B. Updated - Ntc-slc2022 - A - & D - Intel - Processing

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 76
At a glance
Powered by AI
The key takeaways are that the document discusses the intelligence cycle/process used by police, military and intelligence agencies to gather and analyze information, as well as how intelligence supports operational planning and decision making.

The main components of the intelligence cycle are direction, collection, processing, and dissemination and use. It is a cyclical process that feeds back on itself to continuously refine assessments and keep intelligence up to date.

Information is raw or unevaluated data, while intelligence is processed information with investigative or evidentiary value. Intelligence is important for solving crimes and preventing threats like criminality, insurgency and terrorism.

INTELLIGENCE PROCESSING

NORBERTO ALMIRANTE BATISLAONG, MPSA


Police Colonel (Ret.)
Professor
INTRODUCTION

 Intelligence Cycle describes the General Intelligence


Process being undertaken by the police, military, and/or
civilian intelligence agency on their day to day activities
to ensure national security and internal stability of the
country.

 Police and military commanders use the Four (4)


Operations process to continuously design the conduct of
their operations thru:
• Planning the operation
• Preparation of the Operation plan
• Execution of the Operation plan
• Assessment of the result of the executed Operation
plan

2
INTRODUCTION
 All gathered raw data or information are being validated
to determine its importance and suitability for the intended
purposes.
 Without processed “INFORMATION or INTELLIGENCE”, the
Commanders CANNOT successfully accomplish their
activities which are all geared towards the attainment of their
assigned goals or missions.
 Intelligence Operations support the commander's Operation
Process for it provides him or her with “intelligence about the
enemy, the battle-field environment, and the situation in
general.
 Intelligence data derived from processed or evaluated raw
information with evidentiary value are very important in
solving, preventing, and controlling  crimes caused by
“Criminality,  Insurgency, &  Terrorism”.
3
GENERAL CHARACTERISTICS
OF A GOOD INTELLIGENCE AGENT
1. Intelligence Characteristics
2. Physical Characteristics
3. Psychological Characteristics

4
DEFINITION OF TERMS

INTELLIGENCE COMMUNITY
- Integrated and practically organized entity composed of
units or agencies which have…..“intelligence interests and
responsibilities” (i.e. ISAFP-J2, IG-DI, NICA, AISG-PA, NISG-
PN, etc).

POLICE INTELLIGENCE
- Product resulting from the collection, recording,
evaluation, analysis, integration, and the interpretation of all
obtained available information being used in the preparation and
execution of police plans, policies, and programs.

 
5
INTELLIGENCE FAILURE
- Often a result from preventable conditions such as:

a. poor understanding of intelligence methods and


capabilities.

b. poor coordination between intelligence and operations.

c. poor dissemination of intelligence methods of


conducting operations.

6
INTELLIGENCE TRADECRAFT
 Generally speaking, it means the “Activity of Intelligence”.
 Tradecraft, within the intelligence community refers to the
techniques, methods and technologies used in
modern espionage (spying) and generally, as part of the activity
of intelligence assessment.
 This includes general topics or techniques (dead drops, for
example), or the specific techniques of a nation or organization
(the particular form of encryption (encoding) used by the National
Security Agency, for example).Skills and techniques employed by
intelligence personnel (Intelligence officers, intelligence
operators, and informant) in the conduct of intelligence mission
such as espionage, surveillance, casing, undercover assignment,
among others.

 In the Filipino, tradecraft is termed as “Diskarte.”


AGENT HANDLING
- Management of Human agents or Agent Network (Number
of agents in a network/group).

CASE OFFICER (CO)


- Intelligence officer, who is a trained specialist in the
management of human agents and human intelligence
networks.

PRINCIPAL AGENT (PA)


- a senior agent acting as “proxy or "cut-out to buffer
(safeguard/protect) the Case Officer from .direct contact with
the Human agent or Agent Network under the doctrine of “need
to know basis”.

ACTION AGENT (AA)


- Person who does the following or who maintains the
watch. (organic/regular member of the police, military, or any gov’t
8
law enforcement agency).
What is INFORMATION?
-“Unprocessed/raw data or material” of every description,
such as: “facts, statistics, observations, documents, materials,
maps, diagrams, and reports” of any kind that may give light on
the possible or actual enemy, areas of operation, trends,
opinions, gossips, and propaganda.

What is INTELLIGENCE?
- A “processed information”. - An end product resulting
from the “collection, evaluation, analysis, integration, and
interpretation of all obtained available information”.

What is NTELLIGENCE INFORMATION?


- Processed information gathered or received with
“intelligence interests”.
9
COLLECTION OF INFORMATION
– Systematic exploitation of Sources (Human, Scientific,
and Field) of Information by the . . . Collection agencies (IG,
ISAFP, NICA, etc) and the delivery of the information obtained to
the proper Intelligence unit or agency.

