Professional Documents
Culture Documents
Notes LEA 1.6
Notes LEA 1.6
Notes LEA 1.6
MODULE 4
OBJECTIVE: To acquaint the reviewee’s on the nature of intelligence
function, Intelligence Cycle, Fundamentals of Cryptography encoding and
decoding, Classification of Documents, Handling Classified Security
Information, Identification of Criminal Subversive Elements, Modus Operandi
(MO) and Order of Battle (OB)
LESSON 1
PRINCIPLES OF INTELLIGENCE
Functions: (general)
Today’s all countries have their intelligence services. They maybe different
in their organization, efficiency and method but they all have the basic
functions:
1. The collection or procurement of information.
2. The evaluation of the information that become intelligence.
3. The dissemination of intelligence to those need it.
4. Counter Intelligence
Other Function:
1. To serve all branches of the government.
2. To procure and obtain political, economical, psychological, military and
other information, which may bear upon, the different government
department and agencies had collected national interest.
PRINCIPLE OF INTELLIGENCE:
A. GENERAL: In making a selection, the following criterion was
applied.
1. Universality of Application – It should apply to as many phases and
aspects of intelligence as possible. This served as guide to the
production of intelligence and other activities and person or
organization composing it.
2. It must be broad – Truly a general rule – It should form the basis for
formulation of corollary and subsidiary guides.
3. It must be Important – Indeed essential to intelligence. It is guide is
truly important and essential, and then its violation should bring its
own immediate penalties.
4. They must not be mutually exclusive instead each should
compliment each other.
B. OBJECTIVES:
- The fundamental objective of Intelligence is to ensure
rational and timely decision making. This is intelligence’s
“raison d’ etre”.( Its reason for being)
2
POLICE INTELLIGENCE:
The end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the activities of
criminal and other law violators for the purpose of affecting criminals and other
law violators for the purpose of affecting their arrest, obtaining evidence and
forestalling plan to commit crime.
Forms of Intelligence:
1. Sociological Intelligence – deals with demographic and psychological
aspects of group of people.
a. Population & manpower
b. Characteristic of people
c. Public Opinion – attitude of the majority of the people towards
matters of public policy.
d. Education – based on literacy rate.
2. Biographical Intelligence – deals with individual’s personalities who
have actual possession of power.
3. Armed Forces Intelligence – Deals with the Armed Forces of the
Nation.
a. Position of the Armed Forces Constitutional and legal basis of
its creation and actual role.
b. Organizational Structure and territorial disposition.
c. Military manpower recruitment
d. Order of battle
4. Geographical Intelligence – Deals with the progress of research and
development as if the economic and military potential of a nation.
1. Security Intelligence – means that the total sum of effort to conceal the
following:
a. National Policies
b. Diplomatic Decisions
c. Military Data
d. Other information of a secret nature affecting the security of the
nation from unauthorized persons.
2. Counter Intelligence – This is the organized effort to protect specific data
that might be of value to the opponent’s own intelligence organization.
3. Counter Espionage – A negative intelligence becomes dynamic and active
effort. Its purpose is to investigate actual theoretical violation of espionage
laws, to enforce those laws and to apprehend any violators; It is a job to
catch spies. It is basically a police function.
5
Aims of counter Espionage – To locate the enemy , to identify the enemy , and
to neutralize the enemy.
LESSON 2
INTELLIGENCE CYLE
INTELLIGENCE CYCLES:
1. Direction the collection efforts:
A. Determination of requirements:
a. Enemy capabilities including time, place, strength or other details.
b. Enemy vulnerabilities including the nature, extent permanence or
other details.
c. Enemy order of battle
d. Terrain including natural and artificial obstacle and weather
6
2. Collection of information:
a. Determine the collecting agency.
b. Send orders or request
c. Supervise collection effort
d. Use tools or technique in collection
e. Ensure timely collection
Factors in choosing collection agent.
