Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 25

1

jbdavid files….university of batangas – criminology…lipa campus

POLICE INTELLIGENCE AND SECRET SERVICE

DEFINITION OF TERMS
National Intelligence – the total product of intelligence developed by all
governmental agencies that cover the broad aspects of national policy and
security.
Military Intelligence – it is used in the preparation of military policies, plans and
programs. It includes the strategic and combat intelligence.
Strategic Intelligence – that knowledge pertaining to the capabilities and
probable courses of action of foreign nations.
Combat Intelligence – is required by the commander in order to determine the
best use of his available firepower and maneuver forces, to accomplish his
mission, and to maintain the security of his command.
Counter Intelligence – an integral part of all intelligence operations and as such
can’t be separated from combat and strategic intelligence. Its objective is to
safeguard information against espionage, material and installations against
sabotage, and personnel against subversive
Order of Battle Intelligence – concerns the manner in which military forces are
organized and disposed.
Technical Intelligence – concerns foreign technical developments, which have a
practical military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.
Area of Operation – those aspects of the operational environment exclusive of
the military forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment
of an area in which military operations are taking place or planned.
Capabilities – form a military standpoint, enemy capabilities are courses of
action which the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader
national standpoint, capabilities of a nation are the available, workable, courses
of action to accomplish national objectives.
Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it
susceptible to any action, which reduces its war, potential, and or its will to fight.

HISTORICAL DEVELOPMENT
(Selected Items)

Moses
One of the first recorded formalized intelligence efforts, with format, can also be found in
the Holy Bible Numbers 3:17. The scriptures also named the twelve intelligence agents whom
the Lord directed Moses to sent into the land of Canaan and records that “ all those men were
heads of the children of Israel.”

Rehab
The Harlot of Jericho (Joshua 2:1-21)” who sheltered and concealed the agents of
Israel…
Delilah
(Judges 16:9). Delilah was an impromptu intelligence agent. Apart from her tonsorial
specialty, she also allowed sex to gain intelligence from a powerful enemy.

Events and Personalities


in the World of Intelligence

Sun –Tzu
Sun – Tzu’s book “The Art of War” was then a favorite readings of Chinese Communist
Tacticians. He further wrote the saying in which most people in the intelligence service believe
became a parlance in the world of intelligence:
“ Know thy enemy and know yourself,
1
2
jbdavid files….university of batangas – criminology…lipa campus

You need not fear the results of a hundred battles”


“If you know yourself and not the enemy,
for every victory, you are a fool who will meet defeat in every battle.”
Alexander the Great
He device the first “letter sorting” and opening to obtain information.

Sertorius
The Roman commander in Spain who possessed a white fawn and allowed it to be come
widely known that he derived both secrets and guidance from the fawn. His intelligence agents
credited their information to the supernatural power of animals.

Akbar
The “Great Mogul” and sagacious master of Hindustan employed more than 4,000 agents
for the sole purpose of bringing him the truth that his throne might rest upon it.

Genghis Khan
A Mongol who used intelligence to conquer China and invade Cathay. He instructed his
Generals to send out spies and used prisoners as sources of information. The leader of the so-
called MONGOL CONQUERORS - made use of effective propaganda machine by spreading
rumors of Mongol Terror. They collected information on weaknesses and rivalries of Europe.
They usually disguised as merchants.

RENAISSANCE PERIOD
In England, SIR FRANCIS WALSINGHAM, Under Queen Elizabeth, organized the first
National Intelligence Service. He employed spies on the staff of the Admiral in Command of the
Spanish Army and able to obtain information regarding Spanish Army as to their Ships,
equipment, forces and stores. He protected Queen Elizabeth I from countless assassins.
In France, RICHLIEU – introduced the network of covert collectors who transmitted
prompt and accurate information to Paris regarding the activities of the rebels and dissidents of
the kingdom.
NAPOLEON BONAPARTE “One Spy in the right place is worth 20,000 men in the field”
Spy against spy was of high proportion during his time wherein counterespionage came into
popular usage.

Frederick the Great


Father of Organized Military Espionage. He has divided his agents into four classes:
a. Common spies recruited among poor folk, glad to earn a small sum or to
accommodate a military officer.
b. Double spies, the low informers and unreliable renegades of value chiefly in
spreading false information to the enemy.
c. Spies of Consequences – couriers and noblemen, staff officers, and kindred
conspirators, invariable requiring a substantial bribe or bait,
d. Persons who are forced to undertake espionage against his will.

Hannibal
Disguise as a beggar to gather first hand information.

JULIUS CEASAR
During his time, the staff of each legion includes ten “speculators” who served as an
information-collecting agency. The “speculators” were the first intelligence personnel to appear
definitely in a military organization. Military success of the Romans was aided by communication
system. Made use of carrier pigeons, which made possible the amazing speed with which
intelligence of Imperial Rome was transmitted. They also employed ciphers to ensure secrecy
of communications.

Karl Schulmeister

2
3
jbdavid files….university of batangas – criminology…lipa campus

Karl Schulmeister, Napoleon’s eye, Napoleon’s military secret, was born on August 5,
1770. He began his career in offensive espionage. Under a cover role, he was able to infiltrate
the Austrian General Staff.

Wilhelm Stieber
Introduced military censorship and organized military propaganda. He works as a census
taker and developed an informal form in the gathering of data.

Alfred Redl
Chief of the Austro – Hungarian Secret Service - but in fact a double agent of Russia. In
1913, his treason was discovered and he was forced to commit suicide. His treason lead to the
death of 500,000 agents and soldiers combine in his 13 year espionage episode.

BRAHMA KAUTILYA
In Ancient India, he overthrew the NANDA dynasty and established the first MAYURYAN
king in the Indian throne. He recommended to his king that for the ruler to succeed, the ruler
should strike at his enemy’s weak points by means of spies.

Donovan
Major-General, organizer of the OSS, builder of a central intelligence system. The OSS
whose exploits become legendary in World War II.

Battle of Midway
In June 1442, the turning point of the Naval in the Pacific. The victory gained by the
Americans was due to the disrupted messages from the Imperial Japanese Navy.

Admiral Isoroku Yamamoto


April 1943, the Cryptoanalyst of the U.S. Navy Communications Intelligence intercepted a
top-secret signal relaying the travel of the Admiral. En route he was intercepted and crashed in
the Jungles of Baungainville.

V2 – Rackets
OSS agents working in conjunction with the British Intelligence, through penetration and
technical intelligence discovered Punemundo which was the V2 guide missile research project
of Nazi Germany. It resulted to its destruction and heavy bombing.

State Informer
Edward I, King of England in 1725 organized a systematic police system so called Witch
and Ward. By Royal proclamation, the profession “State Informer “was created in 1734 enjoining
all informers to expose criminal activities and be compensated.

Fouche of France
The most feared and respected intelligence director in French history. He created a
network of agent and founded the modern system of spying on spies, which later was known as
counter espionage.

Joseph Petrosino
Member, New York Police Department in early 1900, he was the head of the Italian
Squad. Through extensive intelligence network, he is credited to smash the Black Society.

Federal Bureau of Investigation


First established in 1908 as an investigative arm of the U.S. Department of Justice. It
becomes what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On
September 6, 1939 by a presidential directive, it came to its responsibility the task of a domestic
intelligence.

