SCOPE
DEFINITION
OF TERMS.
INTELLIGENCE PRINCIPLES.
INTELLIGENCE AXIOMS.
INTELLIGENCE CYCLE.
INTELLIGENCE REPORTS/RECORDS
MILITARY SECURITY
COUNTERINTELLIGENCE
DEFINITION OF TERMS
INFORMATION-consists of facts, statistics,
observations, reports, trends, opinions, rumors,
documents, photographs, diagrams, maps and
other data used in the production of intelligence.
INTELLIGENCE-is the product of resulting from
the collection, evaluation, analysis, integration and
the interpretation of all available information.
COUNTERINTELLIGENCE-is concerned with the
countering, or destroying effectiveness of a
hostile intelligence effort.
COMBAT INTELLIGENCE -is the knowledge of the
enemy, weather and other geographical features
required by a commander in the planning and
conduct of tactical operations.
STRATEGIC INTELLIGENCE -is intelligence which
is required for the formulation of the policy and
military plans at national and international levels.
There are seven (7) principles
of intelligence which are as
Intelligence is continuous.
follows:
Intelligence
Operations and Tactical
operations are interdependent.
Intelligence must be useful.
Intelligence must be timely.
Intelligence must be flexible.
Intelligence operation requires
imagination and foresight.
Intelligence requires constant
security measures.
Intelligence is continuous
All intelligence activities
follow a four (4) cycle planning, collection, evaluation
and dissemination those that
are oriented on the
commanders mission. The
cycle is continuous and all
steps are carried out at the
same time.
Intelligence Operations and
Tactical operations are
interdependent.
Intelligence operations are
internal part of the operations of all
units. The overall operations of any
armed force in combat is measured
and greatly affected by the
intelligence which it develops and
uses. Strategy and tactics are at
the same time the cause and effect
of intelligence operations
Intelligence must be useful.
Intelligence must not only
increase knowledge. Useful
intelligence enhances
understanding of the problems
to be solved results in assisting
the commanders problem is
essential to determine what
intelligence is useful to.
Intelligence must be timely.
The best intelligence is worthless if
it does not reach the user in time for
appropriate consideration or action.
Some sacrifice of completeness and
accuracy may have to be accepted
because the situation requires
decisions before complete intelligence
can produce. If this occurs, the user
must be advised of the loss of
completeness and accuracy.
Intelligence must be
flexible.
Standard procedures must make
intelligence operations more
effective; however, procedures
must be responsible to changes to
meet existing requirements under
any situation. Intelligence
operations are based on reason and
sound judgment. Procedures which
do not readily adapt to a given
situation are generally discarded.
Intelligence operation requires
imagination and foresight.
Policies or procedures which limit
imagination
or
initiative
are
avoided. All intelligence personnel
and agencies are exploited to insure
that all available information is
processed to produce intelligence
for the user. Acceptance and
satisfaction which continuance of
current situation can lead to
disaster.
Intelligence requires constant
security measures.
Security measures are necessary to
insure that unauthorized personnel are
denied of information and produced
intelligence. However, it is imperative that
a distinction be made between security
and secrecy. Secrecy connoted to hide
from or conceal information or intelligence.
The free and complete exchange of
information by intelligence processing
agencies is vital to permit production of
the best and most timely product. Security
measures must not deter dissemination of
information or intelligence to those who
have NEED TO KNOW.
Intelligence axioms are facts that
require no proof because the
truth of these statements is
obvious.
THE FOUR (4) AXIOMS OF
INTELLIEGENCE:
AXIOM
No. 1 - Intelligence is
crucial to internal security.
AXIOM No. 2 Intelligence is
essential to all types of
operation.
AXIOM No 3 - Intelligence is a
responsibility of all
governmental
agencies.
AXIOM No 4 Intelligence of the
government must be superior to
that of the insurgent.
AXIOM No. 1 - Intelligence is
crucial to internal security.
It can provide us with advanced
warning of insurgent activities.
Intelligence can also provide detailed
knowledge of insurgent
organizations, personnel, plans and
tactics. In short, intelligence
provides the information which the
government and the Armed Forces
as a whole need to act upon.
