Professional Documents
Culture Documents
Lesson 1 Lesson Proper: Introduction To Police Intelligence and Secret Service
Lesson 1 Lesson Proper: Introduction To Police Intelligence and Secret Service
LESSON PROPER
INTRODUCTION TO POLICE INTELLIGENCE
AND SECRET SERVICE
“if you know your enemy and you know yourself, you
need not fear the results of hundreds of battles. If you
know yourself but not the enemy, for every victory you
will suffer defeat. If you know neither yourself nor the
enemy, you are fool who will suffer defeat in every
battle”.
“What is called for knowledge cannot be elicited from spirits, or from gods, or from
analogy to the past events nor from calculations. He wrote “it must be obtained from
men who know the enemy situation.”
Moses sent the 12 agents and said unto them, get you
u this way southward, and go up into the mountain; and see the land, what it
is; and the people the dwelt therein, whenever they be strong or weak, few or
many, and; what the land dwell in, whether in tenths or strongholds; and what
the lands is whether it be fat or lean, whether there be wood therein, or not.
And be ye good courage and bring the fruit of the land.”
|
RAHAB
The harlot of Jericho (Joshua 2:1-21) which sheltered and
concealed the agents and duped their pursuers. She was
not only impromptu confederate of immense value for the
Jewish leader of that jar distant day, but also established a
plot-pattern which is still of periodic relief to motion picture
producers.
DELILAH
She was an impromptu intelligence agent of the
Philistines. She allowed philistine spies to hide in her house
(judges 16:9) apart from her tonsorial specialty, she
seduced Samson of Israel to reveal the secret of his
strength and used herself to gain intelligence from
powerful enemy. She achieved t he largest effective force
of her employer’s adversaries and contriving the stroke
which put that force out of action.
2. Akbar
The “great mogul and sagacious master” of Hindustan who
employed more than four thousand agents for the sole
purpose of bringing him the truth that his throne might rest
upon him.
|
3. GENGHIS KHAN
He used intelligence to conquer china invade Cathay. He
instructed his generals to send spies and used prisoners as
sources of information. Genghis was regarded as leader of
the so called “Mongol conque rors” and used effective
propaganda by spreading rumors of Mongol terror. They
collected information on weaknesses and rivalries of
Europe and usually disguised as merchants.
4. HANNNIBAL
The Carthaginia general considered as one of the brilliant
military strategist. He developed an effective intelligence
system for 15 years in Rome. He roamed around the city
often disguising as a beggar to gather fist hand
information. Hannibal’s invasion of Italy, his brilliant and
victorious raid in history, gained him many success and
nearly bled Rome to death.
6. SERTORIUS, QUINTOS
He was a Roman General and possessor of white fawn that
tried to follow Polyneus everywhere. The fawn was used as
intelligence agent. His intelligence agent, his intelligence
personnel to appear definitely in military organization.
|
7. GAIUS JULIUS CAESAR
During his time, his staff legion includes ten “speculators” who
served as information-collecting agency. Speculators were the
first intelligenc e personnel to appear definitely in military
organization.
8. NAPOLEON BONAPARTE
He was great leader who believes in the principles that “One
spy in the right place is worth 20,000 men in field.” He also
organized two bureaus of interest:
a. Bureau of Intelligence
Consolidated all incoming information regarding the
enemy for presentation to the emperor and to obtain
information as desired.
b. Topographic Bureau
Maintained a large map which covers the latest information regarding both
enemy and friendly forces.
9. KARL SCHULMEISTER
He was Napoleon’s military secret service and Napoleon’s eyes.
He began his career in offensive espionage. Under a cover role,
he was able to infiltrate the Austrian General Staff and studied
the characters of the Generals. His Royal foes selected to defeat
him.
|
11. FRANCIS WASHINGHAM
Under Queen Elizabeth, he organized the first National I
ntelligence Service. He employed spies on the staff of the Admiral
in Command of the Spanish Army and able to obtain information
regarding Spanish Army as to their ships, equipment, forces and
stores. He protected Queen Elizabeth I from countless assassins.
12. RICHELIEU
He introduced the “network of covert collectors” who transmitted
prompt and accurate information to Paris regarding the activities of
the rebels and dissidents of the kingdom.
|
He was known as the Father of Military Espionage in France. He
was born on May 21, 1759, near Nantes. Trained for priesthood but
Never took orders, instead he becomes a teacher. He rose to
become the most feared and respected intelligence director in
French history, created a network of agents with his assistance and
founded the modern system of spying on spies, which was later
known as counter espionage.
