Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

Lesson 1

LESSON PROPER
INTRODUCTION TO POLICE INTELLIGENCE
AND SECRET SERVICE

I. SUN TZU & SOME OF HIS MAXIMS


Sun Tzu authored the book entitled “PING FA (the art
of war)” written about 400 B.C. which the following
statements could be found.

“if you know your enemy and you know yourself, you
need not fear the results of hundreds of battles. If you
know yourself but not the enemy, for every victory you
will suffer defeat. If you know neither yourself nor the
enemy, you are fool who will suffer defeat in every
battle”.
“What is called for knowledge cannot be elicited from spirits, or from gods, or from
analogy to the past events nor from calculations. He wrote “it must be obtained from
men who know the enemy situation.”

II. HISTORY OF INTELLIGENCE


Biblical records
MOSES
 One of the first recorded formalized intelligence effort
with format can be found in the holy bible (numbers
13:17) the scriptures also named the 12 intelligence
agents whom the lord directed Moses to send into the
land of Canaan also recorded that all those men were
heads of the children in Israel. And Moses sent them to
spy out land of Canaan (NUM 13:17-20)

 Moses sent the 12 agents and said unto them, get you
u this way southward, and go up into the mountain; and see the land, what it
is; and the people the dwelt therein, whenever they be strong or weak, few or
many, and; what the land dwell in, whether in tenths or strongholds; and what
the lands is whether it be fat or lean, whether there be wood therein, or not.
And be ye good courage and bring the fruit of the land.”

|
RAHAB
 The harlot of Jericho (Joshua 2:1-21) which sheltered and
concealed the agents and duped their pursuers. She was
not only impromptu confederate of immense value for the
Jewish leader of that jar distant day, but also established a
plot-pattern which is still of periodic relief to motion picture
producers.

DELILAH
 She was an impromptu intelligence agent of the
Philistines. She allowed philistine spies to hide in her house
(judges 16:9) apart from her tonsorial specialty, she
seduced Samson of Israel to reveal the secret of his
strength and used herself to gain intelligence from
powerful enemy. She achieved t he largest effective force
of her employer’s adversaries and contriving the stroke
which put that force out of action.

INTELLIGENCE IN PRE-MODERN ERA


1. ALEXANDER THE GREAT
 He devised the “first letter sorting and opening” to obtain
information. White marching into Asia, it is recorded there
came to his hints, and rumors of disaffection growing
among his allies and mercenaries.

 The young conqueror thereupon sought the truth and g ot


it by the simplest expedient. He announced that he was
writing home and recommended to his officers that they do likewise. Then, when
the couriers were ladened and had set out for Greece, he ordered them quietly
recalled and proceeded to investigate all the letters that they carried. Malcontents
were detected, legitimate causes of grievances exposed.

2. Akbar
 The “great mogul and sagacious master” of Hindustan who
employed more than four thousand agents for the sole
purpose of bringing him the truth that his throne might rest
upon him.

|
3. GENGHIS KHAN
 He used intelligence to conquer china invade Cathay. He
instructed his generals to send spies and used prisoners as
sources of information. Genghis was regarded as leader of
the so called “Mongol conque rors” and used effective
propaganda by spreading rumors of Mongol terror. They
collected information on weaknesses and rivalries of
Europe and usually disguised as merchants.

4. HANNNIBAL
 The Carthaginia general considered as one of the brilliant
military strategist. He developed an effective intelligence
system for 15 years in Rome. He roamed around the city
often disguising as a beggar to gather fist hand
information. Hannibal’s invasion of Italy, his brilliant and
victorious raid in history, gained him many success and
nearly bled Rome to death.

5. FREDERICK THE GREAT


 Frederick the great was known as the father of military
espionage. He established rules for obtaining and using
every grade of intelligence agents and divided his agents
into four classes as follows.
a. Common Spies
 Recruited among poor folk, glad to earn small amount
of money or to be accommodated as military officer.
b. Double Spies
 The low informers and unreliable renegades who are significant in spreading
false information to the enemy.
c. Spies of Consequences
 Couriers and nobleman, staff officers, and kindred conspirators, invariably
requiring substantial bribe or bait.
d. Intimidated Spies
 Persons who were forced to undertake espionage against their will.

6. SERTORIUS, QUINTOS
 He was a Roman General and possessor of white fawn that
tried to follow Polyneus everywhere. The fawn was used as
intelligence agent. His intelligence agent, his intelligence
personnel to appear definitely in military organization.

|
7. GAIUS JULIUS CAESAR
 During his time, his staff legion includes ten “speculators” who
served as information-collecting agency. Speculators were the
first intelligenc e personnel to appear definitely in military
organization.

8. NAPOLEON BONAPARTE
 He was great leader who believes in the principles that “One
spy in the right place is worth 20,000 men in field.” He also
organized two bureaus of interest:
a. Bureau of Intelligence
 Consolidated all incoming information regarding the
enemy for presentation to the emperor and to obtain
information as desired.
b. Topographic Bureau
 Maintained a large map which covers the latest information regarding both
enemy and friendly forces.

9. KARL SCHULMEISTER
 He was Napoleon’s military secret service and Napoleon’s eyes.
He began his career in offensive espionage. Under a cover role,
he was able to infiltrate the Austrian General Staff and studied
the characters of the Generals. His Royal foes selected to defeat
him.

10. GEORGE WASHINGTON


 Conspirators under oath abound in the history of every nation.
He, as grandmaster, mobilized the free masons of the colonies
at the ou tbreak of American war independence.
 America’s first military intelligence director.

|
11. FRANCIS WASHINGHAM
 Under Queen Elizabeth, he organized the first National I
ntelligence Service. He employed spies on the staff of the Admiral
in Command of the Spanish Army and able to obtain information
regarding Spanish Army as to their ships, equipment, forces and
stores. He protected Queen Elizabeth I from countless assassins.

12. RICHELIEU
 He introduced the “network of covert collectors” who transmitted
prompt and accurate information to Paris regarding the activities of
the rebels and dissidents of the kingdom.