SOURCE
– Any person, object, or activity or action that provides
information about the enemy, weather, or terrain.

SOURCES OF INFORMATION
- Person, thing or action from which information .about the
enemy, weather, or terrain is/are derived.
- Person, object, or record used by an Investigator or
intelligence operative in conducting investigation.

10
AGENCY
– any individual or organization which “exploits a source” to
collect information and/or process information.

INDICATOR
- Generalized theoretical action that an enemy might be
expected to take in preparation of aggressive action like things or
events that transpired in the past or presently occurring.

COLLECTION PLAN
- Dynamic tool used to coordinate and integrate the efforts
of all Collection units and agencies (Intelligence Units, etc) which
is continually being revised as required.
- Assists the Collection Manager in organizing his or her
thought processes.

11
SURVEILLANCE
 Secretive continuous process of watching persons, vehicles,
places, or things to obtain information concerning identities,
activities, vehicles, operations, & contact/s of subject person.
 Covert observations of persons, vehicles, places, or objects thru
physical or technical means to obtain information or evidence.

 Clandestine form of investigation consists of keeping on sight


any person, place, or other physical observation in order to obtain
evidence or information pertinent to the purpose of investigation.
CASING
 Reconnaissance or survey of a building, place or area to
determine its suitability for intelligence use or its vulnerability in
an intelligence operation.

 Security measure because it offers some degree of protection for


those operating in an area unfamiliar to them.
UNDERCOVER ASSIGNMENT OR ROPING
 Investigative technique in which the investigator conceals his/her
true identity and status and adopts an assumed role in order to
obtain access to information or evidence which would not be
available through other investigative means.
 Intelligence work that requires the assumption by police agent of
another identity in keeping with the situation to be explored.
COVER

 Device (tool) or stratagem (trick) by which the selected surveillant


conceals his/her identity and relationship with the Investigating
agency.

 Means by which an individual, group, or organization conceals the


true nature of its activities, and/or its existence from the observe
INFILTRATION

 Gradual penetration into the enemy’s domain and territory.


INTERVIEW
– Method of obtaining information from a person, who is
aware that he/she is giving wanted information although he/she may
be ignorant of the true connection and purposes of the interview.
INTERROGATION
– Art of questioning and examining a person or source to
obtain usable information in the shortest possible time.
- Type of interview which involves a diverse array (selection)
of techniques, ranging from developing a rapport with the
subject to outright torture, with the goal of eliciting (getting
secretly) useful information.
ELICITATION
- Method of acquiring information desired information from
a person who is unaware that he/she is providing wanted
information and if made aware may not intend to give
information.
14
What is INTELLIGENCE PRODUCTION ANALYST?
- Producer of intelligence (out from raw data called
information) and not collector of information who is assigned in
the Intelligence Production Division/Branch/Section of the
Intelligence Unit/Agency such as NICA,PNP. AFP, NBI, PDEA,
etc.

15
What is INTELLIGENCE CYCLE?
- A cyclical steps followed from “Intelligence planning
phase up to the Dissemination and use phase of processed
information called “Intelligence”.
- A repetitive process of CONVERTING INFORMATION into
INTELLIGENCE and made available to users.

INTELLIGENCE CYCLE AS PROCESS


- It determines the daily activities of the Intelligence
Community.
- It provides needs of the intelligence "consumers like the
policymakers, police/military officials, and other decision
makers for their activities.
- Intelligence requirements are sorted (arranged or
classified) and prioritized within the Intelligence
Community .and are. used to drive the collection activities of
the Intelligence Community.
16
FOUR (4) PHASES OF INTELLIGENCE CYCLE:

1. Direction Phase
2.Collection Phase
3. Processing Phase
4. Dissemination and Use Phase

17
4 PHASES OF INTELLIGENCE CYCLE

1. Direction Phase

4. Dissemination Mission 2. Collection Phase


and Use Phase

3. Processing Phase
INTELLIGENCE CYCLE AS A PROCESS

What is the specific mission?

Mission
What is a MISSION?

- Concise (brief) written statement of the directives


from higher ups broken down into objectives and further
classified into pertinent targets.

Example of a Mission Statement:

- To conduct case build-up through intensified


information collection against the radical Islamic Maute
Group, its leadership, personalities, organizational
structure, and other important details for future
neutralization.

