Professional Documents
Culture Documents
Lecture and Q and A Series in Intelligence and Secret Service PDF
Lecture and Q and A Series in Intelligence and Secret Service PDF
Lecture and Q and A Series in Intelligence and Secret Service PDF
By
Charlemagne James P. Ramos
Registered Criminologist
LEA (20%)
Pertinent laws and issuances, principles, concepts, procedures, methods
and techniques in the management, administration, and operation of a
police organization. Specifically it includes the history of policing, police
organization and administration with special focus on Republic Act No.
6975, as amended, police patrol operations with police communication
system, police intelligence, police personnel and records management and
comparative police systems. It includes also the study of the organization,
administration and operation of security agencies under the Private
Security Agency Law and its Implementing Rules and Regulations; loss
prevention and assets, protection program through different security
methods and techniques such as physical security, personnel security,
document and information security; risk analysis and security hazard; and
security survey, inspection and investigations.
About the Contributor
MICHAEL ANGELO P. QUARIN obtained his Bachelor of
Science in Criminology from Sumulong College of Arts and
Sciences College of Criminal Justice Education in 2016 and
subsequently passed the October 2016 Criminologist
Licensure Examination with the rating of 85.85. He is
currently a member of the bold organization of the
PHILIPPINE NATIONAL POLICE and committed in the Lecture
Sessions at What Criminologist Knows? and focuses on the
field of Law Enforcement Administration.
By
Jhun Boy L. Bernardino II
Registered Criminologist/Fire Officer
COVERAGE
Police Intelligence 4.1.6 Counter‐Intelligence
4.1.6.1 Objectives and Importance of Counter‐
4.1 Nature and History of Intelligence Intelligence
4.1.6.2 Basic Principles of Counter‐Intelligence
4.1.1 Nature of Intelligence Function 4.1.6.3 Activities and Functions of Counter‐
4.1.2 Historical Developments of Intelligence
4.1.6.4 Categories of Counter‐Intelligence
Intelligence
4.1.3 Principles and Functions of 4.2 Police Intelligence Operations
Intelligence
4.1.4 Categories of Intelligence 4.2.1 Intelligence Operations
4.1.5 Intelligence Cycle 4.2.1.1 Tasks in Police Intelligence Operations
4.2.1.2 Cycles of Intelligence Operations
4.1.5.1 Planning and Direction of Collection 4.2.1.3 Overt and Covert Method
Efforts 4.2.2 Methods and Techniques of Collecting
4.1.5.2 Collection of Information Information
4.1.5.3 Processing of Information
4.1.5.4 Dissemination and Use of 4.2.2.1 Elicitation
Information 4.2.2.2 Casing
4.2.2.3 Surveillance
4.2.2.4 Observation and Description
4.2.2.5 Tactical Interrogation
COVERAGE
4.2.3 Cover and Undercover Operations 4.3 Fundamentals of Cryptography: Encoding and
Decoding
4.2.3.1 Importance of Cover 4.3.1 Cryptography
4.2.3.2 Types of Cover
4.2.3.3 Hazards of Cover 4.3.1.1 Codes and Ciphers
4.3.1.2 Principles of Codes and Ciphers
4.2.3.4 Undercover Assignment 4.3.1.3 Rules on Encryption
4.2.3.5 Uses and Types of Undercover
Assignment 4.4 Counter‐Intelligence Security Measures and
Security Operations in Relation to Intelligence
4.2.3.6 The Undercover Agent
4.4.1 Physical Security
4.2.4 Informers and Informants 4.4.2 Communication Security
4.4.3 Document Security
4.4.4 Personnel Security
4.2.4.1 Informer and Informant,
Compared 4.5 Introduction to National Security
4.2.4.2 Types and Motives of Informants 4.5.1 Definition and Importance of National Security
4.2.4.3 Recruitment of Informants 4.5.2 Principles and Components
4.5.3 Threats to National Security
4.5.4 Identification of Criminal Subversive Elements
4.5.5 Modus Operandi (MO) and Order of Battle (OB)
PART SEVEN
POLICE INTELLIGENCE
“Trust But Verify”
SCENARIO
A WOMAN, ABOUT 5’4” IN HEIGHT, MEDIUM BUILT, LONG CURLY HAIR,
WEARING A WHITE TSHIRT AND BLACK PANT, HOLDING A BROWN
ENVELOP, WAS STANDING INFRONT OF A PAWNSHOP IN ANGELES CITY.
SHE WAS HIT RUN BY A MOTORCYCLE. THE RIDER WAS A TALL BUT
SKINNY MAN, WEARING A RED CAP, A BLACK LEATHER JACKET AND
MAONG PANT, DURING IN A SUNNY AFTERNOON.
LESSONS
• HUMAN BRAIN HAS LIMITS IN TERMS OF MEMORY. IT CANNOT
ABSORB ALL INFORMATION AT ONCE EVEN SIMPLE ITEMS IN SHORT
SPAN OF TIME. IT REQUIRES CRITICAL ANALYSIS!!
• THE 5 ORDINARY SENSES ARE ESSENTIAL TOOLS IN RECALLING
THINGS AS THEY ARE THE MEANS OF INFO COLLECTION.
• THERE IS A NEED TO TAKE DOWN NOTES WHEN DEALING ON
INFORMATION/ NEWS BRIEFS.
HISTORICAL DEVELOPMENT OF INTEL OPNS
“If you know the enemy and know yourself, you
need not fear the result of a hundred battles.”
“If you know yourself and not the enemy, for
every victory, you are a fool who will meet
defeat in every battle”
SUN TZU
“Against organized crime, internal affairs
in my defensive arm; Intelligence is my offensive arm.”
W. Parker
KNOWLEDGE IS POWER
E.BARON
KNOWLEDGE IS SECURITY
NICAs MOTTO
HISTORICAL DEVELOPMENT OF INTEL OPNS
BIBLICAL ROOTS
• Numbers 13:17 “And Moses sent them to spy out the
land of Canaan and said unto them, get you up this
way southward, and go up into the mountain; and see
the lands, what it is; and the people that dwell
therein, whether they are strong or weak, few or
many; and what the land they dwelt in, whether in
tents, or in strongholds; and what land is; whether it
be fat or lean, whether there be wood therein, or not.
And be of good courage and bring of the fruit of the
land.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN
SHAMMUA THE SON OF ZACCUR – Tribe of Reuben
SHAPAT THE SON OF HORI – Tribe of Simeon
CALEB THE SON OF JEPHUNNEH – Tribe of Judah
IGAL THE SON OF JOSEPH – Tribe of Issachar
HOSHEA THE SON OF NUN – Tribe of Ephraim
PALTI THE SON OF RAPHU – Tribe of Benjamin
GADDIEL THE SON OF SODI – Tribe of Zebulun
GADDI THE SON OF SUSI – Tribe of Joseph, that is from the Tribe of Manasseh
AMMIEL THE SON OF GEMALLI – Tribe of Dan
SETHUR THE SON OF MICHAEL – Tribe of Asher
NAHBI THE SON OF VOPSHI – Tribe of Napthali
GEUEL THE SON OF MACHI – Tribe of Gad
HISTORICAL DEVELOPMENT OF INTEL OPNS
RAHAB
The Harlot of Jericho (Joshua 2:1‐21)” who
sheltered and concealed the agents of Israel,
made a covenant with the agents and duped
their pursuers. She was not only an impromptu
confederate of immense value for the Jewish
leader of that far distant day, but also
established a plot‐pattern which is still of
periodic relief to motion picture producers.