3
4
jbdavid files….university of batangas – criminology…lipa campus

Central Intelligence Agency


The agency was created under the US National Security Act of 1947. The law above the
personnel of the Central Intelligence group established by the late President Truman in January
1946. The CIA is under the National Security Council.

Committee for State Security


Russia - The Intelligence agency known as the KGB - Komitet Gosudarstvennoy
Bezopasnosti (KGB), counterpart of the CIA
British Secret Service – Great Britain
Mossad – Israel,
BND – West Germany
KCIA – Korean Central Intelligence Agency
Britain: Scotland Yard, The London Metropolitan Police Force -
Established by Sir Robert Peel in 1829. Thus the beginning of a colorful legendary police
force and considered one of the most efficient in the world today.

INTELLIGENCE AND THE WORLD WARS


WORLD WAR 1
1900 – Europe powers developed modern staff systems and place intelligence on the
same level with personnel, operations and logistics. Intelligence then functioned in time of
peace and war.
Intelligence during this period, concentrated on information about the armed forces of the
enemy and their capabilities.
AIRCRAFT was introduced as a method of conducting aerial reconnaissance.
WIRELESS TELEGRAPH was used wherein CODES AND CIPHERS were applied.
ARMY INTELLIGENCE rapidly expanded during this period.
“AGENT PROVOCATEUR” – was employed by the Russians for the purpose of internal
Security and political repression. Spying was always the specialty of the Russians.
GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness
throughout Europe but declined at the outset of the war.
BRITISH INTELLIGENCE – succeeded greatly by means of censorship and its CODE
ROOM combined with skillful use of COVERT agents.
US expanded their NAVAL INTELLIGENCE wherein DOMESTIC
COUNTERINTELLIGENCE became a principal activity.

WORLD WAR II
GERMAN INTELLIGENCE – started the war with the world’s best-organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer Group wherein they
subordinated intelligence to operation and did not regard intelligence assignment worthy of a
soldier.
JAPANESE INTELLIGENCE – failed because it was not provided with sufficient number
of trained personnel to assemble and evaluate the mass of materials which were collected
although Japanese Intelligence was involved in short war and defensive in nature.
BRITISH INTELLIGENCE – Its achievement was the delay in the use of German V-
BOMB against them.
In 1942 – a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Penemuenda. Its intelligence failed in
the defeat of GENERAL MONTGOMERY’S forces at ANNHEIM.
US INTELLIGENCE – In 1941, The US Strategic Service was established to research
and analyze military, political and economic information as it affected the security of the Country.
US JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the
navy in the collection and analysis of Strategic information and to be responsible for the
planning and operation of Special services.
US greatest contribution to Intelligence was the development of the AMPHIBIOUS
WARFARE where coordination of many types of intelligence activities was required to provide
adequate knowledge upon which to base the successful operation of a complex military force

4
5
jbdavid files….university of batangas – criminology…lipa campus

transported over water with the objective of establishing itself on an enemy – held shore against
opposition.
US success in WWH was there personnel were drawn from CIVILIAN POPULACE,
BUSINESS AND PROFESSIONAL MEN AND WOMEN.
CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police (the
BIS) to conduct espionage and counterespionage against Japanese Spies and Chinese
communist.
SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all
kinds of materials for the Soviet Union.
SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence
concerned with disaffection among Soviet Troops and anti-communism in any form. FIVE
MAJOR DIVISIONS: Administration, Operation, Investigation, Prosecution, and Personnel.

POST WAR PERIOD: The superpowers


SOVIET INTELLIGENCE
SOVIET INTELLIGENCE SYSTEM – Described as omnipotent and omnipresent for its
vast intricate organization involving millions of people.
SOVIET COUNTERINTELLIGENCE – “IRON CURTAIN” – No one may cross the borders
of the USSR without being detected – All communications are rigidly controlled. Its contribution
to modern Intelligence was the dissemination of false information designed to mislead and
confuse opponents and prospective victims.
GRU – MILITARY INTELLIGENCE ORGANIZATION – is concerned with political events
and economic conditions and also collects information for intelligence purposes all over the
world. It directs foreign sabotage and maintains network of agents in military and special agents.
MGB – MILITARY INTELLIGENCE AND THE MINISTRY OF STATE SECURITY –
formerly NKGB was concerned on political espionage and propaganda abroad and for the
control of espionage activities of foreign communist countries.
KGB – Resumed the former function of the old MGB. It is now the official secret police
agency of the Soviet Union, in charge of the state security (Commission of State Security) K-
Omissija G- Osudarstyennoj B – Ezopasnosti or Komitet Gosudarstvennoy Bezopasnosti

BRITISH INTELLIGENCE SYSTEM


Composed of Several Intelligence Agencies:
BRITISH MILITARY INTELLIGENCE DIVISION (MID) – is divided into 20 different
department.
M15 – devoted to counterespionage and security
SPECIAL BRANCH OF SCOTLAND YARD – is charged with guarding the Royal Family
and Important British Officials and Visiting Foreign Dignitaries.

FRENCH INTELLIGENCE SYSTEM


SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE ESPIONAGE
(SDECE-FOREIGN Intelligence and counterintelligence Service) – under the Prime Minister.
GENERAL CHARLES DE GAULLE – Set up the Bureau Central de Renseignements et
d’ Action (BCRA Central Office for Intelligence and Action in London in 1940. It is an expansion
of the Service De Reassignments (SR-Intelligence Service which is a part of the Old Renzieme
Bureau (Second Bureau) of the French General Staff
SDECE – concerned on Strategic and Counterintelligence, SURETE NATIONALE –
part of French Intelligence Service

GERMAN INTELLIGENCE
RED GESTAPO – security service organized by East Germany to combat the Covert
activities of the West Germany Group when it was still divided by the Berlin Walls.

The Great Betrayals


JUDITH COPLON – A political analyst of the Department of Justice was accused of
taking unlawful possession of government documents and spying for a foreign power.

5
6
jbdavid files….university of batangas – criminology…lipa campus

DR. EMIL JULIUS KLAUS FUCHS – was accused of releasing American Atomic Secrets
to the Soviet in 1945 and British in 1947. He detailed knowledge of the construction of Atomic
bombs.
ERNST HILDING ANDERSON – In 1951, a Royal Swedish Navy provided military
secrets to a foreign power and was found guilty and sentences to life imprisonment.

The Philippines: A Brief look in the Past


On August 8, 1901, the Philippine Constabulary was organized. Pursuant to
Commonwealth Act. No. 343 dated 23, 1938, it was put to a status as a national Police Force.
On July 31, 1901, the Western Police District formerly the Manila Police Department was
organized and founded.
On October 12, 1939, the Quezon City Police Department was founded and now the
Northern Police Department.
On June 19, 1947, a law was passed, R.A. 157 creating the Bureau of Investigation
under then the Department of Justice. By virtue of the Executive Order what is now as the N.B.I.
On July 6, 1967 saw the founding of the P.C. Metropolitan Command, to assist in
combating criminality in the Metropolitan Area.
By Virtue of Presidential Decree 765 on August 8, 1975, all local police forces with the
PC as its Nucleus were integrated –PC-INP.