13. LOIUS XIV (SUN KING)


 He systematized political policy, continuous
surveillance, postal censorship and military
organization.

14. WILHELM STIEBER


 He incorporated intelligence in the General Staff Support System.
He contributed to the science of Military Censorship and
Organized Military Propaganda. He worked as a census taker and
developed an informal format in the gathering of data.

15. ALFRED REDL


 One of the most brilliant intelligence agent, even though he was a
homosexual. Chief of the Austro-Hungarian secret service and at
the same time, agent of Russia (convicted of treason in 1913- but
he committed suicide). His treason led to the death of 500,000
agents and the soldiers combine in his 13 year’s espionage
episode.

16. BRAHMA KAUTILYA


 In ancient India, he overthrew the NANDA Dynasty and
established the first Muyuryan King in the Indian throne. He
recommended to his king that for the ruler to succeed, the ruler
should strike at enemies weak points by means of spies.

17. JOSEPH FOUCHE

|
 He was known as the Father of Military Espionage in France. He
was born on May 21, 1759, near Nantes. Trained for priesthood but
Never took orders, instead he becomes a teacher. He rose to
become the most feared and respected intelligence director in
French history, created a network of agents with his assistance and
founded the modern system of spying on spies, which was later
known as counter espionage.

18. GEN. WILLIAM DONOVAN


 He was regarded as the father of today’s CIA. He was the first chief
of OSS (office of strategic service- forerunner of CIA) when former
president Roosevelt established it in June 14, 1942.

19. EDWARD I
 In 1725, he organized a systematic police system known as “watch
and ward” and royal proclamation; the profession “state informer”
was created in 1734 enjoining all informers to exposed criminal
activities and compensated.

20. JOSEPH PETROSINO


 He was the former head of Italian squad.
Through extensive intelligence network, he
credited to smash the black society.

III. INTELLIGENCE AND THE WORLD WAR


A. WORLD WAR I
1. 1900- Europe powers developed modern staff system and place intelligence on the
same level with personnel, operations and logistics. Intelligence then functioned in
time of peace and war. Intelligence during this period, concentrated on information
about the armed forces of the enemy and their capabilities.
2. AIRCRAFT- was introduced as a tool of conducting aerial reconnaissance.
3. WIRELESS TELEGRAPH - was used wherein codes and cliphers were applied.
4. ARMY INTELLIGENCE- rapidly expanded during this period.
5. “AGENT PROVACATEUR”- was employed by the Russians for the purpose of internal
and political repression. Spying was always the specialty of the Russians.
6. GERMAN INTELLIGENCE- gained a high reputation for offensive effectiveness
throughout Europe but declined at the outset of war.

|
7. BRITISH INTELLIGENCE- succeeded greatly by means of censorship and its code
room combined with skillful use of covert agents.
8. UNITED STATES- expanded their naval intelligence wherein domestic counter
intelligence became a principal activity.

B. US THREE BRANCHES OF INTELLIGENCE


1. POSITIVE BRANCH
 Its function is to collect, evaluate and disseminate intelligence information.
Prepare situation estimate and translate documents.
2. NEGATIVE BRANCH
 Counterintelligence functions: investigate disloyalty and sedition; investigate
graft and fraud in organization.
3. GEOGRAPHIC BRANCH
 Produces maps, photographs, terrain studies sections: administration,
collection by attaches troops, codes and cliphers.

C. INTELLIGENCE DURING WORLD WAR II


1. German intelligence
Germen intelligence started the war with the world’s best organized intelligence
service through advance preparation of intelligence accompanied by troop
movements.
2. JAPANESE INTELLIGENCE
Japanese intelligence failed because it was not provided with sufficient number
of trained personnel to assemble and evaluate the mass of materials which were
collected although Japanese intelligence was involved in short war and defensive In
nature.
3. BRITISH INTELLIGENCE
Its achievement was delay in the use of german v bomb. The operation was
conducted with the OSS and through the penetration and technical intelligence;
they discovered peeenemunde, the V2 guided missile research project of nazi
germany.
4. UNITED STATE INTELLIGENCE
In 1941, the US office of strategic service (OSS) forerunner of today’s central
intelligence agency (CIA) was established to analyze military, political and economic
information as it affected the security of tgeh country. US JOINT CHIEF OF STAFFES
– was organized to act in support of the army and the navy in the collection and
analysis of strategic information and to be responsible for the planning and operation
of special services.
5. CHINESE INTELLIGENCE
In 1932, TAI LI was organized, the china’s secret police to conduct espionage
and counterespionage against Japanese spies and Chinese communist.
6. SOVIET INTELLIGENCE

|
AMTORG was organized for the purpose of purchasing all kinds of materials for
soviet union. SMERSH OR “ DEATH TO SPIES” Smersh was organized during the was
counterintelligence concerned with diaffection among soiet troops and anti-
communism in any form. There were five divisions: administration, operation,
investigation, prosecution and personnel.

OTHER SIGNIFICANT EVENTS IN INTEL DURING WORLD WAR II


1. In 1942, a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at peenemunde. British failed in
the defeat of Gen. Montgomery’s forces at annenheim.

2. UNITED STATE INTELLIGENCE – in 1942, the US strategic service was established to


research and analyze military, political and economic information as it affected the
security of the country.
3. BATTLE OF MIDWAY – in 1942; the turning point of the US-Naval force in the pacific.
The victory gained by the americans was due to the disrupted messages from the
imperial japanese navy.

4. ADMIRAL ISOROKU YAMAMOTO - In april of 1943, the c rypto-


analyst of the U.S. navy coomunications intelligence intercepted
a top-secret signal relaying the travel of the admiral. En route, he
was intercepted and crashed in the jungles of bougainville.

5. U.S. JOINT CHIEF OF STAFFS – was organized to act in support


of the army and navy in the collection and analysis of strategic
information and to be resp osible for the planning and
operation of the special service.

