Cdi101 Intel

Download as pdf or txt
Download as pdf or txt
You are on page 1of 110

THE INTELLIGENCE

OPERATION
2
Biblical Personalities

MOSES RAHAB DELILAH


1st person who used The harlot of Jerico, Uses her beauty to allure
& formalized who sheltered & her enemy, gaining the
intelligence concealed the agent if confidence & to gather
Israel. information.
3
SUN TZU
A CHINESE PHILOSHER
FATHER OF INTELLIGENCE
AUTHOR OF “THE ART OF WAR”
ALEXANDER GEN. ROMANO Q. AKBAR
THE GREAT SERTORIOUS Employed more
devised letter than 4000 agents to
Used secret & guidance
sorting know the truth if his
from Fawn.
throne might rest
upon it.
5
GENGHIS KAN SIR FRANCIS LOUIS XIV
leader of Mongol WALSINGHAM Employed the
conqueror who used surveillance, postal
prsioners as a Organized the 1st Nat’l
censorship, &
source of intel. Ser. & protected
military intelligence
information. Queen Elizabeth from
organization.
countless assassin.
6
NAPOLEON KARL JOSEPH
BONAPARTE SCHULMEISTER FOUCHE
PRINCIPLE: 1 spy in the “Napoleon’s eye” Napoleon’s head
right place is worth He is the Napoleon’s internal security.
20,000 men in the field. military secret agent, Founded the modern
Maintained Military intel. successfully infiltrated the system of spying on
& secret political police Australian General Staff spies (COUNTER
service. through espionage. ESPIONAGE)
7
FREDERICK THE GREAT
FATHER OF ORGANIZED MILITARY ESPIONAGE

1) COMMON SPIES- recruited person to earn


money.
2) D O U B L E S P I E S - t h e l a w i n f o r m e r s &
unreliable renegades of value, means
spreading false information to enemy.
3) SPIES OF CONSEQUENCES- person with
high status in the community (indulge in
bribery).
4) P E R S O N W H O A R E F O R C E D T O T A K E
ESPIONAGE AGAINST HIS WILL. 8
ALFRED Ø One of the most brilliant
intelligent agent.
REDL Ø Chief of the Australian
Hungarian secret service and
later was discovered as a
Russian agent.
Ø Charged with treason and force
to commit suicide.
Ø Responsible over the death of
over 500,000 agents and
soldiers within 13 years of his
espionage episode.
9
HANNIBAL BARCA JULIUS CESAR BRAHMA
“Famous in Punic War” Employed 10 speculators
KAUTILYA
a general of Carthagian who were first intelligence
empire who usually personnel to be appeared Principle: The ruler
roam around the city definitely in a military should strike at his
often disguise as a organization. Made use of enemy’s weak points
beggar together first carrier pigeons that by means of spies.
hand information. renders speed reporting.
10
An investigative arm of the US
Department of Justice. Headed 1st by
JOHN EDGAR HOOVER as the FBI
Director.

11
Principal foreign intelligence and
counterintelligence agency of the U.S.
government. Formally created in 1947, the
Central Intelligence Agency (CIA) grew out
of the World War II Office of Strategic
Services (OSS).
12
The Russian Intelligence Agency
Served a multi-faceted role outside of and
within the Soviet Union, working as both
an intelligence agency and a force of
“secret police”.

13
Israeli Intelligence Agency
2 BRANCHES OF MOSSAD:
1. A M A N - m i l i t a r y i n t e l l i g e n c e f o r
defense force.
2. SHABAK- the general security service
for internal security, from the word
“SHIN BET”- defender who shall not
be seen. 14
KOREAN CENTRAL INTELLIGENCE
AGENCY
The original duties of the KCIA were to supervise and
coordinate both international and domestic intelligence
activities and criminal investigation by all government
intelligence agencies, including that of the military. The
agency's broad powers allowed it to actively intervene in
politics. Agents undergo years of training and checks
before they are officially inducted and receive their first
assignments.
15
GREAT BRITAIN INTELLIGENCE
AGENCY
MI5 MI6 (SIS)
Ø Domestic intelligence Ø Foreign intelligence
Ø Deals with inside Ø Combats overseas
threats of UK. threats
Ø Investigates matters of Ø Gather intelligence
national security in the pertinent to the UK’s
UK. international affairs.
Ø US NSA- national Ø CIA
security agency. Ø Our Spies
Ø Their Spies Ø Has its own counter
intelligence
16
PRINCIPLES
OF INTELLIGENCE
PRINCIPLE- a fundamental guides to
action, broad statement of truth
from which others are derived.