HISTORICAL DEVELOPMENT OF INTEL OPNS
DELILAH
The Philistine used her when she
allowed Philistine spies to hide in her
house (Judges 16). Delilah was an
impromptu intelligence agent. Apart
from her tonsorial specialty, she also
allowed sex to gain intelligence from a
powerful enemy. She achieved the
largest effective force of her
employer’s adversaries and contriving
the stroke which put that force out of
action”.
IMPORTANT EVENTS AND PERSONALITIES IN THE WORLD OF INTELLIGENCE
Sun –Tzu
A Chinese philosopher, creator of the
“The Art of War”
“Information must be obtained from
men who knew the enemy situation.”
“Know thy enemy and know yourself,
you need not fear the results of a
hundred battles”
“If you know yourself and not the enemy,
for every victory, you are a fool who will
meet defeat in every battle.”
HISTORICAL DEVELOPMENT OF INTEL OPNS
Alexander the Great
When Alexander the Great was
marching to Asia, were rumors of
disaffection growing among his
allies and mercenaries, he sought
the truth, and got it by simplest
expedient by devising the first
“letter sorting” and opening to
obtain information.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Sertorius
He was the Roman Commander
in Spain who possessed a
White Fawn and allowed it to
become widely known ‐ that he
derived secrets and guidance
from the fawn. His intelligence
agents credited their
information to the supernatural
power of animals.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Akbar
He was known to be the sagacious
master of the Hindustan. He
employed more than 4,000 agents for
the sole purpose of bringing him the
truth that his throne might rest upon
it.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Genghis Khan
He was known “The Great Mongol”, who used
intelligence to conquer China and invade Cathay.
He instructed his Generals to send out spies and
used prisoners as sources of information. The
leader of the so‐called MONGOL CONQUERORS ‐
made use of effective propaganda machine by
spreading rumors of Mongol Terror, they
collected information on weaknesses and
rivalries of Europe. The leaders usually disguised
as merchants.
HISTORICAL DEVELOPMENT OF INTEL OPNS
RENAISSANCE PERIOD
With the rise of Nationalism and
development of modern armies,
intelligence became apparent to
large states. In England, Sir Francis
Walsingham, under Queen
Elizabeth, organized the first
National Intelligence Service. He
employed spies on the staff of the
Admiral in Command of the Spanish
Army and able to obtain information
regarding Spanish Army as to their
ships, equipment, forces and stores.
He protected Queen Elizabeth I from
countless assassins.
HISTORICAL DEVELOPMENT OF INTEL OPNS
In France
Richlieu
introduced the network of covert collectors
who transmitted prompt and accurate
information to Paris regarding the activities
of the rebels and dissidents of the kingdom.
Louis XIV
systematized political policy, continuous
surveillance, postal censorship and military
intelligence organization were his
contributions.
HISTORICAL DEVELOPMENT OF INTEL OPNS
The French Intelligence System continued since 15th
Century.
Napoleon Bonaparte once said, “One Spy in the right
place is worth 20,000 men in the field”. He organized
two Bureaus of Interest:
Bureau of Intelligence – which consolidate all incoming
information regarding the enemy for presentation to
the emperor and to obtain information as desired, and
Topographic Bureau – which maintains a large map
which covers the latest information regarding both
enemy and friendly forces. He maintained Military
Intelligence and Secret Political Police Service all over
Europe. His main arm was “Spy against spy” concept.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Frederick the Great
“Father of Organized Military Espionage”
He has divided his agents into four classes:
Common spies
those recruited among poor folk, glad to earn a small sum or
to accommodate as military officer.
Double spies
are unreliable renegades, chiefly involved in spreading false
information to the enemy.
Spies of Consequences
couriers and noblemen, staff officers, and kindred
conspirators, requiring a substantial bribe or bait,
• Persons who were forced to undertake espionage against
their own will.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Hannibal
He was considered one of the brilliant
military strategists in the history of
military intelligence. He had developed an
effective intelligence system for 15 years
in Rome. He usually roam around the city
often disguise himself as a beggar to
gather first hand information.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Julius Caesar
During his time, the staff of each Roman Legion
includes ten “speculators” who served as an
information‐collecting agency. The “speculators”
were the first intelligence personnel to appear
definitely in a military organization. Military
success of the Romans was aided by
communication system. Made use of carrier
pigeons, which made possible the amazing speed
with which intelligence of Imperial Rome was
transmitted. They also employed ciphers to
ensure secrecy of communications.
HISTORICAL DEVELOPMENT OF INTEL OPNS
George Washington
Conspirator under oath abounds in the history of
every nation. George Washington was grand
master in intelligence. He mobilized the Free
Masons of the colonies at the outbreak of the
American war of Independence.
Karl Schulmeister
He was Napoleon’s eye, Napoleon’s military
secret, born on August 5, 1770. He began his
career in offensive espionage under a cover role.
He was able to infiltrate the Austrian General
Staff.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Wilhelm Stieber
He incorporated intelligence in the General
Staff Support System. He introduced military
censorship and organized military propaganda. He
works as a census taker and developed informal
gathering of data.
Alfred Redl
He was one of the most brilliant intelligent
agents. Though a homosexual, he became Chief of
the Austro – Hungarian Secret Service. He became
a double agent of Russia.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Brahma Kautilya
In Ancient India, he overthrew the Nanda Dynasty and
established the first MAYURYAN king in the Indian
throne. He recommended to his king that for the ruler
to succeed, the ruler should strike at his enemy’s weak
points by means of spies. He proposed the following
means to conquer enemy’s stronghold:
Intrigues and spies ‐ Winning over enemy’s people ‐ Siege
and assault ‐ Before beginning military operation, a
conqueror should know the comparative strength and
weaknesses of himself and his enemy. No war should be
undertaken without careful examination of all factors
reported by the kings’ spies.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Maj. General Donovan
He was the organizer of the OSS, builder
of a central intelligence system ‐ OSS whose
exploits become legendary in World War II.
Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of
the U.S. Navy Communications Intelligence
intercepted a top‐secret signal relaying the
travel of the Admiral. En route, he was
intercepted and crashed in the Jungles of
Baungainville.
HISTORICAL DEVELOPMENT OF INTEL OPNS
V2 – Rackets
OSS agents working in conjunction with the British
Intelligence, through penetration and technical
intelligence discovered Punemundo which was
the V2 guide missile research project of Nazi
Germany. It resulted to its destruction and heavy
bombing.
Battle of Midway
In June 1442, the turning point of the Naval
in the Pacific, the victory gained by the Americans
was due to the disrupted messages from the
Imperial Japanese Navy.
HISTORICAL DEVELOPMENT OF INTEL OPNS
State Informer
Edward I, King of England in 1725
organized a systematic police system so called
Witch and Ward. By Royal proclamation, the
profession “State Informer “was created in
1734 enjoining all informers to expose criminal
activities and be compensated.
Joseph Petrosino
He was member of the New York Police
Department in early 1900, he was the head of
the Italian Squad. Through extensive
intelligence network, he was credited to smash
and neutralization of the Black Society.
HISTORICAL DEVELOPMENT OF INTEL OPNS
Joseph Fouche
“Father of Police Intelligence
Operations”.
A Frenchman born in 1759, rose to
become the most feared and respected
intelligence director in French history.
He created a network of agent. His
assistance founded the modern system
of spying on spies, which later was
known as counter espionage.
Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of
Justice and became what is known as the F.B.I. under its first director John Edgar
Hoover in 1924. On September 6, 1939 by a presidential directive, it came to its
responsibility the task of a domestic intelligence.
Central Intelligence Agency ‐ The agency was created under the US National Security
Act of 1947. It was the Central Intelligence group established during the time of
President Truman in January 1946. The CIA was under the National Security Council.
