Police Intelligence LECTURES

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

#POLICE #INTELLIGENCE:

Police Intelligence- The product that results from processing raw information (collection, evaluation,
integration and interpretation of information)
Process of finding out what you don’t know (or finding out what needs to be known)
A confidential advice that supports decision making
Has both tactical (or operational) and strategic applications
Intelligence – the and product resulting from the processing of information, or the art of obtaining,
evaluating, and dispensing vital information for future action.
Information – is a knowledge communicated, either obtained by personal study, investigation or
intelligence operation or knowledge derived from printed materials, observations or instructions.
Information - Any knowledge, data, news, opinion or the likes transmitted from a person to another
is information. Processed information becomes intelligence that has police interest and significance.
Sponsor – the sponsor is the group which, through its headquarters, supports and directs the
organization conducting the clandestine activity.
Target – The second organizational element is the target: the person, place or thing against the
clandestine activity is to be conducted.
The Agent – The third organizational element in clandestine activity is the agent. An agent may be
classified according to his function within the organization.
Espionage agent -The espionage agent clandestinely procures information.
Propagandist -The propagandist undertakes to mold the attitudes, opinions and actions of an
individual, group or nation.
Saboteur -The saboteur undertakes positive action against an unfriendly power, resulting in the loss
of use temporarily or permanently of an article, material, facility, process, or other physical resource.
Guerilla -a guerilla is a member of the paramilitary group organized to harass the enemy in a hot war
situation.
Strong – Arm-The strong-arm agent is available to provide special protection during dangerous
phases of clandestine operation. He is also prepared to undertake aggressive action in the
accomplishment of an assigned task and assist in operations directed against target personnel.
Provocateur- a provocateur is an agent who induces an opponent to act to his own detriment by
revealing his true purpose and identity. Provocation may also divert the opponent from an intended
objective. The opponent may be an individual, group or nation.
Cutout- a person or device interposed between two persons or groups in order to provide
communications.
Intermediaries- an individual who serve as a cutout.
Cutout Device- is a place or a thing used in the communication between two members of the
clandestine operation and is also a means of comparting one element from another.
Live Drop- is a person in clandestine operation who accepts information or material from on agent
and surrenders it to another.
Courier- a person who carries information or material from one individual in clandestine operation
and delivers it to another.
Moving Live Drop- a type of unwitting courier the person on whom or in whose personal effects
clandestine material is concealed without his knowledge.
Dead Drop- is a place were clandestine material may be left by one echelon and recovered by
another.
Moving Dead Drop- involves the use of some means of transportation of which clandestine
information or material can be concealed at one point and recovered at another.
Accommodation address- this refers to the address at which posted mail containing intelligence or
operational information is received and at which either held for pickup or readdress and transmitted
further thru the mails.
Clipping Services– is the collection of news items of intelligence value in publications both local and
foreign.
Debriefing – an interview with personnel from a mission to get information of particular interest.
Safehouse – is a place, a building, enclosed mobile, or an apartment where police undercover men
meet, his action agent or handler conducts debriefing or for report purposes.