1. Capability
2. Multiplicity
3. Balance
SOURCE OF INFORMATION
T – DIRECT OBSERVATION BY THE COMMANDER OF A UNIT
U- REPORT BY PENETRATION AGENT OR RESIDENT AGENT
V- REPORT BY PNP/AFP TROOPS INVOLVED IN COUNTER
W- INTERROGATION OF CAPTURED ENEMY AGENT/ FORIEGNER
X- OBSERVATION OF GOV’T. CIVILIAN EMPLOYEE OR OFFICIAL
Y- OBSERVATION BY THE MEMBER OF POPULACE
Z- DOCUMENTARY
A. ASSESSMENT
B. INTEGRATION – It is the combination of the elements stated in
assessment with other known information or intelligence to form a
logical feature or hypothesis of enemy activities or information of
the operational area characteristic of the mission of the command.
LESSON 3
CRYPTOGRAPHY
Definitions:
Substitution System:
1. Simple Substitution – This is an ancient system attributed to many persons. It
is known that Julius Caesar used it. He merely shifted the alphabet three letters
forward, writing “D” in placed of “A”, “E” for “B”, and so forth. Using this method,
our clear text and cipher text alphabets would appear like this.
CIPHER TEXT:
DEFGHIJKLMNOPQRSTUVWXYZABC
2. Simple Substitution with a key Word – The use of a key word “mixes” the
cipher alphabet and breaks the order that is obtained when only shifting the
alphabet is used. Using the key word “Destroying” our clear text and cipher text
look like this.
CLEAR TEXT:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
CIPHER TEXT
DESTROYINGABCFHJKLMPQUVWX Z
3. Transposition Cipher System – In this system the individual letters are still
present in the cryptogram. They have simply been rearranged in a different order
to form the cipher text. Writing a message backward is simple form of
transposition. Leonardo da Vinci wrote his notes in this system. More complex
methods of the transposition system are available but it will take more time and
effort to study it, hence, we will be contented with the basic for the moment and
learn more of cryptology in some other time.
9
LESSON 4
Each document or information has a life cycle in the sense that its
usefulness has a beginning and an end. It passes various stages from the time it
is created until it is finally disposed. This cycle consist of the following:
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
10
Categories of Document
1. Category A
Information which contains reportable time sensitive, order of battle and
significant information.
It should be given priority because it is critical information.
It must be forwarded without delay.
It is critical to friendly operations.
It requires immediate action.
2. Category B
Anything that contains communications, cryptographic documents, or
systems that should be classified a secret and requires special handling.
Higher authorities should declassify it.
3. Category C
Other information, which contains something that, could be an intelligence
value.
Contains exploitable information regardless of its contents.
Unscreened materials/documents should be categorized as Category C.
4. Category D
No value, yet lower level will never classify documents as category D.
No decision must be made at the lower echelon that document has no
value. It is the responsibility of eh higher headquarters.
5. Classified matter obtained from other department shall retain the same
original classification.
Types of Documents:
Class I – Vital Documents:
In this category these are records that are irreplaceable, records of which
reproduction does not have the same value as the original; records needed to
recover cash, to replace building, equipments, raw materials, finished products,
and work in process and records needed to avoid delay in restoration of
production, sales and services.
Class II – Important Documents:
This includes records the reproduction of which will close considerable
expense and labor, or considerable delay.
Class III – Useful Documents
This includes records whose loss might cause inconvenience but could be
readily replaced and which would not in the meantime present an insurmountable
obstacle to the prompt restoration of the business.
Class IV – Non–essential Documents:
This records are daily files, routine in nature even if lost or destroyed, will
not affect operation or administration. This class represent the bulk of records
which should not be even attempted to be protected in the event of disasters,
They should, however, be kept in ordinary files ready for reference, if needed,
and usually discarded after some period of time.
LESSON 5
Ex.
1. Surveillance
2. Casing
3. Elicitation
4. Surreptitious entry
5. Employment Technical means (Bugging and tapping device)
6. Tactical interrogation
7. Observation and Description
Types of Informants:
1. Criminal Informant – informants who give information to the police
pertaining to the underworld about organized criminals with the
understanding that his identity will be protected.
2. Confidential Informants – Similar to the former but he gives information
violate of the law to includes crimes and criminals.
3. Voluntary Informants – A type of informant who give information freely and
willfully as a witness.
4. Special Informant – Those who gives information concerning specialized
cases only and it is regarded a special treatment by the operatives
(Teachers, Businessman)
5. Anonymous Informant – Those who gives information through telephone
with the hope that the informant cannot be identified.