20
Phase 1: Direction- Activities:
a. Planning and Selection of suitable Intelligence Targets as
Requirements for specific peace & order related concerns like,
CPP-NPA-NDF, Maute Group, etc.
b. Drawing up specific collection of information requirements such
as: Identity of the Target or Unit, its leadership and organizational
goals, organizational structure, move-shoot- communicate capabilities,
etc
C. Selection of the intelligence personnel tasked to undertake intel
work basing on their capabilities, training, skills, placement, and
access to the TARGET.
d. Identifies the problem that intelligence process will examine.
- At the initial stage, the following are asked:
1). Who is the consumer of intelligence product?
2).What is/are the tasks that the client wants to
address?
3). What intelligence methods will be used?
4). What resources are required?
5). Where will the resources come from?
6). How long will it take to achieve the task/s? 21
INTELLIGENCE CYCLE AS A PROCESS

1. Direction Phase

Mission 2. Collection Phase


Phase 2: Collection
- Collection of Information is the systematic exploitation
of Sources of Information by collection agencies and the
delivery of the information obtained to the proper Intelligence
unit or agency.

What are the different Sources of Information?


1. Human Sources
2. Field Sources
3. Scientific Sources

23
HUMAN SOURCES (EXAMPLES)

1. Criminal/s & associate/s


2. Informant/s and Informer/s,
3. Witness/es,
4. Offender/s and prisoner/s,
5. Police investigator/s & intelligence officer/s,
6. Private investigator/s,
7. Business people, and
8. People in the community

FIELD SOURCES (EXAMPLES)

1. Surveillance and Casing teams,


2. Undercover operatives,
3. Informant handlers (Case officers, Principal agents, etc),
4. Aerial or coastal surveillance,
5. Liaison officers, and
6. Others
24
SCIENTIFIC SOURCES (EXAMPLES)

1. Physical evidence/Forensic teams,


2. Financial investigators or Forensic accountants ,
3. Economists,
4. Drug analysts,
5. IT specialists,
6. Psychological assessors,
7. Computer crime specialists, and
8. Others
 

25
Phase 2: Collection

Types of Sources of Information


 
1. Open Sources (90%) - are those information obtained
openly.

2. Non-Open Sources (10%) - are those information


obtained by resorting to special efforts of
clandestine (secret) operation.

26
Phase 2: Collection

Methods of Collection Of Information

1. Overt method
- Information or documents produced/obtained openly without
regards as to whether the subject (target) of investigation or
intelligence operation becomes aware of it.

2. Covert method
- The information or documents obtained secretly without the
knowledge of the subject (target) against whom the information or
documents may be used.

27
OVERT COLLECTION METHOD (EXAMPLES)
1. Interviews and surveys,
2. Database manipulation (computer),
3. Requests for information,
4. Electronic surveillance (CCTV ),
5. Evidence in court matters, and
6. Other unconcealed means

COVERT COLLECTION METHOD (EXAMPLES)


1. Informants and Informers,
2. Surveillance and Casing teams,
3. Confidential requests for information,
4. Telephone intercepts/listening devices, and
5. Other secret means of obtaining information.
 
INTELLIGENCE CYCLE AS A PROCESS

1. Direction Phase

Mission 2. Collection Phase

3.Processing Phase
Phase 3: Processing
Four (4) Steps of Processing Procedure
1. Information is processed as received without waiting to
collect additional information.

2. The sequence in processing depends upon the nature and


urgency of the information.

a. Recording is usually the first step; however, on urgent items,


recording may occur simultaneously with evaluation and
interpretation.
b. Disseminated of information needed immediately by higher,
lower, or adjacent units before it is completely processed.
c. Information not of immediate concern, but of possible future
value is normally completely processed before being
disseminated.

30
Phase 3: Processing
Four (4) Steps of Processing Procedure (Cont’n)

3. Evaluation and Interpretation may occur simultaneously


followed by immediate dissemination.

4. Reporting information to higher echelons may occur


concurrently with processing.

31
Phase 3: Processing

Three (3) Steps or Operations in Processing of


Information

1. Recording the information

2. Evaluation of Information

3. Interpretation Analysis

32
Phase 3: Processing
How to Record Information?
- Reduction of information to writing or some other form
of graphical representation (chart, graph, etc) and the
arranging of information into groups of related items.

NOTE:
The wealth of information requires thorough and painstaking
recording to prevent loss of items.

33
Phase 3: Processing

Common Aids/Sources of Recording Information


1. Intelligence Journal
2.Intelligence Workbook
3. Intelligence Situation Map
4. Intelligence Files
5. Coordinate Register
6. Order of Battle (ORBAT)

34
Intelligence Journal
– Permanent chronological record of reports and messages that
have been received and transmitted, of important events that have
occurred, and of actions taken in response, covering a stated period
usually 24 hours.

Intelligence Workbook
– Systematic arrangement by subject heading which aids in the
sorting, evaluation, and interpretation of information in the
preparation of Intelligence reports.
- Not distributed outside the agency.

