Police Intelligence and Secret Service

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

POLICE INTELLIGENCE AND SECRET SERVICE) result; possesses a precise interrelationship; and

INTELLIGENCE DEFINED interacts with each other so as to achieve a balanced


According to Government - Commission Task Force - and harmonious whole.
It means the collection, processing, collation, 3. Continuity - Intelligence must be continuous. It is
interpretation, evaluation and dissemination of necessary that coverage be continuous so that the
information, with references to national security. In shape of what happens today could be studied in the
certain context, it may also mean the network or the light of what happened before, which in turn would
system for the collection, collation, interpretation, enable us to predict the shape of things to come.
evaluation, processing, and dissemination of 4. Communication - Intelligence adequate to their
information. “The term as used here doesn’t include needs must be communicated to all the decision
any police powers or authorities, any investigative makers in manner that they will understand and form
function other than those involve in the collection of that will permit its most effective use.
information nor any function involved in the 5. Usefulness - Intelligence is useless if it remains in
enforcement of laws, orders, or regulation. the minds, or in the files of its collectors or its
According to Military Terminologies - Intelligence is producers. The story must be told and it must be told
the end product resulting from the collection, well. The story must be convincing and to be
evaluation, analysis, integration and interpretation of convincing it must not only be plausible or factual but
all available information which my have immediate or its significance must be shown.
potential significance to the development and 6. Selection - Intelligence should be essential and
execution of plans, policies and programs of the pertinent to the purpose at hand. Intelligence
users. involves the plowing through a maze of information,
According to Police Parlance - The end product considering innumerable number of means or of
resulting from the collection, evaluation, analysis, picking the most promising of a multitude of leads.
integration and interpretation of a available The requirement of decision-making covers very
information regarding the activities of criminal and nearly the entire span of human knowledge. Unless
other law violators for the purpose of affecting there is selection of only the most essential and the
criminals and other law violators for the purpose of pertinent, intelligence will go off in all directions in
affecting their arrest, obtaining evidence, and one monumental waste of effort.
forestalling plan to commit crime. 7. Timeliness - Intelligence must be communicated to
Functions of Intelligence in General the decision maker at the appropriate time to permit
Today all counties have their intelligence services. its most effective use. This is one of the most
They maybe different in their organization, efficiency important and most obvious, for Intelligence that is
and method but they all have the basic functions too soon or too late are equally useless. Timeliness is
such as: one principle that complements all the others.
 the collection or procurement of information 8. Security - Security is achieved by the measures
 the evaluation of the information which then which intelligence takes to protect and preserve the
become intelligence integrity of its activities. If intelligence has no
 the dissemination of intelligence to those who need security, it might be as well being run like a
it. newspaper to which it is similar.
 counter intelligence or negative intelligence, which General Activities in Police Intelligence
is dedicated to the concealment and protection of 1. Strategic Intelligence – it is an intelligence activity
one’s own information from the adversary intelligence which is primarily long range in nature with little
operation. It is a defensive function of intelligence. practical immediate operation value.
CRITERIA, DOCTRINES, AND PRINCIPLES OF 2. Line Intelligence – it is an intelligence activity that
INTELLIGENCE has the immediate nature and value necessary for
Criteria more effective police planning and operation.
a. Universality of application - it should apply to as 3. National Intelligence - it is the integrated product
many phases and aspects of intelligence as possible. of intelligence developed by all the governmental
It should guide not only the production of intelligence branches, departments concerning the broad aspect
but also the concomitant activities essential to the of national security and policy. It is concerned to
process as well as the organization and the thought more than one department or agency and it is not
and actions of the individual composing it. produced by single entity. It is used to coordinate all
b. It must be broad - it should form the basis for a the activities of the government in developing and
formulation of corollary and subsidiary guides. executing integrated and national policies and plans.
c. It must be important, indeed essential, to 4. Counter-Intelligence – phase of intelligence
intelligence- if a guide is truly important and covering the activity devoted in destroying the
essential, then its violations should bring its own effectiveness of hostile foreign activities and to the
immediate penalties. protection of info against espionage, subversion and
Doctrines sabotage.
a. There exists an essential unity between knowledge 5. Undercover Work – is an investigative process in
and action; that knowledge enhances the which disguises and pretext cover and deception are
effectiveness of action – and minimizes the chances used to gain the confidence of criminal suspects for
of error. the purpose of determining the nature and extent of
b. “The knowledge requirements of decision-making any criminal activities that maybe contemplating or
are complex and beyond the capacities of anyone perpetuating.
necessary to meet there requirements.” Functional Classification of Police Intelligence
Principles 1. Criminal Intelligence – refers to the knowledge
1. Objectivity - in intelligence, only the well guided essential to the prevention of crimes and the
succeed. It is a basic intelligence concept that there investigation, arrest, and prosecution of criminal
must be unity between knowledge and action. It offenders.