19. EDWARD I
In 1725, he organized a systematic police system known as “watch
and ward” and royal proclamation; the profession “state informer”
was created in 1734 enjoining all informers to exposed criminal
activities and compensated.
|
7. BRITISH INTELLIGENCE- succeeded greatly by means of censorship and its code
room combined with skillful use of covert agents.
8. UNITED STATES- expanded their naval intelligence wherein domestic counter
intelligence became a principal activity.
|
AMTORG was organized for the purpose of purchasing all kinds of materials for
soviet union. SMERSH OR “ DEATH TO SPIES” Smersh was organized during the was
counterintelligence concerned with diaffection among soiet troops and anti-
communism in any form. There were five divisions: administration, operation,
investigation, prosecution and personnel.
6. AMPHIBIOUS WARFARE
U.S. -greatest contribution was its development where coordination of many types of
intelligence activities was required to provide adequate knowledge upin which is the
basis of the successful opiration of a complex military transported over water with the
objective of establishing itself on an enemy-held shore agianst opposition.
7. U.S.SUCCESS in WWII was that their personnel were drawn from the civilian populace,
businesss and professional men and woman.
|
b. SOVIET COUNTERINTELLIGENCE – described as the “ iron curtain”- because no one
can cross in the borders of USSR without being detected-all communications are rigidly
controlled. Its contribution to the modern intelligence was the dissemination of false information
designed to mislead and confuse opponents and prospective victims.
4. FRENCH INTELLIGENCE
a. SDECE DE DOCUMENTATION EXTERIEUREET DER CONTRE ESPIONAGE – foreign
intelligence and counterintelligence service. This is under the prime minister.
|
d. SURETE NATIONALE – part French intelligence service.
5. GERMAN INTELLIGENCE
RED GESTAPO- the security service organized by the East Germany to combat the covert
activities of the west Germany group when it was still divided by berlin walls.
E. GREAT BETRAYALS
1. JUDITH COPLON- she was a political analyst of the department of
justice who was accused of taking unlawful possession of
government documents and spying for a foreign power. She was a
well-known communist activist.
|
LESSON 2
lesson
proper
It is the capacity for understanding and for other forms of adaptive intellect of behavior,
the mind in operation.
It is the power of meeting any situation, especially a novel situation, successfully by proper
behavior adjustments; the ability to apprehend the interrelationships of presented facts in
such a way as to guide actions towards goal.
It refers to knowledge of an event, circumstances, etc., received or imparted; the gathering
or distribution of information; or the staff of persons engaged in obtaining such
information.
Counter intelligence
It is an activity aimed at protecting an agency's intelligence program against an
opposition's intelligence service. It likewise refers to information gathered and activities
conducted to counter espionage, sabotage, assassinations or other intelligence activities
conducted for or on behalf of foreign powers, organizations or persons,
international terrorist activities, sometimes including personnel, physical, document, or
communications security programs.
Covers the activity devoted in destroying the effectiveness of hostile foreign activities to the
protection of information against espionage, and sabotage.
|
It is also known as negative intelligence because it is an activity dedicated to the
concealment and protection of one’s own information from adversaries’ intelligence
operation.
Negative Intelligence is a generic term which incorporates three different things. These
are as follows.
Security Intelligence
Means that the total sum of efforts to counsel the national policies, diplomatic
decisions, military data, and any other information od secret nature affecting the
security of the nation from unauthorized persons. Its effort is to deny information
to unauthorized persons by restricting to those who are explicitly authorized to
possess it.
Counter Intelligence
Is the organized effort to protect specific data that might be of value to the
opponents own intelligence organization.
Counter – Espionage
In counter-espionage, negative intelligence becomes a dynamic and active effort.
Its purpose is to investigate actual or theoretical violation of espionage laws, to
enforce those laws and to apprehend any violators. It is a job to catch spies. It is
basically a police function.
According to Sir Bassil Thomson – former chief of Scotland Yard Criminal
Investigation Division:
“A Basic requirement of the secret agent is to disguise himself and his
mission. Much of his training and basic skill is dedicated to
concealment. He is supposed to supply with a fool proof cover story
and good documents. He must be a man of exception ability or else
he would not be chosen for this intricate job. The trapping of the dark
intruder is a formidable talk.”