Burned – identity of the undercover has been know by the subject.
Drop – is a convenient, secure, and unsuspecting place where a police undercover man, informer, or
informant by prearrangement leaves a note, a small package, an envelop or item for the action agent
or handler, supervisor, or another agent.
Communications Security – measures adopted to safeguard the transmission or receipts of
messages, the equipment used and the communication center itself.
Intelligence Estimate – is a study which describes, discusses, and interprets the current crime
situation in order to determine organized crime capabilities, vulnerabilities, and probable course of
actions. It also describes the effects of the area of operations upon both police and criminal
elements courses of action.
Omerta – conspiracy of silence.
Historical Accounts of Police Intelligence
Moses sent spies to canaan in order to know the strength of their enemy.
Rahab - assisted Israelite spies by hiding them from the local authorities. The spies, in return for her
protection, promised to save her and her family during the planned military invasion as long as she
fulfilled her part of the deal by keeping the details of the contact with them secret and leaving a sign
on her residence that would be a marker for the advancing soldiers to avoid. She kept her word by
hiding the spies when the city guard came to her house looking for them; the Israelites kept their
word by sparing her family from the general massacre after taking the city: they recognized Rahab's
house by a red cord hanging from her window.
Delilah was approached by the lords of the Philistines, to discover the secret of Samson's strength,
"and we will give thee every one of us eleven hundred pieces of silver". Three times she asked
Samson for the secret of his strength, and three times he gave her a false answer. First he told her
"If they bind me with seven green withes that were never dried, then shall I be weak, and be as
another man.". Then he told her "If they bind me fast with new ropes that never were occupied, then
shall I be weak, and be as another man.". A third time he told her "If thou weavest the seven locks of
my head with the web". On the fourth occasion he gave her the true reason: that he did not cut his
hair in fulfillment of a vow to God.
Sun Tzu was an ancient Chinese military general and strategist who is traditionally believed to have
authored The Art of War, an influential ancient Chinese book on military strategy considered to be a
prime example of Taoist thinking. Sun Tzu has had a significant impact on Chinese and Asian
history and culture, both as an author of The Art of War and through legend. During the 19th and
20th centuries, Sun Tzu's The Art of War grew in popularity and saw practical use in Western
society, and his work has continued to influence both Asian and Western culture and politics.
Alexander III of Macedon popularly known as Alexander the Great was a Greek king who created
one of the largest empires in ancient history. Alexander received a classical Greek education under
the tutorship of famed philosopher Aristotle, Alexander is one of the most famous figures of antiquity,
and is remembered for his tactical ability, his conquests, and for spreading Greek civilization into the
East.
Frederick the Great – father of organized military espionage.
State Informers – originated during the reign of Edward I of England in the 15th century were
rewards were given to those who can report authors seditious writing.
Walsingham – the father of the national secret service, as the protector of queen Elizabeth I
Karl Schulmeister and Demarest – develop the concept of counter-intelligence or spying the spy.
Allan Pinkerton – U.S. first Chief of Secret Service.
Cabeza de Barangay – head of the settlers who appointed eyes and ears of his community.
Luke E. Wright – father of Philippine Constabulary
Col. Henry Allen – first chief of the Philippine Constabulary
Rafael Crame – the first head of the intelligence division of the Philippine Constabulary

