100% found this document useful (5 votes)
2K views47 pages

Intelligence Cycle: Icitap Philippines

The document discusses the intelligence cycle which consists of several phases: tasking/directing, collection of information, processing/collation of data, analysis, production of intelligence, and dissemination. It provides details on various collection methods like observation exercises, casing of areas, surveillance techniques, and elicitation/interviews. The goals, definitions, and types of undercover operations are also outlined. The intelligence cycle aims to develop raw data into actionable intelligence that can help policymakers make informed decisions.

Uploaded by

jeysonmacaraig
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (5 votes)
2K views47 pages

Intelligence Cycle: Icitap Philippines

The document discusses the intelligence cycle which consists of several phases: tasking/directing, collection of information, processing/collation of data, analysis, production of intelligence, and dissemination. It provides details on various collection methods like observation exercises, casing of areas, surveillance techniques, and elicitation/interviews. The goals, definitions, and types of undercover operations are also outlined. The intelligence cycle aims to develop raw data into actionable intelligence that can help policymakers make informed decisions.

Uploaded by

jeysonmacaraig
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

INTELLIGENCE CYCLE

ICITAP PHILIPPINES
CASE/INCIDENT ANALYSIS

ICITAP PHILIPPINES
FOUR AXIOMS OF INTELLIGENCE
As defined in classic philosophy, an axiom is a statement that is so evident or
well-established, that it is accepted without controversy or question.

MODULE 7 LESSON 7.1 REV: 12-2015


AXIOM 1 AXIOM 2
• Intelligence is command • Intelligence is essential to
responsibility all types of operations

AXIOM 3 AXIOM 4
• Intelligence is the • Intelligence of the
responsibility of all government must be
intelligence agencies. superior to that of the
enemy.
4
Intelligence and
6
TRAINING OBJECTIVES
After this lesson, participants will be able to:
1. Expound on the definition of Intelligence Cycle.
2. Identify the phases of the Intelligence Cycle.
3. Describe each of the phases of the Intelligence
Cycle.
4. Review the following: ODEX, Casing, Surveillance,
and Elicitation, Interview and Provocation
Techniques.
INTELLIGENCE CYCLE 7

• The process of developing unrefined data into polished


intelligence for the use of policymakers.

• The direction to provide timely, accurate, appropriate


and consumable intelligence to make informed
decisions.

• The intelligence cycle may consist of four through


seven phases/steps but they are all similar.
INTELLIGENCE CYCLE 8

Tasking

Collection
Dissemination

MISSIO
N
Data
Integration Evaluation
& Analysis
Collation
I. DIRECTING/TASKING 9

INITIAL QUESTIONS

 Who tasks?
 How do they task?
 Why do they task?
 What tasks are set?
10
II. COLLECTION OF INFORMATION
Collection is the systematic exploitation of sources of
information by collection agencies & the delivery of the
obtained information to the proper intelligence section.
Police Information Collection Activities

1. Routing patrols 6. Investigations


2. Surveillance 7. Search & Seizure
3. Criminal investigation 8. Checkpoints
4. Use of outsiders like informers &
informants
9. Cordon & search
5. Interrogations 10. Interview & elicitation
11
II. COLLECTION
THREE MAIN TYPES OF SOURCES OF
INFORMATION
1. Open source (OSINT) is information that is publicly
available. One very notable subset of open source
information is so called “grey literature”.

2. Closed source is information collected for a specific


purpose with limited access and availability to the general
public. It is often found in the form of structured databases.