The aim of Counter-Espionage is to locate the enemy, to identify the
enemy and to neutralize the enemy.
Categories of Counterintelligence
Collective counterintelligence is gaining information about an opponent's intelligence
collection capabilities whose aim is at an entity.
Defensive counterintelligence is thwarting efforts by hostile intelligence services to
penetrate the service.
Offensive counterintelligence is having identified an opponent's efforts against the
system, trying to manipulate these attacks by either "turning" the opponent's agents into
double agents or feeding them false information to report.
Five Importance of Effective Counterintelligence (CI)
Denies information to the enemy.
Reduces the risk of command.
Aids in achieving surprises.
Increases the security of the command.
Decreases the enemy ability to create information about our forces.
|
What is CI Operation?
CI Operation is also called CI Investigation. It is an activity that constitutes the value of the
CI work load, worldwide and includes specific investigation of individual and incidence
which for the most part are conducted in an overt but discreet manner.
Counter-intelligence Investigation
It is an activity which constitutes the value of work load and includes specific investigation
of individual and incidence which for the most part are conducted in an overt and but
discrete manner.
Police Intelligence
It is defined as the end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the activities of
criminal and other law violators for the purpose of affecting their arrest, obtaining
evidence, and forestalling their plans to commit crime.
Intelligence as herein referred to means Police Intelligence as distinguished from Military
Intelligence. The deviation is more on the approach rather than principle. The
fundamental intelligence cycle is still the same, be that used in Police or Military
Intelligence.
Functional Classifications
Criminal Intelligence (CRIMINT)
It refers to the production of intelligence essential prevention of crimes, investigation,
arrest and prosecution criminal offenders.
Internal Security Intelligence (INSINT)
It refers to the knowledge essential to the maintenance of peace and order.
Public Safety Intelligence (PUSINT)
It refers to the knowledge essential to ensure the protection of lives and properties.
|
The cardinal Principle in Police Intelligence at all levels the proper, economical and most
productive use of personnel and equipment employed and/or utilized in planning the collection
of information and dissemination of intelligence.
Information
Generally, information are raw data or unevaluated material of every description
derived from observation, communication, reports, rumors, imagination, and
other sources from which intelligence is produced; Any knowledge, data news,
opinions, or the like transmitted from a person to the another; and/or any
communicated knowledge by personal study, investigation, research, analysis
and observation.
Intelligence Information
It refers to any information gathered or received which is of intelligence interest.
|
Sources
It refers to where/whom/which the information was obtained. This can be from: an
informant; a syndicate; an intelligence broker; double agent; and/or another police
agency that has the needed information on file.
Intelligence Cycle
It is the continuous process which ultimately coordinates and integrates all efforts of the
collecting agencies or units. The intelligence cycle is the process through which
intelligence is obtained, produced, and made available to users.
DIRECTING
DISSEMINATION COLLECTING
MISSION
& USE
PROCESSING
Mission – is the focal point of the intelligence operation; a particular task given to a person
or group to carry out; or one which should be accomplished.
|
In this phase, the Intel Staff Officer or Unit commander determines the required or
important information relevant to mission. Then these requirements will be distributed to the
different collection agencies by direction or by request.
|
Any person, unit or activity that collects and/or processed information by
research, surveillance, or the exploitation of the source of information.
3. Collecting Agencies:
a. Government agencies/offices – variety of information
b. Intelligence units or Intelligence agencies
c. Organizations
5. Methods of Collection
a. Overt – open
b. Covert – secret
|
f. Personnel Security Investigation
g. Sound Equipment – tapping and bugging
h. Use of an artist
i. Surreptitious entry
j. Communication
7. Collecting Planning
Collection planning refers to the continuous process which ultimately
coordinates and integrates the efforts of all collecting Agencies/Units.
1. Recording –is the reduction of information into writing or some other form of
graphical representation and the arranging of this information into groups of
related items.
2. Evaluation – is the determination of the pertinence of the to the operation reliability
source or of the agency the accuracy of the information; or examination of raw
information to determine intelligence value.
|
criteria include knowledge, training, experience and past
performance of troop units or the collector of information.
c. Accuracy (truth of information)
Accuracy refers to the probable truth of the information.
Judgement of accuracy is based on the answers of the following
questions;
Is it possible for the reported fact or event to have taken place?
Is the report is consistent within itself?
Is the report confirmed or corroborated by information from
different sources or agencies?