Committee for State Security ‐ Russia ‐ The Intelligence agency known as the KGB ‐
Komitet Gosudarstvennoy Bezopasnosti (KGB)
British Secret Service – Great Britain
Mossad – Israel
Britain: Scotland Yard, London Metropolitan Police Force
It was established by Sir Robert Peel in 1829 which signaled the beginning of a
colorful legendary police force and considered one of the most efficient in the world
today.
INTELLIGENCE IN THE WORLD WARS
WORLD WAR 1
1900
Europe powers developed modern staff systems and place intelligence on the same
level with personnel, operations and logistics. Intelligence then functioned in time
of peace and war. Intelligence during this period, concentrated on information
about the armed forces of the enemy and their capabilities. AIRCRAFT was
introduced as a method of conducting aerial reconnaissance. WIRELESS TELEGRAPH
was used wherein CODES AND CIPHERS were applied. ARMY INTELLIGENCE rapidly
expanded during this period.
GERMAN INTELLIGENCE
gained a high reputation for offensive effectiveness throughout Europe but
declined at the outset of the war.
INTELLIGENCE IN THE WORLD WARS
BRITISH INTELLIGENCE
succeeded greatly by means of censorship and its CODE ROOM combined with skillful use of COVERT
agents.
US expanded their NAVAL INTELLIGENCE wherein DOMESTIC COUNTERINTELLIGENCE became a
principal activity.
At this time US created three branches of its Intelligence System:
POSITIVE BRANCH
function of collecting evaluating and disseminating intelligence. Prepare situation estimate and
translate documents;
NEGATIVE BRANCH
it is the counterintelligence functions which involve in investigating disloyalty and sedition, investigate
enemy activities, investigate graft and fraud in organization;
GEOGRAPHIC BRANCH
Produces maps, photographs, and terrain studies. SECTIONS
Administration, Collection by attaches and troops, Codes and ciphers
INTELLIGENCE IN THE WORLD WARS
WORLD WAR II
GERMAN INTELLIGENCE
started the war with the world’s best organized intelligence service through advance preparation of
intelligence accompanied by troop movements. GERMAN INTELLIGENCE WEAKENED by the attitude
of the Officer Group wherein they subordinated intelligence to operation and did not regard
intelligence assignment worthy of a soldier.
JAPANESE INTELLIGENCE
failed because it was not provided with sufficient number of trained personnel to assemble and
evaluate the mass of materials which were collected although Japanese Intelligence was involved in
short war and defensive in nature.
BRITISH INTELLIGENCE
the delay in the use of German V‐BOMB against them was their main achievement during this time.
In 1942
a FEMALE SPECIAL AGENT was able to transmit vital information concerning the activities and
installations of the main research station at Penemuenda. Its intelligence failed in the defeat of
GENERAL MONTGOMERY’S forces at ANNHEIM.
INTELLIGENCE IN THE WORLD WARS
US INTELLIGENCE
In 1941, The US Strategic Service was established to research and analyze military, political and
economic information as it affected the security of the country. US JOINT CHIEFS OF STAFFS – was
organized to act in support of the army and the navy in the collection and analysis of strategic
information and to be responsible for the planning and operation of special services. US greatest
contribution to intelligence was the development of the AMPHIBIOUS WARFARE where coordination of
many types of intelligence activities was required to provide adequate knowledge of the successful
operation of a complex military force transported over water with the objective of establishing itself on
an enemy – held shore against opposition. US successes in WW II were based on personnel drawn from
CIVILIAN POPULACE, BUSINESS AND PROFESSIONAL MEN AND WOMEN.
CHINESE INTELLIGENCE
In 1932, TAI LI – organized the China’s Secret Police to conduct espionage and counterespionage against
Japanese Spies and Chinese communist.
SOVIET INTELLIGENCE
AMTORG was organized for the purpose of purchasing all kinds of materials for the Soviet Union.
SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence concerned with
disaffection among Soviet troops and anti‐communism in any form. Its five major divisions are:
Administration, Operation, Investigation, Prosecution, and Personnel.
POST WAR PERIOD: The superpowers
Soviet Intelligence System
SOVIET COUNTERINTELLIGENCE known as “IRON CURTAIN” signified that no one may
cross the borders of the USSR without being detected. This means that all communications are
rigidly controlled. Its contribution to modern intelligence was the dissemination of false
information designed to mislead and confuse opponents and prospective victims. The
MGB(ministerstvo gosudarstvennoy bezopasnosti) – MILITARY INTELLIGENCE AND THE MINISTRY
OF STATE SECURITY formerly NKGB was concerned on political espionage and propaganda abroad
and for the control of espionage activities of foreign communist countries. The KGB resumed the
former function of the old MGB. It is now the official secret police agency of the Soviet Union, in
charge of the state security KGB means (Commission of State Security) K‐ Omissija G‐
Osudarstyennoj B – Ezopasnosti or Komitet Gosudarstvennoy Bezopasnosti
British Intelligence System
It is composed of several intelligence agencies such as the BRITISH MILITARY INTELLIGENCE
DIVISION (MID) which is divided into 20 different departments. The M15 – devoted to
counterespionage and security. It is the special branch of the SCOTLAND YARD charged with
guarding the Royal Family and important British officials and Visiting Foreign Dignitaries.
POST WAR PERIOD: The superpowers
French Intelligence System
The SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE ESPIONAGE (SDECE‐FOREIGN
Intelligence and counterintelligence Service) was under the office of the Prime Minister. GENERAL
CHARLES DE GAULLE set up the Bureau Central de Reassignments et d’ Action (BCRA Central Office
for Intelligence and Action in London in 1940. It is an expansion of the Service De Reassignments (SR‐
Intelligence Service) which is a part of the Old Renzieme Bureau (Second Bureau) of the French
General Staff. SDECE concerned on Strategic and Counterintelligence while SURETE NATIONALE
became part of French Intelligence Service.
German Intelligence System
The RED GESTAPO which serves as security service organized by East Germany to combat the
covert activities of West Germany Group when Germany was still divided by the Berlin Walls.
United States Intelligence System
The CIA and the FBI – the CIA is one among the biggest in the world in terms of intelligence
networking. CIA and the FBI and the other state/ federal units of intelligence services were US main
intelligence agencies.
Agents of Betrayal
Intelligence is sometimes described as a
“world of deceit and betrayal”. Some of
the high personalities which evidence
this description are:
JUDITH COPLON, a political analyst of a
Department of Justice, was accused of
taking unlawful possession of
government documents and spying for a
foreign power.
DR. EMIL JULIUS KLAUS FUCHS was accused of
releasing American Atomic Secrets to the Soviet in
1945 and to the British in 1947. He detailed
knowledge of the construction of atomic bombs.
ERNST HILDING ANDERSON was a Royal Swedish
Navy who provided military secrets to a foreign power
and was found guilty and sentences to life
imprisonment in 1951.
AGENTS OF BETRAYAL IN THE WORKPLACE
COMMON MOTIVES AND CAUSES FOR PEOPLE TO BETRAY:
GULLIBILITY
DISLOYALTY
REVENGE
PERSONAL PRESTIGE
FRIENDSHIP
IDEOLOGICAL BELIEF
JEALOUSY
WEAKNESS OF CHARACTER
INDEBTEDNESS
HERE IS THE CLUE!