follows therefore that intelligence should interact and 2. Internal Security Intelligence – refers to the
condition the decision. Intelligence must be adapted knowledge essential to the maintenance of peace and
to the needs of the decision; it is both giver and order.
taker. Action or decision is planned by knowledge and 3. Public Safety Intelligence – refers to the
guided by it at every step. knowledge essential to ensure the protection of lives
2. Interdependence - Intelligence is artificially and properties.
subdivided into component elements to insure Forms of Intelligence
complete coverage, eliminate duplication and to 1. Sociological Intelligence – deals with the
reduce the overall task or manageable sizes. demographic and psychological aspects of groups of
Nevertheless, each subdivision remains as essential people. It includes the population and manpower and
part of unity; contributes proportionately to the end the characteristics of the people, public opinion –
attitude of the majority of the people towards matter Five Categories of CI Operation
of public policy and education. 1. Military Security – it encompasses the measures
2. Biographical Intelligence – deals with individual’s taken by a command to protect itself against
personalities who have actual possession of power. espionage, enemy operation, sabotage, subversion or
3. Armed Force Intelligence – deals with the armed surprise.
forces of the nation. It includes the position of the 2. Port Frontier and Travel Security – has to do with
armed forces, the constitutional and legal basis of its the application of both military and civil security
creation and actual role, the organizational structure measures for CI control at point of entry and
and territorial disposition, and the military manpower departure, international borders or boundaries.
recruitment and Order of Battle 3. Civil Security – it encompasses active and passive
4. Geographical Intelligence – deals with the progress CI measures affecting the non-military nationals
of research and development as it affects the permanently or temporarily residing in an area under
economic and military potential of a nation. military jurisdiction.
KINDS OF INTELLIGENCE 4. Censorship – it is the control and examination of
A. Strategic Intelligence – as defined earlier, it is an the civil, national, armed forces, field press, and
intelligence data that are not of an immediate value. POWs.
It is usually descriptive in nature, accumulation of 5. Special Operations – counter subversion, sabotage
physical description of personalities, modus operandi. and espionage
It does not have immediate operational value but Counter Intelligence (CI) Operation
rather long range that may become relevant to future 1. Counter Human Intel (HUMINT) – seeks to
police operations. overcome enemy attempts to use human sources to
B. Line Intelligence – It is the kind of intelligence collect information or to conduct sabotage and
required by the commander to provide for planning subversion which includes CI special operations,
and conduct tactical and administrative operation in liaison, counter security, and CI screening.
counter insurgency. This pertains to knowledge of 2. Counter Imagery Intel (IMINT) - includes action
People, Weather, Enemy and Terrain (PWET) used in taken to determine enemy SIGINT and related enemy
planning and conducting tactical and administrative weaknesses, capabilities and activities. These actions
operation in a counter insurgency. include surveillance radar, photo thermal and infrared
Intelligence information to be determined in Line systems. Successful counter – IMINT operations rely
Intelligence are: heavily on pattern and movement analysis and
People - living condition of the people, sources of evaluation of the enemy.
income, education of the people, government 3. Counter Signal Intel (SIGINT) – determine enemy
livelihood projects, extent of enemy influence to the SIGINT and related enemy weaknesses, capabilities
people and activities, assess friendly operations to identify
Weather – visibility, cloudy, temperature, patterns, profiles and develop, recommend and
precipitation (rain), wind analyze counter measures.
Enemy - location of the enemy, strength of the THE INTELLIGENCE CYCLE
enemy, disposition, tactical capability, enemy The single most important part of intelligence activity
vulnerability is the understanding the intelligence cycle because
Terrain - relief and drainage system, vegetation, MISSION, which is the core of the cycle, serves as
surface material, man made features. There are the foundation of all intelligence operations. Every
military aspects of terrain which includes cover and operative must therefore place into mind the
concealment, obstacle, critical key terrain features, following phases of the cycle:
observation and fields of fire, and avenues of PHASE 1 - Planning the Collection Effort
approach. This phase of the cycle involve the determination of
C. Counter Intelligence (CI) - this kind of intelligence the requirements of intelligence. It is concerned with
covers the activity devoted in destroying the identifying the so called Essential Element of
effectiveness of hostile foreign activities and to the Information (EEI) - an item of intelligence or
protection of info against espionage, subversion and information of the characteristics of the area of
sabotage. Hence, the three activities of CI are: operations and the enemy, which the commander
protection of information against espionage; feels he needs before he needs before he can
protection of personnel against subversion; and reasonably arrive at a decision.
protection of installations and material against With this, the intelligence officer must have a
sabotage. thorough knowledge of the available sources of
Counter Intelligence is also known as Negative information, the collecting agencies and type of info
Intelligence - a generic term meaning three different the latter can provide. He must understand the
things; operations of the command in order to provide the
Security Intelligence – means that the total sum of particular Intel required for success. He must have a
efforts to counsel the national policies, diplomatic thorough knowledge of the tactics, organizations, and
decisions, military data, and any other information of characteristics of the enemy and be especially
a secret nature affecting the security of the nation competent in the fields of acquisition of operations.
