Notes LEA 1.6

You might also like

You are on page 1of 19

1

MODULE 4
OBJECTIVE: To acquaint the reviewee’s on the nature of intelligence
function, Intelligence Cycle, Fundamentals of Cryptography encoding and
decoding, Classification of Documents, Handling Classified Security
Information, Identification of Criminal Subversive Elements, Modus Operandi
(MO) and Order of Battle (OB)

LESSON 1

PRINCIPLES OF INTELLIGENCE

LESSON OBJECTIVE: To know the concept and principles of Intelligence

INTELLIGENCE – Is the end product resulting from the collection, evaluation,


analysis, integration and interpretation of all available information, which may
have immediate or potential significance to the development, and execution of
plans and programs of the users.

Functions: (general)
Today’s all countries have their intelligence services. They maybe different
in their organization, efficiency and method but they all have the basic
functions:
1. The collection or procurement of information.
2. The evaluation of the information that become intelligence.
3. The dissemination of intelligence to those need it.
4. Counter Intelligence

Other Function:
1. To serve all branches of the government.
2. To procure and obtain political, economical, psychological, military and
other information, which may bear upon, the different government
department and agencies had collected national interest.

3. To collect when necessary, supplemental information wither at its own


instance or at the request of any government agency and official from
other various sources.
4. To integrate.analyze, process and disseminates to authorized
governmental agencies and officials in the form of report or strategic
interpretative studies.

PRINCIPLE OF INTELLIGENCE:
A. GENERAL: In making a selection, the following criterion was
applied.
1. Universality of Application – It should apply to as many phases and
aspects of intelligence as possible. This served as guide to the
production of intelligence and other activities and person or
organization composing it.
2. It must be broad – Truly a general rule – It should form the basis for
formulation of corollary and subsidiary guides.
3. It must be Important – Indeed essential to intelligence. It is guide is
truly important and essential, and then its violation should bring its
own immediate penalties.
4. They must not be mutually exclusive instead each should
compliment each other.
B. OBJECTIVES:
- The fundamental objective of Intelligence is to ensure
rational and timely decision making. This is intelligence’s
“raison d’ etre”.( Its reason for being)
2

C. UNDERLYING CONCEPTS, JUSTIFYING INTELLIGENCE:


- The existence of intelligence is based on a few
fundamental concepts or beliefs. These fundamental belief
are the heart of it’s doctrine.
D. DOCTRINE OF INTELLIGENCE:
1. There exist as an essential unity between knowledge and action
that knowledge enhances the effectiveness of action and minimized
the chances of error.
2. Coming events cast their shadows before that through a systematic
search for and by the assembly of hits and pieces of evidence,
each of which maybe insignificant in itself , it is possible to form
meaningful patterns.

PRICIPLES AND INTEREST IN INTELLIGENCE:


1. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT – Separate
and a distinct activity but compliments each other.
2. INTELLIGENCE REQUIRES CONTINUITY – It must continue, as planning
and decision-making are continuous.
3. INTELLIGENCE BE USEFUL- It must serve the commander’s need and
requirements.
4. INTELLIGENCE MUST BE TIMELY- It must reach the user on time to
serve as basis for appropriate action.
5. INTELLIGENCE OPERATION MUST BE FLEXIBLE.
6. INTELLIGENCE OPERATIONS REQUIRES IMGINATIVES AND
FORESIGHT.
7. THERE MUST BE ADEQUATE SECURITYTO PROTECT THE
INFORMATION, THE ORGANIZATION AND AGENT/COLLECTOR. – It
denies unauthorized personnel about operation and intelligence product.

POLICE INTELLIGENCE:
The end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the activities of
criminal and other law violators for the purpose of affecting criminals and other
law violators for the purpose of affecting their arrest, obtaining evidence and
forestalling plan to commit crime.

PURPOSE: (covert & Intel. Operation)


1. Check the condition of the community relating to crime, vice, juvenile’s
delinquency and indication of subversion and insurgency.
2. Determine through CI applicant matters pertaining to personnel
security, physical security and document security security of the
organization.
3. Determines the follow-up leads and helps in the solution of individual
criminal cases.
4. Identify criminal elements and other lawbreakers as well as their
associates.
5. Assist in the arrest of wanted elements and those wanted under
R.A.1700 otherwise known as Anti-Subversion Law.
6. Check on the quality and effectiveness of the operation of the PNP
forces.
7. Check on the security conditions of PNP personnel, funds, equipments
and materials.
8. Help in Crime control.
9. Serve as a tool of management for planning and organization
employment purpose.
3

CARDINAL PRINCIPLE IN POLICE INTELLIGENCE:


A Cardinal Principles in police intelligence at all levels is the proper,
economical and most productive use of personnel resources and equipments
employed and / or utilized in planning the collection of information and
dissemination of intelligence. To pursue these end. Heads of the PNP commands
in the Zone/ regional, provincial, district and station levels shall maintain a
harmonious working relationship with other civilian intelligence agencies.
Liaisons with agencies will encourage at all times as necessary to effect
coordination of intelligence operation.