• THE WORLD WE LIVE IN IS FULL OF ILLUSIONS, MYTHS AND LIES. THE
ONLY WAY TO KNOW THE TRUTH IS BY SEARCHING REAL
INFORMATION…
• WHAT WE SEE, WHAT WE HEAR, WHAT WE FEEL, WHAT WE SMELL
AND TASTE ARE OFTENTIMES NOT THE REAL THINGS. HUMANS AS
WE ARE, WE SOMETIMES FAIL TO APPLY CRITICAL ANALYSIS ON
THEM.
• COMMON SENSE IS IMPORTANT!
ESSENTIAL INTERESTS IN INTELLIGENCE
Intelligence Defined
• Webster defines intelligence as the capacity for understanding and for
other forms of adaptive intellect of behavior; the mind in operation; the
power of meeting any situation, especially a novel situation, successfully
by proper behavior adjustments; the ability to apprehend the
interrelationships of presented facts in such a way as to guide action
towards goal; knowledge of an event, circumstances, etc., received or
imparted; the gathering or distribution of information; the staff of persons
engaged in obtaining such information.
• Base on Psychology‐ Intelligence is the capacity of a person to adjust to
new situations through the use of what has been previously learned.
WHAT IS CRITICAL THINKING?
• IT IS THE ABILITY TO THINK CLEARLY AND RATIONALLY ABOUT WHAT
TO DO OR WHAT TO BELIEVE.
• IT INCLUDES THE ABILITY TO ENGAGE IN REFLECTIVE AND
INDEPENDENT THINKING.
• SOMEONE WITH CRITICAL THINKING IS ABLE TO UNDERSTAND THE
LOGICAL CONNECTION BETWEEN IDEAS. THUS, IT IS A COMPLEX
COMBINATION OF COMPETENCE, KNOWLEDGE AND SKILLS.
INTELLIGENCE defined
Intelligence is the capacity to understand things (Webster)
Intelligence is the way we adjust to certain situations (Psychology)
Intelligence is a process, a product and an institution (Task Force)
INTEL AS A PROCESS ‐ COLLECTION, COLLATION, ANALYSIS, EVALUATION,
INTERPRETATION, DISSEMINATION AND USE OF DATA
INTEL AS PRODUCT – PAPER AND ELECTRONIC DATABASES
INTEL AS AN INSTITUTION – AGENCIES OF GOVERNMENT
• According to Military Terminologies ‐ Intelligence is the end
product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information which
my have immediate or potential significance to the development
and execution of plans, policies and programs of the users.
• According to Police Parlance ‐ The end product resulting from the
collection, evaluation, analysis, integration and interpretation of
all available information regarding the activities of criminal and
other law violators for the purpose of affecting criminals and their
arrest, obtaining evidence, and forestalling plan to commit crime.
Definition of Terms
• National Intelligence – the total product of intelligence developed by all
governmental agencies that cover the broad aspects of national policy and
security.
• Military Intelligence – it is used in the preparation of military policies, plans and
programs. It includes the strategic and combat intelligence.
• Strategic Intelligence – the knowledge pertaining to the capabilities and
probable courses of action of foreign nations.
• Combat Intelligence – is required by the commander in order to determine the
best use of his available firepower and maneuver forces, to accomplish his
mission, and to maintain the security of his command.
• Counter Intelligence – an integral part of all intelligence operations and as such
can’t be separated from combat and strategic intelligence. Its objective is to
safeguard information against espionage, material and installations against
sabotage, and personnel against subversive
• Order of battle intelligence – concerns the manner in which military forces are organized
and disposed
• Intelligence – organizations, methods and personnel of competing intelligence system
• Economic ‐ On economics, the areas are on:
Financial – Monetary policies, Currency structure, Transactions, Institutions,
Personalities
Commercial – trade policies, markets, trading methods, price policies, personalities
Industrial – structure of Capacity, manufacturing plants and processes, raw material,
energy rotations, labor relations, personalities
Mining – Mineral Resources, Production method, Output
Agriculture – policies, crop structure, cultivation method, mechanization, financing,
specific characteristics of rural population
Principles of Intelligence
• Objectivity ‐ in intelligence, only the well guided succeed. It is a basic intelligence concept
that there must be unity between knowledge and action. It follows therefore that
intelligence should interact and condition the decision. Intelligence must be adapted to the
needs of the decision; it is both giver and taker. Action or decision is planned by knowledge
and guided by it at every step.
• Interdependence ‐ Intelligence is artificially subdivided into component elements to insure
complete coverage, eliminate duplication and to reduce the overall task or manageable
sizes. Nevertheless, each subdivision remains as essential part of unity; contributes
proportionately to the end result; possesses a precise interrelationship; and interacts with
each other so as to achieve a balanced and harmonious whole.
• Continuity ‐ Intelligence must be continuous. It is necessary that coverage be continuous so
that the shape of what happens today could be studied in the light of what happened
before, which in turn would enable us to predict the shape of things to come.
• Communication ‐ Intelligence adequate to their needs must be communicated to all
the decision makers in manner that they will understand and form that will permit its
most effective use.
• Usefulness ‐ Intelligence is useless if it remains in the minds, or in the files of its
collectors or its producers. The story must be told and it must be told well. The story
must be convincing and to be convincing it must not only be plausible or factual but
its significance must be shown.
• Selection ‐ Intelligence should be essential and pertinent to the purpose at hand.
Intelligence involves the plowing through a maze of information, considering
innumerable number of means or of picking the most promising of a multitude of
leads. The requirement of decision‐making covers very nearly the entire span of
human knowledge. Unless there is selection of only the most essential and the
pertinent, intelligence will go off in all directions in one monumental waste of effort.
• Timeliness ‐ Intelligence must be communicated to the
decision maker at the appropriate time to permit its most
effective use. This is one of the most important and most
obvious, for Intelligence that is too soon or too late are
equally useless. Timeliness is one principle that complements
all the others.
• Security ‐ Security is achieved by the measures which
intelligence takes to protect and preserve the integrity of its
activities. If intelligence has no security, it might be as well
being run like a newspaper to which it is similar.
General Activities
• Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with little
practical immediate operation value.
• Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary for
more effective police planning and operation.
• National Intelligence ‐ it is the integrated product of intelligence developed by all the governmental
branches, departments concerning the broad aspect of national security and policy. It is concerned to
more than one department or agency and it is not produced by single entity. It is used to coordinate all
the activities of the government in developing and executing integrated and national policies and plans.
• Counter‐Intelligence – phase of intelligence covering the activity devoted in destroying the effectiveness
of hostile foreign activities and to the protection of info against espionage, subversion and sabotage.
• Undercover Work – is an investigative process in which disguises and pretext cover and deception are
used to gain the confidence of criminal suspects for the purpose of determining the nature and extent of
any criminal activities that maybe contemplating or perpetuating.
Functional Classification of Police Intelligence
• Criminal Intelligence – refers to the knowledge essential
to the prevention of crimes and the investigation, arrest,
and prosecution of criminal offenders.
• Internal Security Intelligence – refers to the knowledge
essential to the maintenance of peace and order.
• Public Safety Intelligence – refers to the knowledge
essential to ensure the protection of lives and
properties.
Forms of Intelligence
• Sociological Intelligence – deals with the demographic and psychological aspects of groups of
people. It includes the population and manpower and the characteristics of the people, public
opinion – attitude of the majority of the people towards matter of public policy and
education.
• Biographical Intelligence – deals with individual’s personalities who have actual possession of
power.
• Armed Force Intelligence – deals with the armed forces of the nation. It includes the position
of the armed forces, the constitutional and legal basis of its creation and actual role, the
organizational structure and territorial disposition, and the military manpower recruitment
and Order of Battle
• Geographical Intelligence – deals with the progress of research and development as it affects
the economic and military potential of a nation.