6. AMPHIBIOUS WARFARE
U.S. -greatest contribution was its development where coordination of many types of
intelligence activities was required to provide adequate knowledge upin which is the
basis of the successful opiration of a complex military transported over water with the
objective of establishing itself on an enemy-held shore agianst opposition.

7. U.S.SUCCESS in WWII was that their personnel were drawn from the civilian populace,
businesss and professional men and woman.

D. POST WAR PERIOD : THE SUPERPOWERS


1. SOVIET INTELLIGENCE
a. SOVIET INTELLIGENCE SYSTEM – described as the “ omnipotent and omnpresent” for
its vast intricate organization involving millions of people.

|
b. SOVIET COUNTERINTELLIGENCE – described as the “ iron curtain”- because no one
can cross in the borders of USSR without being detected-all communications are rigidly
controlled. Its contribution to the modern intelligence was the dissemination of false information
designed to mislead and confuse opponents and prospective victims.

c. MILITARY INTELLIGENCE AND MINISTRY OF THE STATE SECURITY ( FORMERLY NKGB)


- it is concerned with the political events and economic conditions and also
collects information for intelligence purposes all over the world. It directs foreign sabotage and
maintain network of agents in military and special agents.

d. KGB ( KOMITETOR KOMISSIJA GOUDARSVENNOY BEZOPASNASTI) – it is the official


secret police agency of the soviet union in charge of the state security (COMMISSION OF THE
STATE SECURITY).

2. BRITISH INTELLIGENCE SYSTEM


It is composed of several intelligence agencies as follows;
a. British Military Intelligence Division (MID)
= it is divided into 20 different departments.
b. M15
= devoted to counter espionage and security.
c. SPECIAL BRANCH OF SCOTLAND YARD
= it is charged with guarding the royal family and important british officials and visiting
foreign dignitaries.

3. ISRAEL INTELLIGENCE SYSTEM


a. MOSSAD - in charge of the national intelligence. The number one intelligence agency in
the whole world.
b. AMAN – concerned with military intelligence.
c. SHINBET- concerned with internal security.
d. IIC – Israel intelligence agency- report to the prime minister.

4. FRENCH INTELLIGENCE
a. SDECE DE DOCUMENTATION EXTERIEUREET DER CONTRE ESPIONAGE – foreign
intelligence and counterintelligence service. This is under the prime minister.

b. GENERAL, CHARLES DE GAULLE- he set-up the bureau central


reseignement et d’ action. (BCRA CENTRAL OFFICE FOR
INTELLIGENCE ACTION) in London in 1940.it is an expansion of the
service d’ renseignement ( sr-inteligence service) which is part of the
old renzieme bureau (second bureau) of French general staff.

c. SDECE – concerned in strategic and counter intelligence.

|
d. SURETE NATIONALE – part French intelligence service.

5. GERMAN INTELLIGENCE
RED GESTAPO- the security service organized by the East Germany to combat the covert
activities of the west Germany group when it was still divided by berlin walls.

E. GREAT BETRAYALS
1. JUDITH COPLON- she was a political analyst of the department of
justice who was accused of taking unlawful possession of
government documents and spying for a foreign power. She was a
well-known communist activist.

2. DR. EMIL JULUIS KLAUS FUCHS – he was accused of releasing


American atomic secrets to the soviet in 1945 and British in 1947.
He detailed knowledge of the construction
of the atomic bomb.

3. ERNST HILDING ANDERSON – in 1951, a


royal provided military secrets to a force
power and was found guilty and sentenced
to life imprisonment.

|
LESSON 2
lesson
proper

General Definition of Intelligence

 It is the capacity for understanding and for other forms of adaptive intellect of behavior,
the mind in operation.
 It is the power of meeting any situation, especially a novel situation, successfully by proper
behavior adjustments; the ability to apprehend the interrelationships of presented facts in
such a way as to guide actions towards goal.
 It refers to knowledge of an event, circumstances, etc., received or imparted; the gathering
or distribution of information; or the staff of persons engaged in obtaining such
information.

According to Microsoft Encarta Dictionary;


 Ability to think and learn:
 Refers to ability to learn facts and skills and apply the especially when this ability is
highly developed.
 Secret Information:
 Intelligence refers to information about secret plans or activities, especially those of
foreign governments, the armed forces, business, enemies, or criminals.
 Gathering of Secret Information:
 Intelligence may also refer to the collection of secret military information.
 People Gathering Secret Information
 An organization that gathers information about secret plans or activities of an
adversary or potential adversary and the people involved in gathering such
information.

Four ‘I’ of Intelligence


1.Interest – A feeling of attraction
2.Integrity – Honesty complete
3.Ingenuity – Original truth, in accordance with law
4.Intelligence – Capacity to know from what is right from what is wrong.

Counter intelligence
 It is an activity aimed at protecting an agency's intelligence program against an
opposition's intelligence service. It likewise refers to information gathered and activities
conducted to counter espionage, sabotage, assassinations or other intelligence activities
conducted for or on behalf of foreign powers, organizations or persons,
international terrorist activities, sometimes including personnel, physical, document, or
communications security programs.
 Covers the activity devoted in destroying the effectiveness of hostile foreign activities to the
protection of information against espionage, and sabotage.

|
 It is also known as negative intelligence because it is an activity dedicated to the
concealment and protection of one’s own information from adversaries’ intelligence
operation.
 Negative Intelligence is a generic term which incorporates three different things. These
are as follows.
 Security Intelligence
 Means that the total sum of efforts to counsel the national policies, diplomatic
decisions, military data, and any other information od secret nature affecting the
security of the nation from unauthorized persons. Its effort is to deny information
to unauthorized persons by restricting to those who are explicitly authorized to
possess it.
 Counter Intelligence
 Is the organized effort to protect specific data that might be of value to the
opponents own intelligence organization.
 Counter – Espionage
 In counter-espionage, negative intelligence becomes a dynamic and active effort.
Its purpose is to investigate actual or theoretical violation of espionage laws, to
enforce those laws and to apprehend any violators. It is a job to catch spies. It is
basically a police function.
 According to Sir Bassil Thomson – former chief of Scotland Yard Criminal
Investigation Division:
 “A Basic requirement of the secret agent is to disguise himself and his
mission. Much of his training and basic skill is dedicated to
concealment. He is supposed to supply with a fool proof cover story
and good documents. He must be a man of exception ability or else
he would not be chosen for this intricate job. The trapping of the dark
intruder is a formidable talk.”
 The aim of Counter-Espionage is to locate the enemy, to identify the
enemy and to neutralize the enemy.