17
PRINCIPLE OF
OBJECTIVITY
Basic intelligence concept
that there be unity between
knowledge and action.

18
PRINCIPLE OF
INTERDEPENDENCE
Intelligence is subdivided into
components to ensure complete
coverage, eliminate duplication & to
reduce the over-all task or
manageable size.
19
PRINCIPLE OF CONTINUITY
It is necessary that coverage be
continuous so that the shape of what
happen today could be studied in the
light of what happen before, which in
turn would enable us to predict the
shape of things to come.
20
PRINCIPLE OF
COMMUNICATION
Intelligence adequate to their needs
must be communicated to all the
decision makers in manner that they
will understand and form that will
permit its most effective use.
21
PRINCIPLE OF USEFULNESS
Ø Intelligence is useless if it remains in the
minds, or in the files of its collectors or its
producers.
Ø The story must be told and it must be
told well- must be convincing, and not
just plausible or factual but has
significance to the case involved.
22
PRINCIPLE OF SELECTION
In intelligence should be
essential and pertinent to the
purpose at hand.

23
PRINCIPLE OF TIMELINESS
Ø Intelligence must be communicated to
the decision maker at the appropriate
time to permit its most effective use.
Ø This the most important and obvious,
for intelligence that is too soon or too
late are equally useless.
Ø Timeliness is one principle that
complements all others.
24
PRINCIPLE OF SECURITY
Security is achieved by the
measures which intelligence
takes to protect and preserve
the integrity of its activities.
25
BASIC CONCEPT
OF INTELLIGENCE
OPERATION
26
27
IMPORTANCE OF INTELLIGENCE
1. It is vital to enable a nation to its policies, strategic
plans and conduct its diplomacy.
2. Intelligence is needed in order to enable a nation to
the activities of its internal and external enemies.
3. It is necessary to the activities of criminal
and subversive element.
4. It is vital in for the people and the
state.
5. Intelligence plays an
by providing advance and exact knowledge of the
intentions and design of its enemies.
28
MAJOR CATEGORY
OF INTELLIGENCE
MILITARY INTELLIGENCE
The use of processed information in formulating
military plans, programs and policies.

POLICE INTELLIGENCE
The end product resulting from collection, evaluation,
analysis, integration and interpretation of all
available facts which concerns the activities of
criminal elements and its activities significant to
police planning and operation.
29
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 30
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 31
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 32
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 33
FUNCTIONAL CLASSIFICATION OF POLICE
INTELLIGENCE

The production of
intelligence The knowledge
essential to the essential to
prevention of ensure the
crimes, protection of lives
investigation and and properties.
arrest and
prosecution of
criminal offenders.
34
STRATEGIC INTELLIGENCE
Intelligence information which primarily long range
in nature with practical immediate operation value.

LINE INTELLIGENCE
Immediate in nature and necessary for more
effective police planning and operation.

COUNTER INTELLIGENCE
Phase of intel covering the activity devoted in
destroying the effectiveness of hostile foreign
activities and to the protection of info against espionage,
subversion and sabotage.
35
NATIONAL INTELLIGENCE
Ø The integrated product of intelligence developed by
all governmental branches, departments concerning
the broad aspect of national security and policy.
Ø Used to coordinate all the activities of the
government in developing and executing integrated
and national policies and plans.

UNDERCOVER WORK
An investigative process in which disguise and
pretext cover and deception are used to gain the
confidence of criminal s u s p e c t s f o r t h e p u r p o s e o f
determining the nature and extent of any criminal
activities that maybe contemplating or perpetuating. 36
STRATEGIC LINE COUNTER
INTELLIGENCE INTELLIGENCE INTELLIGENCE
Ø An intelligence data that Ø A kind of intelligence Ø This kind of intelligence
are not of an immediate required by the covers the activity
value. commander to provide devoted in destroying
Ø It is usually descriptive for planning and conduct the effectiveness of
in nature, accumulation t a c t i c a l a n d hostile foreign activities
of physical description of administrative operation and to the protection of
person a l i t i e s , m o d u s in counter insurgency. information against
operandi. Ø Intelligence information espionage, subversion
Ø It does not have must conclude the and sabotage.
immediate operational PWET.
value but rather long
range that may become
relevant to future police
operation.
37
Intelligence information to be determined
in line intelligence are:

38
39
2 KINDS OF INTELLIGENCE SERVICE
FOREIGN INTELLIGENCE INTERNAL SECURITY
SERVICE INTELLIGENCE
Ø Gather information about Ø Seek to neutralize hostile
foreign countries and its intelligence services
institution , analyzes such operating within the
information or both. country and focus also on
Ø It can be in covert the detection of
operation. terrorist/criminal group.
Ø May acquires through
open source.