35
INTELLIGENCE SITUATION MAP
– Displays the current enemy disposition/location and situation,
basis for comparison to determine the significance of new received
data pertaining to the enemy, background for briefings and other
required intelligence reports, overlays which graphically portray the
enemy situation, assist in the determination of enemy’s patterns of
movement, and basis to focus attention on possible intelligence gaps
which require redirection of the collection efforts.

INTELLIGENCE FILES (Persons, Numbers, and Non-Persons


Data)
- These are files necessary to permit ready access to all
available information.

36
TYPES OF INTELLIGENCE FILES

1. Journal File
- permanent and official record which contains a record
copy of each message or document noted in the journal.
 
2. Information or Reference File
- contains all information of possible future value cross-
indexed in this file.

- These are information which have no immediate interest


but may be of future value.

37
Coordinate Register

- Recording device primarily designed to provide the


Intelligence officer with a workable counterpart to the extensive
Intelligence files and Workbooks maintain at higher echelons.

Order of Battle (OB/ORBAT)


- A military tactical term composed of Eight (8) Factors about
the enemy,
- PNP tactical term is Target List or a Master Reference List
composed of Watch List and Wanted List.
 

38
Phase 3: Processing
What is Information Evaluation?
- It is the determination of the following:
1). Pertinence (relevance/significance) of
information to the mission,

2). Reliability of the source (agency or


individual) (Alpha Code: A-Z), and

3). Accuracy of the item/information


(Numeric Code: 1-6).

39
Pertinence of Information

– Determination of the area of operation and who needs it, if


so, by or to whom and when.

Reliability of Source

– Determination of the sources (agency or individual) of the


information by which it was collected and evaluated and its
dependability or principal basis of judging its previous experience,
knowledge of the training, and past performance in collecting and
providing information.

Accuracy of Information
- Determination of the truth of the information.
40
Phase 3: Processing
Application of Admiralty Code/System (NATO System)
- It comprises a Two-character Notation:

1. Assessing the reliability of the source using notation:


Alpha Code: A-F

2. Assessing the level of confidence (credibility/accuracy)


the information using notation: Numeric Code: 1-6
 

41
EVALUATION AND SOURCE

- it is not the source’s name or code name, but . . . . a


statement that gives the reader some idea of the source’s
access to the information and the reliability while at the same
time not revealing the source’s identity.

Examples:
Source: Y1551MEBEFNCRIII1935AO71998.

Evaluation: B2

Evaluation Rating (Final) = B2Y


 

42
What is SOURCE CONTROL CODIFICATION SYSTEM?

- The act, process, or result of arranging in a systematic


coded form the intelligence data. 

Example:
Source: Y1551MEBEFNCRIII1935AO71998
(Civilian agent Source code)

PURPOSE AND SIGNIFICANCE OF THE SOURCE CONTROL


CODIFICATION SYSTEM

- Primarily to protect or keep secret the identity of the


Source or Information provider (regular agent or documented civilian
informant like BIN informant, or plain civilian) and other pertinent
intelligence data for SECURITY REASONS.

43
CATEGORIZATION/CLASSIFICATION OF SOURCE
(INFORMATION PROVIDER: PERSON/AGENCY/DOCUMENTARY)

T - Direct observation report by Commander/COP/Head of Unit.


U - Report by penetration agent (organic gov’t agent or documented
civilian agent).
V - Report by PNP/AFP troops involved in encounter or operation
W - Interrogation report of captured enemy agent, both local and
foreign.
X – Observation report by gov’t official and employee (uniformed and
non-uniformed).
Y – Observation report by a member of the populace.
Z – Documentary report (video, film, magazine, etc).

44
RELIABILITY EVALUATION OF SOURCE (PERSON /
AGENCY): ALPHA CODE - A TO F

A - Completely Reliable: No doubt of authenticity, trustworthiness, or


competency ; or has a history of complete reliability of informant.
B - Usually Reliable: Minor doubt about authenticity, trustworthiness, or
competency; has a history of valid information most of the time of
informant.
C - Fairly Reliable: Doubt of authenticity, trustworthiness, or
competency of informant but has provided valid information in the past.
D - Not Usually Reliability: Significant doubt about authenticity,
trustworthiness, or competency of informant but has provided valid
information in the past.
E – Unreliable: Lacking in authenticity, trustworthiness, and competency
of informant ;or history of invalid information.
F - Reliability Cannot be Judged: No basis exists for evaluating the
reliability of informant. (Example: Anonymous informant)
45
CREDIBILITY/ACCURACY EVALUATION OF ITEM OR
INFORMATION: NUMERIC CODE – 1 TO 6