Categories of Counterintelligence
 Collective counterintelligence is gaining information about an opponent's intelligence
collection capabilities whose aim is at an entity.
 Defensive counterintelligence is thwarting efforts by hostile intelligence services to
penetrate the service.
 Offensive counterintelligence is having identified an opponent's efforts against the
system, trying to manipulate these attacks by either "turning" the opponent's agents into
double agents or feeding them false information to report.
Five Importance of Effective Counterintelligence (CI)
Denies information to the enemy.
Reduces the risk of command.
Aids in achieving surprises.
Increases the security of the command.
Decreases the enemy ability to create information about our forces.

|
What is CI Operation?
 CI Operation is also called CI Investigation. It is an activity that constitutes the value of the
CI work load, worldwide and includes specific investigation of individual and incidence
which for the most part are conducted in an overt but discreet manner.

Counter-intelligence Investigation
 It is an activity which constitutes the value of work load and includes specific investigation
of individual and incidence which for the most part are conducted in an overt and but
discrete manner.

General types of Counterintelligence


1.Passive Measures
 are those measures which seek to conceal information from the enemy.
 Secrecy discipline, document security, camouflage and concealment,
communications security, military censorship counter reconnaissance efforts.
2.Active Measures
 are those measures which seeks active block to the enemies’ effort to gain
information or engage in espionage, subversion sabotage.
 Examples are PSI, Security Tag or Password, Challenge or Password,
Reconnaissance.
3.Deception Measures
 are measures which are used to deceive the enemy.
 Ruse – use of escape and evasion, Dummy position fabricated information.

Police Intelligence
 It is defined as the end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the activities of
criminal and other law violators for the purpose of affecting their arrest, obtaining
evidence, and forestalling their plans to commit crime.
 Intelligence as herein referred to means Police Intelligence as distinguished from Military
Intelligence. The deviation is more on the approach rather than principle. The
fundamental intelligence cycle is still the same, be that used in Police or Military
Intelligence.

Functional Classifications
 Criminal Intelligence (CRIMINT)
 It refers to the production of intelligence essential prevention of crimes, investigation,
arrest and prosecution criminal offenders.
 Internal Security Intelligence (INSINT)
 It refers to the knowledge essential to the maintenance of peace and order.
 Public Safety Intelligence (PUSINT)
 It refers to the knowledge essential to ensure the protection of lives and properties.

Cardinal Principle in Police Intelligence

|
The cardinal Principle in Police Intelligence at all levels the proper, economical and most
productive use of personnel and equipment employed and/or utilized in planning the collection
of information and dissemination of intelligence.

General Activities in Police Intelligence


 Strategic Intelligence – The intelligence which is primarily long range in nature with little
practical immediate operation value.
 Line Intelligence – It is immediate in nature and necessary for more effective police
planning and operation.
 National Intelligence – It refers to the integrated product of intelligence developed by all
the governmental branches, departments concerning the broad aspect of national
security and policy. It is concerned to more than one department or agency and it is not
produces by single entity and used to coordinate all the activities of the government in
developing and executing integrated and national policies and plans.
 Counter Intelligence – It is phase of Intel covering the activity devoted in destroying the
effectiveness of hostile foreign activities and protection of information against espionage,
subversion and sabotage.
 Undercover Work – It is an investigative process in which disguises and pretext, cover
and deception is utilized.

Information
 Generally, information are raw data or unevaluated material of every description
derived from observation, communication, reports, rumors, imagination, and
other sources from which intelligence is produced; Any knowledge, data news,
opinions, or the like transmitted from a person to the another; and/or any
communicated knowledge by personal study, investigation, research, analysis
and observation.

Intelligence Information
 It refers to any information gathered or received which is of intelligence interest.

End Products (knowledge)


 These are results after evaluation, analysis, interpretation, and integration of raw
materials.

Knowledge (Synonymous to intelligence)


Information in mind: general awareness or possession of information, facts, ideas, truths
or principles.
Specific information: clear awareness or explicit information, for example, of a situation
or fact.
All that can be known: all the information, facts, truths, and principles learned
throughout time.
Activity
 Activities are the product of that knowledge after collection, processing,
dissemination and use; examples are raid operation, arrest search and seizure.
Organization
 It refers to the intelligence personnel or the intelligence unit (the unit itself).

|
Sources
 It refers to where/whom/which the information was obtained. This can be from: an
informant; a syndicate; an intelligence broker; double agent; and/or another police
agency that has the needed information on file.

General Classification of Sources of Information


1.Open Sources – The information may be obtained from news files, libraries, magazines,
books, or non-classified files in certain public or private offices. 99% of the information
collected is coming from open sources.
2.Close Sources – They can be located inside a building, safe or vaults. 1% of all information
is from close sources.

General Categories Sources of Information (PPeT)


1. Places
2. People
3. Things

Intelligence Cycle
 It is the continuous process which ultimately coordinates and integrates all efforts of the
collecting agencies or units. The intelligence cycle is the process through which
intelligence is obtained, produced, and made available to users.

PLANNING AND SUPERVISION

DIRECTING

DISSEMINATION COLLECTING
MISSION
& USE

PROCESSING

PLANNING AND SUPERVISION

 Mission – is the focal point of the intelligence operation; a particular task given to a person
or group to carry out; or one which should be accomplished.

 Phases of the Intelligence Cycle

|
In this phase, the Intel Staff Officer or Unit commander determines the required or
important information relevant to mission. Then these requirements will be distributed to the
different collection agencies by direction or by request.