form unauthorized persons. It is an effort to deny Categories of Intelligence Requirements
information to unauthorized persons by restricting to In relation to use
those who are explicitly authorized to possess it. a. Executive – are those information required by
Counter-Intelligence - counter intelligence is the executive, governmental and military commanders;
organized effort to protect specific data that might be the executive requirements are the basis for
of value to the opponent’s own intelligence decisions and national policy making.
organization. Some of its functions are: Censorship – b. Contributory – information required to complete
of the following: correspondence, broadcast, telecast, the staff process – make staff plans and estimates
telephone conversations, telegrams and cables, etc., that contribute to the decision and policy making.
prevention of the dissemination of any information c. Operational – additional intelligence required in
that might aid an opponent; maintenance of files of planning and carrying out effectively the decision or
suspect; surveillance of suspects; mail reading, wire policy announced. Decisions and policy require
tapping and recording; infiltration of the enemy implementation.
intelligence organized to procure information about d. Collateral – higher or adjacent echelons of the
its method, personal, specific operations and interest. government or military establishment may require
Counter-Espionage - In counter-espionage, negative info.
intelligence becomes a dynamic and active effort. Its In relation to type
purpose is to investigate actual or theoretical a. Basic – are general reference materials for use in
violation of espionage laws, to enforce those laws and the planning regarding the enemies, area of
to apprehend any violators. operations, capabilities – static comprehensive.
b. Current – are information which are temporary in  Modus Operandi Files
nature and narrower in scope. 3. Evaluation – examination of raw information to
c. Estimative – are those that determine the future determine intelligence value, pertinence of the
courses of action; required by the executives to plan information, reliability of the source and agency, and
future military operations and policies. its credibility or truth of information. Evaluation is the
PHASE 2 - Collection of information determination of the pertinence of the info to the
This phase of the cycle is concerned with operation, reliability of the source of or agency and
identification of the collecting agency, the formulation the accuracy of the info. Evaluation determines the
of procedures on the manner of collecting the following:
information in conjunction with the plans as achieved  Pertinence - does it hold some value to current
in phase one. operation? Is it needed immediately?
Selection of Collecting Agencies  Reliability – judging the source of info of agency
a. List all available sources; exploit the collecting  Credibility – truth of info. Is it possible for the
agencies. reported fact or event to have taken place? Is the
b. Collection will be assigned in accordance with report consistent within itself? Is the report confirmed
capabilities; or corroborated by info from different sources or
c. Collection directives prepared once the proper agencies? If the report does not agree with info from
collecting agency has been selected to exploit a other sources which one is more likely to be true?
particular source; The Evaluation Guide
d. Collection directives do not limit the activities of ACCURACY OF INFORMATION
the collecting agency; RELIABILITY OF INFORMATION SOURCE OF
e. Criteria for the selection of collecting agency; INFORMATION
suitability, capability, confirmation, timeliness and 1- CONFIRMED by other sources A- COMPLETE
balance. RELIABLE T- Direct Observation by Comdr/Chf of Unit
Purpose of the Collection Plan 2- PROBABLY TRUE B- USUALLY RELIABLE U- Report
a. To insure logical and orderly analysis of the by DPA or Resident Agent
intelligence requirements. 3- POSSIBLY TRUE C- FAIRLY RELIABLE V- Report by
b. To establish a workable collection scheme based PNP/AFP Troops
on the analysis of the intelligence requirement. 4- DOUBTFULLY TRUE D- NOT USUALLY RELIABLE W-
c. To provide definite and precise directives to Interrogation of Captured Enemy
collecting agencies. 5- IMPROBABLE E- UNRELIABLE X- Observation of
d. To avoid possibility of omission, conflict or gov’t/civilian employee
unnecessary duplication of collection effort. 6- TRUTH can not be judged F- REALIBILITY cannot
Steps in Developing a Collection Plan be judged Y/Z- Documentary
a. List the requirements in the order of priority 4. Interpretation – it is establishing the meaning and
b. Break the requirements into indication – any significance of the information. It involves the
evidence of actual or potential enemy activity or following activities:
characteristic of an area of operation enemy activity  Analysis – shifting and isolating those elements
or characteristic of an area of operation, habitual that have significance in light of the mission or
activities – need experience. national objective.
c. Fit those indications into existing situations –  Integration – combining the elements isolated in
critical clues, security measures, attack, defense, etc. analysis and known information to form a logical
d. Basis for development for specific collection picture or theory.
directive - designed to exploit to the fullest the  Deduction – the formulation of conclusions from
collection directive; guide doesn’t limit. the theory developed, tested and considered valid –
e. Selection of Collecting Agencies – criteria for determination of effort and meaning of the
selection – suitability, capability, confirmation, information.