3. Classified is information collected by specifically


tasked covert means including use of human &
technical (image and signals intelligence) resources.
Observation & Description Exercise 12
(ODEX)
Observation (Taking notice) - is a complete & accurate
awareness by an individual of his surroundings &
encompasses the use of all of our major senses to
register & recognize its operational and/or intelligence
significance.
Description - is the actual & factual reporting of one's
own observations or the reported sensory experience
recounted by another.
Observation & Description Exercise (ODEX)
13

Factors that Influence Attention


1. Size – Normal to abnormal size
2. Change – from silence to noise
3. Repetition – shots is fired in every one minute
4. Striking Quality – to attract attention
5. Interest – interest in some objects - sexy women
6. Organic Condition – organic condition of the observer
(ODEX) 14
(ODEX) 15
(ODEX) 16
CASING 17

is the visual inspection of areas or installation in


order to determine their suitability for operational
use such as sites for:
a. safe houses
b. personal/contact meetings
c. caching (imbakan)
d. trainings of agents
e. communications
f. operational activities
g. dead drops
CASING 18
Methods

Personal Map
Reconnaissanc Reconnaissanc Research
e e

Prior
Hearsay
Information
CASING 19
Coverage

Characterizatio Approaches to
Location
n of the Area the Area

Security
Special People in the
considerations in
Characteristics area the area
CASING 20
Report

SKETCHES

PHOTOGRAPHY
COMMERCIAL
PICTURES
DETAIL
21
SURVEILLANCE
is a form of investigation which consists of
keeping a person, place or other targets
under physical or technical observation in
order to obtain evidence or information
pertaining to an investigation.
SURVEILLANCE
22
Definition of Terms
Subject of Surveillance – the person, place, or object being
watched.
Surveillant – the person who does the surveillance or who
maintain watch.
Convoy – an associate of the subject who follows the
subject in an attempt to detect surveillance
Contact – any person with whom the subject speaks, to
whom he pass articles, or from whom he receives articles
Shadow and tail – to follow an individual whenever he
goes, on foot or by vehicle
SURVEILLANCE 23

Two Types

MOVING FIXED
SURVEILLANC SURVEILLANC
E E
• Tail or shadow • Stakeout
SURVEILLANCE 24

Three Methods
Loose Close
surveillance Surveillance

Combination of
Loose & Close
Surveillance
SURVEILLANCE 25
Three Methods

1. LOOSE TAIL – employed when a general impression
of the subject habits and associates is required.

2. ROUGH SHADOWING – without special


precautions, it may be used when the criminal must be
shadowed and he is aware of this fact ; or where the
subject is a material witness and must be protected from
harm or other undesirable influences.

3. CLOSE TAIL – one in which extreme precautions are


taken against losing the subject.
FOOT SURVEILLANCE 26
Five Techniques
One-Man Surveillance

Two-Man or “AB” Surveillance

Three-Man or ABC Surveillance

Leapfrog Surveillance

Progressive Surveillance
SURVEILLANCE 27
SURVEILLANCE 28
29

Elicitation, Interview
&
Provocation
Elicitation, Interview & 30
Provocation
Definition of Terms
Interview– The method of obtaining information from
another person who is aware that he is giving wanted
information, although he may be ignorant of the true
connection & purposes of the interview.
Elicitation – The method of acquiring desired
information from a person who is unaware that he is
providing wanted information, and if made aware may
not intend to give information

Provocation – The method of getting information involving


a wide range of conversational gambits.
UNDERCOVER OPERATION
UNDERCOVER OPERATION
-is an investigative technique in which disguises
and pretext are used to gain the confidence of
criminals in order to determine the extent of
criminal activity.

5 PHASES OF UNDERCOVER OPERATIOS


Planning
Initiation
Operation
Termination
Evaluation
SPECIAL PROJECT

- Is an intelligence/counterintelligence
activity addressed to a threat/ criminal
organization or activity where the process of
information collection is in the nature of
clandestine operations using an intelligence
net composed of agents who are recruited and
handled in accordance with the prescribed
intelligence operational procedures.
The Intelligence OPLAN shall be used
when a special project or case operations
shall spell out in specific terms the direct
participation of basically non-intelligence
offices / units in the effort as a whole or in
any of the defined phases of the intelligence
project or case operations.
UNDERCOVER OBJECTIVES