THREE KINDS OF INTELLIGENCE
Strategic Intelligence – as defined earlier, it is an intelligence data that are
not of an immediate value. It is usually descriptive in nature, accumulation
of physical description of personalities, modus operandi. It does not have
immediate operational value but rather long range that may become
relevant to future police operations.
Line Intelligence – It is the kind of intelligence required by the commander
to provide for planning and conduct tactical and administrative operation
in counter insurgency. This pertains to knowledge of People, Weather,
Enemy and Terrain (PWET) used in planning and conducting tactical and
administrative operation in a counter insurgency.
Intelligence information to be determined in Line Intelligence are:
• People ‐ living condition of the people, sources of income, education of the
people, government livelihood projects, extent of enemy influence to the
people
• Weather – visibility, cloudy, temperature, precipitation (rain), wind
• Enemy ‐ location of the enemy, strength of the enemy, disposition, tactical
capability, enemy vulnerability
• Terrain ‐ relief and drainage system, vegetation, surface material, man made
features. There are military aspects of terrain which includes cover and
concealment, obstacle, critical key terrain features, observation and fields of
fire, and avenues of approach.
• Counter Intelligence (CI) ‐ this kind of intelligence covers the activity
devoted in destroying the effectiveness of hostile foreign activities
and to the protection of info against espionage, subversion and
sabotage. Hence, the three activities of CI are: protection of
information against espionage; protection of personnel against
subversion; and protection of installations and material against
sabotage.
Measures in CI must be both passive and active. Passive measures
are those measures which seek to conceal info from the enemy
while active measures are those which seek actively to block the
enemy’s efforts to gain info or engage in espionage, subversion or
sabotage.
Counter Intelligence is also known as Negative Intelligence ‐ a generic term meaning three different
things;
• Security Intelligence – means that the total sum of efforts to counsel the national policies,
diplomatic decisions, military data, and any other information of a secret nature affecting the
security of the nation from unauthorized persons. It is an effort to deny information to
unauthorized persons by restricting to those who are explicitly authorized to possess it.
• Counter‐Intelligence ‐ counter intelligence is the organized effort to protect specific data that
might be of value to the opponent’s own intelligence organization. Some of its functions are:
Censorship – of the following: correspondence, broadcast, telecast, telephone conversations,
telegrams and cables, etc., prevention of the dissemination of any information that might aid an
opponent; maintenance of files of suspect; surveillance of suspects; mail reading, wire tapping and
recording; infiltration of the enemy intelligence organized to procure information about its
method, personal, specific operations and interest.
• Counter‐Espionage ‐ In counter‐espionage, negative intelligence becomes a dynamic and active
effort. Its purpose is to investigate actual or theoretical violation of espionage laws, to enforce
those laws and to apprehend any violators.
Five Categories of CI Operation
• Military Security – it encompasses the measures taken by a command to
protect itself against espionage, enemy operation, sabotage, subversion or
surprise. Examples are:
Secrecy discipline ‐ Special safeguarding of classified information ‐ Security
of troop movement ‐ Special handling of weather & escapes ‐ Counter
subversion with in the armed forces ‐ Tactical measures in combat area
• Port Frontier and Travel Security – has to do with the application of both
military and civil security measures for CI control at point of entry and
departure, international borders or boundaries. Examples are: Security
screening and control of frontier Security control of merchants, seaman and
crew of commercial aircraft, Security control of frontier crossing point
Security control of seaports
• Civil Security – it encompasses active and passive CI measures affecting the
non‐military nationals permanently or temporarily residing in an area under
military jurisdiction. Examples are: Systematic registration of civilians and
aliens
Control of circulation, Curfew, Surveillance of suspected political
organizations, Security screening of labor, Issuance of passes and permits,
Control of internal commerce
• Censorship – it is the control and examination of the civil, national, armed
forces, field press, and POWs.
• Special Operations – counter subversion, sabotage and espionage
INTELLIGENCE UNITS IN THE WORKPLACE
HUMAN RESOURCES DEPARTMENT
RECRUITMENT AND SELECTION PROCESS ‐ COLLECT INFO ON APPLICANTS
BACKGROUND INVESTIGATION (B.I) – LOYALTY CHECK/MORALITY
CHECK/CRIMINAL RECORDS
H.R TOOLS FOR COLLECTION OF INFO
‡ FORMAT EXAMS (“TELL ME SOMETHING ABOUT YOURSELF”)
‡ INTERVIEW
‡ BACKGROUND INVESTIGATION
‡ PRIOR INFO
‡ RESEARCH
Categories of CI Operation
• Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use
human sources to collect information or to conduct sabotage and subversion
which includes CI special operations, liaison, counter security, and CI screening.
• Counter Signal Intel (SIGINT) – determine enemy SIGINT and related enemy
weaknesses, capabilities and activities, assess friendly operations to identify
patterns, profiles and develop, recommend and analyze counter measures.
MEASUREMENT AND SIGNATURES INTELLIGENCE (MASINT) it
concerns about weapon capabilities and industrial activities which
includes advanced processing and use of data gathered from
overhead and airborne IMINT and SIGINT. It uses Telemetry
Intelligence (TELINT) ‐data relayed by weapons during tests and
electronic intelligence (ELINT) ‐ electronic emissions picked up from
modern weapons and tracking systems.
OPEN‐SOURCE INTELLIGENCE (OSINT) refers to a broad array of
information and sources that are generally available, including
information obtained from the media (newspapers, radio, television,
etc.), professional and academic records (papers, conferences,
professional associations, etc.), and public data (government reports,
demographics, hearings, speeches, etc.).
INTEL SOURCES AND COLLECTION MODE
AS TO SOURCES OPEN SOURCES VS CLOSE SOURCES
AS TO COLLECTION MODE OVERT COLLECTION VS COVERT COLLECTION
OVERT through the review of already published material (newspapers, radio, periodicals, trade,
political, economic and military journals, as well as internet sources) and relatively passive
‘environmental scanning
COVERT through more aggressive techniques of penetrating the secrecy and privacy of others. It
comes from a variety of concealed sources such as human spies, defense attaché and diplomatic
reporting, intercepted communications and signals and satellite imagery. These clandestine means
are used to ‘steal’ information that potentially hostile nation‐states or trans‐national terrorist
groups want to hide
THE INTELLIGENCE CYCLE
MODELS
MODELS
5 ELEMENTS IN THE CYCLE
INTELLIGENCE SERVICES
1. ISI Pakistan
2. CIA USA
3. MI6 UK
4. KGB RUSSIA
5. BND Germany
6. RAW India
7. DGSE France
8. MIS China
9. MOSSAD Israel
SOME LOCAL OFFICES
WITH INTELLIGENCE UNITS
INTELLIGENCE IN THE WORKPLACE
KNOWLEDGE PERTAINING TO:
A. ORGANIZATIONAL STRUCTURES TYPES OR FORMS
B. ADMINISTRATIVE PROCESSESS POSDC/POSDCRB
C. MANAGEMENT RESOURCES 5M’S
D. ORGANIZATIONAL GOALS/OBJECTIVES POLICIES/ GUIDELINES
PHASE 1
Planning the Collection Effort
This phase of the cycle involve the determination
of the requirements of intelligence. It is concerned
with identifying the so called Essential Element of
Information (EEI) ‐ an item of intelligence or
information of the characteristics of the area of
operations and the enemy, which the commander
feels he needs before he can reasonably arrive at a
decision.