THE PRINCIPAL AREAS OF INTEREST IN INTELLIGENCE:


To illustrate this point of the major consideration of intelligence may
appear in this form:

1. Military – offensive and defensive tactics war planes, strategic


concepts and tactical principles, organization, installation, industrial
lease .armed forces, command structure, command personnel,
material, tactics, and morals.
2. General – Topographical and hydrographic characteristic, historical
backgrounds.
3. Diplomatic – foreign policies, alliances, diplomatic establishment,
Foreign Service personnel, technique of conducting foreign relations.
4. Political – Ideology, tradition, institutions, personalities, area of friction.
5. Economic:
a. Financial – Monetary policies, Currency structure, Transaction,
Institutions, personalities.
b. Commercial – trade policies, markets, trading, methods, price
policies personalities.
c. Industrial – Structure of capacity, manufacture, plans and
processes, raw material, energy rotation, labor relations and
personalities.
d. Mining – Mineral resources, production method, output.
e. Agriculture – policies, crop structure, cultivation method,
mechanization, financing, specific characteristic of rural
population.
f. Communication and transportation – telephones, telegraphs,
highways, aviation, ownership and personnel.
g. Social – nationality structure, classes and caste, historical
factors, census aspects, characteristics and mentality of people
forces, social legislation, radio, television, press.
h. Intelligence – Organization, methods and personnel of
competing intelligence system..

GENERAL ACTIVITIES IN POLICE INTELLIGENCE:


1. Strategic Intelligence – The intelligence information, which primarily
long range in nature with little practical immediate operation value.
2. Line Intelligence – This deals of an immediate nature and necessary
for more effective police planning and operation.
3. National Intelligence – The integrated product of intelligence developed
by all the governmental branches, department concerning the broad
aspect of national security policy. It is concerned to more than one
department or agency and it is not produced by a single entity. It is
used to coordinate all the activities of the government in developing
and executing integrated and national policies and plans.
4. Counter Intelligence – Phase of intelligence covering the activity
devoted in destroying the effectiveness of hostile foreign activities and
to the protection of info against espionage subversion and sabotage.
5. Undercover work – It is an investigative process in which disguises and
pretext cover and deception are used to gain the confidence of criminal
suspects for the purpose of determining the nature and extent of any
criminal activities that maybe contemplating or perpetuating.
4

FUNCTIONAL CLASSIFICATION OF POLICE INTELLIGENCE:


1. Criminal Intelligence – refers to the knowledge essential to the
prevention of crimes and the investigation, arrest and prosecution of
criminal offenders.
2. Internal security Intelligence – refers to the knowledge essential to the
maintenance of peace and order.
3. Public Safety Intelligence – refers to the knowledge essential to ensure
the protection of lives and property.

Forms of Intelligence:
1. Sociological Intelligence – deals with demographic and psychological
aspects of group of people.
a. Population & manpower
b. Characteristic of people
c. Public Opinion – attitude of the majority of the people towards
matters of public policy.
d. Education – based on literacy rate.
2. Biographical Intelligence – deals with individual’s personalities who
have actual possession of power.
3. Armed Forces Intelligence – Deals with the Armed Forces of the
Nation.
a. Position of the Armed Forces Constitutional and legal basis of
its creation and actual role.
b. Organizational Structure and territorial disposition.
c. Military manpower recruitment
d. Order of battle
4. Geographical Intelligence – Deals with the progress of research and
development as if the economic and military potential of a nation.

THREE ACTIVITY OF COUNTER INTELLIGENCE:


1. Protection of information against espionage.
2. Protection of personnel against subversion.
3. Protection of installation and materials against sabotage.

TWO GENERAL TYPES OF COUNTER INTELLIGENCE:


1. PASSIVE MEASURES – Those measures which seek to conceal
information from enemy.
2. ACTIVE MEASURES – Those measures that seek actively block the
enemy’s effort to gain information or engage in espionage, subversion or
sabotage.

Counter intelligence – is also known as negative intelligence.

Negative intelligence –Is a generic term meaning three different things:

1. Security Intelligence – means that the total sum of effort to conceal the
following:
a. National Policies
b. Diplomatic Decisions
c. Military Data
d. Other information of a secret nature affecting the security of the
nation from unauthorized persons.
2. Counter Intelligence – This is the organized effort to protect specific data
that might be of value to the opponent’s own intelligence organization.
3. Counter Espionage – A negative intelligence becomes dynamic and active
effort. Its purpose is to investigate actual theoretical violation of espionage
laws, to enforce those laws and to apprehend any violators; It is a job to
catch spies. It is basically a police function.
5

Aims of counter Espionage – To locate the enemy , to identify the enemy , and
to neutralize the enemy.