timeliness and balance. Designation of particular time PHASE 4 - Dissemination and Use of Information
and place that the required information is to be This phase of the cycle refers to the activities of
reported. transferring the processed information to the proper
Factors in choosing Collection Agent users, most particularly the authority that requires
In choosing collection agents, they must be selected the activity. Processed information can be
according to their capability – agents placements or disseminated through annexes, estimates, briefing,
access to the target; multiplicity – more agents; and message, reports, overlays, and or summaries.
balance ¬– the number of agents needed per The criteria that must be observed in dissemination
operation. are:
a. Methods of Collection – collection of information 1. Timeless – must reach the users on time to be of
can be done through overt method (open system) or value. It must be disseminated in accordance with
covert method (secret/clandestine). the urgency and must reach the user in sufficient
b. Collecting Agencies – depending on the type of time to be use.
operation, the collecting agency could be Government 2. Propriety – the message must be clear, concise
Agencies, Intelligence units, or Organizations and complete, as well as in the proper form for the
c. Trade Crafts – includes the use of photography, receiver to readily understand its contents. It must
investigations / elicitation / interrogation, be disseminated to the correct user, presented in a
surveillance, sound equipment, surreptitious entry – form that lends itself to immediate use and
keys and locks, use of an artist, communication distributed by the most effective means appropriate
PHASE 3 - Processing the Collected Information to both time and security requirements.
This phase of the cycle is concerned with the Methods of Dissemination
examination and collation of all collected information. 1. Fragmentary orders from top to bottom of the
Steps in Processing Raw Information command
1. Collection – organization of raw data and 2. Memorandum, circulars, special orders
information into usable form; grouping similar items 3. Operations order, oral or written
of information so that they will be readily accessible. 4. Conference – staff members
2. Recording – is the reduction of info into writing or 5. Other report and intelligence documents
some other form of graphical representation and the 6. Personal Contact
arranging or this info into writing or some form of Who are the users of intelligence?
graphical representation and the arranging of this 1. National leaders and military commanders –
into groups of related items. formulation of national policies.
 Police log book and Journal 2. Advisors and Staff – preparations of plans and
 Intel-work Sheet - Intel Files estimates
 Situation Maps - Rouges Gallery
3. Friendly nations or other branches of the armed 2. Recruited Informant – A person who is selected
forces. cultivated and developed into a continuous source of
4. Processor – basis for evaluation and interpretation. info
5. Head / chairman of an organization Categories of Recruited Informants:
6. Any person with authority for purposes of 1. Spontaneous or Automatic Informant – Informants
planning. who by the nature of their work or position in society
INFORMATION AND ITS SOURCES have a certain legal, moral or ethical responsibilities
Information to report info to the police
Information refers to all evaluated materials of every 2. Ordinary (out-of-their-will) Informants –
description including those derived from observation, Informants that are under the compulsion to report
reports, rumors, imagery, and other sources from info to the police
which intelligence in produced. Information is a 3. Special Employee – informants who are of a
communicated knowledge by others obtaining by specific operational nature
personal study, investigation, research, analysis, Other Classification of Informant
observation. Other terms related to people who gives information
Two General classifications of sources of information: are Automatic Informant, Penetrating Agent ,
1. Open Sources – 99% of the information collected Infiltrating Agent , Full time Informant , Rival –
are coming from open sources. Elimination Informant, False Informant, Frightened
2. Close Sources – 1% of information are collected Informant, Self- aggrandizing Informant, Mercenary
from close sources. Informant , Double Crosser Informant , Woman
Overt Intelligence – is the gathering of information or Informant , Legitimate Informant.
documents procured openly without regard as to Common Motives of Informants
whether the subject or target become knowledgeable People give information to the police due to various
of the purpose reasons. Their motives include reward, revenge, fear
Open Sources: Includes information taken from and avoidance of punishment, friendship, patriotism,
 Enemy activity vanity, civic-mindedness, repentance, competition,
 POW and Civilians and other motives.
 Captured documents INFROMANT RECRUITMENT
 Map - Weather, forecast, studies, report - Agencies Phases
Covert Intelligence – is the secret procurement of 1. Selection – it is particularly desirable to be able to
information, which is obtained without the knowledge identity and recruit an informant who has access to
of the person or persons safeguarding vital many criminal in-group or subversive organization.
intelligence interest. Wide access is probably the single most important
Close Sources: Include information which maybe feature in the consideration of recruiting the potential
taken through: informant
 Surveillance 2. Investigation – the investigation of the potential
 Casing and informants that has tentatively identified as a
 Elicitation “probable” must be as thorough as possible. It must
 Surreptitious entry establish possible existing motives as to this person
 Employment of technical means (Bugging and might assist the police Intel community. Failure to do
Tapping device) so will deny this office who must perform the
 Tactical Interrogation - Observation and approach and persuasion phase with little more that a
Description (ODEX) guess. If necessary, conduct complete background
PERSONS AS SOURCES OF INFORMATION investigation (CBI)
Informant Net – It is a controlled group of people 3. Approach – approach must be done in a setting
who worked through the direction of the agent from which might include pleasant surroundings,
handler. The informants, principal or cutouts supply perhaps a confidential apartment, completely free
the agent handler directly or indirectly with Intel form any probability of compromise, preferably in an
information adjacent city or a remote area foreign to the
Informants (Asset) – people selected as sources of informants living pattern.