Phase 1 – Directing Collection Effort


1. Determination of the intelligence requirements.
Categories of intelligence requirements in relation to use:
◊ Executive – Intelligence is required by executive, governmental and military
commanders. The executive requirements are the basis for decisions and
national policy making.
◊ Contributory – Intelligence is required to complete the staff process: make
staff plans and estimates that contribute to the decision and policy making.
◊ Operational – Additional intelligence required in planning and carrying out
effectively the decision or policy announced. Decisions and policy requires
implementation.
◊ Collateral – Higher or adjacent echelons of the government or military
establishment may require information.

Categories of intelligence Requirements by type:


◊ Basic – General reference materials to be use in planning regarding the
enemies or potential enemies, area of the operations, capabilities – static
comprehensive.
◊ Current – Temporary in nature and narrower in scope. Information required
to cope-up with the current objectives.
◊ Estimative Intelligence – Determines the future courses of action; required
by the executives to plan future military operations and policies.

2. Determination of the Essential Elements of Information (EEI)


Essential Elements of Information
EEI are items of intelligence or information of the characteristics of the area
of operations and the enemy, which the commander feels needed before he
can reasonably arrive at a decision.
These are evaluation based on the existing situation, current domestic and
foreign situations, national objectives, etc. In here, there is no set formula but
judgment and experience are necessary.

3. Establishment of priorities (P.I.R’s)


Establishment of priorities is necessary to decide which items of
information are more important - a system of priority is needed. Critical importance
and lesser importance; EEI – highest priority intelligence requirements essential to
planning.

Phase 2 – Collecting of Information


In this phase, the collecting agency determines what specific information is to be
collected, by whom and from whom. After the collecting activity is carried out, the
collected information is then submitted for processing.
Collection Agency

|
 Any person, unit or activity that collects and/or processed information by
research, surveillance, or the exploitation of the source of information.

1. Criteria of Collecting Agencies/Units:


a. Capability
 An agency must be physically capable of providing the desired
information in a timely manner.
b. Balance
 Within time limits imposed by other considerations, the collection
workload must be balanced from among the collecting agencies.
Balance is a minor consideration when compared with the
important other factors.
c. Multiplicity
 Evaluation of information required that it must be compared with
the information received from other sources and agencies. Subject
to the consideration of suitability and capability more than agency
is used to obtain each item of required information.
d. Suitability
 The collection task assigned to a unit must be compatible with its
primary mission. Only the agencies best suited to furnish the
information are used.

2. Two Basic Collection Strategies:


a. Resource integration – one agent
b. Agent Mixed Redundancy - 3 or more agents assessing for the same
assignment.

3. Collecting Agencies:
a. Government agencies/offices – variety of information
b. Intelligence units or Intelligence agencies
c. Organizations

4. Who is tasked to Collect Information?


a. Intelligence officers/agents – regular members
b. Civilian agents – informers and informants
c. Assets – establishment of institution which assists in providing information.

5. Methods of Collection
a. Overt – open
b. Covert – secret

6. Trade crafts and some Instruments used in the Collection


a. Photography
b. Surveillance
c. Elicitation
d. Interview
e. Interrogation

|
f. Personnel Security Investigation
g. Sound Equipment – tapping and bugging
h. Use of an artist
i. Surreptitious entry
j. Communication

7. Collecting Planning
Collection planning refers to the continuous process which ultimately
coordinates and integrates the efforts of all collecting Agencies/Units.

Steps in Comprising a Collection Plan


a. Planning and supervision of collection efforts/activities
b. Determination of intelligence priorities.
c. Selection of collecting Agencies
d. Supervision of the collection activities (a.k.a. directions)

What are the factors to be considered in collection planning?


a. Personality – Persons involved suspects, social status, etc.
b. Organization – Group committing the crime: Kuratong Baleleng, Pentagon, 14k gang,
Bamboo Union Gang etc.
c. Resources/Equipment – Used in committing the crime i.e., Firearms
d. Activity – Modus operandi/crime activities, time attack, victims, place of attack, etc.

Phase 3 – Processing the Collected Information


It is in this phase in the intelligence cycle in which information becomes
intelligence. The processing phase of intelligence activity is the most expensive and time
consuming activity. The conversion of data into useable product, acceptable to the vast
majority, will still require the greatest expenditure of money. Data processing involves
the following:

1. Recording –is the reduction of information into writing or some other form of
graphical representation and the arranging of this information into groups of
related items.
2. Evaluation – is the determination of the pertinence of the to the operation reliability
source or of the agency the accuracy of the information; or examination of raw
information to determine intelligence value.

Things to be considered during evaluation:


a. Pertinence (usefulness)
 Does it hold some value to current operation?
 Is it needed immediately?
 Who need it?
b. Reliability (dependable)
 Judging the of information.
 The source of information and the agency from which it was
collected or both evaluated for reliability. The principal basis for
judging the source or an agency is previous experience. Other

|
criteria include knowledge, training, experience and past
performance of troop units or the collector of information.
c. Accuracy (truth of information)
Accuracy refers to the probable truth of the information.
Judgement of accuracy is based on the answers of the following
questions;
 Is it possible for the reported fact or event to have taken place?
 Is the report is consistent within itself?
 Is the report confirmed or corroborated by information from
different sources or agencies?
 Does the report agree or disagree in any way with other
available information?
 Does the report agree with information from other sources, or
agencies and which on is more likely to be true?