 According to Sir Bassil Thomson a former chief of Scotland Yard


Criminal Investigation Division:

“A basic requirements of the secret agent is disguise himself and


his mission, much of his training and basic skills is dedicated to
concealment. He is supposed to be supplied with a foolproof cover
story and good documents. He must be a man of exception ability
or else he would choose for his intricate jobs. The trapping of the
dark intruder is a formidable talk.”

Five Important of effective Counter Intelligence:


1. Denies information to the enemy.
2. Reduces the risk of the command.
3. Aids in achieving surprises.
4. Increases the security of the command
5. Decrease the enemy ability to create information about our forces.

Five categories of CI operation:


1. Military Security
2. Port frontier and travel security
3. Civil Security
4. Censorship- This is the control and examination of the civil, national , AFP,
Field press and POW.
5. Special Operation – counter subversion, sabotage and espionage.

Basic principle of Counter Intelligence operation:


1. Conformity of the mission
2. Avoidance of publicity
3. Objectivity
4. Confirmation
5. Offense
6. Flexibility
7. Continuity
8. Coordination

Counter intelligence Investigation – is an activity, which constitute the value of


the counter intelligence workload. Worldwide and includes specific investigation
of individual and incidence which for the most part are conducted in an overt but
discreet manner.

Three categories of counter intelligence measures:


1. Denial measures - secrecy
2. Detection measures - PSI
3. Deception measures – Fabricate information

LESSON 2
INTELLIGENCE CYLE

OBJECTIVE: To familiarized the reviewee’s on the working status of the


intelligence Cycle.

INTELLIGENCE CYCLES:
1. Direction the collection efforts:
A. Determination of requirements:
a. Enemy capabilities including time, place, strength or other details.
b. Enemy vulnerabilities including the nature, extent permanence or
other details.
c. Enemy order of battle
d. Terrain including natural and artificial obstacle and weather
6

e. Information desired by higher, lower or adjacent headquarters.


B. Determination of the essential elements of information (EEI)
a. It is an item of intelligence or information of the characteristic of the
area of operation and the enemy, which the commander fells he
needs before he used before he can reasonably arrive of decision.
C. Establishment of Priorities. (PIRS)
- Priorities reflect the criticality of the need for the particular
information. No formula exist which can automatically
determine priorities such determination is a matter of
judgment.

2. Collection of information:
a. Determine the collecting agency.
b. Send orders or request
c. Supervise collection effort
d. Use tools or technique in collection
e. Ensure timely collection
Factors in choosing collection agent.
1. Capability
2. Multiplicity
3. Balance

3. Processing the collected Information:


A. Recording – the reduction of info. Into writing.
a. Police book Journal
b. Intel work sheet
B. Evaluation – The determination of the pertinence of the info to the operation,
reliability of the source of or agency and the accuracy of the information.

Evaluations determine the following:


1. Pertinence – It hold some value to current operation.
2. Reliability – Judging the source of information agency
3. Credibility – Truth of information.

THE EVALUATION GUIDE:

RELIABILITY OF INFORMATION ACCURACY OF INFORMATION


A. Completely Reliable 1. Confirmed by other Sources
B. Usually Reliable 2. Probably True
C. Fairly Reliable 3. Possibly True
D. Not Usually Reliable 4. Doubtfully True
E. Unreliable 5. Improbable
F. Reliability cannot be judge 6. Truth cannot be
Judge

SOURCE OF INFORMATION
T – DIRECT OBSERVATION BY THE COMMANDER OF A UNIT
U- REPORT BY PENETRATION AGENT OR RESIDENT AGENT
V- REPORT BY PNP/AFP TROOPS INVOLVED IN COUNTER
W- INTERROGATION OF CAPTURED ENEMY AGENT/ FORIEGNER
X- OBSERVATION OF GOV’T. CIVILIAN EMPLOYEE OR OFFICIAL
Y- OBSERVATION BY THE MEMBER OF POPULACE
Z- DOCUMENTARY

4. INTERPRETATION – establishing the meaning and significance of


information.
5. Analysis – The combination of the elements stated in the assessment with
other known information or intelligence to form a logical feature or
hypothesis of enemy activities or information of the operation are
characteristic of the mission of the command.
7

Distinct phases of analysis.

A. ASSESSMENT
B. INTEGRATION – It is the combination of the elements stated in
assessment with other known information or intelligence to form a
logical feature or hypothesis of enemy activities or information of
the operational area characteristic of the mission of the command.

4. DISSIMINATION AND USED:


Processed information are disseminated through annexes, estimates,
briefing, message, reports, overlays, summaries.

The criteria that must be observed in dissemination are:

1. Timeliness – must reach the users in time to be of value.


2. Propriety – The message must be clear, concise and complete, as
well as in the proper form for the receiver to readily understand its
contents.
Methods of Dissemination:
1. Fragmentary orders from top bottom of the command.
2. Memorandum, circulars, special orders
3. Operations orders, oral or written
4. Other report and intelligence documents
Note: This include leaders and military, PNP, foreign National & friendly force.

