – Improbable 6 - Truth
Dependability of Source T – Direct Observation U – Provided by Penetration/Resident Agent V – AFP Troops Involved in Encounter/Operation W – Acquired Through Interrogation of Captured enemy X – Provided by Government Civilian Employee Y – Provided by Members of the Populace Z – Acquired from Documentary Source
C.	Interpretation -This process involves the determination of the evaluated information and the deliberate and logical drawing of its probable meaning. The interpretation process basically consists of the sub-processes of Analysis, Integration and Deduction.
D.	Dissemination and Use -The resulting intelligence will only be of value when it is promptly disseminated to and immediately received and put to use by the receiving units. It is therefore very necessary to have an efficient intelligence dissemination plan in order that all processed intelligence are provided to units who may have use for them at the soonest possible time. Proper dissemination will also provide knowledge on how newly gathered information in other intelligence units may be processed.
INTELLIGENCE CYCLE Collection, Planning and Issuance of Orders M I S S I O N  Essential Elements of Information ( EEIs) Format Recording Evaluation Interpretation Dissemination and Use Collection of Information Processing of Information
E-N-D

More Related Content

What's hot

POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
Roland994165
 
PNP MASTER PLANS
PNP MASTER PLANSPNP MASTER PLANS
PNP MASTER PLANS
calabangamps3
 
Module 1 police operational planning
Module 1   police operational planningModule 1   police operational planning
Module 1 police operational planning
FernanCapistrano1
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
Mcypp Ncmf
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
Jose Van Tan
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
William Harmening
 
CRIMINOLOGY REVIEWER LEA POLICE ORGANIZATION
CRIMINOLOGY REVIEWER LEA POLICE ORGANIZATIONCRIMINOLOGY REVIEWER LEA POLICE ORGANIZATION
CRIMINOLOGY REVIEWER LEA POLICE ORGANIZATION
Niño Kabiling
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
Doing What I Do
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
kelsports
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
Nora A. Rahim
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
Maria Carline Cabizares
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)
Dominic Guiao
 
PNP MC 2022-076.pptx
PNP MC 2022-076.pptxPNP MC 2022-076.pptx
PNP MC 2022-076.pptx
AmmanCabang
 
POLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.pptPOLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.ppt
Alleli Faith Leyritana
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
AishaAL9
 
Drug education and vice control
Drug education and vice controlDrug education and vice control
Drug education and vice control
christian mark rey
 
Arrest
ArrestArrest
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
PatrickMarzAvelin
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Fundamentals Of Pistol Marksmanship
Fundamentals Of Pistol MarksmanshipFundamentals Of Pistol Marksmanship
Fundamentals Of Pistol Marksmanship
bubut97
 

What's hot (20)

POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
PNP MASTER PLANS
PNP MASTER PLANSPNP MASTER PLANS
PNP MASTER PLANS
 
Module 1 police operational planning
Module 1   police operational planningModule 1   police operational planning
Module 1 police operational planning
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
CRIMINOLOGY REVIEWER LEA POLICE ORGANIZATION
CRIMINOLOGY REVIEWER LEA POLICE ORGANIZATIONCRIMINOLOGY REVIEWER LEA POLICE ORGANIZATION
CRIMINOLOGY REVIEWER LEA POLICE ORGANIZATION
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)
 
PNP MC 2022-076.pptx
PNP MC 2022-076.pptxPNP MC 2022-076.pptx
PNP MC 2022-076.pptx
 
POLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.pptPOLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.ppt
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Drug education and vice control
Drug education and vice controlDrug education and vice control
Drug education and vice control
 
Arrest
ArrestArrest
Arrest
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
Fundamentals Of Pistol Marksmanship
Fundamentals Of Pistol MarksmanshipFundamentals Of Pistol Marksmanship
Fundamentals Of Pistol Marksmanship
 

Similar to Basic intelligence

407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT
Brandon D'Andrea
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
voversbyobersby
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptx
aisharasyidila
 
Andrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSAndrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBS
Chris Andrews
 
Incidence Response System
Incidence Response SystemIncidence Response System
Incidence Response System
SikanderZulkarnain1
 
Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.
Louison Malu-Malu
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information Sharing
David Sweigert
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
hfrancob
 
Eric M. Belt Resume
Eric M. Belt ResumeEric M. Belt Resume
Eric M. Belt Resume
Eric Belt
 
Resume 10-7-16
Resume 10-7-16Resume 10-7-16
Resume 10-7-16
Roger Fronek
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
nettletondevon
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsec
IT2Alcorn
 
Thomas Kelly On-line Resume
Thomas Kelly On-line ResumeThomas Kelly On-line Resume
Thomas Kelly On-line Resume
Tom Kelly
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
E Hacking
 