PHASE 1
PLANNING THE COLLECTION EFFORT
• DETERMINATION OF THE GOAL ‐ VISION & MISSION
‐ WHAT DO WE WANT TO ACHIEVE? – GOAL/OBJECTIVE
‐ WHEN? ‐TIME FRAME
‐ WHO? – PEOPLE INVOLVED/RESPONSIBLE
‐ WHY? – REASONS/CAUSE/RATIONALE
‐ WHERE? – VENUE/LOCATION/PLACE OF OPN
‐ HOW? – GUIDELINES/DOCTRINES/SOPs
TOOLS FOR PLANNING:
SARA MODEL – SCANNING – ANALYSIS – RESPONSE – ASSESSMENT
SWOT ANALYSIS – STRENGHT – WEAKNESSES – OPPORTUNITIES ‐ THREATS
PESTELO ANALYSIS – POLITICAL‐ECONOMIC‐SOCIAL‐TECHNOLOGICAL‐LEGAL‐
ORGANIZATIONAL
PHASE 2
Collection of information
This phase of the cycle is concerned with identification of the collecting
agency, the formulation of procedures on the manner of collecting the
information in conjunction with the plans as achieved in phase one.
• Methods of Collection – information can be collected through overt
method (open system) or covert method (secret/clandestine).
• Collecting Agencies – depending on the type of operation, the collecting
agency could be Government Agencies, Intelligence units, or
Organizations
• Trade Crafts – includes the use of photography, investigations / elicitation
/ interrogation, surveillance, sound equipment, surreptitious entry – keys
and locks, use of an artist, communication
PHASE 2
COLLECTION OF INFORMATION
• OBSERVE AND DESCRIBE (ODEX)
• SCIENTIFIC RESEARCH – PROBLEM‐HYPOTHESIS‐ TEST HYPOTHESIS‐RESULT‐
INTERPRETATION – REPLICABILITY
• EXPERIMENTATION
Collecting Agencies – depending on the type of operation, the collecting agency
could be Government Agencies, Intelligence units, or Organizations
Trade Crafts – includes the use of photography, investigations / elicitation /
interrogation, surveillance, sound equipment, surreptitious entry – keys and locks,
use of an artist, communication
PHASE 3
PROCESSING THE COLLECTED INFORMATION
This phase of the cycle is concerned with the examination and collation of all
collected information.
COLLATION – organization of raw data and information into usable form;
grouping similar items of information so that they will be readily accessible.
RECORDING– is the reduction of info into writing or graphical representation and
the arranging of this into groups of related items. Police log book and Journal,
Intel‐work Sheet ‐ Intel Files, Situation Maps ‐ Rouges Gallery, Modus Operandi
Files
EVALUATION – examination of raw information to determine intelligence value,
pertinence of the information, reliability of the source and agency, and its
credibility or truth of information.
ANALYSIS AND INTERPRETATION – explanation of events
RELIABILITY ACCURACY
A - Completely 1 - Confirmed by
reliable other
B - Usually reliable 2 - Probably true
C - Fairly reliable 3 - Possibly true
D - Not usually 4 - Doubtfully true
reliable 5 - Improbable
E - Unreliable 6 - Truth cannot be
F - Reliability cannot judged
be judged
As to Source of Info
T‐ Direct Observation by Commander/Chief of
Unit
U‐ Report by DPA or Resident Agent
V‐ Report by PNP/AFP Troops
W‐ Interrogation of Captured Enemy
X‐ Observation of gov’t/civilian employee
Y – Observation from populace
Z‐ Documentary
PHASE 4
DISSEMINATION & USE OF INFORMATION
This phase of the cycle refers to the activities of transferring the
processed information to the proper users, most particularly the
authority that requires the activity. Processed information can be
disseminated through annexes, estimates, briefing, message, reports,
overlays, and or summaries.
Methods of Dissemination
• Fragmentary orders from top to bottom of the
command
• Memorandum, circulars, special orders
• Operations order, oral or written
• Conference – staff members
• Other report and intelligence documents
• Personal Contact
Who are the users of intelligence?
• National leaders and military commanders –
formulation and implementation of national policies.
• Advisors and Staff – preparations of plans and
estimates
• Friendly nations or other branches of the armed forces.
• Processor – basis for evaluation and interpretation.
• Head / chairman of an organization
• Any person with authority for purposes of planning.
LEGAL AND ETHICAL ISSUES IN INTEL OPNS
INTEL OPERATIONS (COVERT) ‐ IS IT LEGAL? IS IT MORAL?
ANTIs
IT’S A VIOLATION OF RIGHTS!!!
….PRIVACY, FAMILY RIGHTS, HOME & CORRESPONDENCE
PROs
…NECESSARY FOR PUBLIC ORDER, PUBLIC INTEREST,
AND NATIONAL SECURITY
THOUGHTS TO THINK ABOUT...ON LEGAL AND
ETHICAL ISSUES
INTEL OPNS TO BE LEGAL AND ETHICAL…
MUST BE IN ACCORDANCE WITH LAW AND PROCEDURES (MUST BE
AUTHORIZED)
MUST BE PROPORTIONATE TO WHAT IT SEEK TO ACHIEVE (NATIONAL
INTEREST/NATIONAL SCTY)
MUST BE FOR THE COMMON GOOD AND NOT FOR PERSONAL
INTEREST OF A FEW
COVERT INTEL OPNS ARE ALLOWED IN THE…
• AFP – PNP – PDEA – NBI – NICA – BI – BOC – BSP ‐ OTHERS AGENCIES
• COVERT INTEL IS AN AUTHORIZED GATHERING TOOL FOR ALL OF THESE
GOVERNMENT ENTITIES INCLUDING THEIR INSTURMENTALITIES. THEY ARE
EVEN COVERED BY CONFIDENTIAL AND INTELLIGENCE FUNDS FOR INTEL
OPNS IN THE NAME OF NATIONAL SECURITY, PEACE AND ORDER.
FOR PRIVATE INSTITUTION – they maybe allowed to conduct overt intel
activities through registered detective agencies as per (RA 5487)
THE CONCEPT OF COVERT INTELLIGENCE
It is an operation that is so planned and executed as to conceal the
identity of operative.
It is intended to create a political effect which can have implications in
the military, intelligence or law enforcement arenas.
COVERT SURVEILLANCE
A. CONVENTIONAL ‐ BY FOOT OR AUTOMOBILE OR STAKEOUT
B. TECHNICAL ‐ USE OF VIDEO/AUDIO RECORDING GADGETS
C. ASSET TRACKING ‐ USE OF ELECTRONIC TRACKING DEVICES
COMMUNICATIONS
A. COMDATA ‐ messages from mobile phones, emails, fixed
telephones, postal services, and the internet social sites.
B. DECODING AND DECIPHERING – Cryptography
C. INTRUSIVE SURVEILLANCE – eavesdropping, bugging, wiretapping
PEOPLE AS SOURCES OF INFORMATION
• COVERT INTELLIGENCE OPNS USES INFORMANTS (VOLUNTARY) AND
INFORMERS (PAID)
• COVER AND UNDERCOVER: DPA (RECRUITED INSIDE TARGET ORG) AND DIA
(INSERTION OF AGENT INSIDE TARGET ORG)
INFORMATION IS THE LIFE‐BLOOD
OF INTELLIGENCE
NO INFORMATION = NO INTELLIGENCE
Intelligence is Knowledge = Knowledge is
POWER!
INFORMATION
Information refers to all evaluated materials of every description including those
derived from observation, reports, rumors, imagery, and other sources from which
intelligence in produced.
Information is a communicated knowledge by others obtaining by personal study,
investigation, research, analysis, observation.
Two General classifications of sources of information:
Informants (Asset) – people selected as sources of
information, which could be voluntary, or in consideration of a price.
