Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

1

POLICE INTELLIGENCE
JOPERSON G. PABLO, R.CRIM., REB, REA
INTRODUCTION TO POLICE INTELLIGENCE ◼ aspect of intelligence, which comprises civil and police/military measures to counter the enemy or to
prevent sabotage or subversive activities.
◼ inseparable from intelligence.
INTELLIGENCE - the end product resulting from the collection, collation, evaluation, analysis, integration, and the ◼ makes valuable contributions to the overall production of intelligence.
interpretation of all available information.
BASIC PRINCIPLES OF INTELLIGENCE OPERATIONS
POLICE INTELLIGENCE - the end product resulting from the collection, evaluation, analysis, integration, and the 1. Intelligence is continuous
interpretation of all available information regarding the activities of criminals and other law violators for the 2. Intelligence operations and tactical operations are inter-dependent
purpose of effecting their arrest, obtaining evidence for forestalling plan to commit crime. 3. Intelligence must be useful
4. Intelligence must be timely
INTELLIGENCE vs INFORMATION 5. Intelligence operations must be flexible
⚫ Intelligence – processed information 6. Intelligence operations require imagination and foresight
⚫ Information – unprocessed information or raw data 7. Intelligence requires constant security measures

INFORMATION – unprocessed material of every description including those derived from observation, communication,
report, rumor, imagery, and other sources from which intelligence is produced. INTELLIGENCE CYCLE

INTELLIGENCE COMMUNITY – an integrated and nearly organized entity composed of units or agencies, which INTELLIGENCE CYCLE – cyclical steps followed from intelligence planning to the dissemination of processed
have intelligence interest and responsibilities. information. It is a repetitive process used to produce intelligence from information.

INFORMER – the one who gives information for a reward or price. 4 PHASES OF INTELLIGENCE CYCLE
INFORMANT – anyone who can furnish information. 1. PLANNING THE COLLECTION EFFORT
a. Determination of Intelligence Requirements
4 AXIOMS OF INTELLIGENCE ✓ Priority Intelligence Requirements (PIRs) or Essential Elements of Informations (EEIs)
⚫ Axiom 1 - Intelligence is crucial to Internal Security ✓ Other Intelligence Requirements (OIRs)
⚫ Axiom 2 - Intelligence is essential to all types of Operations b. Determination of intelligence priorities
⚫ Axiom 3 - Intelligence is the responsibility of all government agencies c. Determination of Intelligence indicators/ determination of those enemy activities or characteristics of
⚫ Axiom 4 - Intelligence of the government must be superior to that of the enemy the area of operations could indicate the answers to the intelligence requirements.
Indicators - generalized theoretical action that an enemy might be expected to take in preparation for
CATEGORIES OF INTELLIGENCE aggressive action that are things or events that transpired in the past or things or events that are
⚫ Tactical Intelligence presently occurring.
◼ commands the answer to questions concerning the enemy’s capabilities and conditions. d. Determination of intelligence specific orders or requirements/selection of collection agencies to be
◼ focuses directly to a specific operation. employed, and issuance of necessary orders and requests for information.
⚫ Strategic Intelligence – deals with political, economic and military capabilities and vulnerabilities of all e. Determine the collection agencies together with the time and place the information is to be
nations. reported/supervising the execution of orders and requests.
⚫ Counterintelligence
2