Ch 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptCh 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses ppt
ChadMayberry
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
Unimasteressays
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
- Mark - Fullbright
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
doylymaura
 
final res_07aug rework
final res_07aug reworkfinal res_07aug rework
final res_07aug rework
Zachary Sunder
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume Targeting
Nicole Mitchell
 

Similar to Basic intelligence (20)

407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT407th ACTIVE SHOOTER CONOP2.PPT
407th ACTIVE SHOOTER CONOP2.PPT
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptx
 
Andrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBSAndrews-Christopher-Resume-USAJOBS
Andrews-Christopher-Resume-USAJOBS
 
Incidence Response System
Incidence Response SystemIncidence Response System
Incidence Response System
 
Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.Yearly Achievement, Plan SS Securitym before and after.
Yearly Achievement, Plan SS Securitym before and after.
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information Sharing
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Eric M. Belt Resume
Eric M. Belt ResumeEric M. Belt Resume
Eric M. Belt Resume
 
Resume 10-7-16
Resume 10-7-16Resume 10-7-16
Resume 10-7-16
 
Analysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docxAnalysis and ProductionInformation collected in the previous ste.docx
Analysis and ProductionInformation collected in the previous ste.docx
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsec
 
Thomas Kelly On-line Resume
Thomas Kelly On-line ResumeThomas Kelly On-line Resume
Thomas Kelly On-line Resume
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
Ch 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses pptCh 09 investigating fatalities, injuries, near misses ppt
Ch 09 investigating fatalities, injuries, near misses ppt
 
Applied intelligence analysis
Applied intelligence analysisApplied intelligence analysis
Applied intelligence analysis
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
 
final res_07aug rework
final res_07aug reworkfinal res_07aug rework
final res_07aug rework
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume Targeting
 

More from Joann Villareal

China
China China
Basic survival
Basic survivalBasic survival
Basic survival
Joann Villareal
 
General first aid
General first aidGeneral first aid
General first aid
Joann Villareal
 
Threats to national security
Threats to national securityThreats to national security
Threats to national security
Joann Villareal
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and discipline
Joann Villareal
 
Basic signal and communication
Basic signal and communicationBasic signal and communication
Basic signal and communication
Joann Villareal
 
Basic map reading
Basic map readingBasic map reading
Basic map reading
Joann Villareal
 
Basic first aid with cpr
Basic first aid with cprBasic first aid with cpr
Basic first aid with cpr
Joann Villareal
 
Military correspondence
Military correspondenceMilitary correspondence
Military correspondence
Joann Villareal
 
Slideshare upload
Slideshare uploadSlideshare upload
Slideshare upload
Joann Villareal
 

More from Joann Villareal (10)

China
China China
China
 
Basic survival
Basic survivalBasic survival
Basic survival
 
General first aid
General first aidGeneral first aid
General first aid
 
Threats to national security
Threats to national securityThreats to national security
Threats to national security
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and discipline
 
Basic signal and communication
Basic signal and communicationBasic signal and communication
Basic signal and communication
 
Basic map reading
Basic map readingBasic map reading
Basic map reading
 
Basic first aid with cpr
Basic first aid with cprBasic first aid with cpr
Basic first aid with cpr
 
Military correspondence
Military correspondenceMilitary correspondence
Military correspondence
 
Slideshare upload
Slideshare uploadSlideshare upload
Slideshare upload
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Basic intelligence