ESSENTIAL INTEREST IN INTELLIGENCE


Intelligence Defined
Intelligence means the collection, processing, collation, interpretation,
evaluation and dissemination of information, with references to national security.
In certain context, it may also mean the network or the system for the collection,
collation, interpretation, evaluation, processing, and dissemination of
information.
Based on military terms, Intelligence is the end product resulting from the collection,
evaluation, analysis, integration and interpretation of all available information which my have
immediate or potential significance to the development and execution of plans, policies and
programs of the users.

Functions of Intelligence in General


1. The collection or procurement of information
2. The evaluation of the information which then become intelligence
3. The dissemination of intelligence to those who need it.
4. Counter intelligence- It is a defensive function of intelligence.

Principles of Intelligence
The principles of objectivity - In intelligence only the well guided
succeed. It is a basic intelligence concept that there be unity between knowledge
and action. It follows therefore that intelligence should interact and condition the
decision. Intelligence must be adapted to the needs of the decision; it is both
giver and taker. Action or decision is planned by knowledge and guided by it at
every step.
The principles of Interdependence - Intelligence is artificially subdivided
into component elements to insure complete coverage, eliminate duplication and
to reduce the overall task to manageable sizes. Nevertheless, each subdivision
remain as essential part of unity; contributes proportionately to the end result;
possesses a precise interrelationship; and interacts with each other so as to
achieve a balanced and harmonious whole.
The Principles of Continuity - Intelligence must be continuous. It is
necessary that coverage be continuous so that the shape of what happens today
could be studied in the light of what was happened before, which in turn would
enable us to predict the shape of things to come.
The Principles of Communication - Intelligence adequate to their needs
must be communicated to all the decision makers in manner that they will

6
7
jbdavid files….university of batangas – criminology…lipa campus

understand and form that will permit its most effective use. Above all, it must be
understood for without understanding there is no communication.
The Principle of Usefulness - Intelligence is useless if it remains in the
minds, or in the files of its collectors or its producers. The story must be told and
it must be told well. The story must be convincing and to be convincing it must
not only be plausible or factual but its significance must be shown.
The Principles of Selection - In intelligence should be essential and
pertinent to the purpose at hand. Intelligence involves the plowing through a
maze of information, the considering and innumerable number of means or of
picking the most promising of a multitude of leads. The requirement of decision-
making covers very nearly the entire span of human knowledge. Unless there is
selection of only the most essential and the pertinent, intelligence will go off in
all directions in one monumental waste of effort.
The Principles of Timeliness - Intelligence must be communicated to the
decision-maker at the appropriate time to permit its most effective use. This is
one of the most important and most obvious, for Intelligence that is too soon or
too late is equally useless. Timeliness is one principle that complements all the
others.
The Principles of Security - Security is achieved by the measures which
intelligence takes to protect and preserve the integrity of its activities. If
intelligence has no security, it might be as well being run like a newspaper to
which it is similar.

Police Intelligence Defined


The end product resulting from the collection, evaluation, analysis, integration and
interpretation of al available information regarding the activities of criminal and other law
violators for the purpose of affecting criminals and other law violators for the purpose of affecting
their arrest, obtaining evidence, and forestalling plan to commit crime.

Purposes of Police Intelligence


1. Check the condition of the community relating to crime, vice, juvenile
delinquency and indications of subversion and insurgency.
2. Determine through counter intelligence applicant matters pertaining to
personnel security, physical security and document security of the police organization.
3. Determines the follow-up leads and helps in the solution of individual criminal
cases.
4. Identify criminal elements and other law breakers as well as their associates.
5. Assists in the arrest of wanted criminals and those wanted under RA 1700
otherwise known as the Anti-Subversion Law.
6. Check on the quality and effectiveness of the operation of the police (PNP)
forces.
7. Check on the security conditions of PNP Personnel, funds, equipment and
materials.
8. Help in crime control prevention.
9. Serve as a tool of management for planning and organizational employment
purposes.

The Principal Areas of Interest in Intelligence


1. Military – offensive and defensive tactics, war plans, strategic concepts and tactical
principles, organizations, installations, industrial lease, armed forces, command structure,
command personnel, material, tactics, morale,
2. General – topographical and hydrographic characteristics, historical backgrounds
3. Diplomatic – foreign policies, alliances, diplomatic establishment, foreign service
personnel, technique of conducting foreign relations
4. Political – ideology, traditions, institutions, personalities, area of friction
5. Economic
a. Financial – Monetary policies, Currency structure, Transactions,
Institutions, Personalities

7
8
jbdavid files….university of batangas – criminology…lipa campus

b. Commercial – trade policies, markets, trading methods, price policies,


personalities
c. Industrial – structure of Capacity, manufacturing plants and processes,
raw material, energy rotations, labor relations, personalities
d. Mining – Mineral Resources, Production method, Output
e. Agriculture – policies, crop structure, cultivation method, mechanization,
financing, specific characteristics of rural population
6. Communications and Transportation – telephones, telegraphs, wireless, railways,
shipping, automobiles and trucks, highways, aviation, ownership, policies, organization,
personnel
7. Social – nationality structure, classes and caste, historical factors, census, personal
aspects, characteristics and mentality of people forces, social legislation, radio,
television, press, motion picture
8. Intelligence – Organizations, Methods and Personnel of Competing Intelligence system

General Activities in Police Intelligence


1. Strategic Intelligence – the intelligence information which primarily long range in nature
with little practical immediate operation value.
2. Line Intelligence – which is of an immediate nature and necessary for more effective
police planning and operation.
3. National Intelligence - it is the integrated product of intelligence developed by all the
governmental branches, departments concerning the broad aspect of national security
and policy. It is concerned to more than one department or agency and it is not produced
by single entity. It is used to coordinate all the activities of the government in developing
and executing integrated and national policies and plans.
4. Counter Intelligence – phase of Intel covering the activity devoted in destroying the
effectiveness of hostile foreign activities and to the protection of info against espionage,
subversion and sabotage.
5. Undercover Work – is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of
determining the nature and extent of any criminal activities that maybe contemplating or
perpetuating.

Forms of Intelligence
1. Sociological Intelligence – deals with the demographic and psychological aspects of
groups of people.
a. Population and manpower
b. Characteristics of the people
c. Public opinion – attitude of the majority of the people towards
matter of public policy.
d. Education – based of literacy rate
2. Biographical Intelligence – deals with individual’s personalities who have actual
possession of power.
3. Armed Force Intelligence – deals with the armed forces of the Nation.
a. Position of the Armed Forces Constitutional and legal basis of its creation and
actual role.
b. Organizational structure and territorial disposition
c. Military manpower recruitment.
d. Order of Battle
4. Geographical Intelligence – Deal with the progress of research and development as it
affects the economic and military potential of a nation.

TYPES OR KINDS OF INTELLIGENCE


a. STRATEGIC INTELLIGENCE - An intelligence data that are not of an
immediate value. It is usually descriptive in nature, accumulation of physical description
of personalities, modus operandi. It does not have immediate operational value but rather
long range that may become relevant to future police operations.