AXIOM No. 2 Intelligence is
essential to all types of
operation.
This axiom means that the
government of the nation should
initiate a carefully planned, fully
coordinated and intensely
executed program to maintain or
restore internal security.
This overall program
contains three (3) basic
types of operations
Internal Defense
Operations namely:
It is directed against insurgents,
secessionist movements, as well
as
the
ultra-rightist,
their
organizations, methods, motives,
their support system to include
their
human
and
material
resources.
Internal Development
Operations
This is undertaken
to improve the
political, economic and social aspects
and environments within a nation
thereby alleviating causes of
dissatisfaction by the people towards
the government. One of the best
examples of this kind of operation is
the Civil Military Operations and
Special Operations Team concept
adopted by the Armed Forces in its
latest drive against insurgency.
Psychological Operations
This is conducted to influence
the attitude and behavior of all
groups within the populace
thereby obtaining the maximum
support for the government.
Intelligence provides all the
information where all these
operations must be planned,
implemented and evaluated if the
government is to be successful.
AXIOM No 3 - Intelligence is a
responsibility of all
governmental
agencies.
The covert and clandestine nature of
subversive insurgency requires a thoroughly
controlled and coordinated intelligence
effort on the part of the government. All
governmental agencies should contribute to
the intelligence effort to collect the detailed
information and produce the comprehensive
intelligence that is required for internal
defense, internal development and
psychological operations.
AXIOM No 4 Intelligence of
the government must be
superior to that of the
The struggle
insurgent
. between a subversive
insurgent organization and the
constituted government of a nation has
sometimes been called an intelligence
war. Throughout the entire process of
insurgency, the insurgent relies heavily
upon intelligence to plan and execute
measures designed to disrupt, paralyze,
and overthrow the constituted
government.
The Intelligence Cycle
The Intelligence Cycle is the process by
which information is converted into
intelligence. It has four phases: Directing,
collecting, processing, and disseminating.
Directing
determines what intelligence is
required and who should collect it.
Collecting obtains combat information,
intelligence, and targets by tasked
organizations.
Processing converts combat information
into intelligence and targets through
analysis, and determines how it fits into
the situation.
Disseminating passes the intelligence and
targets to users when they need them.
All four of these phases may take
place concurrently. They are the
lowest common denominator in the
production of combat intelligence and
each is indispensable; if one fails, the
entire intelligence effort will fall.
We can compare the intelligence
process to a cycle; hence the
descriptive title ---- The Intelligence
Cycle.
The cycle picture here is merely a
teaching vehicle designed to provide a
composite picture of the functions
performed by the intelligence officer
In the study of intelligence cycle,
it is unimportant which phase is
considered first - - information or
intelligence can be inserted in any
phase as appropriate. The
intelligence cycle has no beginning
and no end. Any sequence which
logically organizes thought processes
is workable.
For the purposes of logical
presentation, we will begin our study
of the cycle with the planning phase.
The entire intelligence effort is
1. PLANNING OF THE COLLECTION
EFFORT
The Commander must make
certain that he has What he needs,
When he need it. He is continually
wondering what the enemy is doing,
thinking, and planning for the future
operations, and about the nature of
the terrain not under his control.
These questions are all part of the
fog of war, and this fog does
not lift automatically.
PLANNING OF THE COLLECTION
EFFORT CONSIST OF 5 STEPS:
Determination of intelligence requirements.
Determination of intelligence priorities.
Determination of those enemy activities or
characteristics of the area of operations
which would indicate the answers to the
intelligence requirement and to determine
specific items of information.
Selection of collection agencies to be
employed and the issuance of necessary
orders and requests for information.
Supervising the execution of orders and
request.
Depending on the mission, The
Commander and his staff require
information and intelligence:
To arrive at sound and timely
decisions in preparing plans and
estimate for future operations and in
conducting operations.
To protect the command by avoiding
surprise and denying the enemy
information concerning his own
forces.
To assist in the processing of other
information.