2. COLLECTION OF INFORMATION – systematic exploitation of sources of information by collection Accuracy – probable truth of the information.
agencies and the delivery of the information obtained to the proper intelligence unit or agency.
Sources of Information RELIABILITY OF INFORMATION ACCURACY OF INFORMATION SOURCES OF INFORMATION
• any person, object or record used by an investigator in conducting investigation. (CUFNUR) (CPPDIT) (CAPIGPD)
• persons, things, or actions from which information about the enemy, weather or terrain is derived. A – Completely Reliable 1 – Confirmed by other sources T – Direct Observation by the
Types of Sources of Information COMMANDER of a unit
• Open sources – those that are obtained without resorting to special effort or clandestine B – Usually Reliable 2 – Probably True U – Report by a penetration
AGENT/resident agent
operation.
C – Fairly Reliable 3 – Possibly True V – Report by an AFP trooper or
• Non-open sources – those that are not obtained openly as described above.
PNP
Kinds of Informer
D – Not Usually Reliable 4 – Doubtfully True W – Interrogation of a captured
• Common or ordinary enemy/Agent of foreigner
• Confidential E – Unreliable 5 – Improbable X – Observation by a
Kinds of Informant Government/civilian employee/
• Confidential official
• Voluntary F – Reliability cannot be judged 6 – Truth cannot be judged Y – Observation by a member of a
• Involuntary Populace
• Special Z – Documentary
• Anonymous
• Interpretation and Analysis – determination of the significance of the information relative to the
3. PROCESSING OF INFORMATION information and the intelligence already known and drawing deductions about the probable
meaning of the evaluated information.
• Recording – reduction of information to writing or some other form of graphical representation
Activities involved:
and the arranging of information into groups of related items.
➢ Assessment – sifting and sorting of evaluated information to isolate insignificant
Means of Recording
elements with respect to the mission and operation of the unit.
▪ Intelligence Journal
➢ Integration – combination of elements isolated in analysis with other known information
▪ Intelligence Workbook
▪ Enemy Situation Map to form a logical picture on hypothesis of enemy activities or influence of operational
▪ Order of Battle Records/Watch Lists area characteristics on the mission of the unit.
➢ Deduction – designed to answer the question “what does this information means in
▪ Coordinate Register
relation to the enemy situation, weather and area of operation.
▪ Identification Files
• Evaluation
4. DISSEMINATION AND USE OF INFORMATION
o determination of the pertinence, reliability and accuracy of the information.
Considerations:
o determination of the pertinence or significance of the information relative to the
✓ Timeliness - must reach the users on time to be of value. It must be disseminated in
operation, reliability of the sources or agency, and accuracy of the information.
accordance with the urgency and must reach the user in sufficient time to be use.
Pertinence – determination of the area of operation and who needs it, if so by whom and
✓ Propriety – the message must be clear, concise and complete, as well as in the proper form
when.
for the receiver to readily understand its contents. It must be disseminated to the correct
Reliability – determination of the sources of information by which it was collected and
user, presented in a form that lends itself to immediate use and distributed by the most effective
evaluated.
means appropriate to both time and security requirements.
jgp_16
3

Methods of Dissemination: ⚫ COVER – device or stratagem by which the selected investigator conceals his identity and relationship with the
▪ Personal Contact – conferences, briefings, person to person exchanges investigating agency. Operator adopts different cover stories, aliases, backstopping for their falsified documents
▪ Messages – couriers, secured electrical means to make cover story credible.
⚫ UNDERCOVER – an investigative technique in which the investigator conceals his true identity and status and
▪ Intelligence Documents: adopts an assumed role in order to obtain access to information or evidence, which would not be available
o Intelligence Reports through other investigative means.
o Intelligence Summaries ⚫ CASING – Visual inspection of an area, place building or installation to determine to determine its suitability for
o Imagery Interpretation Reports intelligence use or its vulnerability in an intelligence operation.
o Document Analysis Reports
o Periodic Intelligence Reports USES OF CASING
o Tactical Interrogation Reports ◼ 1. Aids in the planning of an operation by providing needed information.
o Technical Intelligence Report ◼ 2. It assists the agent handler to instill confidence in his agent during the briefing phase by being able to
o Technical Intelligence Bulletin speak
o ORBAT Handbook ◼ 3. Considered a form of security that offers some degree of protection for those operating in the area
o PACREP unfamiliar to them.
o Intelligence Annexes ◼ 4. During the debriefing phase, it will aid in the operational testing of the agent.