information, which could be voluntary, or in 4. Testing – the testing program should begin, of
consideration of a price. course, with the limited assignment, with a gradual
 Informant – refers to a person who gives integration into the more important areas. The
information to the police voluntarily or involuntarily occasional testing of an informant should continue
with out any consideration through the entire affiliation
 Informer – those who give information to the INTELLIGENCE OPERATIONS
police for price or reward Intelligence Operations is the result of intelligence
Types of Informants planning, planning is always ahead of operation
1. Criminal Informant – an informant who give although an operation can be made without a plan, it
information to the police pertaining to the underworld is usually due to sudden and inevitable situations but
about organized criminals with the understanding definitely this is poor intelligence management.
that his identity will be protected The 14Operational Cycles
2. Confidential Informant – is similar to the former 1. Mission and Target –
but he gives information violate of the law to includes a. Infiltration – the insertion of action agent inside
crimes and criminals the target organization
3. Voluntary Informant – a type of informant who b. Penetration – recruitment of action agent inside
give information freely and willfully as a witness to a the target organization
certain act 2. Planning
4. Special Informant – those who gives information 3. Spotting
concerning specialized cases only and it is regarded a 4. Partial Background Investigation (PBI) or Complete
special treatment by the operatives (ex. teachers, Background Investigation
businessmen) 5. Recruitment - the only qualification of an agent is
5. Anonymous Informant – those who gives to have an access to the target
information through telephone with the hope that the 6. Training
informant can not be identified 7. Briefing
Sub-type of Informant 8. Dispatch
1. Incidental Informant – a person who casually 9. Communication - technical method like
imparts information to an officer with no intention of telephone/radio, non-technical method like personal
providing subsequent information meeting, live drop or dead drop
10. Debriefing
11. Payments – depends upon the motivation of Surveillance is a form of clandestine investigation
informant which consists of keeping persons, place or other
a. Regulatory - pay no bonuses targets under physical observation in order to obtain
b. Supplemental - income that is enough to ease his evidence or information pertinent to an investigation.
financial worries Surveillance of persons is called Tailing or
12. Disposition – involve activity on rerouting, Shadowing, Surveillance of place is called Casing or
retraining, retesting, termination Reconnaissance, and Surveillance of other things,
13. Reporting events, and activities is called Roping.
14. Operational Testing Considerations in Surveillance Planning
COVER AND UNDERCOVER ACTIVITIES  Pre-Surveillance Conference – a conference held
1. Cover - the means by which an individual group of among the team members, the police intelligence unit
organization conceals the true nature of its acts and before surveillance is conducted.
or existence from the observer.  Surveillance Plan – a plan established the as
2. Cover story – a biographical data through fictional required according to type of personnel, and the
that will portray the personality of the agent he general and specific instructions for surveillance.
assumed, a scenario to cover up the operation  Area Target Study – refers to the area of operation
3. Cover Support – an agent assigned in target areas of surveillance activities.
with the primary mission of supporting the cover  Surveillant – a person who conducts surveillance
story. with includes only observations.
Types of Cover  Stakeout or Plant – is the observation of places or
1. Natural Cover – using actual or true background areas from a fixed point.
2. Artificial – using biographical data adopted for the  Tailing or Shadowing – it is the observation of a
purpose person’s movement.
3. Cover with in a Cover – justification of existence  Undercover Man – it refers to a person trained to
4. Multiple Cover – any cover you wish. observe and penetrate certain organization suspected
Organizational Cover – is an account consisting of of illegal activities and later reports the observation
biographical which when adopted by an individual will and information’s that proper operational action can
assume the personality he wants to adopt be made
Undercover Assignment – is an investigative  Liason Program – the assignment of trained
technique in which agent conceal his official identity intelligence personnel to other agencies in order to
an obtain information from that organization obtain information of police intelligence value.
THE UNDECOVER AGENT (Agencies like the press, credit agencies, labor
Special qualifications include knowledge of the unions, telephone companies)
language, area background regarding events,  Safehouse – is a place, building, enclosed mobile,
knowledge about the custom and habits, physical or an apartment, where police undercover men meet
appearance, and must be an artist. for debriefing or reporting purposes.