40
41
MAJOR INTELLIGENCE SERVICES IN THE PHILIPPINES

NBI
INTELLIGENCE
NICA Responsible for SERVICE OF AFP
Primary intelligence gathering handling and
and analysis arm of the solving major
philippine government, in high profile
charge of carrying out overt, cases that are
covert, and clandestine in the interest of
intelligence program. the nation.
42
AGENT RECRUITMENT AND
MANAGEMENT
Agent come from a 3 major sources:
1. The university world, where students are sought &
trained for intelligence careers;
2. The armed & police forces, where a degree of
intelligence know-how may already have been
attained; and
3. The underground world of espionage, which
produces an assortment of person, including
criminal informers, with applicable experience. 43
Some spies must be cautiously recruited and
persuaded into cooperation; others volunteer
and are termed “ walk-ins”.

“ Counterintelligence staffs
are spies who
simulates to be
are always doubtful of defecting, but in
walk- ins or defectors and
restrict their use for reality maintain
positive espionage their original loyalty.
purposes.
44
The most valuable spy of all is
the “agent –in-place”- MOLE.

45
INTELLIGENCE PERSONNEL
Agent Intelligence Team
An undercover Composed of specialized agents,
operative that translator teams and phot interpreter
detect, observe, team ussually engaged in the following
infiltrate and activities:
gather 1. Interrogation of criminals and
information inerview civilians;
regarding a
2. Translation of documents; and
particular target.
3. Interpretation of footage and
photographs.
46
PHASES OF RECRUITMENT
INVESTIGATION
Process of determining
the degree of qualification,
APPOINTMENT
personal background of
prospective agent. Issuance of order as
vPartial BI an operative agent in
vComplete BI a certain unit.
Step Step

SELECTION Step TESTING Step


A series of actual and
Process of choosing from theoretical assignment
available personnel the to determine the
most qualified operative intellectual capacity of
fitted for police the prospect.
intelligence work.
ESSENTIAL QUALITIES OF
AN INTELLIGENCE AGENT
1) Unquestioned loyalty to the state and
allegiance to the constitution.
2) I n t e g r i t y a n d h o n e s t y i n d i c a t i n g
uprightness of character.
3) Good moral character
4) Respect to authority and superiors
5) Common sense and wise use of judgement
6) Self discipline
7) Good people skills
8) Self confidence and inherent fortitude.
48
OPERATIONAL CYCLE
A chronological development of
intelligence activities from basic
requirements to final product and its
report/result.

49
PRINCIPLES OF
INTELLIGENCE ACTIVITIES:
1. Intelligence activities must be done by dedicated
personnel.
2. When the task cannot be obtain by other means.
3. Risk must be justifies by expected results.
4. Collection effort cannot be undertaken without
operational information.

50
Subject of the TARGET/
operation MISSION
The gadgets or
equipment used
to accomplish
its mission.

Man of
SUPPORT
AGENT/S FACILITIES &
operation
FUNCTION
51
ORDER OF
THE BATTLE
INTELLIGENCE

52
ORDER OF THE BATTLE INTELLIGENCE
COMPOSITE:
1) COMPOSITION- identification or organization of units.
2) DISPOSITION- location of the enemy units.
3) DEPLOYMENT- predetermine deployment of enemy unit.
4) MOVEMENT- determination of enemy’s movement or tactics.
5) STRENGTH- concerned w/ the total no. of personnel, type units &
supporting weapons in a given enemy force.
6) TACTICS- conduct operation by the enemy.
7) TRAINING- enhancement of capabilities of the personnel.
8) LOGISTICS- combat efficiency and the ultimate determination of
capabilities of both agents and enemy’s unit.
9) COMBAT EFFICIENCY- the effectiveness and fighting quality of the
enemy unit.
10) MISCELLANEOUS DATA- knowing more with regards to the enemy for
effective combat operation. 53
INTELLIGENCE CYCLE
INFORMATION 1 PLANNING AND DIRECTION