Modes of Obtaining/Gathering Information


1. Informants/Informers
2. Surveillance
3. Casing
4. Cover and Undercover
5. Interview/Elicitation
6. ODEX
7. Informants/Informers
Informant – is any person who furnishes the police and information relevant to a criminal case,
about the activities of criminals or syndicates.
Informer – a person who gives information on a regular basis, they are paid.
Informant - is an individual who openly or secretly obtained or assists in obtaining information for
intelligence and Counter Intelligence purposes in exchange for some recompense, monetary or
otherwise.
Informer distinguished from informant – an informant is an individual who gives information for a
price or reward. An informer gives information in consideration of the money or reward. While, an
Informant gives information either in consideration of the reward or not.

Types of Informants
1. Anonymous Informants
2. Rival Elimination Informants
3. False Informants
4. Self-Aggrandizing Informants - an informant that is conceited, overconfident, and arrogant.
5. Mercenary Informants – Sales information. He/she could be one of the members of
syndicate.
6. Double-Crosser Informants - he/she gives information, but the objective is also to get more
information from the police and their activities.
7. Women Informants - She could be an associate of the syndicate. She uses her body to
obtain more information.
8. Legitimate Informants – gives information for a legitimate reason/s
9. Incidental Informants - Individuals who furnish information with no intention of repeating
his services of furnishing information on a continuing basis.
10. Casual Informants - Individuals who by social or professional position, possesses or has
access to information of continuing interest, and who willingly provides information to the CI
unit, either in response to a specific request or on his own initiative.
11. Automatic Informants - Those by virtue of their official positions are expected or obligated
to furnish information openly to CI units in normal course of their duties. e.g., Government
officials, police officers and technical experts.
12. Recruited Informants - Individuals that are selected, trained and utilized as continuous
and covert sources of information concerning specific counterintelligence targets.
Double Agents - Individuals who are simultaneously employed by two opposing intelligence
agencies with only one of the agencies aware of his dual role. Double agents controlled CI unit may
produce very valuable information, particularly in long range counterespionage operations, but their
control and exploitation is complex and difficult, and requires extremely stringent security
precautions and control measures.
Dual Agents - Individual simultaneously and independently employed by two or more friendly
intelligence units and, who do not show preference for either and normally motivated by material
gain. When an informant is determined to be a Dual Agent, his services will normally be terminated.
Motives of Informants
1. Vanity – for self-aggrandizement in order to get favorable attention.
2. Civic Mindedness – Gives information because it’s a duty as a concerned citizen.
3. Fear – Gives information in order for his/her to be protected.
4. Repentance – Gives information due to changes of his values, belief, and convection.
Kinds of Informants
1. Criminal
2. Voluntary
3. Involuntary
4. Confidential
5. Special
6. Anonymous
Types of Informers
1. Common or Ordinary
2. Confidential
Other meanings of “ Informants”
1. Obnoxious – the view of the public to a person selling information to another or money motivated.
2. Stool Pidgeon – the view of the underworld to a person who expose their activities and identities.
3. Savior – the view of the police to a person who gives information, without his valuable reports or
revelations the crime would remain unsolved.
Surveillance
Surveillance -is a clandestine form of investigation which consists of keeping any person, place or
other physical observation in order to obtain evidence or information pertinent to the purpose of the
investigation.
-is a planned observance of persons, places or objects: however, it is concerned primarily with
persons. Places and objects can be closely watched but are generally incidental to the primary
interest of seeking information about people.
Subject of Surveillance – the person, place, or object being watched.
Surveillant – the person who does the surveillance or who maintain watch.
Convoy – an associate of the subject who follows the subject in an attempt to detect surveillance.
Contact – any person with whom the subject speaks, to whom he pass articles, or from whom he
receives articles.
Made – the surveillant being recognized as the surveillant by the subject or convoy.
Lost – the subject is lost when the surveillant do not know his whereabouts. The subject is lost when
the subject eluded him.
Fingerman – an individual who can positively point out the subject.
Put the finger on – go identify a subject by pointing him out either in person or in photograph.
Put to bed – when the subject under surveillance has returned to his quarter and apparently retired
for the night.
Shadow and tail – to follow an individual whenever he goes, on foot or by vehicle.
THE TWO GENERAL TYPES OF SURVELLANCE
1. Moving surveillance. Maybe referred to as a tail or shadow.
A moving surveillance is conducted when a person, object or activity being watched move from one
place to another. The surveillant may however, move from one vantage point to another in the
immediate area.
2. Fixed surveillance. Maybe referred as a stakeout.
Is conducted when a person, object, or activity being watched is not expected to move from one
area. The surveillant may however, move from one vantage point to another in the immediate area.

METHODS OF SURVEILLANCE
1. Loose surveillance. Observation of the subject or object is not continuous. The surveillance
maybe discontinued if the subject becomes suspicious or when the services of another surveillant
are required.
2. Close Surveillance. Continuous observation of the subject is maintained at all times, even if the
subject appears to become suspicious or openly accosts the surveillant and accuses him of
watching or following him.
3. Combination of Loose and Close Surveillance. Circumstances, which usually depend on the
specific act of the subject, may necessitate a change from a loose surveillance to a close
surveillance without prior notice.