Does the report agree or disagree in any way with other
available information?
Does the report agree with information from other sources, or
agencies and which on is more likely to be true?
EVALUATION GUIDE
3. Interpretation
Interpretation is the process of establishing the meaning and significance
of information. It involves the following:
|
b. Integration – is the combination of the elements started in the assessment with
other known information or intelligence to form a logical feature or hypothesis
of enemy activities or the information of the operational area and characteristics
of the omission of the command.
c. Deduction – refers to formulation of conclusions from the theory developed,
tested and considered valid; determination of effort and meaning of the
information.
Dissemination is through:
Methods of dissemination:
1. Fragmentary orders from top to bottom of the command;
2. Memorandum, circulars, special orders etc;
3. Operations order, oral or written;
4. Conference – staff members;
5. Other report and intelligence documents;
6. Personal contact – It can be done by the use of telephone, personal visits, and debriefings;
7. Messages – This can be made by use of radio, utilization of messengers or couriers, or by
rapid means of signal communication.
Criteria of Dissemination:
1.Timeliness
Timeliness states that the information must be disseminated on time.
|
2.Propriety
The message must be clear, concise and complete, as well as in the proper form for
the receiver to readily understand its contents. It must be disseminated to the correct
user, presented in a form that leads itself to immediate use and distributed by the most
effective means appropriate to both time and security requirements.
Users of Intelligence:
1.National leaders and military commanders
Formulation and implementation of national policies.
2.Advisors and staff
Preparations of plans and estimates.
3.Friendly nations and other branches of armed forces.
4.Processor
Basis for evaluation and interpretation
|
LESSON 3
LESSON
PROPER
Surveillance
Defined as the discreet observation of persons, places and vehicles for the purpose of
obtaining information concerning the identities or activities of criminals. A surveillant is
the person who conducts the surveillance or performs the observations while a subject
is the person, place or vehicle being observed by the surveillant.
The term shadowing or tailing refers to the act of the surveillant of following his/her
subject to detect criminal activities, to establish the association of subject, to find a wanted
person and many other purposes. Roping is a kind of undercover work wherein surveillant
assumes different roles and identity in order to obtain information.
Purpose of Surveillance
1.To get information on criminal activities as bases for future raid.
2.To discover the identities of persons frequenting the place.
3.To prevent the commission of crime.
4.To establish legal grounds for the application of a search warrant.
5.To arrest the criminal in flagrante delicto or caught in the act.
|
Example: In case the subject will use the telephone booth, the shadower must feign a
call at the available booth.
2.Two-Man Shadow
This is easier for the surveillants to fully cover the subjects. The method allows the
exchange of the positions of the shadowers in order to avoid discovery. One shadower
will follow behind the subject and the other may either be abreast or on opposite side
of the street or following the first shadower.
2. If subject suddenly turns a corner, A may continue straight ahead, instead of rushing
to the corner and anxiously looking for the subject. C then crosses the street and
follows the subject, to take the positions of A, C, is in a Position to view any sudden
disappearance of subject towards a door or building.
2. Entering a Building – If the building has no back exit, the surveillant should wait until the
subjects comes out. It is necessary to follow the subject inside the building if there is an
exit at the back of the building. In case the subject boards an elevatot, the surveillant
should also board the elevator. The surveillant should tell the elevator boy the same floor
as that of the subject or he/she may proceed to the top floor. If there are more than one
shadower, one should alight on the floor of the subject. The other may proceed to other
directions such as the first floor where they could wait for the subject.
3. Riding a Bus – The surveillant should board the same bus. Sit behind or at the side of the
subject. If the shadower misses the bus, he/she should board a taxi and broad the bus at
a place ahead.
4. Riding a Taxi – If subjects rides on a taxi, the shadower should take another taxi and note
the plate number and the company name of the subject’s taxi. If he/she fails to tail the
taxi, he/she should get information from the taxi company through the driver of the taxi
for the disclosure of the subject’s destination.
|
5. Riding a Train – The shadower must fall in line towards the ticket booth, behind the
subject so that he/she could overhear the destination or he/she could merely request for
a timetable or a ticket for the last destination.
6. Inside a Restaurant – Shadower should allow the subject to select a table before entering
the restaurant. The shadower must select the obscure table and estimates to finish his/her
meal at the same time as that of the subject.
7. In a Hotel – The room of the subject could be inquired from the hotel registry. Once
pinpointed, the shadower must take and adjacent or opposite room. If there are no
available on this arrangement, the nearest vacant room should be the choice.