1 - Confirmed by Other Sources: Confirmed by other independent


sources; logical in itself; consistent with other information on the subject
(person, thing, or activity)..
2 - Probably True: Not confirmed; logical in itself; consistent with other
information on the subject (person, thing, or activity)..
3 - Possibly True: Not confirmed; reasonably logical in itself; agrees with
some other information on the subject (target person, thing, or activity).
4 - Doubtfully True: Not confirmed; possible but not logical; no other
information on the subject
5 – Improbable: Not confirmed; not logical in itself; contradicted by other
information on the subject (target person, thing, or activity).
6 - Truth Cannot be Judged: No basis to exist for evaluating the validity
of the information

46
= CLASSIFICATION OF SOURCE (PERSON/AGENCY/DOCUMENT) REPRESENTED BY LETTERS

T - Direct observation by Commander/COP/Head of Unit


U - Report by penetration agent
V - Report by PNP/AFP troops involved in encounter or operation
W - Interrogation of captured enemy agent, both local and foreign
X - Observation by gov’t official and employee (uniformed and non-uniformed)
Y - Observation by a member of the populace
Z – Documentary (video, film, magazine, etc)

= RELIABILITY OF SOURCE (PERSON/AGENCY) REPRESENTED BY LETTERS


A - Completely Reliable: No doubt of authenticity, trustworthiness, or competency of informant.
B - Usually Reliable: Minor doubt about authenticity, trustworthiness, or competency of informant most of the time.
C - Fairly Reliable: Doubt of authenticity, trustworthiness, or competency of informant but has provided valid
information in the past.
D - Not Usually Reliability: Significant doubt about authenticity, trustworthiness, or competency of informant but
has provided valid information in the past.
E – Unreliable: Lacking in authenticity, trustworthiness, and competency of informant or with history of invalid
information.
F - Reliability Cannot be Judged: No basis exists for evaluating the reliability of informant source. (Example:
Anonymous informant)
= CREDIBILITY/ACCURACY OF INFORMATION REPRESENTED BY NUMBERS

1 - Confirmed by other sources - Confirmed by other independent sources; ; logical in itself;


Consistent with other information on the subject
2 - Probably true - Not confirmed; logical in itself; consistent with other information on the subject.
3 - Possibly true - Not confirmed; reasonably logical in itself; agrees w/ some other info on the
subject
4 - Doubtfully true - Not confirmed; possible but not logical; no other info on the subject
5 - Improbable - Not confirmed; not logical in itself; contradicted by other info on the subject.
47
6 - Truth cannot be judged -No basis to exist for evaluating the validity of the information.
EXAMPLES: HOW TO PROCESS (VALIDATE) INFORMATION?
Evaluation Rating: B2Y
B - Person’s reliability as an informant is just fair (fairly reliable) as there is
doubt as to his or her authenticity, trustworthiness, or competency
though has he or she provided valid information in the past.
2 - Information provided by the person as an informant is probably true
though not confirmed yet by other source but such information is logical
in itself and consistent with other information on the subject (target
person, thing, or activity).
Y - Person that provides information is a civilian populace.
Evaluation Rating: A1U

A - Person as an informant is completely reliable as there is no doubt as


to his or her authenticity, trustworthiness, or competency.
1 - Information provided by the person has been confirmed by other
independent sources; logical in itself; & consistent with other information
on the subject (target person, thing, or activity).
U - Person that provides the information comes from penetration agent
(organic gov’t agent or documented civilian agent)
KINDS OF ANALYSIS

1. Descriptive analysis
- Examines the info and seeks to describe what is
happening or what happened previously.

2. Explanatory analysis
- Seeks to explain the reasons why an event or incident
is happening or happened.

 3. Predictive analysis


- Uses both descriptive and explanatory analyses in
seeking to forecast or predict what may occur as a result of what is
happening and the cause behind.
 
.
49
INTERPRETATION ANALYSIS
- It is a process of determining the significance of the gathered
information relative to the mission by comparing, contrasting and
summarizing them with those information or intelligence data
already known and thereafter draw deduction (assumption or
conclusion) about the probable meaning of the evaluated
information by undertaking the following activities:

1. Assessment
2. Integration
3. Deduction

50
ASSESSMENT OF INFORMATION
- Sifting (filtering) and sorting (categorizing) of evaluated
information to isolate insignificant elements with respect to the
mission and operation of the unit.

INTEGRATION OF INFORMATION

- Process of combining, connecting, and linking all the


elements isolated in analysis with other information from the
past, present, and possible future information to form a logical
picture on hypothesis (possible explanation) of the enemy
activities or influence of operational area characteristics on the
mission of the unit.
 

51
DEDUCTION

- Inference or conclusion derived from the hypotheses


(theories) developed.
- It is then tested and considered valid as a result of
integration.
- It is designed to Answer The Questions:

1). What does this information mean in relation to the area


of operation and the enemy situation?

2) What does this information mean in relation to the


enemy’s use of counter-deception?

