INTELLIGENCE CYCLE
LESSON’S GOALS:
The goal of this block of instruction is to provide the students with the understanding
about what is intelligence and its cycle.
LESSON’S OBJECTIVES:
At the end of the discussion, the participants will be able to:
1. Define what Intelligence is.
2. Identify and define the 4 stages in the Intelligence Cycle/Process.
3. Identify what are Priority Intelligence Requirements (PIR).
INTRODUCTION TO INTELLIGENCE
INTELLIGENCE – is different from mere information-processing. It’s not the sort of brain
intelligence, or small letter “I” in intelligence that psychologist study. Intelligence is “secret
knowledge of an enemy, the kind of knowledge which stands independently of the means by
which it is obtained and the process by which it is distilled”.
MOSES – was directed by God to choose leaders from among the 12 tribes and send
them as spies to explore the land of Canaan.
REHAB – sheltered and concealed the agents of Israel and made a covenant with them
and duped their pursuers.
DELILAH – allowed the Philistine spies to hide in her house; she also allowed sex to
gain intelligence.
SUN TZU – a Chinese Philosopher; author of the famous book “ART OF WAR”.
The most famous quote from this book was:
“If you know thy enemy and know yourself, you need not fear the result of a
hundred battles”.
"If you know yourself and not the enemy, for every victory, you suffer defeat”.
“In you know neither yourself nor the enemy, you are a fool who will meet defeat
in every battle”.
ALEXANDER THE GREAT – devised the first “letter sorting” and opening of the
letters to obtain information.
WHAT IS INTELLIGENCE?
INTELLIGENCE is the product resulting from the collection, evaluation and interpretation of
all available information which concerns one or more aspects of police operations and which is
immediately or potentially significant to police planning.
INTELLIGENCE CYCLE
(ILLUSTRATION/DRAWING)
I. PLANNING AND DIRECTING THE COLLECTION EFFORT
WHAT IS THE PRIORITY INTELIGENCE REQUIREMENTS (PIR)?
It is an item of intelligence or information of the characteristics of the area of
operations and the enemy, which the commander feels he needs before he can
reasonably arrive at the decision.
FIVE (5) STEPS IN PLANNING AND DIRECTING THE COLLECTION
EFFORT:
1. Determine the intelligence requirements.
2. Determine the intelligence priorities.
3. Determine the enemy activities, characteristics of the area of operations.
4. Issuance of orders and requests and the selection of collection agencies to be
employed.
5. Supervise the execution of orders and requests.
DEPENDING ON THE MISSION, THE COMMANDER AND HIS STAFF
REQUIRE INTELLIGENCE AND INFORMATION…
To arrive at sound and timely decision.
To protect the command.
To assist in the processing of other information.
II. COLLECTION OF INFORMATION
Collection is the systematic exploitation of sources of information by the
collection agencies and the delivery of the information obtained to the proper
intelligence section.
Sources of Information are persons, things or actions from which enemy,
weather or terrain information is derived.
MAJOR SOURCES OF INFORMATION INCLUDES:
Enemy’s prisoners of war (POW)
Seized enemy documents and materials
Enemy communication
Civilians
Maps
Weather Forecasts
Studies prepared by friendly units
Intelligence Reports
Enemy activities
Collection Agency is an individual, organization or unit that has access to sources
of information and the capability of collecting information from the above-mentioned. It
includes:
Unit Personnel – the primary mission of a unit determines the amount of
information that it can provide.
Intelligence Specialists – they are valuable collectors of information and
especially trained personnel.
Special Units – these units have various specific collection mission significant to
the overall collection effort.
METHODS OF COLLECTION:
1. OVERT METHOD
Interview and surveys
Database manipulation (Computers)
Request for information
Electronic surveillance (CCTV)
Evidence in court matters
2. COVERT METHOD
Informants
Surveillance teams
Confidential requests for information
Telephone intercepts/listening devices
SURVEILLACE – is the monitoring of behavior, activities, or
information for the of information gathering, influencing, managing or
directing.