8
9
jbdavid files….university of batangas – criminology…lipa campus

b. LINE INTELLIGENCE – It is the kind of intelligence required by the


commander to provide for planning and conduct tactical and administrative operation in
counter insurgency. This pertains to knowledge of People, Weather, Enemy, Terrain
(PWET) used in planning and conducting tactical and administrative operation in a
counter insurgency.
PEOPLE - Living condition of the people, Sources of income, Education of the people,
Gov’t livelihood projects, Extent of enemy influence to the people
WEATHER – Visibility, Cloudy, Temperature, Precipitation (rain), Wind
ENEMY - Location of the enemy, Strength of the enemy, Disposition, tactical capability,
Enemy vulnerability
TERRAIN - Relief and drainage system, Vegetation, Surface material, Man made
features
C. COUNTER INTELLIGENCE (CI) (Negative Intel)
This kind of intelligence covers the activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of info against espionage, subversion and
sabotage.
Three Activity of CI
a. Protection of information against espionage
b. Protection of personnel against subversion
c. Protection of installations and material against sabotage

COUNTER INTELLIGENCE (Negative Intelligence)

Negative Intelligence is a generic term meaning three different things;


A. Security Intelligence – means that the total sum of efforts to counsel the following
National Policies, Diplomatic decisions, Military data, and any other information of a
secret nature affecting the security of the nation form unauthorized persons.
The basic of security intelligence is concealment in general
B. Counter Intelligence - Counter Intelligence is the organized effort to protect specific data
that might be of value to the opponent’s own intelligence organization.
C. Counter-Espionage - In counter-espionage, negative intelligence becomes a
dynamic and active effort. Its purpose is to investigate actual or theoretical violation of
espionage laws, to enforce those laws and to apprehend any violators. It is a job to catch
spies. It is basically a police function.
“A basic requirement of the secret agent is disguise himself and his mission. Much
of his training and basic skill is dedicated to concealment. He is supposed to be supplied
with a foolproof cover story and good documents. He must be a man of exception ability
or else he would not be chosen for this intricate job. The trapping of the dark intruder is a
formidable talk.”
The aims of counter-espionage is to locate the enemy, to identify the enemy, and to
neutralize the enemy

Five Categories of CI Operation


1. Military Security – it encompasses the measures taken by a command to protect itself
against espionage, enemy operation, sabotage, subversion or surprise.
Example: Secrecy discipline
Special safeguarding of classified info.
Security of troop movement
Special handling of weather & escapes
Counter subversion with in the armed forces
Tactical measures in combat area
2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for CI control at point of entry and departure, international borders
or boundaries
Examples: Security screening and control of frontier
Security control of merchants, seaman and crew of
commercial aircraft, Security control of frontier crossing point
Security control of seaports

9
10
jbdavid files….university of batangas – criminology…lipa campus

3. Civil Security – it encompasses active and passive CI measures affecting the non-
military nationals permanently or temporarily residing in an area under military
jurisdiction.
Examples: Systematic registration of civilians and aliens
Control of circulation, Curfew,
Surveillance of suspected political organizations
Security screening of labor, Issuance of passes and permits
Control of internal commerce
1. Censorship – it is the control and examination of the Civil, National, Armed forces, Field
press, and POWs.
2. Special Operations – counter subversion, sabotage and espionage

WHAT IS CI OPERATION?
CI INVESTIGATION is an activity that constitutes the value of the CI workload, worldwide
and includes specific investigation of individual and incidence which for the most part are
conducted in an overt but discreet manner.
Three Categories of CI Measure
1. Denial Measure - Secrecy discipline, Document security, Camouflage and
concealment, Communication security, Military censorship, Counter reconnaissance
2. Detection Measure – PSI, Security tag or pass card, Challenge or password,
Reconnaissance
3. Deception Measures - Ruse – use of escape and evasion, Dummy position, Fabricated
info

Categories of CI Operation
1. Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to
use human sources to collect information or to conduct sabotage and
subversion
2. Counter Imagery Intel (IMINT) - Includes action taken to determine enemy
SIGINT and related EW capabilities and activities. These actions include
surveillance radar, photo thermal and infrared systems. Successful; counter
– IMINT operations rely heavily on pattern and movements analysis and
evaluation.
3. Counter Signal Intel (SIGINT) – determine enemy SIGINT and related EW
capabilities and activities, assess friendly operations to identify patterns,
profiles and develop, recommend and analyze counter measures.

10
11
jbdavid files….university of batangas – criminology…lipa campus

THE INTELLIGENCE CYCLE

Intelligence Requirements
Collecting Agencies
Collection Plan

Users of Intel
methods of
dissemination:
Personal contact Sources of
Formal Intel Info
Documents Collecting
MISSION agencies
Intel Estimates
Periodic Reports methods of
Intel Studies collection

Collation Journal
Sit-map
Intel Files

Evaluation Interpretation
Persistence Analysis
Reliability of Source Integration
Credibility of Info Deduction

Phase I - Direction the Collection Efforts


Determination of Intelligence Requirements:
What is the Essential Element of Information (EEI)?
It is an item of intelligence or information of the characteristics of the area of operations
and the enemy, which the commander feels he needs before he needs before he can
reasonably arrive at a decision.

Categories of Intelligence Requirements


1. In relation to use

11
12
jbdavid files….university of batangas – criminology…lipa campus

a. Executive – intelligence required by executive, governmental and


military commanders; The executive requirements are the basis for
decisions and national policy making.
b. Contributory – the intelligence required to complete the staff
process – make staff plans and estimates that contributes to the
decision and policy making.
c. Operational – Additional intelligence required in planning and
carrying out effectively the decision or policy announced. Decisions and
policy require implementation.
d. Collateral – higher or adjacent echelons of the government or
military establishment may require info.
2. By type:
a. Basic – general reference materials for use in the planning
regarding the enemies, or potential enemies, area of operations,
capabilities – static comprehensive.
b. Current – temporary in nature and narrower in scope. Info
required to scope with the current objectives.
c. Estimative Intel – determines the future courses of action;
required by the executives to plan future military operations and
policies.

Determination of the Priority


Becomes necessary to decide which items of information are more
important – a system of priority is needed; critical importance and lesser
importance; EEI-highest priority Intel requirements; indicates the Intel
requirements essential to planning.

Selection of Collecting Agencies


 List all available sources; exploitation of collecting agencies.
 Collection will be assigned in accordance with capabilities;
 Collection directives prepared once the proper collecting agency has
been selected to exploit a particular source;
 Collection directives do not limit the activities of the collecting agency;
 Criteria for the selection of collecting agency; suitability, capability,
confirmation, timeliness and balance.

Phase II - Collection of information


1. Determine collecting agency
2. Send orders or requests
3. Supervise collection effort
4. Use tools or technique in collection
5. Ensure timely collection

Factors in choosing collection Agent


1. Capability – agents placements or access to the target
2. Multiplicity – more agents
3. Balance

Methods of Collection
1. Overt – open
2. Covert – secret

Trade Crafts: Photography, Investigations / Elicitation / Interrogation, Surveillance, Sound


equipment, Surreptitious Entry – keys and locks, Use of an artist, Communication

12
13
jbdavid files….university of batangas – criminology…lipa campus

Phase III. Processing the Collected Information


1. Collection – organization of raw data and information into usable
form; grouping similar items of information so that they will be readily
accessible.
Recording – is the reduction of info into writing or some other form of graphical
representation and the arranging or this info into writing or some form of graphical
representation and the arranging of this into groups of related items.
 Police log book and Journal, Intel-work Sheet, Intel Files, Situation Maps,
Rouges Gallery, MO Files, Other Files
2. Evaluation – examination of raw information to determine
intelligence value, pertinence of the information, reliability of the source
and agency, and its credibility or truth of information. Evaluation determines
the following:
1. Pertinence - does it hold some value to current operation? Is it
needed immediately?
2. Reliability – judging the source of info of agency
3. Credibility – truth of info. Is it possible for the reported fact or
event to have taken place? Is the report consistent within itself? Is the report
confirmed or corroborated by info from different sources or agencies? If the report
does not agree with info from other sources which one is more likely to be true.