NOTE:
- The resulting answers provide a useful conclusion which
can serve as a basis for determining future enemy’s courses of
action and for keeping the Intelligence Estimate current.
52
INTELLIGENCE CYCLE AS A PROCESS

1. Direction Phase

4. Dissemination
Mission 2. Collection Phase
and Use

3. Processing Phase
4. Dissemination and Use
- Important Factors in the Dissemination and Use of
Evaluated Information or Intelligence to the User are:

a. Timeliness
- Timely conveyance of evaluated information or intelligence
data to those who need it (user/s) to enable the user/s to make
decisions with confidence in the formulation of plans, policies,
and programs for the enhancement of national security.
b. Propriety
- Suitability/correctness of the evaluated information or
intelligence in an appropriate form for dissemination to the user.
- Dissemination of intelligence data is prioritized and only the
unit which needs it can avail of.

54
4. Dissemination and Use

Methods of Information Dissemination


a. Oral briefing or Personal contact
b. Message/s thru Electronic means
  c. Written Intelligence reports

55
INTELLIGENCE CYCLE
FEEDBACK

- A dialogue between Intelligence consumers (users) and


producers (tasked Intelligence units/agencies) should occur before
and continue after the intelligence has been received.

- The Intelligence analyst should have some sense of how well


their intelligence requirements are being met and addressed any
adjustments that need to be made.

- Assesses the degree to which the finished intelligence


addresses the needs of the Intelligence consumer and will determine
if further collection and analysis is required.

56
INTELLIGENCE CYCLE (PROCESS)

1. Direction Phase

4. Dissemination Mission 2. Collection Phase


and Use Phase

3. Processing Phase
PLANNING and SUPERVISION
- a continuous process which ultimately coordinates and
integrates all efforts of the Intelligence Cycle from Direction,
Collection, Processing up to Dissemination & Use Phases.

58
TYPES OF WRITTEN INTELLIGENCE REPORTS
– Usually made for higher, lower, and adjacent units.

1. Intelligence Report (INTREP)


2. Intelligence Summary (INTSUM)
3. Imagery Interpretation Report (IIR)
4. Document Analysis Report (DAR)
5. Tactical Interrogation Report (TIR)
6.Technical Intelligence Report (Tech-IR)
7. ORBAT (Order of Battle) Handbook
8. Periodic Accomplishment Report (PACREP)
9. Intelligence Estimate (Intel-Est)
10. Supplementary Intelligence Report (SUPINTREP)
11. Periodic Intelligence Report (PERINTREP)
12. Intelligence Annexes
13. Other forms of Intelligence Reports
59
BRIEF EXPLANATION ON HOW TO
“ EVALUATE GATHERED INFORMATION
AND
TRANSLATE IT INTO AN INFORMATION REPORT
(INFOREP)”

60
INTELLIGENCE CYCLE: AS A PROCESS
(THE INFORMATION COLLECTION AND PROCESSING)

= Procedure on how to process raw data or information


and convert the same into a reliable data called
Intelligence.

1. Identify first the target selection and collect needed


information as many as you can.
2. Record all gathered information.
3. Evaluate all gathered information
4. Analyze all gathered information by applying the
Interpretation Analysis Method (Assessment, Integration,
and Deduction)

61
INTELLIGENCE CYCLE: AS A PROCESS
(THE INFORMATION COLLECTION AND PROCESSING)

= Component of Admiralty/NATO Code/System

1. Alpha Code : A to Z (Reliability of Source or Information


provider)

2. Numeric Code: 1 to 6 (Accuracy of the information/item


collected)

3. Categorization of Source or Information Provider (T, U, V,


W, X & Z)

62
= CLASSIFICATION OF SOURCE (PERSON/AGENCY/DOCUMENT) REPRESENTED BY LETTERS

T - Direct observation by Commander/COP/Head of Unit


U - Report by penetration agent
V - Report by PNP/AFP troops involved in encounter or operation
W - Interrogation of captured enemy agent, both local and foreign
X - Observation by gov’t official and employee (uniformed and non-uniformed)
Y - Observation by a member of the populace
Z – Documentary (video, film, magazine, etc)

= RELIABILITY OF SOURCE (PERSON/AGENCY) REPRESENTED BY LETTERS


A - Completely Reliable: No doubt of authenticity, trustworthiness, or competency of informant.
B - Usually Reliable: Minor doubt about authenticity, trustworthiness, or competency of informant most of the time.
C - Fairly Reliable: Doubt of authenticity, trustworthiness, or competency of informant but has provided valid
information in the past.
D - Not Usually Reliability: Significant doubt about authenticity, trustworthiness, or competency of informant but
has provided valid information in the past.
E – Unreliable: Lacking in authenticity, trustworthiness, and competency of informant or with history of invalid
information.
F - Reliability Cannot be Judged: No basis exists for evaluating the reliability of informant source. (Example:
Anonymous informant)
= CREDIBILITY/ACCURACY OF INFORMATION REPRESENTED BY NUMBERS