2 INFORMATION COLLECTION

3 PROCESSING OF INFORMATION

4
INTELLIGENCE INTELLIGENCE DESSEMINATION
I The blood line or main source of intelligence
R N would include any of the following: maps,
A F materials, documents, reports of possible or
actual enemy operations.
W O
R The knowledge or facts which the investigator
M had gathered or acquired from persons or
D A documents, which are pertinent or that has
relevant concerning the subject.
A T
T I It is a communicated knowledge obtained by
O study, observation, research and analysis.
A
N
SOURCES OF
INFORMATION
1. RECORDS;
2. PERSON (INFORMANTS): Controlled group of people
under the direction of agent
a) INFORMANT NET handler.

b) INFORMANT No consideration

c) INFORMER For price or reward

56
Report the organized or
I underworld crime.

TN Same with the latter but it reports

YF 1. CRIMINAL INFORMANT crimes and criminals.

2. CONFIDENTIAL INFORMANT Free and willfully as a witness to


PO 3. VOLUNATRY INFORMANT a certain act (BEST WITNESS).
ER 4. SPECIAL INFORMANT Gives info. on a specialized case
S 5. ANONYMOUS INFORMANT
(professional).
M
6. INCIDENTAL INFORMANT Through telephone or cellphone.

OA 7. RECRUITED INFORMANT Imparts info. without intention of


FN providing it.

T A person selected/ cultivated into


a continuous source of info.
57
STEPS OF
INFORMANT Identify and recruit an informant who has
ac c es s t o m any cr i m i n a l i n - g r o u p s /
PROCESSING subversive organizations.

1. Selection Of the potential informants “PROBABLE”


must be thorough as possible.
2. Investigation
Must be done on an area which is
3. Approach completely free from any probability pf
compromise.
4. Testing
Begin with limited assignment with
gradual integration.

58
59
1. PLANNING
AND DIRECTION
60
1. PLANNING AND DIRECTION
“course of action to be taken”

The determination of intelligence


requirements (IRs).
PIR
EEI Priority Intelligence
Essential Elements Requirements
Information
An item of intelligence or information of the characteristics of the
area of operations & the enemy, which the commander feels
needed before he can reasonable arrive at a decision.
The basis for intelligence operation and approved by the police
executive. 61
2.INFORMATION
COLLECTION
62
2. INFORMATION COLLECTION
The essence of procurement of
information of which the most vital
factors is access of either the agents/
informants to the desired facts without
arousing the attention of the subject or
those given the task to protect them.

63
2 TYPES OF INFORMATION COLLECTION
◦ OVERT METHOD ◦ COVERT METHOD
Collection of A clandestine or
information in an secret means of
open means like o b t a i n i n g
printed materials, information.
internet articles,
interviews, and the
like.

64
C
O ELICITATION
THE PROCESS OF
V EXTRACTING
E
R
INFORMATION FROM A
T PERSON BELIEVE TO
INFILTRATION BE IN POSSESSION
M
E
OF VITAL
T INFORMATION
H SURVEILLANCE WITHOUT SUBJECT
O
D
KNOWLEDGE.
65
PURPOSE OF ELICITATION
I. To acquire information through other
channel;
II. To obtain information that is not
publicly known;
III. To provide source of information; &
IV. To assist various individuals.
66
2 DEVICES OF ELICITATION
A) APPROACH METHOD B) PROBE METHOD
The process of setting Ø An attempt to obtain more
people to start talking. information after the subject
gives a vague, incomplete
general response.
TYPES OF APPROACH:
a. F L A T T E R Y - p e o p l e a r e Ø Used w/ an approach in
susceptible to praise so use order to sustain a
this weakness as a way of conversation.
approaching the subject for a. COMPETITION ROBE
elicitation. b. CLARITY PROBE
b. PROVOCATIVE APPROACH- c. HIGH PRESSURE PROBE
use conventional gambits d. HYPOTHETICAL PROBE
67
TYPES OF APPROACH: flattery & provocative
A A) FLATTERY
P TEACHER PUPIL
Subject is treated with authority, then
solicit his view point and opinion on a
PM APPROACH
subject matter.

R ET KINDRED SOUL A t e c h n i q u e b y s h o w i n g c o n c e r n t o t h e
APPROACH subject in order to gain information.
O HO GOOD SAMARITAN
AD APPROACH Offers help and assistance to the subject.