• Informant – refers to a person who gives information to the police voluntarily or
involuntarily with out any consideration
• Informer – those who give information to the police for
price or reward
Types of Informants
• Criminal Informant – an informant who give information to the police pertaining to the
underworld about organized criminals with the understanding that his identity will be
protected
• Confidential Informant – is similar to the former but he gives information violate of the law to
includes crimes and criminals
• Voluntary Informant – a type of informant who give information freely and willfully as a
witness to a certain act
• Special Informant – those who gives information concerning specialized cases only and it is
regarded a special treatment by the operatives (ex. teachers, businessmen)
• Anonymous Informant – those who gives information through telephone with the hope that
the informant can not be identified
Sub‐type of Informant
• Incidental Informant – a person who casually imparts information to an
officer with no intention of providing subsequent information
• Recruited Informant – A person who is selected cultivated and developed
into a continuous source of info
Categories of Recruited Informants:
• Spontaneous or Automatic Informant – Informants who by the nature of
their work or position in society have a certain legal, moral or ethical
responsibilities to report info to the police
• Ordinary (out‐of‐their‐will) Informants – those under the compulsion to
report info to the police
• Special Employee – informants who are of a specific operational nature
Other Classification of Informant
Other terms related to people who gives information
are Automatic Informant, Penetrating Agent ,
Infiltrating Agent , Full time Informant , Rival –
Elimination Informant, False Informant, Frightened
Informant, Self‐ aggrandizing Informant, Mercenary
Informant , Double Crosser Informant , Woman
Informant , Legitimate Informant.
Motives of Informants
People give information to the police due to various
reasons. Their motives include reward, revenge, fear
and avoidance of punishment, friendship, patriotism,
vanity, civic‐mindedness, repentance, competition,
and other motives.
INFROMANT RECRUITMENT
• Selection – it is particularly desirable to be able to identify and recruit an
informant who has access to many criminal in‐group or subversive
organization. Wide access is probably the single most important feature in
the consideration of recruiting the potential informant
• Investigation – the investigation of the potential informants that has
tentatively identified as a “probable” must be as thorough as possible. It
must establish possible existing motives as to this person might assist the
police Intel community. Failure to do so will deny this office who must
perform the approach and persuasion phase with little more that a guess. If
necessary, conduct complete background investigation (CBI)
Approach – must be done in a setting from which might
include pleasant surroundings, perhaps a confidential
apartment, completely free from any probability of
compromise, preferably in an adjacent city or a remote area
foreign to the informants living pattern.
• Mission and Target
Infiltration – the insertion of action agent inside the target organization
Penetration – recruitment of action agent inside the target organization
• Planning
• Spotting
• Partial Background Investigation (PBI) or Complete Background Investigation
• Recruitment ‐ the only qualification of an agent is to have an access to the target
• Training
• Briefing
• Dispatch
• Communication ‐ technical method like telephone/radio, non‐technical method like personal meeting, live drop or dead drop
• Debriefing
• Payments – depends upon the motivation of informant
• Disposition – involve activity on rerouting, retraining, retesting, termination
• Reporting
• Operational Testing
COVER AND UNDERCOVER
• Cover ‐ the means by which an individual group of organization
conceals the true nature of its acts and or existence from the
observer.
• Cover story – a biographical data through fictional that will portray
the personality of the agent he assumed, a scenario to cover up
the operation
• Cover Support – an agent assigned in target areas with the
primary mission of supporting the cover story.
• Undercover Assignment – is an investigative technique in which agent conceal his official
identity and obtain information from that organization
Uses of Undercover Assignment
Use independently to get first hand info about the subject of investigation like:
a) Security evaluation of every installation
b) Gain confidence of suspended persons
c) Agent penetration
d) Verify info from human resources
e) Uncover concealed identity
Supplement other investigative techniques like:
a) Playing ground works for raids and searches by going entry
b) To assist in locating evidence
c) To install, maintain investigative equipments of undercover assignment
THE UNDECOVER AGENT
Special qualifications include knowledge of the language, area background
regarding events, knowledge about the custom and habits, physical
appearance, and must be an artist.
Factors considered in Selecting Cover Story
• Mutual Point of Interest
• Justification of presents
• Previous and permanent address
• Efficiency of role and freedom from the movement
• Means of communication
• Social and financial status
• Optional alternate plan
• Safe departure
Selecting Action Agents
• Placement – location of prospective agent with respect to the
target
• Access – it is the capability of a prospective agent to obtain the
desired info for the Intel organization or to perform to Intel
collection mission in the area.
• Primary Access – it is the access to the desired info
• Secondary Access – it is the access to the desired info through a
principal source where the latter has the direct access
• Outside Access – the agent is employed outside the target and
merely monitor info from a third person who is monitoring info n
the area
CONTROL – authority to direct the agent to carryout task or requirement on
behalf of the clandestine organization in an acceptable manner and security
Two Categories of Control
• Positive Control – is characterized by professionalism and rapport like Agent
motivation and Psychological control
• Negative Control – characterized by threat and it include the following:
• Disciplinary Action – includes verbal reprimand for poor performance or
insecure actions withholding certain material rewards, reduction of
agents salary or in extreme situation the threat of terminating
professional relationship
• Escrow Account – control of an agent by putting his salary in a bank to be
withdrawn only after a fulfillment of a condition
• Blackmail
Procuring Different Type of Agents
• Agent in Place – an agent who has been recruited by an intelligence service
within a highly sensitive target, who is just beginning a career or have been
long or (outside) insider.
• Double Agent – an enemy agent who has been captured, turned around
and sent back where he came from as an agent of his captors
• Expandable Agent – an agent whom false information is leaked to the
enemy.
• Penetration Agent – an agent who has such reached the enemy gets
information and would manage to get back alive.
• Agent of Influence – an agent who uses influence to gain information
• Agent of Provocation – one who provoke the enemy to give information
METHODS OF COVERT INTELLIGENCE
Concept of Surveillance
Surveillance is a form of clandestine investigation which
consists of keeping persons, place or other targets under
physical observation in order to obtain evidence or
information pertinent to an investigation.
Surveillance of persons is called Tailing or Shadowing,
Surveillance of place is called Casing or Reconnaissance,
and Surveillance of other things, events, & activities is called
Roping.
In Surveillance, the following are considered:
• Pre‐Surveillance Conference – a conference held among the
team members, the police intelligence unit before
surveillance is conducted.
• Surveillance Plan – a plan established the required type of
personnel, and the general and specific instructions for
surveillance.
• Area Target Study – refers to the area of operation (AOR) of
surveillance activities.
• Surveillant – a person who conducts surveillance with includes only
observations.
• Stakeout or Plant – is the observation of places or areas from a fixed
point.
• Tailing or Shadowing – it is the observation of a person’s movement.
• Undercover Man – it refers to a person trained to observe and penetrate
certain organization suspected of illegal activities and later reports the
observation and information’s that proper operational action can be made
• Liaison Program – the assignment of trained intelligence personnel to
other agencies in order to obtain information of police intelligence value.
(Agencies like the press, credit agencies, labor unions, telephone companies)
• Safehouse – is a place, building, enclosed mobile, or an apartment,
where police undercover men meet for debriefing or reporting purposes.
• Drop – any person is a convenient, secure and unsuspecting place where
police undercover men meet his action agent for debriefing or reporting
purposes.
• Convoy – an accomplice or associate of the subject used to avoid or elude
surveillant.
• Decoy – a cover supporting the surveillant who can become a convoy
whenever surveillant is burned.
• Contact – any persons whom the subject picks or deals
with while he is under observation & identifies the observer.