Essential Elements of
Information (EEI)Specific information of an actual
or potential enemy and of the
terrain, hydrographic and
metrological conditions a
commander needs in a particular
situation in order to accomplish his
mission. The essential elements
may also include information
required by higher, lower, adjacent,
support or attached units.
Other Intelligence
Requirements (OIR)Requirements derived from
command requirements which do
not qualify as EEI and from staff
requirements regarding
information on other enemy
capabilities, vulnerabilities and
characteristics of the area which
also could materially affect the
successful accomplishment of the
mission.
MISSION IS RECEIVED
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
Begin the IPB process.
Commander's
Checklist
CHECK - Do you and your staff have the same
perception of the upcoming fight?
You, the S3, the S2, and other key
personnel discuss your common
understanding of the battlefield. (See
Figure 2-1, Common Understanding).
You and the S2 determine the extent of the
area of interest (AI).
Identify all enemy units that you might
engage.
CHECK - Does the S2 know all that you know
about the enemy situation?
The S2 identifies gaps in knowledge.
You identify which uncertainties must be
solved for this mission.
Give the S2 your initial guidance for
intelligence. (Focus his IPB effort.) Usually,
you have the S2 focus on analyzing COAs
and reinforcements available to the enemy
commander you're about to face.
CHECK - Does the S2 understand your initial
guidance?
Figure
2-1
FACTS AND ASSUMPTIONS
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
Commander's
Checklist
The S2 continues IPB to produce the
intelligence estimate:
CHECK - Did the S2 discuss the kinds of
operations the area of operations (AO) will
support?
The S2 analyzes the environmental effects
on enemy COAs.
CHECK - Did the S2 cover what is known
about the enemy YOU will face?
The S2 researches the known enemy
situation and how he normally fights in
similar situations (situation map, doctrinal
templates).
The S2 generates situation templates for
each of the enemy's COAs. He does this by
integrating the IPB products.(See Figure 2-2,
IPB.)
The S2 prepares most of the intelligence
estimate at this point.
CHECK - Did the S2 focus the IPB per your
guidance?
CHECK:
- Do the situation templates make sense
given the enemy's situation and your
knowledge of his tactics
- Did the S2 prioritize the enemy COAs
logically (most likely, most dangerous, least
likely)?
- Ask yourself, "If I were the enemy S3/G3
Figure 2-2
ANALYSIS OF HIGHER
MISSION AND INTENT
Intelligence Cycle Phase:
Directing
Commanders
Interaction with the Intelligence
Cycle
Commander's
Checklist
The S2 helps the rest of the staff
conduct mission analysis. The S2
should analyze tasks from the
enemy's perspective.
Except for paragraphs 5a (Effects
of Intelligence on Friendly COAs)
and 5b (Effects of Area of
Operations on Friendly COAs), the
S2 should brief the intelligence
estimate before the S3/XO briefs the
mission analysis. Paragraphs 5a
and 5b require S3-developed
friendly COAs and the S2 briefs
these later as part of the staff
recommendation.
CHECK - Did the S2 brief the status
of the unit's collection assets?
COMMANDERS GUIDANCE
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence
Cycle
In addition to other planning
guidance, give the S2 instructions
about aspects of the enemy that
you're most concerned about.
Provide your guidance on
intelligence collection and target
acquisition in terms of enemy,
weather, and terrain. The S2 should
make sure your concerns are
adequately addressed in developing
and analyzing friendly COAs.
Be sure to emphasize to the S2 how
you intend to employ your assets
so the S2 can anticipate the support
you expect. For example, if you plan
to use cross-FLOT aviation
operations, the S2 should anticipate
support to Suppression of Enemy
Commander's
Checklist
Commander's
Interaction with the Intelligence Cycle
The S2 helps develop friendly COAs. He
analyzes COAs from the enemy's
perspective and ensures that each
friendly COA is valid against all enemy
COAs in terms of force ratios, tactics,
and common sense.
Commander's
Checklist
CHECK - Is each friendly COA valid
against each enemy COA?