C PARTIAL
DISAGREEMENT D e b a t e h i m i n a w a y t h a t i t l o o k s a
H APPROACH challenge for him.
68
TYPES OF APPROACH: flattery & provocative
A B) PROVOCATIVE
P The elicitor accumulates the source of
TEASER BAIT knowledge about a particular subject to
PM APPROACH t e m p t t h e s u b j e c t t o g i v e h i s v i e w o f
knowledge.
R ET MANHATTAN FROM T h e e l i c i t o r a d o p t s a n u n b e l i e v a b l e
MISSOURI attitude, he questioned all statements and
O HO APPROACH opposition.

AD JOE BLOW
APPROACH
The elicitor adopts the attitude of being
approachable.
C NATIONAL PRIDE
H APPROACH
When the elicitor become patriotic in all
aspect of elicitation.
69
TYPES OF PROBE
Debate him/her (effective when used in
COMPETITION
P PROBE
connection with the teacher pupil
approach.
R ME CLARITY Elicit additional information in an
PROBE area which the response is unclear.
O HT HIGH
Serves to pin down a subject in a
B OD PRESSURE
specific area or used t o p o i n t o u t
PROBE
E contradiction to what the subject said.

HYPOTHETICAL
Presents a hypothetical situation and
PROBE
get the subject reaction.
70
C
O ELICITATION
V
E GRADUAL
R DISCREET
T
INFILTRATION ENTERING INTO
M
E ENEMY’S DOMAIN
T AND TERRITORY.
H SURVEILLANCE
O
D 71
INFILTRATION

PENETRATION
The action inside the
enemy’s compound.
72
C
O ELICITATION THE DISCREET
V OBSERVATION OF
E PERSONS, PLACE AND
R VEHICLES FOR THE
T
INFILTRATION PUEPOSE OF OBTAINING
INFORMATION
M
E CONCERNING THE
T IDENTITIES OR
H ACTIVITIES OF
SURVEILLANCE
O CRIMINALS.
D 73
SURVEILLANCE VS UNDERCOVER
OPERATION
UNDERCOVER
SURVEILLANCE OPERATION/
ASSIGNMENT
DISCREET THE AGENT CONCEALS
OBSERVATION OWN IDENTITY TO
WITHOUT CLOSE CLOSELY OBSERVE
CONTACT WITH THE THE SUBJECT.
SUBJECT.
74
SURVEILLANCE

Stationary Technical Moving

75
S SURVEILLANCE
T
A
T Stationary Technical Moving

I
O Stake-out Fixed point observation
N
A Follow the subject for a
while, cease from tailing and
R Leap-frog f o l l o w a g a i n w h e r e t h e
Y subject usually passes.
76
T SURVEILLANCE
E
C Stationary Technical Moving
H
Discreet or
N Bugging eavesdropping through
I A generic term for
telephone conversation
with or intercepting a
C eavesdropping or
telephone conversation.
listening in to
A conversation by Wire Tapping
electronic means.
L
77
SURVEILLANCE

M Stationary Technical Moving


O
It focuses to the events or
V activities of the enemy. Roping
I INTERCHANGEABLE
N CALLED AS:
G

78
UNDERCOVER WORK
A form of investigation in which the
investigator assumes a different and
unofficial identity (COVER STORY) in
order to obtain information.

COVER IDENTITY/ The logical


PERSONALITY fabrication use by
Process or procedure individual to hide an
by which an individual individual to hide his
conceals his true identity, background,
identity and activities. and activities.
79
TYPES OF COVER
NATURAL Using true or actual personal background
COVER to fit the purpose.
ARTIFICAIL A cover using biographical data adopted
COVER for a fictitious purpose.
COVER Use of secondary cover in case of
WITHIN THE compromise which necessitate the
COVER admission of a lesser crime.
MULTIPLE
Refers to any tactic to cover himself.
COVER
80
TYPES OF UNDERCOVER
ASSIGNMENT:
DWELLING One which the undercover agent establishes in or near the
ASSIGNMENT residence which houses the subject.
WORK Places the undercover agent in a type of employment where he can
ASSIGNMENT observe the activities of the subject.
SOCIAL Requires the under cover agent frequent places of entertainment
ASSIGNMENT and amusement known to be habitually visited by the target.
The undercover agent must know the ideologies of the
SUBVERSIVE
organizations in order that he could suit his philosophies and
ASSIGNMENT
actions while inside the said organization.
PERSONAL
Also known as “rope job”. Agent is required to develop friendship
CONTACT
and trust with the target.
ASSIGNMENT
81
IMPORTANCE OF COVER:
1)S e c r e c y o f o p e r a t i o n a g a i n s t e n e m y
intelligence;
2)Secrecy of operation against unfriendly or
enemy; &
3)For the successful accomplishment of the
mission.