Purpose: Implementation of national policy.

Mission: The guiding light of the 4 cycle of intelligence.

LESSON 3

CRYPTOGRAPHY

OBJECTIVE: To remind the reviewee’s the important of Fundamental of


Cryptography, the Encoding and Decoding.

Definitions:

Cryptography – Study / science of encoding information in the form of codes and


ciphers.
- The act in writing in cipher or secret character or the
particular used.
Codes – A system on which arbitrary group of symbols represented by other
letter rather than by a complete words phrases or sentence.
Cipher – A system in which individual letters of a message are represented by
other letter than by a complete words, phrases or sentences.
Cryptogram – encrypted text/message complete with heading of message written
in unintelligence text or language which implies/convey hidden meaning.
Cryptanalysis – The process of converting cryptograms(usually of hostile origin)
into plain text without the key from a code book.
Plain Text – The message that will be put into secret form. Usually the plain text
is in the native tongue of the communicator.
Encipher- Is to convert a plain text message into unintelligible language by
means of a cipher system.
Encode – Is to convert a plain text message into unintelligible language by
means of a code system.
Encrypt- Is to convert a plain text message into unintelligible language by means
of a cryptosystem
Decipher – Is to convert an enciphered message into its equivalent or original
plain text by means of a cipher system.
8

Decode – Is to convert an encoded message into its equivalent plain or original


plain text by means of code system.
Decrypt – Is to convert a cryptogram into plain text by reversal of the encryption
process.
Key – Is a symbol or sequence of symbol or applied to the text to encrypt or
decrypt.
Cipher System – Is a system which is involved with either transposition or
substitution, or a combination of the two.
Transposition Cipher System – These system are like Jigsaw puzzles in that all
the places of the whole original text are present but are merely
disarranged.Transposition ciphers can be two methods: these are the
“monoliteral” which deals with the transposition of the individual letters and the
“polyliteral” which deals with the transposition of pairs or sets of letters in regular
groupings.
Substitution Cipher System – Is a system involving the treatment of individual
letters or pair of letters of the clear text, wherein they retain their relative position
in the message but not their identities and are replaced by other elements or text
units so that the external form of the writing is cryptographic in nature.
Nulls – Is a letter or are letters having no significance which are inserted as
fillers. Nulls or dummies are use to complete the system or geometric design or
to complete five letters groups from transmission. M letters of infrequent
occurrences, such as J,K,Q,X, and Z should never be used as dummies since
they are quickly recognized.
Traffic Analysis – Is the careful inspection and study of signal communication for
the purpose of penetrating camouflage communication network for the purpose
of security.
Brevity Codes – Is a prearranged system of words, symbols, numbers or specific
arrangement of them which are used to represent other words or sentences.
They are used in communication system to report early warning information,
danger, signals, and action indicators (dead drops indicators, cache in placed,
safe site, compromised, etc.)

Substitution System:
1. Simple Substitution – This is an ancient system attributed to many persons. It
is known that Julius Caesar used it. He merely shifted the alphabet three letters
forward, writing “D” in placed of “A”, “E” for “B”, and so forth. Using this method,
our clear text and cipher text alphabets would appear like this.

CLEAR OR PLAIN TEXT:


ABCDEFGHIJKLMN OPQRSTUVWXYZ

CIPHER TEXT:
DEFGHIJKLMNOPQRSTUVWXYZABC

2. Simple Substitution with a key Word – The use of a key word “mixes” the
cipher alphabet and breaks the order that is obtained when only shifting the
alphabet is used. Using the key word “Destroying” our clear text and cipher text
look like this.

CLEAR TEXT:
ABCDEFGHIJKLMNOPQRSTUVWXYZ

CIPHER TEXT
DESTROYINGABCFHJKLMPQUVWX Z

3. Transposition Cipher System – In this system the individual letters are still
present in the cryptogram. They have simply been rearranged in a different order
to form the cipher text. Writing a message backward is simple form of
transposition. Leonardo da Vinci wrote his notes in this system. More complex
methods of the transposition system are available but it will take more time and
effort to study it, hence, we will be contented with the basic for the moment and
learn more of cryptology in some other time.
9

LESSON 4

CLASSIFICATION OF DOCUMENTS AND HANDLING CLASSIFIED SECURITY


INFORMATION.

LESSON OBJECTIVE: To inculcate the importance of “need to know principles”

DOCUMENT AND INFORMATION SECURITY

In every installation, document and information are indispensable for their


daily operations and activities, be it in the form of a paper, film, and magnetic
media or in the computer system. Once there is a leakage in the contents of a
company’s document and information, the business operational stability is at
stake. It may be a start of bankruptcy that would lead to its total disclosure. The
leakage of document and information cost government, business and industry
alike, billion of pesos. A rival company or an enemy agent might use an illegally
obtain document and information for their own advantage. For this reason, a
comprehensive and information security program is very essential to the
installation in order to focus freely on the attainment of its goals and objectives.
Protection of document and information entails a mammoth task on the
part of eh executives and the staff of the installation. There should be a clear
understanding on all the types of documents and information of the organization.
Security measures in the classification, handling, care, and proper disposition of
classified documents and information must be a primary concern in order to
preserve the confidentiality and integrity of document and information through out
all phases of its existence.