The Evaluation Guide


Accuracy of Info Reliability of Info
A- Confirmed by other sources 1- COMPLETE RELIABLE
B- PROBABLY TRUE 2- USUALLY RELIABLE
C- POSSIBLY TRUE 3- FAIRLY RELIABLE
D- DOUBTFULLY TRUE 4- NOT USUALLY RELIABLE
E- IMPROBABLE 5- UNRELIABLE
F- TRUTH CANNOT BE JUDGED 6- REALIBILITY cannot be judged

As to Source of Info
T – DIRECT OBSERVATION BY COMDR/CHIEF OF A UNIT
U – REPORT BY PENETRATION AGENT OR RESIDENT AGENT
V – REPORT BY PNP/AFP TROOPS INVOLVED IN ENCOUNTER
W – INTERROGATIO OF CAPTURED ENEMY AGENT/FOREIGNER
X – OBSERVATIO OF GOV’T/CIVILIAN EMPLOYEE OR OFFICIAL
Z – DOCUMENTARY

3. Interpretation – it is establishing the meaning and significance of


the information. It involves the following activities:
 Analysis – shifting and isolating those elements that have significance
in light of the mission or national objective.
 Integration – combining the elements isolated in analysis and known
information to form a logical picture or theory.
 Deduction – the formulation of conclusions from the theory developed,
tested and considered valid – determination of effort and meaning of the
information.

Phase IV - Dissemination and Use


Processed information are disseminated through Annexes, Estimates, Briefing, Message,
Reports, Overlays, Summaries

The criteria that must be observed in dissemination are:


1. Timeless – must reach the users on time to be of value. It must be
disseminated in accordance with the urgency and must reach the user in sufficient time to
be use.
2. Propriety – the message must be clear, concise and complete, as well as in the
proper form for the receiver to readily understand its contents. It must be disseminated

13
14
jbdavid files….university of batangas – criminology…lipa campus

to the correct user, presented in a form that lends itself to immediate use
and distributed by the most effective means appropriate to both time and
security requirements.

Methods of Dissemination
1. Fragmentary orders from top to bottom of the command
2. Memorandum, circulars, special orders
3. Operations order, oral or written
4. Conference – staff members
5. Other report and intelligence documents
6. Personal Contact

Who are the users of intelligence?


1. National leaders and military commanders – formulation and
implementation of national policies.
2. Advisors and Staff – preparations of plans and estimates
3. Friendly nations or other branches of the armed forces.
4. Processor – basis for evaluation and interpretation.

INFORMATION AND ITS SOURCES

INFORMATION
All evaluated materials of every description including those derived fro observation,
reports, rumors, imagery, and other sources from which intelligence in produced.
Information is a communicated knowledge by others obtaining by personal study,
investigation, research, analysis, observation. The use of modern gadgets in intelligence and
other things and material that possess or contain a desire information or knowledge.

Two General classifications of sources of information:


1. Open Sources – 99% of the info collected are coming from open sources.
2. Close Sources – 1% of info from close sources.

Overt Intelligence – is the gathering of information or documents procured openly without


regard as to whether the subject or target become knowledgeable of the purpose
Open Sources: Includes information taken from
Enemy activity, POW, Civilians, Captured documents, Map, Weather, forecast, studies,
report, Agencies
Covert Intelligence – is the secret procurement of information, which is obtained without the
knowledge of the person or persons safeguarding vital intelligence interest.
Close Sources: information are usually taken through:
Surveillance, Casing, Elicitation, Surreptitious entry, Employment of technical means
(Bugging and Tapping device), Tactical Interrogation, Observation and Description

PERSONS AS SOURCES OF INFORMATION


Informant Net – It is a controlled group of people who worked through the direction of
the agent handler. The informants, principal or cutouts supply the agent handler directly or
indirectly with Intel information
Informants – people selected as sources of information, which could be voluntary, or in
consideration of a price.
 Informant – refers to a person who gives information to the police voluntarily or
involuntarily with out any consideration
 Informer – those who give information to the police for price or reward

Types of Informants
1. Criminal Informant – an informant who give information to the police pertaining to
the underworld about organized criminals with the understanding that his identity will be
protected

14
15
jbdavid files….university of batangas – criminology…lipa campus

2. Confidential Informant – is similar to the former but he gives information violate of


the law to includes crimes and criminals
3. Voluntary Informant – a type of informant who give information freely and willfully as
a witness to a certain act
4. Special Informant – those who gives information concerning specialized cases only
and it is regarded a special treatment by the operatives (ex. teachers, businessmen)
5. Anonymous Informant – those who gives information through telephone with the
hope that the informant can not be identified

Sub-type of Informant
1. Incidental Informant – a person who casually imparts information to an officer with
no intention of providing subsequent information
2. Recruited Informant – A person who is selected cultivated and developed into a
continuous source of info
Categories of Recruited Informants:
 Spontaneous or Automatic Informant – Informants who by the nature of their work
or position in society have a certain legal, moral or ethical responsibilities to report
info to the police
 Ordinary run of he Mill Informants – Informants that are under the compulsion to
report info to the police
 Special Employee – informants who are of a specific operational nature
Other classification of Informant
Automatic, Penetration, Full time, Rival – Elimination, False Informant, Frightened Informant,
Self- aggrandizing Informant, Mercenary Informant, Double Crosser Informant, Woman
Informant, Legitimate Informant
Common Motives of Informants
Reward, Revenge, Fear and avoidance of punishment, Friendship, Patriotism, Vanity, Civic-
Mindedness, Repentance, Competition, Other motives
INFROMANT RECRUITMENT
1. Selection – (access)
2. Investigation – (potentials through CBI)
3. Approach – (pleasant surroundings, compromise free).
4. Testing – (begin with the limited assignment)
Factors considered in Informant Recruitment
Sex, Health, Age, Built, Education, Ability, Personality

INTELLIGENCE OPERATIONS
It is the result of intelligence planning, planning is always ahead of operation although an
operation can be made without a plan, it is usually due to sudden and inevitable situations but
definitely this is poor intelligence management.

Different Task involve in Police Intelligence Operation


Discovery and identification activity, Surveillance, Liaison Program, Informant Management,
Clipping Services, Debriefing, Relevant Miscellaneous Activities, Casing, Utilization of
Informant for planning and organizational employment purposes.

THE 14 OPERATIONAL CYCLES


Mission and Target – Infiltration – the insertion of action agent inside the target organization –
Penetration – recruitment of action agent inside the target organization – Planning –
Spotting - Investigation - PBI/CBI - Recruitment - the only qualification of an agent is to have an
access to the target – Training – Briefing – Dispatch - Communication - Technical –
telephone/radio, Non-technical – personal meeting, live drop/dead drop - Debriefing - Payments
– depends upon the motivation - Disposition – involve activity on rerouting, retraining, retesting,
termination – Reporting - Operational Testing

COVER AND UNDERCOVER


 Cover - the means by which an individual group of organization conceals the true nature of
its acts and or existence from the observer.