FIVE TECHNIQUES OF FOOT SURVEILLANCE


a. One-Man Surveillance. One investigator is used to conduct the surveillance. It is best employed
in a fixed surveillance. It should be avoided in moving surveillance because it provides the least
amount of flexibility in the surveillant, in addition to watching the subject should take notes, watch for
convoys, and collect evidences.
b. Two-Man or “AB” Surveillance
In the “AB” technique of surveillance, the surveillant behind the subject is always known as “A”
surveillant. “A” follows the subject and “B” either follows on the same side of the street or from
across the street.
c. Three-Man or ABC Surveillance. The most effective technique of foot surveillance is the “ABC”
technique. It employs three surveillance, and is intended to keep two sides of the subject covered.
“A” follows the subject. “B” follows “A” and concentrates on keeping “A” in sight rather than the
subject. “B” also watches for convoys. The normal position for “B” is behind “A”. “C” normally
operates across the street from slightly to the rear of the subject.
d. Leapfrog Surveillance. Two or more surveillants are used to conduct the leapfrog technique of
surveillance. This is a variation of the “AB” and “ABC” methods. It is simple to execute and greatly
reduces the chances of the subject reorganizing surveillant. Surveillant “A” follows “B”. Both
surveillants operate on the same side of the street as the subject. After a variable time or distance
has elapsed by prearrangement of signals, “A” falls back and allows “B” to assume the position “A”
and “A” becomes “B”.
e. Progressive Surveillance. The Progressive technique of surveillance is used when extreme
caution is mandatory. It can be presupposed by the surveillants that the subject will resort to every
method it elude possible surveillance. It is a slow technique and limited to subject that follow habitual
daily routines.
VEHICLE SURVEILLANCE
In vehicle surveillance the subject will move primarily by automobile, therefore necessitating the
surveillant followed by automobile.
Three Techniques of Vehicle Surveillance.
1. One Vehicle Technique
2. Two-Vehicle Technique
3. Four-Vehicle Technique
FIXED SURVEILLANCE OR STAKEOUT
In fixed or stakeout surveillance it is the subject that remains stationary. The surveillant may move
around for closer observation of the area and the subject. When one surveillant is detailed to watch
a place with more than one exit, the surveillant may have to move about considerably in order to
maintain the proper surveillance.
Casing
Casing – is reconnaissance or surveillance of a building, place or area to determine its suitability for
intelligence use or its vulnerability in an intelligence operation.
PURPOSE
1. Operative will know the best route to take to get there.
2. Operative will know how to conduct himself without attracting attention.
3. Operative will know what security hazards are in the area and how they can be avoided or
minimized.
4. Operative will know the best route to take to get out of the area.
METHODS OF CASING
1. Personal Reconnaissance– A personal reconnaissance of an area is the most effective method
and will produce the most information since you know just what you are looking for.
2. Map Reconnaissance– A map reconnaissance alone may not be sufficient but it can produce a
certain amount of usable information. From a map, it is possible to get a good survey of road and
street network.
3. Research– Such information can be acquired through research. Research normally entails a
study of unclassified sources such as local newspapers, periodicals, public bulletins, telephone and
city directories, radio and television broadcasts, and other available references.
4. Prior Information– Your unit will have on file reports from other activities within your unit, and
also from other intelligence units that may provide you with information. In addition, town studies,
geodetic surveys, etc., can provide you with valuable information.
5. Hearsay – This type of information is usually gained by the person operating in the area of
performing the casing job. Casing should always be done with your ears open when visiting such
places as restaurants, bars, places of amusement, and while riding on a public transport facility.
Some hearsay information maybe gained by discreet questioning of the people in the area.
Cover and Undercover
COVER – is the means by which an individual, group or organization conceals the true nature of its
activities, and/or its existence from the observer.
It is used so that the intelligence unit may operate with minimum interference from the outside
elements. By “outside elements”, we mean those not having the “Need to Know”
TYPES OF COVER
1. Natural cover – using true or actual personal background.
2. Artificial cover – using biographical data adopted for the purpose that is fictitious or fabricated.
3. Cover within a cover – use of secondary cover in case of compromise which necessitates the
admission of a lesser crime
4. Multiple cover – any cover wished
ORGANIZATIONAL COVER
OBJECTIVES OF ORGANIZATIONAL COVER
1. To camouflage and protect operational personnel and their activities.
2. To protect installation in which clandestine activities are based
THREE (3) TYPES OR ORGANIZATIONAL COVER
1. Cell cover – intended for small operating groups, wherein the numbers of the group are not
working together.
2. Group cover – provides security for three (3) or more individuals appearing to be working together
3. Cover family – combination of compartmental.

MEANING OF COVER STORY


A biographical account, true or fictional or a combination of true or fiction which portrays the
undercover operatives’ past history and current status.

TYPES OF COVER STORY


1. Natural Cover Story – story using actual background data with minor adjustments to fill and/or fit
the situation.
2. Artificial Cover Story – using biographical data which are invented for the purpose.
3. Combination of True and False Personal Data
BACKSTOP – refers to falsified documents and materials prepared by an undercover to make his
cover story credible.
Interview/Elicitation
INTERVIEW – The method of obtaining information from another person who is aware that he is
giving wanted information, although he may be ignorant of the true connection and purposes of the
interview.
ELICITATION – The method of acquiring desired information from a person who is unaware that he
is providing wanted information, and if made aware may not intend to give information.
INTERROGATION - The art of questioning and examining a source to obtain usable information in
the shortest possible time. The goal of any interrogation is to obtain useful and reliable information in
a lawful manner and in a minimum amount of time and meeting the intelligence requirements of any
echelon of command. A good interrogation produces needed information that is timely, complete,
clear and accurate. Interview, debriefing and elicitation are examples of types and forms of
interrogation.
ODEX
OBSERVATION (Taking notice) - is a complete and accurate awareness by an individual of his
surroundings and encompasses the use of all of our major senses to register and recognize its
operational and/or intelligence significance.
DESCRIPTION - is the actual and factual reporting of one's own observations or the reported
sensory experience recounted by another.

You might also like