INTORDUCTION TO INTELLIGENCE TRADECRAFT METHODS OF CASING


◼ Personal Reconnaissance
INTELLIGENCE TRADECRAFT ◼ Map Reconnaissance
◼ the ways, means and the methods of intelligence operations and espionage, the process used by the ◼ Research/Records check
intelligence officers, operators, and assets (agents) to go about their business. ◼ Prior Information
◼ pertains to the Skills, Innovation, Flexibility and Initiative on a chosen field of endeavor. ◼ Hearsay
◼ Skills and techniques employed by intelligence personnel in the conduct of intelligence missions. In short
Filipino term, it is termed as “DISKARTE.” ⚫ SURVEILLANCE – a planned observation of persons, places or objects; however, it is primarily directed to
◼ a method used in clandestine operations such as espionage. persons. It may also be defined as form of investigation which consists of keeping any person, place or other
◼ Pertains to skills needed to successfully perform intelligence work in a hostile environment. For all you under physical observation in order to obtain evidence or information pertinent to the purpose of the investigation.
know, Tradecraft is “INVISIBLE”
OBJECTIVES OF SURVEILLANCE
2 TYPES OF TRADECRAFT ◼ To obtain evidence of a crime.
⚫ RURAL – It is high-threat tradecraft primarily because of the risk and security that it demands. Incidental to its ◼ To check on the reliability of information and their sources.
application is its difference compared to that of urban setting. ◼ To obtain probable cause for obtaining search warrants.
⚫ URBAN – It is basically viewed as the application of tradecraft in urban areas wherein sophistication and ◼ To prevent the commission of an act or to apprehend a subject in the commission of an act.
unique clandestine operation is required. ◼ To obtain information for later use in interrogation.
◼ To develop leads and information received from sources.
USES OF INTELLIGENCE TRADECRAFT ◼ To know at all times the whereabouts of an individual.
Intelligence tradecraft is primarily used in the conduct of clandestine intelligence mission in a hostile environment ◼ To obtain admissible legal evidence for use in court.
of high-threat areas. It is primarily used in the following: ◼ To locate persons of interest of the investigation by watching their habitats and associates.

jgp_16
4

◼ To obtain detailed information concerning the scope and nature of a person’s activities. ◼ The objectives of recruitment are to obtain qualified and motivated agents and eliminate the danger of
jeopardizing the mission in the recruitment process.