15
16
jbdavid files….university of batangas – criminology…lipa campus

 Cover story – a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation
 Cover Support – an agent assigned in target areas with the primary mission of supporting
the cover story.

Types of Cover
1. Natural Cover – using actual or true background
2. Artificial – using biographical data adopted for the purpose
3. Cover with in a Cover – justification of existence
4. Multiple Cover – any cover you wish.

ORGANIZATIONAL COVER – is an account consisting of biographical which when adopted by


an individual will assume the personality he wants to adopt - To camouflage and protect
operational personnel and their activities and protect installation on which clandestine activities
are based

UNDERCOVER ASSIGNMENT – is an investigative technique in which agent conceal his


official identity an obtain information from that organization

Types of Undercover Assignment


Dwelling, Work, Social, Jurisdictional assignment, Combination of assignment, Rope job –
striking up friendship with the subject

UNDECOVER AGENT
Special qualifications: Knowledge of the language, Area background regarding events,
Knowledge about the custom and habits, Physical appearance, an artist.

Selecting Action Agents


1. Placement – location of prospective agent with respect to the target
2. Access – it is the capability of a prospective agent to obtain the desired info for the Intel
organization or to perform to Intel collection mission in the area.
 Primary Access – it is the access to the desired info
 Secondary Access – it is the access to the desired info through a principal
source where the latter has the direct access
 Outside Access – the agent is employed outside the target and merely monitor
info from a third person who is monitoring info n the area

Agent Management
CONTROL – authority to direct the agent to carryout task or requirement on behalf of the
clandestine organization in an acceptable manner and security
1. Positive Control – is characterized by professionalism and rapport
2. Negative Control – characterized by blackmail and threat
Disciplinary Action - Escrow Account – Blackmail

METHODS OF COVERT INTELLIGENCE

SURVIELLANCE
A form of clandestine investigation which consist of keeping persons, place or other
targets under physical observation in order to obtain evidence or information pertinent to an
investigation.

Important Terms in Surveillance


Pre-Surveillance Conference – a conference held among the team members, the police
intelligence unit before surveillance is conducted.
Surveillance Plan – established type of personnel, the general and specific instructions for
surveillance, the operational limitations, signals and special instruction.
Area Target Study – All available information about the areas should be collected and
analyzed.
16
17
jbdavid files….university of batangas – criminology…lipa campus

Surveillant – a person who conducts surveillance with includes only observations.


Stakeout or Plant – is the observation of places or areas from a fixed point.
Tailing or Shadowing – it is the observation of a person’s movement.
Undercover Man – a person trained to observe and penetrate certain organization
suspected of illegal activities and later reports the observation and information’s that proper
operational action can be made.
Liason Program – this is the assignment of trained intelligence personnel to other agencies
in order to obtain information of police intelligence value. (Agencies like the press, credit
agencies, labor unions, tel. Companies)
Safehouse – is a place, building., enclosed mobile, or an apartment, where police
undercover men meet for debriefing or reporting purposes.
Drop – any person is a convenient, secure and unsuspecting place where police undercover
men meet his action agent for debriefing or reporting purposes.
Convoy – an accomplice or associate of the subject used to avoid or elude Surveillant.
Contact – ant persons whom the subject picks or deals with while he is under observation
and identifies the observer.
Made – when subject under surveillance becomes aware that he is under observation and
identifies the observer.
Lost – when the surveillant does not know the whereabouts of his subject or the subject had
eluded the surveillance.

Type of Surveillance
According to Intensity and Sensitivity
1. Discreet –subject person to be watch is unaware that he is under observation
2. Close – subject is aware that he is under observation varied on each occasions
3. Loose – applied frequently or infrequently, period of observation varied on each
occasion
According to Methods
1. Stationary – this is observation of place usually a bookie stall, a gambling, joint, a
residence where illegal activities are going on (fixed position)
2. Moving – surveillance follow the subject from the place to place to maintain
continuous watch of his activities
3. Technical – this is a surveillance by the use of communications and electronic
hardware’s, gadgets, system and equipment

Special Equipment (Technical Supports)


Camera with telephoto lens, Moving Picture camera, Binoculars, Tape recording
apparatus, Wire taping device, Other instrument – miniaturized one-way radio, etc.

Method available to Employ


1. Surveillance of Place
2. Tailing or shadowing (1-2-3 man shadow)
3. Undercover Investigation

Basic Preparations
Study of the Subject (Name, Address, Description, Family and Relatives, Associates, Character
and Temperament, Vice, Hobbies, Education, etc)
Knowledge of the area and Terrain (Maps, National and religious backgrounds, Transportation,
Public Utilities)

Subversive Organization (History and Background, Biography of the Official, Identity and
Background of members and former members, Method of identification employed by the
members, Files and records, nature, location and accessibility, Meeting)

Cover Story

17
18
jbdavid files….university of batangas – criminology…lipa campus

CASING
It is reconnaissance or surveillance of a building place or area to determine its suitability
for Intel use or its vulnerability in operations.

Method of Casing
a. Personal Reconnaissance – the most effective method and will
produced the most info since you know just what you’re looking for.
b. Map Recon – it may not sufficient but it can produce a certain amount of
usable info
c. Research - much info can be acquired through research
d. Prior Info – your unit and of the unit will have file report that they may
provide you with info
e. Hearsay –info usually gain by the person operating in the area and
performing casing job

Info desired in Casing


a. Area condition and habit – a description of the locality as whether the place is a
residential, commercial, highly urbanized, rural, etc
b. Active Opposition – enemy
c. Disposal Plan – disposal of the information in case of possible compromise.
d. Escape and Evasion – the exist planning in case of emergencies, from immediate
focal point, the general area and completely from the area

OBSERVATION and DECRIPTION


(ODEX)
 Observation – a complete and accurate observation by an individual of his surroundings an
encompasses the use of all the major sense to register and recognized its operational or
Intel significance
 Description – the actual and factual reporting of one’s observation of he reported sensory
experience recounted by another

Psychologist estimate that approximately


a. 85% of our knowledge is gathered through sight
b. 13% of your hearing
c. 2% through the three senses

Psychological Processes for accurate observation


1. Attention – consist of he psychological process involve in becoming aware of an
existence of fact
2. Perception – involved in the understanding this fact of awareness
3. Report – involved in identifying the name in one own mind and some fact which
has been perceive, narrated and identified

ELICITATION
It is a system or plan whereby info of Intel value is obtained through the process direct
intercommunication in which one or more of he parties to the common is unaware of the specific
purpose of the conservation

2 Devises in the conduct of Elicitation


 Approach – process of setting people to start talking
 Probe – to keep the people taking incessantly

Types of Approach
1. Flattery – people are susceptible to praise
a. Teacher – Pupil Approach –

18
19
jbdavid files….university of batangas – criminology…lipa campus

b. Kindred Soul Approach – the subject has been place in a pedestal having some
specialized quality and you flatter him/her by showing enough concern for his/her
welfare to pay special attention to his enjoyment
c. Good Samaritan Approach –
2. Provocative Approach – discover a wide range of conventional gambits. Ex. Joe Blow
Approach – is “I” know the answer to everything” approach. The elicitor adopts the attitude
of being approachable of any field

Types to Probe
1. Competition Probe – this is effective when used in connection with the teacher pupil
approach
2. Clarity Probe – used to elicit additional info in an area which the response is clear
3. His Pressure Probe – it serves to pin down a subject in a specific area or it maybe used
to point out contradictions in what the subject has said
4. Hypothetical Probe – presents a hypothetical situation and to get he subject to react to
the hypothetical situations