1 - Confirmed by other sources - Confirmed by other independent sources; ; logical in itself;


Consistent with other information on the subject
2 - Probably true - Not confirmed; logical in itself; consistent with other information on the subject.
3 - Possibly true - Not confirmed; reasonably logical in itself; agrees w/ some other info on the
subject
4 - Doubtfully true - Not confirmed; possible but not logical; no other info on the subject
5 - Improbable - Not confirmed; not logical in itself; contradicted by other info on the subject.
63
6 - Truth cannot be judged -No basis to exist for evaluating the validity of the information.
What is EVALUATION RATING?

- it is not the source’s name or code name, but a statement


that gives the reader some idea of the source’s access to the
information and the reliability while at the same time not revealing
the source’s identity.

EXAMPLES:

EVALUATION RATING:
B2Y or A1U

NOTE: See next slide for further elaboration/explanation

64
EXAMPLES: HOW TO PROCESS (VALIDATE) INFORMATION?
Evaluation Rating: B2Y
B - Person’s reliability as an informant is just fair (fairly reliable) as there is
doubt as to his or her authenticity, trustworthiness, or competency
though has he or she provided valid information in the past.
2 - Information provided by the person as an informant is probably true
though not confirmed yet by other source but such information is logical
in itself and consistent with other information on the subject (target
person, thing, or activity).
Y - Person that provides information is a civilian populace.
Evaluation Rating: A1U

A - Person as an informant is completely reliable as there is no doubt as


to his or her authenticity, trustworthiness, or competency.
1 - Information provided by the person has been confirmed by other
independent sources; logical in itself; & consistent with other information
on the subject (target person, thing, or activity).
U - Person that provides the information comes from penetration agent
(organic gov’t agent or documented civilian agent)
= HOW TO INDICATE EVALUATION RATING IN THE
INFORMATION REPORT?

- By combining/indicating the source of information,


reliability of the source, and accuracy/credibility of information
itself being represented by notation letters (Alpha Code: A to F)
and numerical number (Numeric code: 1 to 6)

NOTE:
in succeeding slides are SAMPLES of TWO (2)
INFORMATION REPORTS (INFOREPSs) with TWO (2) separate
EVALUATION RATING: B2Y and A1U.

66
SAMPLE OF INFORMATION REPORT (INFOREP) FORMAT
CONFIDENTIAL
Republic of the Philippines
NATIONAL POLICE COMMISSION
PHILIPPINE NATIONAL POLICE, NATIONAL CAPITAL REGION POLICE OFFICE
SOUTHERN POLICE DISTRICT
DISTRICT INTELLIGENCE DIVISION
Lawton Avenue, Fort Bonifacio, Taguig City
 
INFORMATION REPORT
 
1. FILE NUMBER SPDDID-2102
2. REFERENCE SPD IMPLAN No. 2022-02 to PNP LOI SANG-BANAT
3. SUBJECT Report on suspected illegal drug high value target
(HVT) YAO MENG @ “PINSTIK”
4. DATE OF REPORT November 7, 2022
5. REPORTER PCMS Alex P Abiog
6. DESIGNATION/UNIT Agent Handler, Team 2, IOB, DID, SPD
ASSIGNMENT
7. EVALUATION B2
8. SOURCE Y1300MECADNCRIII1990A122009
9. DATE ACQUIRED November 7, 2022
10. MANNER NFORMATION Personal meeting with source by AH. 67
ACQUIRED
INFORMATION REPORT (INFOREP): Continuation:
CONFIDENTIAL
 11.INFORMATION PROPER
Information received by Agent Handler (AH) from his confidential civilian
informant (Action agent) @ MANAGER disclosed that on November 7, 2022, at
10:00 PM, he noticed that their a Chinese looking national client or customer has
been acting suspiciously for almost a weeklong now. He is staying at their
condominium room located at No. 123, Xavierville Condominium, Barangay
Bel-Air, Makati City . Their customer‘s name is Mr MENG FE, a Hong Kong
national and with Philippine tourist visa.
Further, the source was able to surreptitiously took several pictures of the
said person together with his frequent unidentified Filipina looking companion
and submitted the same to his Agent handler (AH) for verification.

12. COMMENT/S:
Records verification made on file revealed that the source’s submitted
picture of MENG FE has indeed matched with the descriptions of YAO MENG
@“PINTSIK” listed as alleged No. 3 man of Chinese TRIAD group operating in
the Philippines per Illegal Drug Watch list of this office.