The S2 refines initial IPB:
The S2 develops named areas of
interest (NAIs), event templates, and
event analysis matrices to confirm or
deny each enemy COA. The event
template shows how to quickly confirm
or deny the situation templates. It will
become the basis for the collection or
reconnaissance and surveillance (R&S)
plan.
The S2 identifies enemy high value
targets (HVTs) for each enemy COA.
CHECK - Is the S2 developing indicators
for each NAI?
COA ANALYSIS (War gaming)
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
Commander's
Checklist
The S2 role-plays the enemy commander CHECK - Has the S2 logically
presented probable enemy reactions to
during wargaming. The S2 makes sure
friendly maneuver and targeting?
the staff fully addresses friendly
responses for each enemy COA by trying
to "win" the wargame for the enemy.
Each response is tied to an enemy
action. The friendly action will be
translated to an "ON ORDER" or "BE
PREPARED" task in the operation order
(OPORD) or fragmentary order (FRAGO).
(See Figure 2-3, Wargaming.)
As the unit's collection manager, the S2
wargames the R&S plan to make sure
tasked collection assets are available to
report activity in the designated NAIs.
CHECK - Do you agree with the assets
tasked by the S2? Do you or your S3
have conflicting requirements for your
scouts or cavalry which will preclude
the S2 from properly executing his R&S
plan?
CHECK - Has the S2 covered NAIs and
target areas of interest (TAIs)
adequately?
The S2 develops and recommends a set
of Intelligence Requirements, or (IRs),
for each friendly COA that is wargamed.
CHECK - Are all IRs linked to specific
enemy actions or reactions that require
a friendly response?
The S2 continues to refine the initial IPB:
The S2 completes the event templates
and event analysis matrices to anticipate
key enemy decisions for each friendly
COA.
An event template or analysis matrix
represents the enemy's decision support
template (DST) synchronization matrix
for a given friendly COA.
CHECK - Did the staff wargame against
The XO directs the staff to record the
wargaming results into both a DST and a each of the possible enemy COAs?
BOS synchronization matrix for each
friendly COA that is wargamed. (See
Figure 2-4, DST and BOS
synchronization matrix.)
CHECK - Is each friendly response
associated with a clearly defined IR?
Figure 2-
COA ANALYSIS (Targeting)
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
Commander's
Checklist
The FSO chairs a targeting session for each
friendly COA.
CHECK - Do the identified HPTs attack an
enemy weakness that will further the
The S2, S3, and FSO choose a set of HPTs for success of the friendly COA? Do they
each friendly COA from the HVT list.
support your concept of the operation and
your priorities?
The targeting team develops the HPT list.
The targeting team develops the attack
guidance matrix.
CHECK - Did the S2 validate "immediate" and
"planned" targets? Has he identified
appropriate TAIs and tasked collection assets
to locate targets when and where you need
them attacked?
CHECK - Did the S2 validate target categories
marked as "destroy?"
The Intelligence and Electronic Warfare
Support Officer (IEWSO) at brigade (or EW
officer at division and corps) recommends
appropriate integration of communications
jamming into the fire support plan.
CHECK - Does the planned jamming further
the maneuver plan and complement the
lethal fire plan?
Figure 24
RECOMMENDATION
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
The S2 participates in developing the
staff recommendation.
Commander's
Checklist
CHECK - Have each COA's strengths
and weaknesses been adequately
addressed in terms of the enemy?
The S2 also completes the intelligence
estimate: paras 5a and 5b.
The S2 recommends for your approval
certain IR to become PIR.
CHECK - Do they address your priority
concerns about the enemy? Are the
recommended PIR consistent with PIR
guidance in Appendix A?
CHECK - Have you told the S2 when the
PIR must be satisfied?
DECISION
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
Choose a COA.
The S2 should highlight the
intelligence requirements for each
friendly decision on the DST.
Resolve with the S2 and IEWSO the
"price" for answering each IR.
Will you have to depend upon higher
headquarters?
Will you have to task a line unit?
Give S2 final approval for PIR and the
collection or R&S plan.