Factors considered in Selecting Cover Story  Drop – any person is a convenient, secure and
1. Mutual Point of Interest unsuspecting place where police undercover men
2. Justification of presents meet his action agent for debriefing or reporting
3. Previous and permanent address purposes.
4. Efficiency of role and freedom from the movement  Convoy – an accomplice or associate of the subject
5. Means of communication used to avoid or elude surveillant.
6. Social and financial status  Decoy – a cover supporting the surveillant who can
7. Optional alternate plan become a convoy whenever surveillant is burned.
8. Safe departure  Contact – any persons whom the subject picks or
Selecting Action Agents deals with while he is under observation and
1. Placement – location of prospective agent with identifies the observer.
respect to the target  Made – when subject under surveillance becomes
2. Access – it is the capability of a prospective agent aware that he is under observation and identifies the
to obtain the desired info for the Intel organization or observer.
to perform to Intel collection mission in the area.  Lost – when the surveillant does not know the
 Primary Access – it is the access to the desired info whereabouts of his subject or the subject had eluded
 Secondary Access – it is the access to the desired the surveillance.
info through a principal source where the latter has TYPES OF SURVEILLANCE
the direct access According to Intensity and Sensitivity
 Outside Access – the agent is employed outside 1. Discreet –subject person to be watch is unaware
the target and merely monitor info from a third that he is under observation
person who is monitoring info n the area 2. Close – subject is aware that he is under
AGENT CONTROL observation varied on each occasions
CONTROL – authority to direct the agent to carryout 3. Loose – applied frequently or infrequently, period
task or requirement on behalf of the clandestine of observation varied on each occasion
organization in an acceptable manner and security According to Methods
Two Categories of Control 1. Stationary – this is observation of place usually a
1. Positive Control – is characterized by bookie stall, a gambling, joint, a residence where
professionalism and rapport like: illegal activities are going on (fixed position)
a. Agent motivation 2. Moving – surveillance follow the subject from the
b. Psychological control place to place to maintain continuous watch of his
2. Negative Control – characterized by threat and it activities
include the following: 3. Technical – this is a surveillance by the use of
a. Disciplinary Action – includes verbal reprimand for communications and electronic hardware’s, gadgets,
poor performance or insecure actions withholding system and equipment
certain material rewards, reduction of agents salary Special Equipment (Technical Supports)
or in extreme situation the threat of terminating 1. Camera with telephoto lens
professional relationship 2. Moving Picture camera
b. Escrow Account – control of an agent by putting hi 3. Binoculars
salary in a bank to be withdrawn only after a 4. Tape recording apparatus
fulfillment of a condition 5. Wire taping device
c. Blackmail 6. Other instrument – miniaturized one-way radio
METHODS OF COVERT INTELLIGENCE Methods available to employ in Surveillance
SURVEILLANCE Ordinarily, the methods are surveillance of place,
tailing or shadowing (1-2-3 man shadow), undercover
investigation, special methods includes: wire tapping It is a system or plan whereby information of
- concealed microphones - tape recorder -television - intelligence value is obtained through the process
electric gadgets direct intercommunication in which one or more of he
Essential Requirements and Appearance in parties to the common is unaware of the specific
Surveillance purpose of the conservation. The three phases are
In the actual process of operation, the agent is determination of the mission, selection of the subject,
advised to be of general appearance, has no and accomplishment of the mission.
noticeable peculiarities in appearance. Agent should Two Devices in the conduct of Elicitation
not wear inconspicuous jewelry or clothing, nothing  Approach – process of setting people to start
about him to attract attention. He must have talking
perseverance and able to wait for hours. Alertness,  Probe – to keep the people taking incessantly
resourcefulness, and being versatile and quick-witted Types of Approach
are his weapons. 1. Flattery – people are susceptible to praise so use
Basic Preparations in Surveillance this weakness as a way of approaching the subject
1. Study the Subject – name, address, description, for elicitation.
family and relatives, associates, character and a. Teacher – Pupil Approach – the subject is treated
temperament, vice, hobbies, education, others as an authority then solicit his view point and opinion
2. Knowledge of the area and terrain – maps, on a subject matter.
national and religious backgrounds, transportation, b. Kindred Soul Approach – the subject is placed in a
public utilities pedestal having some specialized quality then flatter
3. Subversive Organization - history and background, him/her by showing enough concern for his/her
biography of the official, identity and background of welfare to pay special attention to his enjoyment
members and former members, method of c. Good Samaritan Approach – is the sincere and
identification employed by the members, files and valid offers of help and assistance are made to the
records, nature, location and accessibility, meeting subject
4. Cover Story – the scenario must be appropriate to d. Partial – disagreement Approach – seek to produce
cover up operation and avoidance of identification of talking by the word “I’m sure if I fully agree”.
mission. 2. Provocative Approach – discover a wide range of
Counter Surveillance – the conduct of operation is conventional gambits
coupled with counter intelligence measures such as a. Teaser Bait Approach – the elicitor accumulates
window shopping, use of convoys and decoys, the sources of knowledge about a particular subject
stopping immediately on blind corners, getting out to tempt the subject to give his/her views.
immediately on public conveyances, retracing, b. Manhattan from Missouri Approach – the elicitor
entering mobile housing adopts an unbelievable attitude above anything. He
CASING OR RECONNAISSANCE questions all statements and oppositions.