PORTRAIT PARLE (P/P)


It is a means of using descriptive terms in relation to the personal features of an
individual and it can be briefly described as a world description or a spoken picture.
(Anthropometry - no two human beings has the same body measurement)

BACKGROUND CHECKS AND INVESTIGATION


Domestic Background, Personal Habit, Business History, Social or Business Associates,
Medical History, Educational Background, Family History

TACTICAL INTERROGATION
The need for obtaining information of highest degree of credibility on the minimum of
time.
 Interrogation – the systematic asking of questions to elicit information in the minimum of
time.
 Interrogator - person who does the questioning.
 Interrogee – any person who is subjected to the interrogation process in any of its forms and
phases.
 Suspect – any person believed to be associated with prohibited activity
 Source – a person who for any reason submits information of intelligence interest usually on
a voluntary basis
 Witness – any person who has direct knowledge of facts concerning an event or activity.
 Provocateur – an individual from enemy forces who is deliberately introduce in our custody
with a specific mission of causing some unfavorable action or reaction on our part.
 Screening – initial examination of an interrogee to determine the extent of his knowledge of
persons, places, things or events in which we are interested.
 Formal Interrogation - the systematic attempt to exploit to an appropriate depth those are
of he interrogee’s knowledge which have been identified in the screening process
 Debriefing – the interrogation of a friendly interrogee who has information at the direction of
or under the control of the friendly intelligence service.
 Interview – Similar to a debriefing although it is less formal and the interrogee is not
necessarily under the control or employment of he respective intelligence service
 Interrogation Report – an oral or written statement of information by the questioning f an
interrogee

Form of Interrogation
 Direct – the subject is aware of the fact that he is being interrogated, but he may not learn
the true objectives of the interrogation. This is being used extensively at the tactical lever.
 Indirect – the subject is not aware that he is being interrogated. This is used when time is
not so important

19
20
jbdavid files….university of batangas – criminology…lipa campus

Techniques of Interrogation
The “Open Techniques” – the interrogator is open and direct in his approach and makes no
attempts to conceal the purpose of the interrogator. It is best employed when the interrogee is
cooperative. It is frequently used at the tactical level where time is a major interrogator.

The “Common Interest” Technique – the interrogator must exert effort to impress the
interrogee of their common interest. The interrogator must look for he point out the real
advantages the interrogee will receive if he cooperates

Record File (we know all technique) – the interrogator prepare a file on the source listing all
known information (record should be padded to make it appear to be very extensive)

Exasperation – Techniques (Harassment) – effectively employed against hostile type


interrogee. The interrogator must be alert because the interrogee may fabricate information to
gain relief from irritation (monotype).

Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”, “Bud
Guy – God Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”.

Egotist Techniques (Pride and Ego) – Described him as the best


Effective on the source who have been looked down upon by his superiors or comrade.

“Silent” Technique – employed against nervous or the confident type of interrogee.

“Question Barrage” Technique (Rapid Fire Questioning) – intended to confuse the


interrogee and put him into a defensive position. The interrogee become frustrated and
confused, he will likely reveal more than he intended, thus creating opening for further
questioning.

INTELLIGENCE IN SECURITY OPERATIONS

ASPECTS OF SECURITY
Protective Security- can be defined as those measures taken by an
installation or unit to protect itself against sabotage, espionage or subversion
and at the same time provide freedom of action in order to provide the
installation of the unit with the necessary flexibility to accomplish its mission.
 Physical Security- can be defined as those measures taken to prevent
physical access or entry to an installation or area by an unauthorized
personnel.
 Personnel security- Personnel security measures are those measures
taken to insure that only authorized personnel have access to classified
documents or information.
 Security of Classified Matter- Security of classified matters are those
measures taken to prevent the unauthorized disclosures of classified
matter.

PHYSICAL SECURITY
Physical Security may be also defined as the safeguarding by physical
means, such as guard, fire protection measures, of plans, policies, programs,
personnel, property, utilities, information, facilities and installation against
compromise, trespass, sabotage, pilferage, embezzlement, fraud, or other
dishonest criminal act.

Designation of Restricted Area- A “restricted area” is any area in which


personnel or vehicles are controlled for reasons of security.
1. Exclusion Area- an exclusion area is a restricted area which contains a
security interest to TOP SECRET importance, and which requires the
highest degree of protection.

20
21
jbdavid files….university of batangas – criminology…lipa campus

2. Limited Area - a limited area is a restricted area in which a lesser degree


of control is required than in an exclusion area but which the security
interest would be compromised by uncontrolled movement. ( Interior Area
Control, Visitor Identification and Movements Control, Key Control)

DOCUMENT AND INFORMATION SECURITY


Classified matter should be classified according to their content and not to
the file in which they are held or of another document to which they refer, except
radiograms or telegrams referring to previously classified radiograms or telegram
Documents Security- that aspect of security which involves the application
of security measures for the proper protection and safeguarding of classified
information.
Matter includes everything, regardless of its physical character, or in which
information is recorded or embodied. Documents, equipment, projects, books,
reports, articles, notes, letters, drawings, drawings, sketches, plans,
photographs, recordings, machinery, models, apparatus, devices, and all other
products or substances fall within the general term “matter”. Information, which is
transmitted orally, is considered “matter” for purposes of security.
Security Clearance is the certification by a responsible authority that the
person describe is cleared for access to classified matter the appropriate level.
Need-to-know is the principle whereby access to classified matter may
only be only given to those persons to whom it is necessary for the fulfillment of
their duties. Persons are not entitled to have access to classified matter solely
by virtue of their status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty requires
knowledge or possession thereof.
Certificated of Destruction is the certification by a witnessing officer that
the classified matters describe therein has been disposed of in his presence,
approved destruction methods.
Classified – to assign information by one of the four classification
categories.
Security Clearance – administrative determination that an individual is
eligible for access to classified matter.
Compromise – lose of security, which results from an authorized person
obtaining knowledge of classified matter.
Compartmentation – the grant of access to classified matter only to
properly cleaved persons in the performance of their official duties.
Declassify – removal of security classification from classified matter.
Reclassify / Re grading – act of changing the assigned classification of
matter.
Up grading – act of assigning to a matter of higher classification to a
classified document.

TOP SECRET MATTER


Information and material (matter), the unauthorized disclosure of which
would cause exceptionally grave damage to the nation, politically, economically
or from a security aspect. This category is reserve for the nation’s closest
secrets and is to be used with great reserve.

Examples of Top Secret Documents


1. Very important political documents regarding negotiation for major
alliances.
2. Major governmental projects such as proposal to adjust the nation’s
economy.
3. Military – Police defense class/plans
4. Capabilities of major successes of Intel services.
5. Compilations of data individually classified as secret or lower but
which collectively should be in a higher grade.

21
22
jbdavid files….university of batangas – criminology…lipa campus

6. Strategies plan documenting overall conduct of war.


7. Intel documents revealing major Intel production effort permitting an
evaluation by recipients of the success and capabilities of Intel agencies.
8. Major government project like drastic proposals.