Commander's
Checklist
ISSUE THE OPORD/FRAGO
Intelligence Cycle Phase:
Directing
Commander's
Interaction with the Intelligence Cycle
Once you approve the targeting
priorities established in the attack
guidance matrix, the FSO develops a
detailed fire support plan to include a
schedule of fires. The S2 should help
the FSO identify known HPTs and HVTs
that require intelligence support to
locate. The FSO, S2, and S3 should all
discuss the amount of damage each
target requires to support the overall
plan.
Commander's
Checklist
CHECK - Has the S2 identified the
intelligence required to support the
schedule of fires? Does the S2
understand the level of damage each
target requires? Does the S2 understand
when the BDA for each target needs to
be determined to support the schedule
of fires?
The S2 develops for your approval:
Finalized PIR (detailed and specific).
CHECK - Has the S2 covered all NAIs,
TAIs, and DPs with appropriate
collection (R&S) assets?
The intelligence synchronization
matrix. This matrix links the PIRs and
IRs with the associated DPs from the
DST as well as a specific collection
strategy. (See Figure 2-5, Intelligence
Synchronization Matrix.)
CHECK - Does the intelligence
synchronization matrix get you the
intelligence you need when you need it?
CHECK - Does the intelligence
synchronization matrix support your
targeting effort to the degree you
require? Have BDA requirements been
incorporated into the collection or R&S
plan?
Collection or R&S plan with detailed
taskings and requirements reflecting
the collection strategy on the
intelligence synchronization matrix.
CHECK - Is the S2 tasking all available
organic and attached collection assets
including engineer, aviation, artillery,
etc?
CHECK - Can the collection assets
deliver the intelligence the S2 is
Detailed taskings and requests that
"Flesh Out" the synchronization matrix. tasking? (Ask the MI unit commander or
his IEWSO.)
An intelligence annex, including the
collection plan.
CHECK - Does higher headquarters
clearly understand your priorities and
when you must have the intelligence
Figure 2
SUPERVISE
Intelligence Cycle Phase:
Collecting
2. COLLECTION OF INFORMATION
ACTUAL COLLECTION OF INFORMATION BASED ON
THE COLLECTION PLAN OR ORDERS AND REQUEST.
COLLECTION- the systematic exploitation of
source of information by collecting agencies
and the delivery of information thus obtained
to the proper Intel section.
SOURCE OF INFORMATION- are persons,
things, or action from which information about
the enemy, weather or terrain is derived.
COLLECTION AGENCY- is any person, unit, or
activities that collect and/or processes
information by research, surveillance,
interrogation or other exploitation of source.
Commander's
Interaction with the Intelligence Cycle
The S2 receives and consolidates all
subordinates R&S overlays ensure they
adequately support his collection plan.
Collection assets conduct collection
operations.
The S2 receives reports and redirects
taskings.
Commander's
Checklist
CHECK - Is the S2 tracking upcoming
dead-lines for intelligence requirements
via the intelligence synchronization
matrix?
CHECK - Is he prompting collection
assets to meet taskings?
CHECK- Are the MI unit and other tasked
assets meeting their intelligence
taskings?
- Are the S2 and the IEWSO apprising
you of the status of intelligence
requests to division?
- Is the S2 apprising you of collection
problems?
INTELLIGENCE COLLECTION
PLAN
SUPERVISE
Intelligence Cycle Phase:
Processing
3. PROCESSING OF COLLECTED
INFORMATION INTO INTELLIGENCE
Intelligence is information which has been processed..
Processing is that step by which intelligence is created from
the raw material of information.
It consist of 3 distinct steps:
RECORDING of the information so that it can
be compared with other items on hand.
EVALUATION of information in order to
determine its intelligence value.
INTERPRETATION of the information in relation
to other information and intelligence on hand in
order to draw conclusions regarding its
meaning.
Recording
If the intelligence officer is to
confirm one report by comparing it
with another, and if he is to determine
the significance of evaluated
information, he must maintain a
system of records. Recording has one
purpose ---to facilitate the task of the
intelligence officer. The intelligence
officer, however, must subordinate the
maintenance of recording the mission
of assembling, producing, and using
intelligence. Action must come first,
record are of secondarily importance.