Casing is the term use in the police organization while c. Joe Blow Approach – is “I” know the answer to
reconnaissance is used in military terms. Casing or everything” approach. The elicitor adopts the attitude
reconnaissance is the surveillance of a building place of being approachable of any field.
or area to determine its suitability for Intel use or its d. National Pride Approach – nature propensity of al
vulnerability in operations. It aids in the planning of persons to defend their country and its policies.
an operation by providing needed information. It Types to Probe
assists the agent handler to install confidence in his 1. Competition Probe – this is effective when used in
agent during briefing phase by being able to speak connection with the teacher pupil approach
knowingly about the area of operation. Casing is also 2. Clarity Probe – used to elicit additional information
considered a security measure because it offers some in an area which the response is clear
degree of protection for those operating in an area 3. High Pressure Probe – it serves to point out
unfamiliar to them. contradictions in what the subject has said
Method of Casing 4. Hypothetical Probe – presents a hypothetical
1. Personal Reconnaissance – the most effective situation and to get he subject to react to the
method and will produced the most info since you hypothetical situations
know just what you’re looking for. Purposes of Elicitation
2. Map Reconnaissance – it may not sufficient but it 1. To acquire info which is unbelievable through other
can produce a certain amount of usable information channel
3. Research - much info can be acquired through 2. To obtain info which although unclassified in not
research publicity known
4. Prior Information – your unit and of the unit will 3. To provide source of info
have file report that they may provide you with info 4. To assist various individuals
5. Hearsay –info usually gain by the person operating PORTRAIT PARLE (P/P)
in the area and performing casing job It is a means of using descriptive terms in relation to
OBSERVATION AND DECRIPTION, A.K.A (ODEX) the personal features of an individual and it can be
Observation – a complete and accurate observation briefly described as a world description or a spoken
by an individual of his surroundings an encompasses picture. (Anthropometry - no two human beings has
the use of all the major sense to register and the same body measurement)
recognized its operational or Intel significance Identification Methods
Description – the actual and factual reporting of one’s 1. Branding and mutilation
observation of he reported sensory experience 2. Parade system with portrait parle
recounted by another 3. Fingerprint method
Psychologist estimate that approximately 85% of our Several method of acquiring descriptive ability
knowledge is gathered through sight, 13% from 1. Learns the meaning of the numerous words used
sense of hearing and only 2% through the three in describing the various features of the persons.
other senses 2. Study and practice the description of the features,
Psychological Processes for accurate observation such as the eyes, hair or the nose as hey appear on
 Attention – consist of he psychological process several different persons.
involve in becoming aware of an existence of fact 3. Learning a definite order of proceeding from one
 Perception – involved in the understanding this picture to another
fact of awareness Methods of obtaining descriptive information
 Report – involved in identifying the name in one 1. Close observation of the person and accurate
own mind and some fact which has been perceive, recording of the terms describing the features
narrated and identified 2. Information describing through interviews of
ELICITATION witnesses
3. Examination of observation of photographs and questioning (this is done repeatedly). After many
sketches repetitions, the interrogee will be exasperated and
4. Examination of records will finally cooperate hoping that he can be allowed to
BACKGROUND CHECKS AND INVESTIGATION rest or sleep. Ask a question, listen to a reply and
Information needed: Domestic Background, Personal then ask the same question repeatedly (use a tape
Habit, Business History, Social or Business recorder if possible). The purpose is to bore the
Associates, Medical History, Educational Background, interrogee thoroughly until he begins to answer
Family History questions freely to end the harassment.
TACTICAL INTERROGATION 5. Opposite Personality Technique – also known as
The need for obtaining information of the highest “Mutt and Jeff”, “Threat and Rescue”, “Bud Guy –
degree of credibility taken on the minimum of time God Guy’, “Sweet and Sour”, “Sugar and Vinegar”,
can be through interrogation which varies and “Devil and Angel”. Use of two (2) interrogators
dependent entirely on the situation. In tactical playing opposite roles.
interrogation, familiarization of the following is 6. Egotist Techniques (Pride and Ego) – usually
necessary: successful when employed against an interrogee who
 Interrogation – the systematic asking of questions has displayed a weakness or a feeling of insecurity.
to elicit information in the minimum of time. You may reverse the technique by complimenting the
 Interrogator - person who does the questioning. interrogee in hopes of getting him to admit certain
 Interrogee – any person who is subjected to the information to gain credit. Described him as the best
interrogation process in any of its forms and phases. person, superior or comrade.