8. In a theater – The shadower should be seated behind the subject. If the subject gets out,
he/she should follow in different exit point.
10. Inside a small private or Public Office – The shadower must wait outside, pretending to
be a customer of nearby establishments.
11. Telephone Booth – The shadower may take the next booth or stand near the subject to
hear the conversation. The telephone book used and the page number at which it was
left open should be noted.
2.Use of Convoy – The subject employs other partners to detect if he/she is being tailed. The
convoy which may employ the ABC method would be very easy to detect shadowers.
If the subject uses this, the shadower must be behind the convoy and follow them
instead.
|
Purposes of Undercover Operation
1.Gathering Evidence
The undercover agent can observe criminal activities, hear conversations,
photographs documents and performs other activities for collating and
gathering evidence.
2.Counter-Intelligence
Counter intelligence operation is a means to identify the double-crossers. The
undercover agent could validate the truthfulness of the information given by
informants.
4.Loyalty Check
This applies to private or government employees who are security risk personnel,
especially those involved in intelligence work.
|
2.Social Assignment – these are places of amusements, such as bars, nightclubs and other
places of entertainment where a subject frequently goes. Criminals throw a major part
of their loot to these places and the undercover agent must know the hostesses who
are girl friends of the criminals. He/she must know to drink socially without getting drunk.
3.Subversive Organizations - He/she must know the ideologies of the organizations in order
suit his/her philosophies and actions while inside the said organization.
4.Residential Assignment – This concerns the neighborhood of the suspect where the
undercover agent fits himself/herself as new resident, without generating suspicion. The
purposes are to befriend to those who could give information and possibly get closer to
the subject.
5.The fictitious Personality – The preparation should include the fictitious background of the
undercover agent. He/she must discard all papers and identification cards, etc. A new
set background information should be issued to him. The agent must memorize all the
details of his/her fictitious background.
1.By informers – The informers must be given the picture the criminal together with his/her
last known address and acquaintances or his/ her possible hang outs. If no picture is
available, the full descriptions of the criminal must be given to the informer. If the criminal
has no acquaintances in the Metropolitan area, the likelihood is that he/she will flee to
his/her hometown or province where he/she has the relatives to guide him/her.
3. Grapevine Sources – These grapevine informants or informers have easier access to the
underworld where vital information could be gathered as to the whereabouts of the
|
particular criminal. The prisoners or inmates are most often knowledgeable on crimes
and criminals more than the police, especially on major crimes.
4. By Tailing – The surveillant may tail the wife, relatives and friends of the criminal who will
deliver provisions to the hiding place.
5. Using Children of the Same Age – The children of the criminal maybe used as sources of
information as to whereabouts of the subject.
6. Courting the Girlfriend of the Criminal – This can be done by showering them with gifts
and expressing passionate love. Money and love have proven in the past as a major
consideration of betrayal. Most of the girlfriend of the criminals are hostesses, prostitutes
or dancers.
7. Harassing the Associates and friends of the Criminal – These people will give the desired
information in exchange for peace, or by befriending or helping them to get out of the
mess of minor violations of law.
8. Arrested Criminals Known to the Subject – These persons must be interrogated with the
false information that the one responsible for their arrest is the information coming from
the criminals being sought. The underworld character should be intrigued about this
technique so that they would betray each other. There is always a power struggle
among the criminal syndicates for their continued existence.
9. In fresh cases, the bloodhound dogs or K-9 are used to track down the suspect in
squatter’s areas, open field or wooded terrain. This is most effective if piece of article
belonging to the criminal, left at the crime scene is sniffed by the dog as a sample of the
odor of the criminal.
10. In very recent cases, find out the ethnic origin of the criminal. If he/she is from Baguio
City, there is a great possibility that they will go home to his/her place. In the past, there
were successes in arresting the criminal at the pier or at the domestic airport within 3
days stick out.
11. Disguises – Beware of disguises employed by the criminal. Many suspects had eluded
police cordon or dragnet by pretending to be abnormal persons greased with the dark
oil and acting the mannerisms of the abnormal. Some suspects also attired themselves
with wigs and feminine dresses. In company with some women, they had easily passed
the police cordon.
12. Corrupting the known associates of the criminal through money – In the underworld,
money talks louder than other things.