⚫ CLANDESTINE COMMUNICATION – the art of making contact or communication between government agents
(specially between agent handlers and action agents) and other intelligence personnel working within the circle Steps in Recruitment
of the specific mission called clandestine network. ➢ Assessment of the target
➢ Planning the approach
SUMMARY: The Intelligence Community should train their personnel in using tradecraft dogmatically as a set of roles. ➢ Rapport development
It will create inherent understanding to the fundamentals of using tradecraft by improving, adapting to new trends and ➢ Exploitation of motives
overcoming the fear against opponents by any side. ➢ Cultivation and development of the right attitude
⚫ TRAINING – a continuous matter and is accomplished both informally and formally. The goal of agent training
is to provide the general knowledge and special skills so the agent can carry out effectively and securely the
task assigned to him.
INTELLIGENCE OPERATIONAL CYCLE (IOC) ⚫ BRIEFING – consists of providing the agent with the most recent developments that may affect the operation;
a general review of the operational facts and detailed instructions regarding the task itself.
⚫ OPERATIONAL TESTING – tasking an agent to obtain certain operational requirements applying all aspects
Intelligence Operational Cycle – the chronological development of collection activities from the time of basic
taken during the training. It is an efficiency performance test.
requirements to the time of submission of the final products.
⚫ DISPATCH AND RECEPTION – defining the procedures to be followed by the agent when communication is
The phases or stages of the operational cycle should be considered as a series of guidelines that assist the staff
sent to him as well as when he sends back communication.
planer, the special collection unit and particularly the agent handler in handling and carrying out special collection
⚫ COMMUNICATION – outlining the system communication flow that must conform to the limits set by security in
operations.
accordance with the operational requirements and consistent with the 4 basic aspects of control, flow,
continuity and security.
STEPS OF THE INTELLIGENCE OPERATIONAL CYCLE
⚫ MISSION – the concise written statement of the directives broken down into objectives and further classified ⚫ DEBRIEFING – begins as soon as he has completed an assigned task in order to get the latest intelligence
into pertinent targets as a result of the mission analysis in relation with one’s capabilities and operational information and operational developments. It often serves as a favorable time for making clarifications. It should
conditions. be thoroughly prepared in order to recognize significant information and to ask the right questions.
⚫ OPERATIONAL PLANNING – the concept of the project. It involves the assignment of a specific task to each ⚫ PAYMENTS – an agent may receive regular payment for his services. Some who adhere to a certain strong
moral and ideological code may not wish to accept money, but may have no objection receiving financial
element or operating agency, the operational support, coordination, administrative instruction and security.
compensation of their clandestine collection effort.
⚫ SPOTTING – the process of locating, identifying and gathering data on persons who appear to be of potential
⚫ DISPOSITION – Termination of the services of agents must be considered prior to recruitment. An agent may
value to current operations or those which may conceivably take place on a later date. The spotting process
be terminated because of accomplishment of the mission, exhaustion of funds, agent being compromised, lack
must be done in a manner which leaves the agent candidates unaware of the spotting activity.
of access to the assigned target, and disloyalty on the part of the agent.
⚫ INVESTIGATION AND ASSESSMENT
⚫ REPORTING – the means of transmitting the main product of clandestine collection effort.
◼ this involves processing and collating the maximum information available on the agent candidate to
determine his qualification, motivation and suitability to undertake information collection activities.
◼ may reveal facts about the agent candidate that makes him unfit for the assignment.
⚫ RECRUITMENT
◼ the formal acceptance of the agent candidate as an active member of the information collection effort.
Access is the key.