82
Ø ACT IN ACCORDANCE WITH HIS ORDER;
OR
Ø ACT ACCORDING TO HIS JUDGMENT.
NOTE: Agent should refuse to make a statement
except to a member of his own organization.

83
SURVEILLANCE

Stationary Technical Moving

Reconnaissance/ surveillance
of a building, place, or area
to determine its suitability
Casing
for intelligence use or its
vulnerability in operations.
A term only used on
military aspect.
84
TYPES OF CASING
INTERIOR CASING
Close observation of the lay-out of
the building.
EXTERIOR CASING
Observation of the whole picture of
the area or building, as to observe
possible exits and approaches.

85
SAFE HOUSE
base of the operatives

STASH
base of the enemy

86
INFORMATION DESIRED IN CASING:
AREA CONDITION Description of the locality: residential,
AND HABIT commercial, highly urbanized or rural, and
as well as the living condition, population
and whether condition.
ACTIVE Prevent intelligence activity that includes
OPPOSITION not only the enemy but also the effort of
neutral or allied countries to discover and
observe our intelligence activities.
DISPOSAL PLAN The disposal of information to attain goals
and objectives.
ESCAPE & EVASION The exit planning in case of compromise or
emergencies.
87
SURVEILLANCE

Stationary Technical Moving

The act of the surveillant of


following his subject to detect
criminal activities, to establish
the association of subject, to find
a wanted person and many other Shadowing
purpose. /tailing
88
Discreet following on foot

SHADOWING VS TAILING
“Tailgating”
Discreet following of subject’s vehicle

89
TYPES OF SHADOWING/TAILING
LOOSE TAIL ROUGH CLOSE TAIL
Ø General SHADOWING Ø Extreme
impression of the Ø w/out special importance not
subject’s habits & precautions lose the subject
associates is and the subject but equally
required. is aware of the important not
Ø Utmost fact. to be detected.
important to Ø The material
remain witness must be
undetected. protected.

90
METHODS OF FOOT SURVEILLAANCE
1-MAN SHADOW 2-MAN SHADOW 3-MAN SHADOW
Ø Conducted by Ø Easiest way to OR ABC
one man alone. fully cover the TECHNIQUE
Ø Applicable to
subject. Ø 3 shadowers
close contact Ø One will follow
with the subject. the subject on
the same
direction and the
other will come
from different
direction.

91
3.PROCESSING
OF INFORMATION
92
3.PROCESSING OF INFORMATION
“Information becomes intelligence”
1. A process through which
A step by which information is managed;
the intelligence is
transformed from 2. Increases our knowledge
raw facts or of a particular problem
materials to and situation; and
intelligence data. 3. Results in preventive and
informed public policy.
93
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION Organized raw
2. RECORDING d a t a i n t o
usable form or
3. EVALUATION
grouping them
4. ANALYSIS into similar
5. INTEGRATION items.
6. DEDUCTION 94
COLLATION METHOD
A. INTELLIGENCE
Daily logbook
JOURNAL
B. ENEMY Disposition of
SITUATION MAP the enemy
C. INTELLIGENCE
Documents
WORKSHEET
D. INTELLIGENCE Journal file, reference
file, order of battle, and
FILE wanted list files.
95
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION
2. RECORDING The reduction
of information
3. EVALUATION
into writing.
4. ANALYSIS
5. INTEGRATION
6. DEDUCTION 96
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION
The examination
2. RECORDING of information
3. EVALUATION to determine
4. ANALYSIS intelligence
value.
5. INTEGRATION
6. DEDUCTION 97
EVALUATION GUIDE:
EVALUATION OF ACCURACY OF INFORMATION
RELIABILITY CREDIBILITY SOURCE
COMPLETELY CONFIRMED BY THE
A RELIABLE 1 OTHER SOURCES T UNIT COMMANDER