● Obtain information and intelligence has proven


unsuccessful,

● Obtain evidence for prosecution,

● Determine if a crime is being planned or


committed,

● Identify individuals involved in criminal


activity,
Undercover-An Investigative Technique
● The individual acting in an undercover capacity must be
resourceful, intelligent, initiative, full of energy and
courageous.
III. EVALUATION 37

• Validity of an inference directly linked to Quality of the


data behind the inference.
• Data evaluation is a key element of the intelligence cycle. It
should be conducted simultaneously with or immediately after
its acquisition.
• Evaluation requires a separate assessment of the reliability of
the source (the provider of the information) & validity &
accuracy of the information.
• Source & the actual information must be evaluated
independently of each other.
EVALUATION 38

Determination of the pertinence or significance of the


information relative to the operation, reliability of the
sources or agency, & accuracy of the information.
Pertinence – The pertinence of information is more than just
a matter of determining who needs it & when.
Reliability – Determination of the reliability of the source &
agency may be relatively easy because of the more frequent
exploitation of a given source or use of a particular agency.
Accuracy - The accuracy of information may be readily
determined because of the comparative wealth of
corroborating evidence.
3RD PHASE: PROCESSING OF INFORMATION
EVALUATION RATING 39
SYSTEM
RELIABILITY OF SOURCE ACCURACY OF INFORMATION
A – Completely reliable 1 – Confirmed by other sources
B – Usually reliable 2 – Probably true
C – Fairly reliable 3 – Possibly true
4 – Doubtfully true
D – Not usually reliable
5 – Improbable
E – Unreliable
6 – Truth cannot be judged
F – Reliability cannot be judged
SOURCES OF INFORMATION
 Direct observation by the commander of a un
 Report by a penetration agent or resident agent
 Report by an AFP trooper or PNP personnel in encounter or operation
 Interrogation of a captured enemy agent or foreigner
 Observation by a government or civilian employee or official
 Observation by a member of a populace
 Documentary
IV. COLLATION 40

 Transfer of collected information and/or


intelligence into a storage system (be it a
filing cabinet or a computerized data base)
in a structured (indexed, cross-referenced)
format that permits rapid & accurate
access.

 Intelligence Fusion
V. DATA INTEGRATION & 41
ANALYSIS
Data Integration Charting Techniques
• Show relationships among entities
Link Charting featuring in the investigation

• Show chronological relationships


Event Charting among entities or sequences of events

• Explore the movement of money,


Commodity narcotics, stolen goods or other
Flow Charting commodities

Activity • Identify activities involved in a


Charting criminal operation
V. DATA INTEGRATION & ANALYSIS
42
Data Integration Charting Techniques

Financial • Identify concealed income of individuals or


business entities and to identify indicators of
Profiling economic crime

Frequency • Organize, summarize and interpret


Charting quantitative information

Data • Illustrate relationships between


Correlation different variables
43
V. DATA INTEGRATION & ANALYSIS

Four Types of Inferences

Hypothesis Prediction

Estimation Conclusion
VI. DISSEMINATION 44
Forms of Dissemination Process

1. Structured formalized reports

2. A structured and formal oral presentations with


supporting documentation

3. Weekly overviews in the form of bulletins

4. Ad-hoc briefing to intelligence and investigative


teams
RE-EVALUATION 45
Can be Directed at:
1. Process
2. Analytical product
3. Use of the analytical product
4. Effectiveness of reporting
5. Staff deployment
6. Priority setting
7. Analyst’s perspective
8. Client’s perspective Intelligence activity is a collective
process, as opposed to something one person or a group of
people do as individual entrepreneurs.
SUMMARY 46

You can now…

Module 7 Lesson 7.2 REV: 12-2015


1. Expound on the definition of Intelligence Cycle.
2. Identify the phases of the Intelligence Cycle.
3. Describe each of the phases of the Intelligence Cycle.
4. Review the following: ODEX, Casing, Surveillance,
and Elicitation, Interview and Provocation
Techniques, uUndercover operations.
Marami
ng
Salamat
Po!

You might also like