Purpose of Protecting Classified Materials


1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the
moments of classified materials.
3. Enforce the use of “Need to Know” principle.

Two (2) Kinds of Documents


1. Personal – letters, diary and notebooks. These should be treated usually
the same with official document.
2. Official – orders, manuals, letters, overlays, maps and magazines. You
may be careful and follow the chain of command.

DOCUMENT / INFORMATION CYCLE

Each document or information has a life cycle in the sense that its
usefulness has a beginning and an end. It passes various stages from the time it
is created until it is finally disposed. This cycle consist of the following:
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
10

Categories of Document
1. Category A
 Information which contains reportable time sensitive, order of battle and
significant information.
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operations.
 It requires immediate action.
2. Category B
 Anything that contains communications, cryptographic documents, or
systems that should be classified a secret and requires special handling.
 Higher authorities should declassify it.
3. Category C
 Other information, which contains something that, could be an intelligence
value.
 Contains exploitable information regardless of its contents.
 Unscreened materials/documents should be categorized as Category C.
4. Category D
 No value, yet lower level will never classify documents as category D.
 No decision must be made at the lower echelon that document has no
value. It is the responsibility of eh higher headquarters.

Three (3) Security Concepts


1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the
value of document.
3. Training is necessary for the practice of “Need to Know” principle.

Four (4) Types of Classified Matters


1. TOP SECRET (green color code) – is any information and materials the
unauthorized disclosure of it would cause exceptionally grave damage to
the nation, politically, economically and military operation.
2. SECRET (red color) – is any information and material, the unauthorized
disclosure of it would endanger national security cause serious injury to
the interest or prestige of the nation or any governmental activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) – is any information or material, the
unauthorized disclosure of it would be prejudicial to the interest and
prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to and be of advantage
to and be of advantage to a foreign country.
4. RESTRICTED (white or no color) – is any information and material which
requires special protection other than those determines confidential,
secret and top secret.

Rules of Classification of Documents


1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected
therein. Pages, paragraphs, sections or components thereof may bear
different classifications. Documents separated from file or group shall be
handled in accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or
destruction, catalogs, or accession list shall not be classify if any reference
to classified matter does not disclosed classified information.
11

5. Classified matter obtained from other department shall retain the same
original classification.

PROTECTION OF SENSITIVE INFORMATION


Proprietary information is information that in some special way relates to
the status or activities of the possessor and over which the possessor asserts
ownership. In the business

community, proprietary information relates to the structure, products or business


methods of the organization. It is usually protected in some way against causal
or general disclosure.
All proprietary information is confidential, but not all confidential
information is proprietary. For example, confidential personnel data in employee
files is not considered as proprietary although the company treats it as
confidential.

Types of Documents:
Class I – Vital Documents:
In this category these are records that are irreplaceable, records of which
reproduction does not have the same value as the original; records needed to
recover cash, to replace building, equipments, raw materials, finished products,
and work in process and records needed to avoid delay in restoration of
production, sales and services.
Class II – Important Documents:
This includes records the reproduction of which will close considerable
expense and labor, or considerable delay.
Class III – Useful Documents
This includes records whose loss might cause inconvenience but could be
readily replaced and which would not in the meantime present an insurmountable
obstacle to the prompt restoration of the business.
Class IV – Non–essential Documents:
This records are daily files, routine in nature even if lost or destroyed, will
not affect operation or administration. This class represent the bulk of records
which should not be even attempted to be protected in the event of disasters,
They should, however, be kept in ordinary files ready for reference, if needed,
and usually discarded after some period of time.

Basic Consideration in Document and Information Security:


1. Security of information is based on the premise that the government has the
right and the duty to protect official papers from unwarranted and indiscriminate
disclosure;
2. The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office;
3. Classified matter shall be classified according to their contents and not to the
classification of files in which they are held or another document to which they
are referred;
4. Classification shall made as soon as possible by placing appropriate marks on
the matter to be classified; and
5. Each individual whose duties allow access to classified matter or each
individual who possess knowledge of classified matter while it is in his position
shall insure that dissemination of such classified matter is on the “need to know”
basis and to property cleared persons only.
12

Types of Proprietary Information


1. Trade Secrets – this consist of any formula, pattern, device or compilation
of information which is used in one’s business and which gives him an
opportunity to gain an advantage over competitors who don not know or
use it. It may be a formula for a chemical
compound a process of manufacturing, treating or preserving materials, a
pattern for machine or device, or a list of customers. It differs from other
secret information as to single or ephemeral events. A trade secret is a
process or device for continuous use in the protection of the business.
2. Patents – this is a grant made by the government to an inventor,
conveying or securing to him the exclusive right to make, use, or sell his
invention for term of years.