Commander's
Interaction with the Intelligence Cycle
The S2 records each intelligence
message into a general database. He
ensures that no message gets lost, and
that each message is quickly
retrievable.
Commander's
Checklist
CHECK - Can you get immediate
answers to questions you have on
reported enemy activities, crossreferenced by time, location, or
subject?
The S2 evaluates each report for
pertinence, reliability, accuracy, and
timeliness.
The S2 analyzes each report and
updates the common understanding of
the battlefield. He places special
emphasis on the confirmation or denial
of situation templates (filling the high
priority gaps in knowledge). He uses the
event template or analysis matrix to
anticipate enemy decisions and confirm
enemy COA.
CHECK - Are situation templates being
confirmed or denied in a timely
manner?
The S2 continually analyzes combat
information and raw data to develop
situations, develop or identify targets,
assess battle damage, and give
indications and warning (I&W) of
hostilities.
CHECK - Is the S2 fully exploiting IPB
and collection efforts? Do you have a
good picture of the battlefield? Do you
have enough confirmed intelligence to
execute your concept of the operation
as planned during wargaming? Do you
have enough intelligence to properly
issue "ON ORDER" and "BE
PREPARED" missions to allow for
contingencies identified during
wargaming?
- Is the S2 informing you of potential
new enemy actions not anticipated
during IPB or wargaming? Is the S2
preparing you to change your concept
of the operation based upon these
unexpected enemy actions?
- Is the S2 analyzing the reports and
telling you what they mean or merely
conducting battlefield "beancounting?"
- Is combat information being reported
in a timely manner?
Figure 2
RECORDING cont:
There are three(3) general aids by
which recording is accomplished:
The G2 or Intelligence journal.
The G2 or Intelligence Workbook.
The Enemy Situation Map.
The G2 or Intelligence journal.
The
G2 or Intelligence Workbook.
The
Enemy Situation Map.
EVALUATION
Information is of small value unless it
has been analyzed with respect to its
pertinence, the reliability of the officer and
agency and its probable accuracy. The
intelligence officer must examine each item
of information as soon as it is received to
determine its intelligence value. This
examination may be either elaborated or
instantaneous, depending upon the
circumstances. Is the information needed
immediately or at some future time? Are
the source and agency reliable? Is the
information confirmed or corroborated by
previously received information or
previously produced intelligence.
EVALUATION TABLE
A.
B.
C.
D.
E.
F.
SOURCE RELIABILITY
INFORMATION ACCURACY
COMPLETELY RELIABLE
1. CONFIRM BY OTHER
SOURCES
USUALLY RELIABLE
2. PROBABLY TRUE
FAIRLY RELIABLE
NOT USUALLY RELIABLE 3. POSSIBLY TRUE
4. DOUBTFULLY TRUE
UNRELIABLE
5. IMPROBABLE
RELIABILITY CANNOT BE
6. TRUTH CANNOT BE
JUDGE
JUDGE
INTERPRETATION
Interpretation of information consists of
determining its significance with respect to
other information or intelligence already at
hand. It is accomplished by analysis of the
information, integration of significant items
of information with previously collected and
processed intelligence and finally, drawing
conclusion as to the probable meaning of the
information.
Evaluation and Interpretation together
are the essential steps in processing. Keep in
mind that the commander wants intelligence
and not merely a compilation of information.
4. DISSEMINATION AND USE OF
INTELLIGENCE
INTELLIGENCE IS THE END RESULT OF
ALL INTELLIGENCE ACTIVITIES. TO BE
USED, IT MUST BE DISSEMINATED TO THE
COMMANDER, HIS STAFF, AND THE
OTHER WHO REQUIRES IT IN A PROPER
FORM IN TIME TO SERVE THE PURPOSE
OF THE RECIPIENTS.
SUPERVISE
Intelligence Cycle Phase:
Dissemination
DISSEMINATION AND USE OF
INTELLIGENCE Cont.
Dissemination to other users is
accomplished by means of messages
(radio, Messenger, or any rapid means
of signal communications), personal
contact (telephone, personal visits,
briefing), and intelligence documents
(periodic intelligence reports,
intelligence summaries, OB and PI
reports, integrating reports, operation
orders and intelligence annexes, terrain
and weather studies, and other special
reports).