13. ACTION TAKEN/REQUESTED:


Subsequently, the Agent Handler was directed to conduct close monitoring
to confirm the veracity of the information. 68

CONFIDENTIAL
INFORMATION REPORT (INFOREP): Continuation
CONFIDENTIAL
  14. ATTACHMENT/S:

 Picture of high value illegal drug suspect named YAO MENG @


MENG FE/PINTSIK and unidentified Filipina looking companion
en route to their condominium room located No. 123, Xavierville
Condominium, Brgy. Bel-Air, Makati City

Alex Padilla Abiog


Police Chief Master Sergeant

CONFIDENTIAL
69
 
SAMPLE OF INFORMATION REPORT (INFOREP) FORMAT
CONFIDENTIAL
Republic of the Philippines
NATIONAL POLICE COMMISSION
PHILIPPINE NATIONAL POLICE, NATIONAL CAPITAL REGION POLICE OFFICE
SOUTHERN POLICE DISTRICT
DISTRICT INTELLIGENCE DIVISION
Lawton Avenue, Fort Bonifacio, Taguig City
 
INFORMATION REPORT
1. FILE NUMBER SPDDID-2103
 
2. REFERENCE SPD IMPLAN No. 2022-02 to PNP LOI SANG-BANAT
3. SUBJECT Report on suspected illegal drug high value target
(HVT) YAO MENG @ “PINSTIK”
4. DATE OF REPORT November 8, 2022
5. REPORTER PCMS Alex P Abiog
6. DESIGNATION/UNIT Agent Handler, Team 2, IOB, DID, SPD
ASSIGNMENT
7. EVALUATION A1
8. SOURCE U1219MDBBDNCRIII1980A02001
9. DATE ACQUIRED November 8, 2022
10. MANNER ACQUIRED Casing and Surveillance operation
70
INFORMATION REPORT (INFOREP): Continuation:
CONFIDENTIAL
  INFORMATION PROPER
11.
On November 8, 2022, at 6:00 PM, while conducting intensified monitoring,
Agent Handler (AH), along with his action agent (AA) @ MANAGER spotted YAO
MENG @ MENG FE/PINTSIK” eating alone at Coffee shop of Xavierville
Condominium, Brgy. Bel-Air, Makati City. He was busy conversing with someone
over his cellular phone. The two (2) operatives, however, failed to establish the
topic of conversation for lack of opportunity and proper cover to do so. But they
were able to initiate video footage coverage on the subject at the coffee shop
from 6:00 PM up 8:00 PM before he entered his condominium room No. 123.

12. COMMENT/S:
Based on all available intelligence data on file and in coordination with other
PNP anti-drug units, the s subject personality is indeed YAO MENG @ PINTSIK ,
just using the MENG FE as appearing in his passport and other transactions to hide
his true identity from gov’t authorities. He is believed to be in the country to meet
some local counterparts and plan out their illegal drug trafficking activities

13. ACTION TAKEN/REQUESTED:


Strongly recommend that subject HVT personality and his local counterparts,
who are yet to be identified, be covered by appropriate Case Operation Plan
(COPLAN) for their eventual early neutralization.
CONFIDENTIAL 71
INFORMATION REPORT (INFOREP): Continuation

CONFIDENTIAL
 
14. ATTACHMENT/S:

Video Footage Coverage of target personality

Alex Padilla Abiog


Police Chief Master Sergeant

CONFIDENTIAL
72
 
SUMMARY
- Intelligence Process ( Cycle) a describes the general
intelligence process in Police, Military, and Civilian
Intelligence agency. or in Law Enforcement.
- Police or Military Commanders use the operations
process of plan, prepare, execute, and assess to continuously
design and conduct operations.
- The commander cannot successfully accomplish the activities
involved in the operations process without “information and
intelligence”.
- Intelligence Cycle /Process responds to the needs of the
Commander is consisting of Four (4) Phases (Direction; Collection;
Processing; and Dissemination and Use)

73
SUMMARY
- The commander cannot successfully accomplish the activities
involved in the operations process without “information and
intelligence”.
- Intelligence Cycle /Process responds to the needs of the
Commander is consisting of Four (4) Phases (Direction; Collection;
Processing; and Dissemination and Use)
- Intelligence Cycle/Process is a cyclical steps that feed
back upon itself.
- It ensures that assessments continue to be refined and
Intelligence stays up-to-date, thus Security must always be
observed.

74
SUMMARY
- Information is a raw or unevaluated data while Intelligence is
a processed information.

- Produced intelligence data with investigative or evidentiary


value is very important in crime solution, and prevention and
control of   man-made or human-induced incidents or crimes
brought about by Criminality,  Insurgency, and  Terrorism.

75
Thank you!
Any questions?

76

You might also like