Primary Distinctions between Patents and Trade Secrets


1. Requirements for obtaining a patent are specific; to qualify for a patent the
invention must be more than novel and useful. It must represent a positive
contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret
tests while the exclusive right to patent protection expires after 17 years.

Proprietary Information Protection Program


Realizing that the most serious threat to trade secrets is the employee, a
measure of protection is often realized through the use of employee agreements
which restrict the employee’s ability to disclose information without specific
authorization to the company. The following countermeasures may be adopted:
1. Policy and procedure statements regarding all sensitive information.
2. Pre and post employment screening and review.
3. Non-disclosure agreements from employees, vendors, contractors and
visitors.
4. Non-competitive agreements with selected employees.
5. Awareness programs.
6. Physical security measures
7. informed monitoring of routine activities

LESSON 5

IDENTIFICATION OF CRIMINAL SUBVERSIVE ELEMENTS

LESSON OBJECTIVE: Explain the important of Identification of Criminal


subversive Elements .
Information – All Raw data or evaluated materials of every description derived
from observation, communication, reports, rumors, imagination and other
sources from which intelligence is produced.

Intelligence Information – All evaluated information of every description


including those derived from observation, reports, rumors, imagery, and other
source from which intelligence is produced.
-Any information gathered or received which is of intelligence interest.
Source – Where the information is obtained.
13

Two general classification of source of information:


1. Open Source – 99% of the information collected are coming from open
source.
2. Close Source – 1% of information from close source.

Overt Intelligence – the gathering of information or documents procured openly


without the knowledge of the person or person safeguarding vital intelligence
interest.
Ex:
1. Enemy Activity
2. POW
3. Civilians
4. Captured Documents
5. Map
6. Weather, forecast, studies, report
7. Agencies

Covert Intelligence – The secret procurement of information, which is obtained


without the knowledge of the person safeguarding vital intelligence interest.

Ex.
1. Surveillance
2. Casing
3. Elicitation
4. Surreptitious entry
5. Employment Technical means (Bugging and tapping device)
6. Tactical interrogation
7. Observation and Description

Persons as source of Information:


1. Information Net – Controlled group of people who worked through the
direction of the agent handler. The informant’s principal or cutouts supply the
agent handler directly or indirectly with intelligence information.
2. Informant – refers to a person who gives information to the police voluntarily
or involuntarily without any consideration.
3. Informer – Those who gives information to the police for price or reward.

Types of Informants:
1. Criminal Informant – informants who give information to the police
pertaining to the underworld about organized criminals with the
understanding that his identity will be protected.
2. Confidential Informants – Similar to the former but he gives information
violate of the law to includes crimes and criminals.
3. Voluntary Informants – A type of informant who give information freely and
willfully as a witness.
4. Special Informant – Those who gives information concerning specialized
cases only and it is regarded a special treatment by the operatives
(Teachers, Businessman)
5. Anonymous Informant – Those who gives information through telephone
with the hope that the informant cannot be identified.
Sub-type of Informant:
1. Incidental informant – A person who casually imparts information to an
officer with no intention of providing subsequent information.
Recruited Informant – A person who is selected cultivated and developed into
continuous source of information.
14

Categories of Recruited Informants:


1. Spontaneous or Automatic Informant – Informant who by the nature of
their work or position in society have a certain legal, moral, or ethical
responsibilities to report information to the police.
2. Ordinary run- of the Military Informant – Informants that are under the
compulsion to report information to the police.
3. Special Employee Informant – informants who are of specific operational
nature.

Common Motives of informant:


1. Reward
2. Revenge
3. Fear and avoidance of punishment
4. Friendship
5. Patriotism
6. Vanity
7. Civic
8. Repentance
9. Competition
10. Other motives

Informant Recruitment:
1. Selection – It is particularly desirable to able to identify and recruit an
informant who has access to many criminal in-group or subversive
organization.
Wide Access – Is probably the single most important feature in the
consideration of recruiting the potential informant.
2. Investigation – The investigation of the potential informant that has
tentatively identified as a “probable’ must be thorough as possible.
3. Approach – Approach must be done in a setting from which might include
pleasant surroundings, perhaps a confidential apartment, completely free
from any probability of compromise, preferably in an adjacent city or a
remote area foreign to the informant living pattern.
4. Testing – The testing program should begin, of course, with limited
assignment with gradual integration into more important areas. The
occasional testing of an informant should continue through the entire
affiliation.
5. Indoctrination.

Factors to considered in Informant Recruitment:


1. Sex
2. Health
3. Age
4. Built
5. Education
6. Ability
7. Personality

Intelligence Operations – It is the result of intelligence planning is always ahead


of operation although an operation can be made without a plan. It is usually due
to sudden and inevitable situation but definitely this is poor intelligence
management.