EVALUATION GUIDE

Reliability of Accuracy of Sources of Information


Information Information
(CUFNUR) (CPPDIT)

A – Completely 1 – Confirmed by T – Direct observation by the commander


reliable other sources and the chief of a unit.
B – Usually reliable 2 – Probably true U – Reports by penetration agent or
C – Fairly reliable 3 – Possibly true resident agent.
D – Not usually 4 – Doubtfully true V – Report by PNP/AFP troops involved in
reliable 5 – Improbable encounter.
E - Unreliable 6 – Truth cannot W – Interrogation of captured enemy
F– Reliability cannot be judged agent/foreigner.
be judged X – Observation of government and civilian
employee or official.
Y – Observation by a member of the
populace.
Z - Documentary

3. Interpretation
Interpretation is the process of establishing the meaning and significance
of information. It involves the following:

a. Analysis – refers to the determination of significance of information relative and


drawing to the information and intelligence already known deductions about
probable meaning of the evaluated information. It is done by shifting and
isolating those elements that have significance in the light of the mission or
national objective.

|
b. Integration – is the combination of the elements started in the assessment with
other known information or intelligence to form a logical feature or hypothesis
of enemy activities or the information of the operational area and characteristics
of the omission of the command.
c. Deduction – refers to formulation of conclusions from the theory developed,
tested and considered valid; determination of effort and meaning of the
information.

Phase 4 – Dissemination and Use


This is the timely conveyance of intelligence information in an appropriate form and
by any suitable means to those who need. The primary purpose of timely
dissemination is to enable the commander to make decisions with confidence; a
secondary purpose is to provide knowledge, in light of which new information may
be processed.

Two principles preclude the release of intelligence information:


1. First there must be the “need to know” on the part of the recipient.
 “Need to know” is not necessarily determined by a person’s position in the
organizational hierarchy. Need to know is usually akin to the task
performed.
2. Secondly, a potential recipient should be “cleared” by responsible authority as
being eligible to receive the intelligence data.
 Confidential sources are the life line of the intelligence effort. They must be
protected at almost any price. Therefore, it is apparent that the “need to
know” and proper clearance of the receiver are surpassed by the
consideration, “will the use of data destroy or endanger the source of
information?”
It is the final phase of the cycle. Processed information is
disseminated to the agency, unit or command to effect or implement the
mission.

Dissemination is through:
Methods of dissemination:
1. Fragmentary orders from top to bottom of the command;
2. Memorandum, circulars, special orders etc;
3. Operations order, oral or written;
4. Conference – staff members;
5. Other report and intelligence documents;
6. Personal contact – It can be done by the use of telephone, personal visits, and debriefings;
7. Messages – This can be made by use of radio, utilization of messengers or couriers, or by
rapid means of signal communication.

Criteria of Dissemination:
1.Timeliness
Timeliness states that the information must be disseminated on time.

|
2.Propriety
The message must be clear, concise and complete, as well as in the proper form for
the receiver to readily understand its contents. It must be disseminated to the correct
user, presented in a form that leads itself to immediate use and distributed by the most
effective means appropriate to both time and security requirements.

Users of Intelligence:
1.National leaders and military commanders
 Formulation and implementation of national policies.
2.Advisors and staff
 Preparations of plans and estimates.
3.Friendly nations and other branches of armed forces.
4.Processor
 Basis for evaluation and interpretation

Forms in disseminating information


1.Spot Reports
 These are reports used by all echelons to transmit intelligence or information of
immediate and significant impact on current planning and operations, speed of
transmission of spot report is essential. The spot report is afforded the most expeditious
transmission consistent with security requisite. No format is prescribed answer the
question, when, where, who, what, why and how (5W’s and 1 H).
2.Intelligence summary
 This is the brief summary of information of intelligence interest covering a period of time
designated by the commander. The length of the period will vary depending on the
desires of the commander.
3.Analysis of the area of operation
 Area of operation is the detailed comprehensive study with emphasis on people,
weather, enemy and terrain (PWET).
4.Intelligence estimates
 This the logical and orderly examination of the intelligence factors affecting the
accomplishment of the mission. It provides the commander with an analysis of the area
of operations, enemy capacities that can influence his mission. It provides the
commander with the basis for planning operations and for disseminating intelligence to
his staff.

|
LESSON 3
LESSON
PROPER

Surveillance
 Defined as the discreet observation of persons, places and vehicles for the purpose of
obtaining information concerning the identities or activities of criminals. A surveillant is
the person who conducts the surveillance or performs the observations while a subject
is the person, place or vehicle being observed by the surveillant.

Types of Surveillance based on the knowledge of the subject


1.Covert Surveillance. This is a type of surveillance conducted to a subject who is unaware
that he/she is under surveillance.
2.Overt Surveillance. This occurs if the subject is aware that he/she is under surveillance.

Kinds of Surveillance based on the location of the subject


1.Fixed Surveillance. This is usually performed when surveillance is directed to a particular
building or premise. The surveillant is immovable in place while observing his/her
subject.
2.Moving Surveillance. It is performed by foot or by the use of any transportation vehicle in
order to observe the subject.

The term shadowing or tailing refers to the act of the surveillant of following his/her
subject to detect criminal activities, to establish the association of subject, to find a wanted
person and many other purposes. Roping is a kind of undercover work wherein surveillant
assumes different roles and identity in order to obtain information.

Purpose of Surveillance
1.To get information on criminal activities as bases for future raid.
2.To discover the identities of persons frequenting the place.
3.To prevent the commission of crime.
4.To establish legal grounds for the application of a search warrant.
5.To arrest the criminal in flagrante delicto or caught in the act.

Methods of Foot Surveillance


1.One Man Shadow
 It is conducted by one man in shadowing a subject. The surveillant should establish the
contacts of the subject, place visited, girl-friends and confidants.

|
Example: In case the subject will use the telephone booth, the shadower must feign a
call at the available booth.

2.Two-Man Shadow
 This is easier for the surveillants to fully cover the subjects. The method allows the
exchange of the positions of the shadowers in order to avoid discovery. One shadower
will follow behind the subject and the other may either be abreast or on opposite side
of the street or following the first shadower.

3.Three-Man Shadower or ABC Technique of Shadowing


 The three shadowers are represented as A, B and C. This is how they work. A is close to
the subject and follows him/her at a distance depending on the pedestrian traffic. B
follows A at the same distance A to the subject. If vehicular traffic is moderate, it may be
opposite him/her on the other side of the street. B and C take turns in assuming the
position of A to prevent A from becoming familiar and noticeable figure to the subject.
Pre-arranged signals are encouraged.