jgp_16
5

OVERVIEW ON COUNTERINTELLIGENCE (CI) ◼ To prevent the appointment, employment or retention of an employee of such individual of questionable
loyalty.
COUNTERINTELLIGENCE – the aspect of police intelligence relating to all security measures both offensive (active) ◼ To protect own personnel from hostile activities of assassinations, sabotage, subversion, disaffection form
and defensive (passive) to safeguard information, personnel, material and installations against espionage, sabotage opposition.
and subversion by foreign nations and dissident groups or individuals that constitute a threat to national security. ⚫ DOCUMENT SECURITY
◼ Document – Any recorded information, regardless of its physical form or characteristics and includes but
ESPIONAGE – the act or practice of spying. The use of a spy by a government in order to discover the military or is not limited to:
political secrets of other nations. ◆ Written matter, whether handwritten, printed or typed
◆ All printed, drawn or engraved matters
SABOTAGE – destruction of property or obstruction of public service as to undermine a government’s police or ◆ All sound and voice recordings
military effort. ◆ All printed photographs and printed films
◆ All productions of the foregoing for whatever purpose
SUBVERSION – an act that seeks to overthrow a constituted government. The act or instance of subverting. ◼ Classified Matter – information or material in any form or any nature, the safeguarding of which is
necessary in the interest of national security
TREASON – disloyalty to one’s own country by giving away or selling its secrets to the enemy or by trying to overthrow ◼ Classified Police Information/ Classified Military Information
its government. ◆ Includes all information concerning documents, cryptographic devices, developments, projects, and
materials falling in the category of top secret, secret, confidential or restricted
SEDITION – any action promoting or inciting discontent or rebellion against a government. 4 Categories of Classified Matters
◆ Top Secret – information and material whose unauthorized disclosure would cause exceptionally
MEASURES FOR EFFECTIVE COUNTERINTELIGENCE grave damage to the country.
⚫ Passive (Defensive) – CI measures that seek to conceal information from the enemy. ◆ Secret – information and material whose unauthorized disclosure would endanger national security,
Example: Secrecy discipline, communication security, concealment camouflage. cause serious injury to the interest and prestige of a nation or of any government activity or would
⚫ Active (Offensive) – CI measures that seek to actively block enemy attempts to gain information or block enemy be of great advantage to foreign nation.
efforts to engage in espionage, sabotage or subversion. This includes detection, prevention and neutralization. ◆ Confidential – information and material whose unauthorized disclosure would be prejudicial to the
interest or prestige of the nation or government activity or would cause administrative
COMPONENENTS OF COUNTERINTELIGENCE embarrassment or unwarranted injury to an individual or would b an advantage to a foreign nation.
⚫ PHYSICAL SECURITY ◆ Restricted – information and material that require special protection other than that determined
◼ Physical Security – a system of barrier placed between the potential intruder and the material being to be top secret, secret or confidential.
protected ⚫ COMMUNICATION SECURITY (COMSEC) – the protection resulting from the application of measures
◼ Human Barrier – a person who stands between the intruder and the material being protected. designed to deny unauthorized persons information of value which might be derived from a study of
◼ Animal Barrier – usually a dog trained used as guard communications materials and information or to mislead unauthorized persons in their interpretations of the
◼ Natural Barrier – all barriers that are not man-made such as mountains, rivers, etc. results of such a study.
◼ Energy Barrier – usually electrical and electronics devices used to provide assistance to guard personnel. ⚫ OPERATIONAL SECURITY (OPSEC) – the sum total of precautions taken to maintain the secrecy of the activity
◼ Structural Barrier – constructed feature, regardless of original intent, that tend to delay intruder and protect the identity of agents constitutes operational security.
⚫ PERSONNEL SECURITY
◼ includes security measures designed to prevent unauthorized individual of doubtful loyalty to the Philippine
government from gaining access to classified matters or security facilities, armaments, restricted
area/office warehouse supply rooms, power houses and others.
jgp_16
6