Sub-type of Informant:
1. Incidental informant – A person who casually imparts information to an
officer with no intention of providing subsequent information.
Recruited Informant – A person who is selected cultivated and developed into
continuous source of information.
14
Informant Recruitment:
1. Selection – It is particularly desirable to able to identify and recruit an
informant who has access to many criminal in-group or subversive
organization.
Wide Access – Is probably the single most important feature in the
consideration of recruiting the potential informant.
2. Investigation – The investigation of the potential informant that has
tentatively identified as a “probable’ must be thorough as possible.
3. Approach – Approach must be done in a setting from which might include
pleasant surroundings, perhaps a confidential apartment, completely free
from any probability of compromise, preferably in an adjacent city or a
remote area foreign to the informant living pattern.
4. Testing – The testing program should begin, of course, with limited
assignment with gradual integration into more important areas. The
occasional testing of an informant should continue through the entire
affiliation.
5. Indoctrination.
Importance of Cover:
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have need to
know
3. Successful accomplishment of the mission
Types of cover:
1. Natural Cover – Using actual or true background
2. Artificial – Using biographical data adopted for the purpose
3. Cover with Cover – Justification of Existence
4. Multiple Cover – any cover you wish
Hazards of cover:
1. Static or dormant opposition (ordinary citizen)
2. Un hostile active opposition (Police/Security agencies)
3. Hostile active opposition (enemy intelligence operatives)
PROCURING AGENTS:
1. Agent in place – an agent who has been recruited by an intelligence
service within a highly sensitive target, who is just beginning a career or
have been long or (outsider) insider.
2. Double Agent – an enemy agent who has been captured turned around
and sent back where he came from as an agent of his captors.
3. Expandable agent – An agent through whom false information is leaked to
the enemy.
4. Penetration Agent – agents who have such reached the enemy get the
information and would manage to get back alive.
5. Agent influence – an agent who uses influence to gain information.
6. Agent provocation
Types of Surveillance:
A. According to Intensity and Sensitivity
1. Discreet – subject person to be watch is unaware that he is under
observation.
2. Close – Subject is aware that he is aware that he is under
observation varied on each occasion.
3. Loose – Applied frequently or infrequently, period of observation
varied on each occasion.
4. Harassment – suspected criminals are under surveillance wherein
an harass is made.
B. According To Methods:
1. Stationary
2. Moving
3. Technical
Casing – It is reconnaissance or surveillance of a building place or area to
determine its suitability for intelligence use or its vulnerability in operations.
Methods of Casing:
1. Personal Reconnaissance The most effective method and will produced
the most information since you know just what you’re looking for.
2. Map Reconnaissance
3. Researched
4. Prior Information
5. Hearsay – information usually gain by the person operating in the area
and performing casing job.
Elicitation:
It is a system or plan whereby information of intelligence value is obtained
through the process direct intercommunication in which one or more of the
parties to the common is unaware of the specific purpose of the conversation.
Three Phases:
1. Determination of the mission
2. Selection of the Subject
3. Accomplishment of the mission.
Types of Approach:
1. Flattery – people are susceptible to praise.
Variants:
a. Teacher-Pupil Approach – The subject is treated as an authority.
b. Kindred Soul Approach
c. Good Samaritan Approach
d. Partial – Disagreement approach.
2. Provocative Approach – discover a wide range of conversational gambits.
Variants:
a. Teaser Bait Approach – The elicitor accumulates the sources of
knowledge about a particular subject.
b. Manhattan from Missouri Approach – Elicitor adopts an
unbelievable attitude above anything. He questions all statement
and opposition.
Reference;
BOOKS
Clearly, Thomas. Mastering the Art of War, Boston, Mass Shambala Publication,
Inc.
Grinffith, Samuel B., Sun Tzu – The Art of War, New York, Oxford University
Press.
19
Lyman, MD and Potter, G.W. Organized Crime, New Jersey, U.S.A.Prince Hall
Inc.
Motto ,Carmine J and June, Dake L. (2000). Undercover 2 nd ed Boca Raton: CRS
Press 2000
Ulep, Mauricio C.(2000). The Law on FireArms and Explosives INC. Manila.
OTHERS
A. Encyclopedia Britannica
D. Review Materials
F. Intelligence Manual