Advantages of the Three-man Shadow or ABC method


1. When the subject becomes suspicious of any of the operatives, said operative could
quickly drop out of the shadowing.

2. If subject suddenly turns a corner, A may continue straight ahead, instead of rushing
to the corner and anxiously looking for the subject. C then crosses the street and
follows the subject, to take the positions of A, C, is in a Position to view any sudden
disappearance of subject towards a door or building.

Tactics and Techniques of Shadowing


1. Turning Corners – The surveillant should not rush if the subject turns to a corner. If the
subject disappears, the nature of the surrounding will determine the tactics to locate the
subject. It is preferable to lose the subject rather than alerts him/her in the tail.

2. Entering a Building – If the building has no back exit, the surveillant should wait until the
subjects comes out. It is necessary to follow the subject inside the building if there is an
exit at the back of the building. In case the subject boards an elevatot, the surveillant
should also board the elevator. The surveillant should tell the elevator boy the same floor
as that of the subject or he/she may proceed to the top floor. If there are more than one
shadower, one should alight on the floor of the subject. The other may proceed to other
directions such as the first floor where they could wait for the subject.

3. Riding a Bus – The surveillant should board the same bus. Sit behind or at the side of the
subject. If the shadower misses the bus, he/she should board a taxi and broad the bus at
a place ahead.

4. Riding a Taxi – If subjects rides on a taxi, the shadower should take another taxi and note
the plate number and the company name of the subject’s taxi. If he/she fails to tail the
taxi, he/she should get information from the taxi company through the driver of the taxi
for the disclosure of the subject’s destination.

|
5. Riding a Train – The shadower must fall in line towards the ticket booth, behind the
subject so that he/she could overhear the destination or he/she could merely request for
a timetable or a ticket for the last destination.

6. Inside a Restaurant – Shadower should allow the subject to select a table before entering
the restaurant. The shadower must select the obscure table and estimates to finish his/her
meal at the same time as that of the subject.

7. In a Hotel – The room of the subject could be inquired from the hotel registry. Once
pinpointed, the shadower must take and adjacent or opposite room. If there are no
available on this arrangement, the nearest vacant room should be the choice.

8. In a theater – The shadower should be seated behind the subject. If the subject gets out,
he/she should follow in different exit point.

9. Inside a Private House – The shadower should wait outside at a distance to be


inconspicuous, taking the address and the occupants to be verified later.

10. Inside a small private or Public Office – The shadower must wait outside, pretending to
be a customer of nearby establishments.

11. Telephone Booth – The shadower may take the next booth or stand near the subject to
hear the conversation. The telephone book used and the page number at which it was
left open should be noted.

Common Tricks of the Subject in Surveillance


1.Test for Tailing – When the subject is conscious that he/she is being tailed while about to
board a public conveyance, he/she usually jumps off the vehicle. If somebody also jumps
off, he/she then recognizes the shadower, which will be the basis for future recognition.

2.Use of Convoy – The subject employs other partners to detect if he/she is being tailed. The
convoy which may employ the ABC method would be very easy to detect shadowers.
If the subject uses this, the shadower must be behind the convoy and follow them
instead.

Basic Undercover Operation


Undercover Operation is a police operations wherein the investigator assumes a fictitious
identity in order to infiltrate the ranks of the criminals for the purpose of obtaining information.
This should be the last resort if no other effective means of obtaining information is available. It
is last resort because of the risk involved which may cause the loss of life or limb of the
investigator.

Undercover Agent is a person who conducts an undercover assignment. He/she should


be knowledgeable on the subject’s language or dialect, customs and habit, physical
appearance among others.

|
Purposes of Undercover Operation
1.Gathering Evidence
 The undercover agent can observe criminal activities, hear conversations,
photographs documents and performs other activities for collating and
gathering evidence.

2.Counter-Intelligence
 Counter intelligence operation is a means to identify the double-crossers. The
undercover agent could validate the truthfulness of the information given by
informants.

3.Installation of Surveillance Equipment


 The agent is in a position to secretly install surveillance equipment such as
hearing devices or wiretapping facilities.

4.Loyalty Check
 This applies to private or government employees who are security risk personnel,
especially those involved in intelligence work.

5.Penetrating Subversive Organizations


 By nature of the operations of this organization, which is clandestine, the only
effective method of obtaining information is by undercover operations.

6.Basis for a Successful Raid


 Information obtained by undercover agents are direct, hence they are important
base for the planning and execution of future raids. The agent is in a position to
know the armaments of the targeted criminals.

Qualities of a Good Undercover Agent


1. He/she must be able to adapt in the field of his/her assignment. If the assignment will be
farmer, he/she must know how to plant or use the plow or use machines of agriculture.
2. He/she must be a good actor and practical psychologist.
3. He/she has knowledge above the ordinary in terms of general information and the varied
ways of life, profession and occupation.
4. He/she must have temperament, or calm, enduring and affable personality. Self-control
and self-confidence are a few of the qualities desired.
5. He/she must have a photographic memory because most often, he/she could not use
written notes about his/her activities and observations. Keen power of observation and
sound judgment are also desired.

Type of Undercover Assignment


Type following are the specific assignments of an undercover agent:
1.Work Assignment – If the agents is to be employed as a janitor, he/she must know his/her
and appear as such, focusing his/her mentality and habit to work assignment. He must
avoid language of refinement in order that his/her educational background will appear
to that of a janitor.

|
2.Social Assignment – these are places of amusements, such as bars, nightclubs and other
places of entertainment where a subject frequently goes. Criminals throw a major part
of their loot to these places and the undercover agent must know the hostesses who
are girl friends of the criminals. He/she must know to drink socially without getting drunk.

3.Subversive Organizations - He/she must know the ideologies of the organizations in order
suit his/her philosophies and actions while inside the said organization.

4.Residential Assignment – This concerns the neighborhood of the suspect where the
undercover agent fits himself/herself as new resident, without generating suspicion. The
purposes are to befriend to those who could give information and possibly get closer to
the subject.