– is used by government for intelligence gathering,
prevention of crime, the protection of a process,
person, group or object, or the investigation of
crime.
CASING – is reconnaissance or surveillance of a building, place or area
to determine its suitability for intelligence use or its vulnerability in an
intelligence operation.
SOURCES OF INFORMATION:
1. HUMAN SOURCES
Criminals and their relatives/associates
Informants
Witnesses
Offenders and prisoners
Other police, investigators of intelligence officers
Private investigators
Business and community people
Academics and consultants
2. FIELD SOURCES – permanent and specialized collectors; police or
intelligence officers who work in the field.
3. ELECTRONIC SOURCES – are the products of electronic methods used by
our organization to collect the information.
TYPES OF ELECTRONIC SOURCES:
Telephone intercepts
Listening devices
Tracking devices
Computer interception
Satellite imagery
Other forms of intercepting communications
III. PROCESING OF INFORMATION
PROCESSING is the step by which intelligence is created from the raw material
of information.
1. RECORDING – is reducing information to writing or some form of graphical
representation.
2. EVALUATION OF INFORMATION – the information is examined to
determine its pertinence, reliability of the source and the collection agency and
accuracy of the information.
3. INTERPRETATION OF INFORMATION – determines the significance and
meaning of information.
THE STANDARD EVALUATION TABLE IS AS FOLLOWS:
RELIABILITY OF SOURCE/AGENCY ACCURACY OF INFORMATION
A – Completely Reliable 1 – Confirmed by other sources
B – Usually Reliable 2 – Probably True
C – Fairly Reliable 3 – Possibly True
D – Not usually reliable 4 – Doubtfully true
E – Unreliable 5 – Improbable
F – Reliability cannot be judged 6 – Truth cannot be judged
SOURCE OF INFORMATION
T – Direct observation of the Unit Commander
X – Government Civilian Employee
U – Penetration/Resident Agent
Y – Member of the populace
V – AFP/PNP troops involved in counter operation
Z – Documentary
IV. DISSEMINATION OF INTELLIGENCE
DISSEMINATION is the timely distribution of intelligence to those who need it,
in the most suitable form.
The final phase in the intelligence process.
It solicits feedback from the decision-maker and redefine the intelligence
tasks.
RESTRICTIONS OF DISSEMINATION:
Be aware of the security classification of the intelligence products and
ensure that it is only disseminated to people who have the same level of
security clearance of higher.
“Need to know” principle should be followed.
Be careful of forwarding information that has been provided to you in
confidence.
Be aware of the legislative implications or Memorandum of
Understandings (MOUs) when dealing with intelligence.
TWO (2) CONSIDERATIONS IN DISSEMINATION:
1. TIMELINESS – Intel must be timely. It must reach the user on time to be
of value.
2. PROPRIETY – the message must be clear, concise and complete in order
that the receiver will readily understand its content.
The accuracy or decorum of transmitting intelligence to the
concerned agency/community.
“Need-To-Know” Principle and Security
METHODS OF DISSEMINATION:
1. PERSONAL CONTACT – conference, briefing, debriefing
2. MESSAGE – couriers, secured electrical/electronic means
3. INTELLIGENCE DOCUMENTS – Intelligence Report (IR), Intelligence
Summary (ITSUM), Information Transmittal Sheet ((ITS) or SOI
4. Daily Intelligence Brief (DIB)
NOTE: A reliable PRODUCT (Intelligence) depends on the continuous SUPERVISION and
PLANNING of the PROJECT OFFICER/COMMANDING OFFICER in every phase of the Intelligence
Cycle.
SUMMARY
PLANNING (Most crucial)
COLLECTION OF INFORMATION (Most dangerous)
PROCESSING OF INFORMATION (Most tedious)
DISSEMINATION OF INFORMATION (Most critical)
THANK YOU…