• Made – when subject under surveillance becomes aware
that he is under observation and identifies the observer.
• Lost – when the surveillant does not know the whereabouts of his subject
or the subject had eluded the surveillance.
SURVEILLANCE ACTIVITIES
• According to Intensity and Sensitivity
• Discreet –subject person to be watch is unaware that he is under observation
• Close – subject is aware that he is under observation varied on each occasions
• Loose – applied frequently or infrequently, period of observation varied on each
occasion
• According to Methods
• Stationary – this is observation of place usually a bookie stall, a gambling, joint, a
residence where illegal activities are going on (fixed position)
• Moving – surveillance follow the subject from the place to place to maintain
continuous watch of his activities
• Technical – this is a surveillance by the use of communications and electronic
hardware’s, gadgets, system and equipment
Special Equipment (Technical Supports)
• Camera with telephoto lens
• Moving Picture camera
• Binoculars
• Tape recording apparatus
• Wire taping device
• Other instrument – miniaturized one‐way radio
Methods available to employ in Surveillance
Ordinarily, the methods are surveillance of place, tailing or shadowing (1‐2‐3 man
shadow), undercover investigation, special methods includes: wire tapping ‐ concealed
microphones ‐ tape recorder ‐television ‐ electric gadgets
Counter Surveillance – the conduct of operation
is coupled with counter intelligence measures
such as window shopping, use of convoys and
decoys, stopping immediately on blind corners,
getting out immediately on public
conveyances, retracing, entering mobile housing
CASING OR RECONNAISSANCE
Casing is the term use in the police organization while
reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building place or
area to determine its suitability for Intel use or its vulnerability in
operations. It aids in the planning of an operation by providing
needed information. It assists the agent handler to install
confidence in his agent during briefing phase by being able to
speak knowingly about the area of operation.
Casing is also considered a security measure because it offers
some degree of protection for those operating in an area
unfamiliar to them.
Method of Casing
• Personal Reconnaissance – the most effective method and
will produced the most info since you know just what you’re
looking for.
• Map Reconnaissance – it may not sufficient but it can
produce a certain amount of usable information
• Research ‐ much info can be acquired through research
• Prior Information – your unit and of the unit will have file
report that they may provide you with info
• Hearsay –info usually gain by the person operating in the area
and performing casing job
OBSERVATION AND DECRIPTION (ODEX)
Observation – a complete and accurate observation by
an individual of his surroundings an encompasses the
use of all the major sense to register and recognized its
operational or Intel significance
Description – the actual and factual reporting of one’s
observation of he reported sensory experience
recounted by another
ELICITATION
It is a system or plan whereby information of intelligence value is
obtained through the process of direct intercommunication in
which one or more of parties to the common is unaware of the
specific purpose of the conversation. The three phases are
determination of the mission, selection of the subject, and
accomplishment of the mission.
Two Devices in the conduct of Elicitation
Approach – process of setting people to start talking
Probe – to keep the people taking incessantly
Example of Approach:
Teacher – Pupil Approach – the subject is treated as an authority then solicit
his view point and opinion on a subject matter.
Good Samaritan Approach – is the sincere and valid offers of help and
assistance are made to the subject
PORTRAIT PARLE (P/P)
It is a means of using descriptive terms in
relation to the personal features of an individual and it can be briefly
described as a word
description or a spoken picture.
(Anthropometry ‐ no two human beings has the same body measurement)
BACKGROUND CHECKS AND INVESTIGATION
(BI‐ PBI or CBI)
Information needed:
• Domestic Background
• Personal Habit
• Business History
• Social or Business Associates
• Medical History
• Educational Background
• Family History
TACTICAL INTERROGATION
The need for obtaining information of the highest
degree of credibility taken on the minimum of time
can be through interrogation which varies and
dependent entirely on the situation.
Types of Interrogation
• Screening ‐ usually accomplished as soon as after capture, apprehension or
arrest of an interrogee. The objective is to obtain background information
about the interrogee and determine his area of knowledge and ability.
• Formal Interrogation (Detailed) –the systematic attempt to exploit to an
appropriate depth those areas of the interrogee’s knowledge, which have
been identified in the screening process
• Debriefing – a form of eliciting information, which is generally used when
the area of intellectual capability of the interrogee is known. Maximum use
of the narrative and not try to trap the person being debriefed with leading
question. The debriefer/interrogator must be familiar with the subject in
which the interrogation is being conducted.
• Interrogation of Lay Personnel (Specific Type) – the techniques used
are the same as in the interrogations, however, especial effort must be
made to established a common frame of reference between the
interrogator and the interrogee. The amount of information obtained
from this type will depend on the interrogator’s inequity in establishing
common terminology on the source can understand which will enable
the interrogator to get the desired information.
• Technical Interrogation – the level of interrogation where the source
has specific and such detailed information that requires a trained
expert in the subject matter to be explored. It usually covers the
specific subject and time is not as limited as during other interrogation.
Phases of Interrogation
• Planning and Preparation
• Approach (Meeting the Interrogee) Questioning
• Termination
• Recording Reporting
INTERROGATION TECHNIQUES:
• Techniques of Approach – the purpose is to gain the cooperation of the source and induce
him to answer questions which will follows.
• The “Open Techniques” – the interrogator is open and direct in his approach and makes no
attempts to conceal the purpose of the interrogator. It is best employed when the
interrogee is cooperative. It is frequently used at the tactical level where time is a major
interrogator.
• The “Common Interest” Technique – the interrogator must exert effort to impress the
interrogee of their common interest. The interrogator must look for he point out the real
advantages the interrogee will receive if he cooperates
• Record File (we know all technique) – the interrogator prepare a file on the source listing
all known information (record should be padded to make it appear to be very extensive).
The information must contain the life history of he interrogee to include his activities and
known associates (Party‐ bio‐data of the interrogee is important). The “we know all” is used
in conjunction with the record file. During the approach, the interrogator may ask the
interrogee about a subject, if he refuses to cooperate, the interrogator may provide the
answer in order to impress him that the interrogator knows him very well (all is known).
• Exasperation – Techniques (Harassment) – effectively employed against hostile type
interrogee. The interrogator must be alert because the interrogee may fabricate
information to gain relief from irritation (monotype). Subject Interrogee is placed in a
longer period of interrogation without rest or sleep. The interrogator permits the source to
go to sleep and subsequently awaken for another series of questioning (this is done
repeatedly). After many repetitions, the interrogee will be exasperated and will finally
cooperate hoping that he can be allowed to rest or sleep. Ask a question, listen to a reply
and then ask the same question repeatedly (use a tape recorder if possible). The purpose is
to bore the interrogee thoroughly until he begins to answer questions freely to end the
harassment.
• Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”,
“Bad Guy – Good Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of
two (2) interrogators playing opposite roles.
• Egotist Techniques (Pride and Ego) – usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity. You may reverse the
technique by complimenting the interrogee in hopes of getting him to admit certain
information to gain credit. Described him as the best person, superior or comrade.
• “Silent” Technique – employed against nervous or the
confident type of interrogee. Look out the interrogee
squarely in the eye with sarcastic smile (force him to break
eye contact first). He may ask questions but the
interrogator must not answer. Patience is needed until the
interrogator is ready to break silence.
• “Question Barrage” Technique (Rapid Fire Questioning) –
intended to confuse the interrogee and put him into a
defensive position. The interrogee become frustrated and
confused, he will likely reveal more than he intended, thus
creating opening for further questioning.
Criminologist Licensure Examination
Frequently Asked Questions
LEA 4
LEA 4
LEA 4