SECRET MATTER
Information and material (matter), the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be of great advantage to a foreign nation. A SECRET grading is
justified if:
 It materially influences a major aspect of military tactics;
 It involves a novel principle applicable to existing important projects;
 It is sufficiently revolutionary to result in a major advance in existing techniques or in the
performance of existing secret weapons;
 It is liable to compromise some other projects so already graded.

Examples of Secret Documents


1. Those that jeopardize or endanger Intel relations of a nation.
2. Those that compromise defense plans, scientific or technological
development.
3. Those that reveal important intelligence operations.
4. War plans or complete plans for future war operations not included in top
secret.
5. Documents showing disposition of forces.
6. New designs of aircraft projections, tanks, radar and other devices.
7. Troop movement to operational areas.
8. Hotel plans and estimates
9. Order of battle info.

CONFIDENTIAL MATTER
Information and material (matter) the unauthorized disclosure of which, while not
endangering the national security, would be prejudicial to the interest or prestige of the nation or
any governmental activity, or would cause administrative embarrassment or unwarranted injury
to an individual or would be of advantage to a foreign nation.

Examples of Confidential Documents


1. Plans of government projects such as roads, bridges, building, etc.
2. Routine service reports like operations and exercise of foreign power.
3. Routine intelligence reports.
4. Certain Personnel records, Staff matters.

RESTRICTED MATTER
Information and material (matter), which requires special protection other than that
determined to be TOP SECRET, SECRET, or CONFIDENTIAL.

COMMUNICATION SECURITY
Communication Security is the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized persons in gaining information
through our communications. It includes Transmission, Cryptographic and Physical security..

TRANSMISSION SECURITY
Transmission Security is that component of communication security which results from all
measures designed to protect transmission from interception, traffic analysis and imitative
deception.

22
23
jbdavid files….university of batangas – criminology…lipa campus

CRYPTOGRAPHIC SECURITY
Cryptographic Security is that component of communication security which results from
the provisions of technically sound crypto-system and their proper use.
PERSONNEL SECURITY
The Security “chain”: Personnel Security is the “weakest link” in the security
“chain” .
Personnel Security Investigation- is an inquiry into the character, reputation, discretion
and loyalty of individual in order to determine a person’s suitability to be given security
clearance.

Types of personnel Security Investigation


National Agency Check (NAC). National Intelligence Coordinating Agency (NICA),
National Bureau of Investigation (NBI), ISAAFP or J2 Division, GHQ AFP, CIDG PNP Camp
Crame., etc.
Local Agency Check (LAC). Place of the locality where the individual is a resident,
Mayor of the locality where the individual is a resident, PNP Station thereat, Provincial/City
Fiscal, City/Municipal Judge
Background Investigation (BI) This is more comprehensive investigation than the NAC
or the NAC and LAC. A through and complete investigation of all or some of the circumstances
or aspects of a person’s life is conducted.
 Complete Background Investigation. – Consist of the investigation of the
background of an individual, particularly all the circumstances of his personal life.
 Partial Background Investigation. – Consist of the investigation of the background
of an individual but limited only to some of the circumstances of his personal life which
are deemed pertinent to the investigation.

Factors to consider during the conduct of Background Investigation.


1. Loyalty – faithful allegiance to the Philippine Government and its duly constituted
authority.
2. Integrity- uprightness in character, soundness of moral principles, freedom from
moral delinquencies, ore more simply stated-honesty.
3. Discretion- the ability of tendency to act or decide with prudence; the habit of wise
judgement or simply stated- good judgement
4. Moral- distinctive identifying qualities which serve as an index to the essential or
intrinsic nature of a person; his outward manifestation, personal traits or moral habits.
5. Character- the sum of the traits that serves as an index of the essential intrinsic
nature of a person. It is the aggregate of distinctive mental and moral qualities that
have been impressed by nature, education and habit upon the individual.
6. Reputation- opinion or estimation in which one is generally held. It is what one
reported to be, whereas character is what a person is.

SECURITY SURVEY AND INSPECTION


Security Survey is an estimate of the security standards of a unit, and is conducted to
enable the responsible officer to recognize and evaluate security hazards and determine
protective measures necessary to the prevention of sabotage, espionage, subversive activities
and other criminal acts inimical towards the interest and/or mission of the unit and/or command.
Security Inspection is a check of how well existing security measures and regulations
are being carried out within a command. A security inspection may also include an investigation
of alleged or suspected security violations. Physical security is concerned with forces, entrances
and exists, guards, traffic control, lighting, fire control, and with such other physical measures,
which, if properly established and maintained, will deny access to, unauthorized persons.

EXECUTIVE/VIP PROTECTION
Executive/VIP Security. – Those measures taken by Agents, Security Officers, Law
Enforcement officers or an Agency /officers to protect heads of state, foreign, national or local
dignitaries, civilian or military against any personal injury, assassination, sabotage, and
espionage. These may include the protection of any government or civilian officials and
individual utilized as government witnesses.

23
24
jbdavid files….university of batangas – criminology…lipa campus

NATIONAL SECURITY

What is National Security?


National Security is defined as the protection of the nation’s people and
territories from physical assault. In this sense, national security was properly
equated with national defense, and the threats to a nation’s security.

What is National Security Policies?


It refers to those political, economic, psycho-social and military instruments
which government adopt in order to cope with the various threats and obstacles
to their NATIONAL SECURITY and/or to develop, explore or use opportunities
presented to enhance the attainment of national goals and uphold the interest of
the nation.

Basis of National Security

National Interest
National Interest - the general and continuing end for which a nation acts. The term
“national interest” is used to refer to the general concept of national security and well-being.
Philippines National Interests - includes self-preservation, freedom and independence,
territorial integrity, political stability, and socio-economic welfare.

National Principles and Polices


From our national interests, national principles and polices are derived. These are:
 That our country shall be a Republican State
 That the defense of the state shall be the concern of all citizens.
 That we, as a people, renounce war to further our national interests.
 That our government shall promote social justice.
 That as a matter of concept, civilian authority is supreme at all times over the military. This
concept is actualized when the President assumes at the same time the position of the
Commander-in-Chief of the AFP.

National Strategy
In furtherance of our national principles and polices, the leaders of our nation are then
able to formulate our strategy.
National Strategy is the art and science of developing and using the political, economic,
and psychological powers of a nation, together with its armed forces, during peace and war, to
secure national objectives. It is the long -range plan through which a nation applies its strength
toward the attainment of its objectives.

National Power
The numerical strength and character of population, cultural development, character of
government, geographical location, resources, economic development and military potential.
The degree to which a nation is strong or deficient in these elements is normally a measure of
its national power.

Components of National Power


Political strength stems from the character of the people and from the type and stability
of the government and the soundness of its foreign policy.
Economic strength stems from a combination of factor such as geographic location,
climatic conditions, supply of natural resources, industrial capacity, internal and external
communication systems, international trade, and the size, health and technical competence of
the population.
Cultural strength stems from the national unity, the social and moral fiber of the people
and the things they believe in, and from the nature and vigor of national institutions-political,
social, religious, educational, scientific and cultural.

24
25
jbdavid files….university of batangas – criminology…lipa campus

Military strength is the ability of a nation to exert pressure by armed force in furtherance
of national policy. It consists of the strength of all the armed forces in combination with other
elements of national power, depending heavily on natural resources, economic strength, a broad
base of war industries and a vigorous population, military strength is influenced by the number
and quality of the nation’s military, economic, and political alliances.

25

You might also like