Different Task Involve in the Police Intelligence Operation


1. Discovery and identification activity
2. Surveillance
3. Liaison Program
4. Informant Management
5. Clipping Services
6. Debriefing
15

7. Relevant Miscellaneous Activities


8. Casing
9. Utilization of informant for planning and organizational employment
purposes.

The 14 operational Cycles


1. Mission and target
a. Infiltration – The insertion of action agent inside the target
organization
b. Penetration – Recruitment of action agent inside the target
organization.
2. Planning
3. Spotting
4. Investigation- PBI/CBI
5. Recruitment – The only qualification of an agent is to have access to the
target.
6. Training
7. Briefing
8. Dispatch
9. Communication
10. Debriefing
11. Payments – Depend upon the motivation
- Buy his life not his job
- Regulatory and dependability that counts not the amount
- Pay no bonuses
- Supplemental that agent income for regular sources
enough to ease his financial worries but not to cause him
to live in style.
12. Disposition
13. Reporting
14. Operational testing

Cover and Undercover:


Cover – Which an individual group of organization conceals the true nature of its
acts and or existence from the observer.
Cover Story – Biographical data through fictional, which portray the personality of
the agent, he assumed a scenario to cover up the operation.
Cover Support – An agent assigned in target areas with the primary mission of
supporting the cover story.

Importance of Cover:
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have need to
know
3. Successful accomplishment of the mission

Types of cover:
1. Natural Cover – Using actual or true background
2. Artificial – Using biographical data adopted for the purpose
3. Cover with Cover – Justification of Existence
4. Multiple Cover – any cover you wish

Hazards of cover:
1. Static or dormant opposition (ordinary citizen)
2. Un hostile active opposition (Police/Security agencies)
3. Hostile active opposition (enemy intelligence operatives)

Organizational cover – is an account consisting of biographical which when


adopted by an individual will assume the personality he wants to adopt.
16

Undercover assignments – Is an investigative technique in which agent


conceal his official identity and obtain information from the organization.
Types:
1. Dwelling
2. Work
3. Social
4. Jurisdictional Assignment
5. Combinational Assignment
6. Rope Job-(striking up friendship with the subject)

CONTROL – authority to direct the agent to carryout task or requirement on


behalf of the clandestine organization in an acceptable manner and security.

Two categories of control:


1. Positive control – is characterized by professional and rapport.
a. Agent motivation
b. Psychological control
2. Negative Control – Black Mail and Threat.
a. Disciplinary Action
b. Escrow Account – control of an agent by putting his/her salary in a
bank to be withdrawn only after a fulfillment of a condition.
c. Black mail

The Essence of Procurement:


THE ESSENCE OF INTELLIGENCE IS ACCESS, SOMEONE OR SOME
DEVICE HAS TO GET CLOSE ENOUGH TO A THING, A PLACE OR A
PERSON TO OBSERVE OR DISCOVER TO THE DESIRED FACTS WITHOUT
AROUSING THE ATTENTION OF THOSE WHO PROTECT THEM THE
INFORMATION MUST MOVE QUICKLY OR IT MAY GET STALE AND IT MUST
NOT GET LOST OR INTEGRATED IN ROUTE.

PROCURING AGENTS:
1. Agent in place – an agent who has been recruited by an intelligence
service within a highly sensitive target, who is just beginning a career or
have been long or (outsider) insider.
2. Double Agent – an enemy agent who has been captured turned around
and sent back where he came from as an agent of his captors.
3. Expandable agent – An agent through whom false information is leaked to
the enemy.
4. Penetration Agent – agents who have such reached the enemy get the
information and would manage to get back alive.
5. Agent influence – an agent who uses influence to gain information.
6. Agent provocation

Surveillance – A form of clandestine investigation which consist of keeping


person, place or other targets under physical observation in order to obtain
evidence or information pertinent to the investigation.

Consideration in surveillance Planning:


1. Pre-Surveillance conference – a conference held among the team
members or unit before surveillance is conducted.
2. Surveillance Plan – The plan must establish the required type of
personnel, the general and specific instruction for surveillance.
3. Area Target Study – All available information about the areas should be
collected and analyzed.
4. Surveillant – A person who conducts surveillance with includes only
observation.
5. Stakeout or Plant – The observation of places or areas from fixed point.
6. Tailing or Shadowing – the observation of a person’s movement.
7. Undercover man – Refer to the person trained to observed and penetrate
certain organization suspected of illegal activities and later reports the
observation and information that proper operational action can be made.
17

8. Liaison Program – This is the assignment of trained intelligence personnel


to other agencies in order to obtain information of police intelligence value.
( ex. press, Companies)
9. Safe house – Is a place, building, enclosed mobile, or an apartment,
where police undercover men meet for debriefing or reporting purposes.
10. Drop – Any person is a convenient, secure and unsuspecting place where
police undercover men meet his action agent for debriefing or reporting
purposes.
11. Convoy – An accomplice or associate of the subject used to avoid or
elude surveillant.
12. Contact – Any person whom the subject picks or deals with while he is
under observation and identifies the observer.
13. Made – When subject under surveillance becomes aware that he is under
observation and identifies the observer.
14. Lost – When the surveillance does not know the where about of his
subject or the subject had elude the surveillance.