OTHER TOPICS COUNTER INTELLIGENCE OPERATIONS


⚫ Counter Human Intel (HUMINT) - seeks to overcome enemy attempts to use human sources to collect
GENERAL ACTIVITIES OF POLICE INTELLIGENCE information or to conduct sabotage and subversion which includes CI special operations, liaison, counter
⚫ Strategic Intelligence - an intelligence activity which is primarily long range in nature with little practical security, and CI screening.
immediate operation value. ⚫ Counter Imagery Intel (IMINT) - includes action taken to determine enemy SIGINT and related enemy
⚫ Line Intelligence - an intelligence activity that has the immediate nature and value necessary for more effective weaknesses, capabilities and activities. These actions include surveillance radar, photo thermal and infrared
police planning and operation. systems. Successful counter – IMINT operations rely heavily on pattern and movement analysis and evaluation
⚫ National Intelligence - the integrated product of intelligence developed by all the governmental branches, of the enemy.
departments concerning the broad aspect of national security and policy. It is concerned to more than one ⚫ Counter Signal Intel (SIGINT) - determine enemy SIGINT and related enemy weaknesses, capabilities
department or agency and it is not produced by single entity. It is used to coordinate all the activities of the and activities, assess friendly operations to identify patterns, profiles and develop, recommend and analyze
government in developing and executing integrated and national policies and plans. counter measures.
⚫ Counter-Intelligence - phase of intelligence covering the activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of info against espionage, subversion and sabotage. SURVEILLANCE PRECAUTIONS
⚫ Undercover Work - an investigative process in which disguises and pretext cover and deception are used to ⚫ Do not make abrupt or unnatural movements
gain the confidence of criminal suspects for the purpose of determining the nature and extent of any criminal ⚫ Do not make use of disguise that will attract attention
activities that maybe contemplating or perpetuating. ⚫ Never stare at the subject
⚫ Do not attempt to appear too innocent when accosted by the suspect.
FUNCTIONAL CLASSIFICATIONS OF INTELLIGENCE ⚫ Never speak to another agent unless absolutely necessary to accomplish the mission
⚫ Criminal Intelligence - the knowledge essential to the prevention of crimes and the investigation, arrest, and ⚫ Maintain distance
prosecution of criminal offenders. ⚫ Plan ahead
⚫ Internal Security Intelligence - the knowledge essential to the maintenance of peace and order. ⚫ Be aware on changes of actions
⚫ Public Safety Intelligence - the knowledge essential to ensure the protection of lives and properties. ⚫ Note-taking should be done in safe areas.
⚫ Make use of street furniture (Telephone booth, sidewalk, vendors, waiting sheds)
KINDS OF INTELLIGENCE ⚫ Don’t court women
⚫ Strategic Intelligence – an intelligence data that are not of an immediate value. It is usually descriptive in ⚫ Don’t take woman on an undercover assignment
nature, accumulation of physical description of personalities, modus operandi. It does not have ⚫ Don’t claim to be a big shot
immediate operational value but rather long range that may become relevant to future police operations. ⚫ Don’t fail to provide a person in place who can vouch for the operative
⚫ Line Intelligence – the kind of intelligence required by the commander to provide for planning and conduct ⚫ Don’t spend too much money.
tactical and administrative operation in counter insurgency. This pertains to knowledge of People, Weather,
Enemy and Terrain (PWET) used in planning and conducting tactical and administrative operation in a counter DON’Ts IN SURVEILLANCE
insurgency. ⚫ Window Shopping
⚫ Counter Intelligence – covers the activity devoted in destroying the effectiveness of hostile foreign ⚫ Use of Convoys
activities and to the protection of info against espionage, subversion and sabotage. the three activities of CI ⚫ Stopping immediately on blind corners
are: protection of information against espionage; protection of personnel against subversion; and ⚫ Getting out immediately on public conveyances
protection of installations and material against sabotage. ⚫ Retracing
⚫ Entering mobile housing