  • 3. A. Definition of Terms Intelligence – an end product (knowledge) resulting from the recording, evaluation, analysis, integration and interpretation of information concerning an enemy whether actual or potential to include weather and terrain in the area of operation. - the activity involved in the production of that end product which includes collection, processing, dissemination and use of the knowledge.
  • 4. Counter-Intelligence – denies information to the enemy, increases the security of the command and aids in achieving surprises. It consists passive and active measures. Intelligence Cycle– Intelligence work is a continuous process. It is a repetition of what has transpired or become known. There is neither a beginning nor an end. There is no first nor last phase, hence a cycle.
  • 5. II. PRINCIPLES OF INTELLIGENCE
  • 6. General - intelligence operations are influenced by such element of the operational units as the commander’s mission limitation imposed by national policy or higher commands, scale of use of weapons, the locality, the nature of friendly and enemy forces and the civil population in the area. Commander’s Need - Different Commanding Officer need information on different geographical areas. Some of their needs, however, are from overlapping areas. Plans, orders and request are concerned with definite area, particularly the area of influence of the command.
  • 7. Planning - Intelligence requires careful and thorough planning. It includes the anticipation of intelligence needs the organization to fulfill the needs and supervision of the organization. It is continuous and must be adopted to changing conditions. Use - Intelligence must be adequate for the purpose for which it utilized. Timeliness - Intelligence must reach the user on time to serve as a basis for appropriate action.
  • 8. Flexibility - Intelligence activities are based on reason and judgment and not on fixed procedures. Security - Constant security measures must be undertaken to deny unauthorized personnel information about operations, sources of information and the intelligence product. Imagination, Foresight and Resourcefulness - for intelligence personnel and agencies should use resourcefulness for future intelligence needs so that all available information can be developed and exploited to produce intelligence for the user.
  • 9. An Integral Part of Military Operations - Intelligence activities are integral parts of the operations of all units, both combat and service. Continuity - The basic principle of intelligence operations is that intelligence activities follows a simple continuous cycle. Intelligence as a cycle - All intelligence activities generally follow a three phase cycle oriented to the commander’s mission. This cycle is continuous and all steps are carried out at the same time.
  • 10. Intelligence Cycle is the sequence of steps that raw information has to go through before it is processed into useful intelligence ready to be disseminated and used by the units needing them. III. INTELLIGENCE CYCLE
  • 11. 1. Collection Planning and Issuance of Orders - This step involves the development of a plan for the collection effort, which is in accordance with the mission of the unit and the present enemy situation. The collection of needed information are then sent to the selected “collection agencies” which are friendly units and organization who are in a position to gather them. The intelligence collection planning must be a continuous effort and must begin even before the receipt of orders from higher headquarters.
  • 12. 2.Collection of information - This step is the implementation of the collection plan and involves the effort of the intelligence sections of the unit to obtain adequate information regarding the enemy and the actual situation in the area of operation. Here are the recommended procedures to be followed in reporting information collected about the enemy:
  • 13. Essential Elements of Information (EEI). It is the responsibility of the individual soldier in the field to report quickly, completely and accurately all information, which he has gathered about the enemy. The following essential elements of the information should be included in the report: WHAT, WHERE AND WHEN. Answers to these questions will be aid the intelligence personnel in processing your information.
  • 14. Example: What - fifteen(15) rebels in black uniform, traveling NE on logging road towards the town of Pantao,Ragat, Where – Temporary halted at hill 124 GC 213524 When- 181030H Apr 2003
  • 15. B. Format - a more comprehensive way on how to report information about enemy is to follow the S-A-L-U-T-E format: S-Size…………..Enemy Company of about 80 infantry A-Activity……..digging mortar emplacement and laying land mines L-Location……..On a ridge at GC 81238180 U-Unit…………..3rd Coy, National Guard Battalion T- Time…………191600H Jul 2002 E- Equipment…4 tubes 81 mm mortar 2 units .50 Cal MG, 50 Units M16 Rifles and assorted anti tank weapon
  • 16. 3.Processing of information - It is the step of the intelligence cycle wherein all gathered information is deliberately processed to transform them into useful intelligence . The processing of information involves the following:
  • 17. Recording - The process of arranging the gathered information into systematic patterns to facilitate its evaluation and interpretation. Recording is done through the entry of the information into the intelligence journals, workbooks, information or reference files and the order of the battle.
  • 18. B. Evaluation - This process involves the careful examination of the gathered information to determine its accuracy and pertinence to the desired product of the intelligence effort. Information is considered pertinent if it concerns the enemy, it relates to the characteristics of the area of operation, and it is needed immediately, or has possible present or future value.
  • 19. Reliability of Information A – Completely Reliable B – Usually Reliable C – Fairly Reliable D – Not usually, Reliable E – Unreliable F – Reliability Cannot be Judge Veracity of Report 1 – Confirmed by Other Sources 2 – Probably True 3 – Possibly 4 – Doubtful 5 – Improbable 6 - Truth
  • 20. Dependability of Source T – Direct Observation U – Provided by Penetration/Resident Agent V – AFP Troops Involved in Encounter/Operation W – Acquired Through Interrogation of Captured enemy X – Provided by Government Civilian Employee Y – Provided by Members of the Populace Z – Acquired from Documentary Source
  • 21. C. Interpretation -This process involves the determination of the evaluated information and the deliberate and logical drawing of its probable meaning. The interpretation process basically consists of the sub-processes of Analysis, Integration and Deduction.
  • 22. D. Dissemination and Use -The resulting intelligence will only be of value when it is promptly disseminated to and immediately received and put to use by the receiving units. It is therefore very necessary to have an efficient intelligence dissemination plan in order that all processed intelligence are provided to units who may have use for them at the soonest possible time. Proper dissemination will also provide knowledge on how newly gathered information in other intelligence units may be processed.
  • 23. INTELLIGENCE CYCLE Collection, Planning and Issuance of Orders M I S S I O N Essential Elements of Information ( EEIs) Format Recording Evaluation Interpretation Dissemination and Use Collection of Information Processing of Information
  • 24. E-N-D