 Suspect – any person believed to be associated 7. “Silent” Technique – employed against nervous or
with prohibited activity the confident type of interrogee. Look out the
 Source – a person who for any reason submits interrogee squarely in the eye with sarcastic smile
information of intelligence interest usually on a (force him to break eye contact first). He may ask
voluntary basis questions but the interrogator must not answer.
 Provocateur – an individual from enemy forces Patience is needed until the interrogator is ready to
who is deliberately introduce in our custody with a break silence.
specific mission of causing some unfavorable action 8. “Question Barrage” Technique (Rapid Fire
or reaction on our part. Questioning) – intended to confuse the interrogee
 Screening – initial examination of an interrogee to and put him into a defensive position. The interrogee
determine the extent of his knowledge of persons, become frustrated and confused, he will likely reveal
places, things or events in which we are interested. more than he intended, thus creating opening for
 Formal Interrogation - the systematic attempt to further questioning.
exploit to an appropriate depth those are of he INTELLIGENCE IN NATIONAL SECURITY
interrogee’s knowledge which have been identified in Understanding National Security
the screening process National Interest - Each nation, regardless of creed or
 Debriefing – the interrogation of a friendly form, has their national interest to protect and to
interrogee who has information at the direction of or advance. For national interests, people would willingly
under the control of the friendly intelligence service. go to war to succeed of perish. What then is national
 Interview – Similar to a debriefing although it is interest? National interest has been defined in many
less formal and the interrogee is not necessarily ways. But for our purposes, we take the context of
under the control or employment of he respective national interest to mean the general and continuing
intelligence service end for which a nation acts. The term “national
 Interrogation Report – an oral or written statement interest” is used to refer to the general concept of
of information by the questioning f an interrogee national security and well-being. National are what
INTERROGATION TECHNIQUES: the decision-making body in government determines
Techniques of Approach – the purpose is to gain the which beliefs, matters or dictates of conscience are
cooperation of the source and induce him to answer important to the maintenance of the nation. To
questions which will follows. secure or support national interest, certain objectives
1. The “Open Techniques” – the interrogator is open may be set by a nation.
and direct in his approach and makes no attempts to And what are the Philippines national interests?
conceal the purpose of the interrogator. It is best Invariably, our national interest includes self-
employed when the interrogee is cooperative. It is preservation, freedom and independence, territorial
frequently used at the tactical level where time is a integrity, political stability, and socio-economic
major interrogator. welfare. National Principles and Polices - From our
2. The “Common Interest” Technique – the national interests, national principles and polices are
interrogator must exert effort to impress the derived. These are:
interrogee of their common interest. The interrogator a. That our country shall be a Republican State
must look for he point out the real advantages the b. That the defense of the state shall be the concern
interrogee will receive if he cooperates of all citizens.
3. Record File (we know all technique) – the c. That we, as a people, renounce war to further our
interrogator prepare a file on the source listing all national interests.
known information (record should be padded to make d. That our government shall promote social justice.
it appear to be very extensive). The information must e. That as a matter of concept, civilian authority is
contain the life history of he interrogee to include his supreme at all times over the military. This concept is
activities and known associates (Party- bio-data of actualized when the President assumes at the same
the interrogee is important). The “we know all” s time the position of the Commander-in-Chief of the
used in conjunction with the record file. During the AFP.
approach, the interrogator may ask the interrogee National Strategy - In furtherance of our national
about a subject, if he refuses to cooperate, the principles and polices, the leaders of our nation are
interrogator may provide the answer in order to then able to formulate our strategy.
impress him that the interrogator knows him very National Power - How may a nation measures ones
well (all is known). power? The elements of national power are numerical
4. Exasperation – Techniques (Harassment) – strengths and character of population, cultural
effectively employed against hostile type interrogee. development and character of government,
The interrogator must be alert because the interrogee geographical location, resources, economic
may fabricate information to gain relief from irritation development and military potential. The degree to
(monotype). Subject Interrogee is placed in a longer which a nation is strong or deficient in these
period of interrogation without rest or sleep. The elements is normally a measure of its national power.
interrogator permits the source to go to sleep and The components of National Power are: Political
subsequently awaken for another series of Strength, Economic Strength, Cultural Strength, and
Military Strength. Political strength stems from the
character of the people and from the type and
stability of the government and the soundness of its
foreign policy. Economic strength stems from a
combination of factor such as geographic location,
climatic conditions, supply of natural resources,
industrial capacity, internal and external
communication systems, international trade, and the
size, health and technical competence of the
population. Cultural strength stems from the national
unity, the social and moral fiber of the people and the
things they believe in, and from the nature and vigor
of national institutions-political, social, religious,
educational, scientific and cultural. Military strength is
the ability of a nation to exert pressure by armed
force in furtherance of national policy. It consists of
the strength of all the armed forces in combination
with other elements of national power, depending
heavily on natural resources, economic strength, a
broad base of war industries and a vigorous
population, military strength is influenced by the
number and quality of the nation’s military,
economic, and political alliances.

You might also like