Commander's
Interaction with the Intelligence Cycle
The S2 keeps key personnel within the
unit abreast of the general situation via
intelligence briefings (usually best) and
intelligence reports. The technique of
using a graphic intelligence report
(status at a glance) is usually optimal in
dynamic situations. (See Figure 2-6,
Graphic Intelligence Report.)
Commander's
Checklist
CHECK - Are all intelligence
requirements identified in the BOS
synchronization matrix being met in an
adequate manner? Are decision makers
getting the intelligence in a timely
manner?
A written intelligence report may be
more appropriate for static situations.
During wargaming, the S2 and the
IEWSO contract to deliver specific
intelligence to specific decision makers
at specific times during the battle.
Reports are event or requirement
driven. They are not time oriented. The
key is to give you intelligence you need
when you need it or, not every 4, 6, or
12 hours?
The S2 always keeps personnel
abreast of the status of confirming or
denying enemy COAs and answering
PIRs on time.
CHECK - Is your S2 producing
intelligence reports when you need
them?
During the battle, the S2 tracks the
intelligence synchronization matrix to
identify when decisions need to be made, by
whom, and what intelligence the decision
maker needs. Then the S2 provides the
needed intelligence to those who need it.
Also during the battle, the S2 uses the
intelligence synchronization matrix to make
sure collection assets are collecting on the
proper PIR at the proper time and will meet
deadlines required by the primary
synchronization matrix. The S2 resolves
collection problems in a timely manner to
support timely dissemination.
CHECK - Are intelligence reports
keeping key personnel abreast of
the enemy situation? Are they well
written? Do they answer PIRs or
otherwise explain why the
information is important? Rule of
thumb: Can an alert combat arms
soldier understand them quickly
without explanation?
CHECK - Do all key personnel
know about the current status of
confirming or denying situation
templates (enemy COAs)?
- Is the intelligence available
whenever you or one of your staff
officers needs to make an informed
decision?
RECEIVE MISSION (Again)
Intelligence Cycle Phase:
Directing (Again)
Commander's
Interaction with the Intelligence Cycle
The intelligence cycle is dynamic, and you
need to refocuse it as the battle changes and
your requirements for intelligence and
targets change.
Continue to discuss the common
understanding of the battlefield with the S2,
S3, and other staff officers.
Commander's
Checklist
CHECK - Is the S2 apprising you of
anticipated situations on the battlefield?
CHECK - Does the S2 use PIRs to refocus the
collection effort to address new gaps in
knowledge?
CHECK - Does the S2 ask you to approve the
new PIRs before implementing them?
Different IRs will become PIRs to address
new (or newly important) gaps in knowledge.
Likewise, PIRs may be downgraded to IRs.
The collection plan and taskings are modified
to meet new requirements.
If necessary, new intelligence may require
reinitiation of all (or parts) of the command
estimate process.
CHECK - Can the S2 and IEWSO estimate the
impact on collection assets associated with
each change in the PIRs?
CHECK - Is the S2 prompting you and the S3
to modify the plan ?
INTELLIGENCE
REPORT/RECORD
Intelligence
Report is
important in the procedures of
intelligence Cycle which must be
followed in order to get
significant military information in
proper and effective manner that
can be essential to the
commander who needs to
formulate and make decisions.
MILITARY SECURITY
Military Security -encompasses those measures
taken by a command to project itself from
espionage, hostile observation, subversion or
sabotage. It includes those active and passive
counterintelligence measures taken within or
directly pertaining to Armed forces and to specific
military operations. At corps (or equivalent units)
and lower organization levels, counterintelligence
measures are usually concerned with military
security. Military security embraces most of the
basic counterintelligence measures which would
be applicable to all types of military units
regardless of their type of specific mission.