13. Publication of Rewards – Done in newspapers of general circulation mostly read by the
masses. This effective for the capture of the criminal. A weeklong publication together
with the criminal’s picture will pay off.
|
The informant
The solution of a crime sometimes depends on the information furnished by the
informants and informers. Informers and informants are generally synonymous for they provide
information to the police authorities. The world informant is a general term that refers to any
person who gives information to the police authorities relative to a crime.
Who is an Informant?
An informant is any person who furnishes the police information relevant to a criminal
case about the activities of criminals or syndicates. This is done without any monetary
consideration. The informant may openly give information or may serve as a witness voluntarily.
Types of Informant
Anonymous Informant
He/she maybe an anonymous phone caller, letter writer or text sender. The duty
of the investigator is to receive the information, not to reveal any other
information to the caller about facts already known.
Confidential Informant
This is a person who provides the police with confidential information
concerning a previous crime or a projected and planned crime. He/she does not
want to be identified as the source of information. Under the law, these
informants are protected and their identity could not be revealed by the police
even under the order of the court unless on exceptional case where there is a
claim of the defense that the informant framed up the accused.
Rival-Elimination Informant
This kind of informant mostly maintains to be anonymous. His/her purpose is to
eliminate the rival person or gang due to competition or their motives such as
revenge, etc.
False Informant
This informant usually reveals information of no consequence, value or stuff
connected with thin air. His/her purpose is to appear to be on the side of the law
and for throwing out the suspicion form himself/herself or from gang or
associates.
Frightened Informant
He/she is prodded by fear or self-interest in giving information to the police.
He/she maybe one of the lesser gang member who runs to the police when
his/her gang mates are about to be involved in dangerous situations or when
the gang he/she belongs is hot on the police trail. Motivated by anxiety and self-
preservation of his/her well-being he/she furnishes the information to protect
himself and as a means of sustaining self-importance. This type is the weakest link
in the composition of the criminal chain.
|
Self-Aggrandizing Informant
This kind of informant moves around the centers of criminals, group or syndicates
and delights in surprising the police about bits of information. His/her
information may be of value by way of authentication in intelligence operation.
Mercenary Informant
The has information for sale. He/she may have been victimized in double-cross
or little share in the loot or given a dirty deal and seeks revenge as he/she will
profit in the disclosure.
Double-Crosser Informant
He/she uses his/her seeming desire to divulge information as an excuse to talk
to the police in order to get more information from them more than what is
given. To counter this kind of informant, the police applies the deception method
by giving false information that will lead to his/her capture.
Women Informant
She maybe the female associate of the criminals, who was roughed up,
marginalized in the deal or being eased out from the group. Care must be given
to this kind of informant because women, given the skills and expertise, are more
dangerous than me. They often give free romance that will result in blackmailing
the investigator or will result to an extended family for support. Women are said
to be most effective among informers because they could easily penetrate the
ranks of criminals with less suspicion. Besides, they could mingle with the crowd
easily and could obtain information more than their male counterparts, especially
if their beauty attracts attention. They have easier access to women associates of
male criminals. However, care should be employed as they could easily doubts-
cross the police once they fall in love with criminals.
Motives of Informants
The following are reasons why informant give information:
1. Vanity – The motive is for self-aggrandizement by gaining favorable attention and
importance by police.
2. Civic Mindedness – Informants provide information because they are imbued with the
sense of duty and obligation to assist the police in their task.
3. Fear – It is engendered illusion of oppression from enemies or from impending dangers.
4. Repentance – Those lesser criminals such as accomplices or accessories will have a
change in heart to unburden their conscience.
What is informer?
An informer is person who provides information to the police on a regular basis. They are
either paid regularly or in a case-to-case basis, or none all. They are cultivated and established
by the police on a more or less permanent character as long they are loyal and useful to the
police organization.
|
Selection of Informers
There is no hard and fixed rule in the selection of informants. The informers must be
indoctrinated that they are not immune from arrest and prosecution if they commit crimes. They
should not bring shame and dishonor to the police service. When they will commit crimes, they
should be punished like the rest. All the sectors of the society must be covered and their
composition included but not limited to taxi drivers, jeepney and bus drivers, vendors,
conductors, waiters, dancers, ex-convicts, shady or businessmen, prostitutes, the elite in the
society and others. They should be planted as moles or stole pigeons practically in all the corners
of the social order.
2. French System
This involves the practice of obtaining information that relies heavily on buying
information; this advocates the extensive use of informers.