Types of Surveillance:
A. According to Intensity and Sensitivity
1. Discreet – subject person to be watch is unaware that he is under
observation.
2. Close – Subject is aware that he is aware that he is under
observation varied on each occasion.
3. Loose – Applied frequently or infrequently, period of observation
varied on each occasion.
4. Harassment – suspected criminals are under surveillance wherein
an harass is made.
B. According To Methods:
1. Stationary
2. Moving
3. Technical
Casing – It is reconnaissance or surveillance of a building place or area to
determine its suitability for intelligence use or its vulnerability in operations.

Methods of Casing:
1. Personal Reconnaissance The most effective method and will produced
the most information since you know just what you’re looking for.
2. Map Reconnaissance
3. Researched
4. Prior Information
5. Hearsay – information usually gain by the person operating in the area
and performing casing job.

Elicitation:
It is a system or plan whereby information of intelligence value is obtained
through the process direct intercommunication in which one or more of the
parties to the common is unaware of the specific purpose of the conversation.

Three Phases:
1. Determination of the mission
2. Selection of the Subject
3. Accomplishment of the mission.

Devices in the conduct of Elicitation:


1. Approach – Process of setting people to start talking
2. Probe – to keep the people taking incessantly.
18

Types of Approach:
1. Flattery – people are susceptible to praise.
Variants:
a. Teacher-Pupil Approach – The subject is treated as an authority.
b. Kindred Soul Approach
c. Good Samaritan Approach
d. Partial – Disagreement approach.
2. Provocative Approach – discover a wide range of conversational gambits.
Variants:
a. Teaser Bait Approach – The elicitor accumulates the sources of
knowledge about a particular subject.
b. Manhattan from Missouri Approach – Elicitor adopts an
unbelievable attitude above anything. He questions all statement
and opposition.

c. Joe Blow Approach – is “I know the answer to everything


Approach” Elicitor adopts the attitude of being approachable of any
field.
d. National Pride Approach – Nature propensity of all person to
defend their country and it’s policies.
Types of probe:
1. Competition probe - this is effective when used in connection with teacher
pupil approach.
2. Clarity probe – Used to elicit additional information in an area, which the
response is clear.
3. High pressure Probe – It serves pin down a subject in a specific area or it
maybe used to point out contradiction in what the subject has said.
4. Hypothetical Probe – presents a hypothetical situation and to get the
subject to react to the hypothetical situation.

Reference;

BOOKS

Cael, Basilio G. (2002). Terrorism, Kidnapping, Assassination. Mary Jo


Publishing House, Inc.

Claros, R. (1996). Security Intelligence, Seven Shield Enterprise, Dimasalang,


Naga City.

Clearly, Thomas. Mastering the Art of War, Boston, Mass Shambala Publication,
Inc.

Delizo, Bernard and Manwong ,Rommel (2006). The Law Enforcement


Administration Text Book in Criminology. RK Manwong Publication.

Directorate for Investigation HPNP(2000), Camp Crame, Philippines National


Police (PNP)

Fennelly, Lawrence J. (1997). Effective Physical Security, Boston:Butterworth,


1997.

Fernandez, Buenaventura and Busto Arellano V.(2005).Philippine National Police


Examination Reviewer. A.V.B. Printing Press 1202-B Unit II A. Maceda St. Cor.
Dapitan St. Samp. Manila.

Grinffith, Samuel B., Sun Tzu – The Art of War, New York, Oxford University
Press.
19

Lloyd, Mark, The Guinnes Book of Espionage. Middlesex, GB, Guinness


Publishing Ltd.

Lyman, MD and Potter, G.W. Organized Crime, New Jersey, U.S.A.Prince Hall
Inc.

Madinger, John.(2000). “Confidential Informant” Law Enforcement’s Most


Valuable Tools.CRC Boca Raton London New York Washinton, DC 2000

McMahon, Rory J. (2002). Practical Handbook for private Investigation, New


York, CRC Press.

Motto ,Carmine J and June, Dake L. (2000). Undercover 2 nd ed Boca Raton: CRS
Press 2000

Schultz, B.S and Norton L. A, Police Operational intelligence, Springfield, ILL:


Thomas book Publication, Inc..

Ulep, Mauricio C.(2000). The Law on FireArms and Explosives INC. Manila.

OTHERS

A. Encyclopedia Britannica

B. The World Book Encyclopedia

C. Compilation of Notes on Intelligence

D. Review Materials

F. Intelligence Manual

You might also like