Military Security Cont:
Some example of military
Secrecy disciplinesecurity
Counter sabotage
are:
Safeguarding of classified
defense information and
equipment
Signal communication security
Security of troops movements
Security of control of
accredited correspondents
Special handling of evaders
and escapees
Base and Unit security
Counter subversion within the
AFP
Counterespionage
Concealment and camouflage
Counter reconnaissance
Counterintelligence control of
prohibited areas
Special handling of prisoners of
war (POW)
Security control of all relation
with resistance groups operating
in enemy territory.
Tactical measures as required in
combat area.
COUNTERINTELLIGENCE
It consist of all activities done
in peace and war concerned with
the prevention, detection,
neutralization and destruction of
the intelligence activities of a
real or potential enemy, by
planning and developing suitable
counter measures to that such
hostile activities.
Counterintelligence Cont.
Objective:
To safeguard information, personnel,
materials, and instillations against espionage, or
subversive activities of hostile foreign powers,
and disaffected or dissident groups or
individuals which constitute a threat to the
national security. In addition, it is with the
realm of counterintelligence to take aggressive
action to neutralize and destroy hostile efforts
to engage in espionage, sabotage and
subversion.
COUNTERINTELLIGENCE
MEASURES:
Passive Counterintelligence measures- conceal
information from the enemy. They include measures as
secrecy discipline, security of classified documents and
materials, communications and electronics security,
movement control, censorship camouflage, the use of
concealment, and electronic countermeasures. Passive
counterintelligence measures generally are ready
standardized in the SOP regardless of the specific
nature of the unit mission.
Active Counterintelligence measures- activity
block the enemys attempt to gain information or to
engage in sabotage or subversion. They include counter
reconnaissance, counterespionage, counter subversion,
and the use of smoke to deny enemy observation. Active
counterintelligence measures vary with the mission of
the units.
SUMMARY
DEFINITION
OF TERMS.
INTELLIGENCE PRINCIPLES.
INTELLIGENCE AXIOMS.
INTELLIGENCE CYCLE.
INTELLIGENCE REPORTS/RECORDS
MILITARY SECURITY
COUNTERINTELLIGENCE
QUESTIONS ?
???
THE END
EXAMINATION
Basic Intelligence
Name____________
Course___________
Date____________
Score___________
Test I (True or False)
Instructions: Write T if the statement is
true and F if the statement is false .
_____ 1. Combat intelligence is intelligence which required
for the formulation of policy and military plans at
national and international levels.
_____ 2. Information is a raw or unevaluated material of
every
description
including
that
derived
from
observation,
communication,
reports,
rumors,
imaginary and other sources from which intelligence is
produced.
_____ 3. Phase of intelligence cycle in which information is
transformed into intelligence is dissemination.
_____ 4. Recording, Evaluation and Interpretation are three
(3) distinct steps of processing information.
_____ 5. Product resulting from collection, evaluation and
interpretation of information is Intelligence.
Test II (Single Response)
Encircle only the letter that corresponds to
your answer.
1. _____________are facts that require no proof because the truth
of these statements is obvious.
a. Intelligence principles
b. Intelligence axioms
c. Intelligence Cycle
2. _____________One of the principle of intelligence .
a. Intelligence must be useful b. Intelligence is initiative
c. Intelligence is none sense
3.
Planning, Collection, Processing and Dissemination are
__________ of the intelligence cycle.
a. Factors
b. Steps
c Phases
4. ____________is the step by which intelligence is created from
the raw material of information.
a. Recording
b. Evaluation
c. Processing
5. The intelligence cycle has no_____________________.
a. information
b. Beginning and no end
intelligence
c.
6.
Planning of the collection effort consist of
_________steps.
a. 7
b. 3
c. 5
7. Recording, Evaluation and interpretation are the
_______ of processing of information.
a. distinct steps
b. Factors
c. Operations
8. _______________one of the operation of processing
information
according to pertinence, reliability of
source and accuracy of information.
a. Recording
b. Interpretation
c. Evaluation
9. _____________ __ are persons, things, or actions from
which information about the enemy, weather or
terrain is derived.
a. Collection agency b. Source of information
c. Collection
10. Essential Elements of Information (EEI) are the
unobtainable items of
intelligence needed by the
Commander, at the particular time.
a. True
b. False
c. none of the side