USUALLY
B RELIABLE 2 PROBABLY TRUE U INTELLIGENCE AGENT
MILITARY/ LE
C FAIRLY RELIABLE 3 POSSIBLE TRUE V PERSONNEL
NOT USUALLY
D RELIABLE 4 DOUBTFULLY TRUE W INTERROGATION

IMPROBABLE GOVERNMENT
E UNRELIABLE 5 REPORT X CIVILIAN EMPLOYEE
RELIABILITY TRUTH CANNOT BE Members of the
F UNKNOWN 6 JUDGED Y populace

CUFNUR COPROPODOIT Z DOCUMENTS


98
STEPS OF PROCESSING OF
INFORMATION Shifting and isolating
those elements which
1. COLLATION have significant in
2. RECORDING light of mission or
objectives.
3. EVALUATION
4. ANALYSIS INTERPRETATION
Establishing
PHASES OFthe
5. INTEGRATION meaning and
INTERPRETATION
significance of the
6. DEDUCTION information
99
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION
2. RECORDING Combination of
all analyzed
3. EVALUATION
data to form a
4. ANALYSIS logical picture
5. INTEGRATION or theory.
6. DEDUCTION 100
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION Formulation of a
conclusion from the
2. RECORDING theory developed,
determination of
3. EVALUATION effect and meaning
4. ANALYSIS of the information.

5. INTEGRATION
6. DEDUCTION 101
DEDUCTIVE INDUCTIVE
LOGIC LOGIC
GENERAL TO SPECIFIC TO
SPECIFIC GENERAL
GATHER EVIDENCES THAT FACTS ARE CONCLUDED,
WILL EVENTUALLY THUS PROVIDING
POINTING TO A EVIDENCES TO MAKE IT
SPECIFIC AND ESTABLISHED AND
CONCLUSIVE FACT. CONCLUSIVED DATA.
102
4.INTELLIGENCE
DESSEMINATION
103
CARDINAL
THE PRINCIPLE OF OF
TIMELY CONVEYANCE
DISSEMINATION
INFORMATION OF
BY ANY SUITABLE
INTELLIGENCE
MEANS TO THOSE WHO NEED IT.

“NEED TO KNOW
BASIS” 104
SAFE HAND METHOD
IT IS DISPATCHED TO THE ADDRESSE
INTO THE PERSONAL CARE OF
AUTHORIZED PERSONS.

105
DESSEMINATION
THE TIMELY CONVEYANCE OF
INFORMATION BY ANY SUITABLE
MEANS TO THOSE WHO NEED IT.

TIMELINESS PROPRIETY SECURITY


Reach the Proper security
Right
users on measures for
users
time to be classified
useful. matters. 106
FIVE DIFFERENT COLLECTION AGENCIES OF INTELLIGENCE
HUMINT Intelligence derived from information collected and provided
Human Intel. by human sources.
IMINT Collects information via satellite and aerial photography.
Imagery Intel.
MASINT Consist of acoustic and radar intelligence, nuclear radiation
Measurement detection, IR intelligence and etc. used primarily to support
& Signature military commanders and other users on a national or
Intel. tactical scale.
A form of intelligence collection management that involves
OSINT
finding, selecting, and acquiring information from publicly
Open Source
Intel. available sources and analyzing it to produce actionable
intelligence.
Gathering information through interception of signals,
SIGINT
Signal Intel.
whether between people (COMINT), or involving electronic
signal. 107
DIFFERENCES
CRIMINAL
INVESTIGATION INTELLIGENCE
Ø Reactive in nature Ø Proactive function
Ø Deductive logic Ø Inductive logic
Ø Files are Ø Files are closed or
considered as confidential
open files

108
CLIPPING SERVICES LINK ANALYSIS FLOW CHARTING
Ø Clipping articles ØShow relationship Ø Demonstrate a
from newspapers in between individual chain of event or
accordance with an and organization. activities over a
existing format is an period.
important method of
gathering intelligence
data.

109
CLASSIFICATION OF CLANDESTINE AGENT
COVERT ACTION
PRINCIPAL AGENT ACTION AGENT SUPPORT AGENT
AGENT
A m a n a g e r i a l The doer of the Recruited agent Performs all
a g e n t a n d t h e clandestine task. who is in senior auxiliary services
leader of an agent position usually at the direction of
network. w i t h i n a the project officer.
government and
able to exert
influence on a
f o r e i g n
government at the
direction of a
sponsor.

110

You might also like