jgp_16
7

INFORMATION PERSONALITIES
⚫ any forms of communicated knowledge which serves as the bloodline of police intelligence. ⚫ SUN TZU – takes a more practical view. According to him foreknowledge is the key. He said that “It must be
⚫ all evaluated materials of every description including those derived from observation, reports, rumors, imagery, obtained from men who knew the enemy situation”.
and other sources from which intelligence is produced. Information is a communicated knowledge by others ⚫ ALEXANDER THE GREAT – While marching towards Asia, he devised the first letter sorting and to obtain
obtaining by personal study, investigation, research, analysis, observation. information.
⚫ AKBAR – The “Great Mogul” and sagacious master of Hindustan who employed more than four thousand
GENERAL CLASSIFICATIONS OF SOURCES OF INFORMATION agents for the sole purpose of bringing him the truth his throne might rest upon him.
⚫ Open Sources – 99% of the information collected are coming from open sources. ⚫ GENGHIS KHAN – the leader of the so-called Mongol conquerors and used effective propaganda spreading
⚫ Close Sources – 1% of information are collected from close sources. rumors of Mongol terror. They collected information on weaknesses and rivalries of Europe and usually
disguised as merchants.
OVERT INTELLIGENCE – the gathering of information or documents procured openly without regard as to whether ⚫ FREDERICK THE GREAT – The FATHER OF ORGANIZED MILITARY ESPIONAGE. He established rules for
the subject or target become knowledgeable of the purpose. obtaining and using every grade of spy or intelligence and divided his agents into 4 classes.
◼ COMMON SPIES
COVERT INTELLIGENCE – the secret procurement of information, which is obtained without the knowledge of the ◼ DOUBLE SPIES
person or persons safeguarding vital intelligence interest. ◼ SPIES OF CONSEQUNCES
◼ PERSONS
COVER - the means by which an individual group of organization conceals the true nature of its acts and or ⚫ JULIUS CEASAR – During his time, his staff of each legion includes ten “speculators” who served as
existence from the observer. information-collecting agency. The Speculators were the first intelligence personnel to appear definitely in a
military organization. Adapted also codes and ciphers or secret writings.
COVER STORY – a biographical data through fictional that will portray the personality of the agent he assumed, ⚫ NAPOLEON BONAPARTE – believes that “one spy in the right place is worth 20,000 men in the field”. He also
a scenario to cover up the operation organized two bureaus of interest.
◼ Bureau of intelligence - consolidated all incoming information regarding the enemy presentation to the
COVER SUPPORT – an agent assigned in target areas with the primary mission of supporting the cover story. emperor and to obtain information desired.
◼ Topographic Bureau - maintained a large map which covers the latest information regarding both enemy
TYPES OF SURVEILLANCE and friendly forces.
⚫ According to Intensity and Sensitivity: ⚫ GEN.WILLIAM DONOVAN – In June 1942, Pres. Roosevelt established the Office of Strategic Services (OSS)
◼ Discreet – subject person to be watched is unaware that he is under observation. with Donovan as in-charge. The OSS was builder of a Central Intelligence system and considered a forerunner
◼ Close – subject is aware that he is under observation varied on each occasion. of CIA. The exploits made by the OSS became legendary in WWII.
◼ Loose – applied frequently or infrequently, period of observation varied on each occasion.
⚫ According to Methods: TOP 10 INTELLIGENCE AGENCIES IN THE WORLD
◼ Stationary – observation of place usually a bookie stall, a gambling, joint, a residence where illegal ⚫ Australian Secret Intelligence Service (ASIS), Australia – established in 1952, during an executive
activities are going on (fixed position). Council meeting by Prime Minister Robert Menzies, and was headed by Alfred Deakin Brookes.
◼ Moving – surveillance follow the subject from the place to place to maintain continuous watch of his ⚫ Research and Analysis Wing (R&AW), India – this special organization was formed in 1968, and operated
activities. under the leadership of R.N.Kao.
◼ Technical – a surveillance by the use of communications and electronic hardware’s, gadgets, system and ⚫ Canadian Security Intelligence Services (CSIS), Canada – formed in 1984 by the Act of parliament, Bill C-
equipment. 9.
⚫ Direction Generale De La Securite Exterieure (DGSE), France – the Agency specializes in gathering and
disseminating information related to external intelligence.
jgp_16
8

⚫ The Institute for Intelligence and Special Operations, MOSSAD, Israel – headquartered in Tel Aviv, Israel,
Mossad, is one of the key national intelligence agencies. Mossad is a Hebrew word which literally means
“the institute”; the finest intelligence agency in the world.
⚫ Federal Security Services (FSB), Russia – The Agency is among the best in countering terrorism, cross
border security and surveillance. Headquartered in Lubyanka Square, downtown Moscow, the agency is also
believed to work with RAW (India) and other ex-soviet agencies in Russia.
⚫ Ministry of State Security (MSS), China – Known to be the most active and the largest agency operating
under the Government of the People’s Republic of China the agency plays an active role in handling
domestic issues as well. It is also said that the Ministry of State Security Agency works closely with other
international intelligence Agencies such as ISI from Pakistan.
⚫ Secret Intelligence Services / Military Intelligence Section 6 (MI6), United Kingdom – Situated in London,
Secret Intelligence Services popularly known as MI6. The agency is involved in working closely with United
States and Israel agencies.
⚫ Central Intelligence Agency, CIA, United States – formed in 1947 and has its headquarters in Langley,
Virginia which is situated near Washington D.C. With over 22,000 employees the Agency is the most popular
and among the best funded intelligence agencies of the world.
⚫ Inter Service Intelligence (ISI), Pakistan – said to be the top most organization with most advanced
sources of information and secret agents working around the world today.

jgp_16

You might also like