5.The fictitious Personality – The preparation should include the fictitious background of the
undercover agent. He/she must discard all papers and identification cards, etc. A new
set background information should be issued to him. The agent must memorize all the
details of his/her fictitious background.

Don’ts in the Assignment


1.Don’t drink too much
2.Don’t court women
3.Don’t use women agent
4.Don’t brag to other people
5.Don’t spend too much

Communications by the Undercover Agent to the Headquarters


1. Telephone
2. Secret Meetings
3. Coded Messages

Tracing and Arresting the Criminal


Several methods in tracing the location of the suspects are employed by the law enforcers;
some of the methods are the following:]

1.By informers – The informers must be given the picture the criminal together with his/her
last known address and acquaintances or his/ her possible hang outs. If no picture is
available, the full descriptions of the criminal must be given to the informer. If the criminal
has no acquaintances in the Metropolitan area, the likelihood is that he/she will flee to
his/her hometown or province where he/she has the relatives to guide him/her.

2. By informants – Informants must be contacted to secure possible information as to the


whereabouts of the criminals.

3. Grapevine Sources – These grapevine informants or informers have easier access to the
underworld where vital information could be gathered as to the whereabouts of the

|
particular criminal. The prisoners or inmates are most often knowledgeable on crimes
and criminals more than the police, especially on major crimes.

4. By Tailing – The surveillant may tail the wife, relatives and friends of the criminal who will
deliver provisions to the hiding place.

5. Using Children of the Same Age – The children of the criminal maybe used as sources of
information as to whereabouts of the subject.

6. Courting the Girlfriend of the Criminal – This can be done by showering them with gifts
and expressing passionate love. Money and love have proven in the past as a major
consideration of betrayal. Most of the girlfriend of the criminals are hostesses, prostitutes
or dancers.

7. Harassing the Associates and friends of the Criminal – These people will give the desired
information in exchange for peace, or by befriending or helping them to get out of the
mess of minor violations of law.

8. Arrested Criminals Known to the Subject – These persons must be interrogated with the
false information that the one responsible for their arrest is the information coming from
the criminals being sought. The underworld character should be intrigued about this
technique so that they would betray each other. There is always a power struggle
among the criminal syndicates for their continued existence.

9. In fresh cases, the bloodhound dogs or K-9 are used to track down the suspect in
squatter’s areas, open field or wooded terrain. This is most effective if piece of article
belonging to the criminal, left at the crime scene is sniffed by the dog as a sample of the
odor of the criminal.

10. In very recent cases, find out the ethnic origin of the criminal. If he/she is from Baguio
City, there is a great possibility that they will go home to his/her place. In the past, there
were successes in arresting the criminal at the pier or at the domestic airport within 3
days stick out.

11. Disguises – Beware of disguises employed by the criminal. Many suspects had eluded
police cordon or dragnet by pretending to be abnormal persons greased with the dark
oil and acting the mannerisms of the abnormal. Some suspects also attired themselves
with wigs and feminine dresses. In company with some women, they had easily passed
the police cordon.

12. Corrupting the known associates of the criminal through money – In the underworld,
money talks louder than other things.

13. Publication of Rewards – Done in newspapers of general circulation mostly read by the
masses. This effective for the capture of the criminal. A weeklong publication together
with the criminal’s picture will pay off.

|
The informant
The solution of a crime sometimes depends on the information furnished by the
informants and informers. Informers and informants are generally synonymous for they provide
information to the police authorities. The world informant is a general term that refers to any
person who gives information to the police authorities relative to a crime.

Who is an Informant?
An informant is any person who furnishes the police information relevant to a criminal
case about the activities of criminals or syndicates. This is done without any monetary
consideration. The informant may openly give information or may serve as a witness voluntarily.

Types of Informant
 Anonymous Informant
 He/she maybe an anonymous phone caller, letter writer or text sender. The duty
of the investigator is to receive the information, not to reveal any other
information to the caller about facts already known.

 Confidential Informant
 This is a person who provides the police with confidential information
concerning a previous crime or a projected and planned crime. He/she does not
want to be identified as the source of information. Under the law, these
informants are protected and their identity could not be revealed by the police
even under the order of the court unless on exceptional case where there is a
claim of the defense that the informant framed up the accused.

 Rival-Elimination Informant
 This kind of informant mostly maintains to be anonymous. His/her purpose is to
eliminate the rival person or gang due to competition or their motives such as
revenge, etc.

 False Informant
 This informant usually reveals information of no consequence, value or stuff
connected with thin air. His/her purpose is to appear to be on the side of the law
and for throwing out the suspicion form himself/herself or from gang or
associates.

 Frightened Informant
 He/she is prodded by fear or self-interest in giving information to the police.
He/she maybe one of the lesser gang member who runs to the police when
his/her gang mates are about to be involved in dangerous situations or when
the gang he/she belongs is hot on the police trail. Motivated by anxiety and self-
preservation of his/her well-being he/she furnishes the information to protect
himself and as a means of sustaining self-importance. This type is the weakest link
in the composition of the criminal chain.

|
 Self-Aggrandizing Informant
 This kind of informant moves around the centers of criminals, group or syndicates
and delights in surprising the police about bits of information. His/her
information may be of value by way of authentication in intelligence operation.

 Mercenary Informant
 The has information for sale. He/she may have been victimized in double-cross
or little share in the loot or given a dirty deal and seeks revenge as he/she will
profit in the disclosure.

 Double-Crosser Informant
 He/she uses his/her seeming desire to divulge information as an excuse to talk
to the police in order to get more information from them more than what is
given. To counter this kind of informant, the police applies the deception method
by giving false information that will lead to his/her capture.

 Women Informant
 She maybe the female associate of the criminals, who was roughed up,
marginalized in the deal or being eased out from the group. Care must be given
to this kind of informant because women, given the skills and expertise, are more
dangerous than me. They often give free romance that will result in blackmailing
the investigator or will result to an extended family for support. Women are said
to be most effective among informers because they could easily penetrate the
ranks of criminals with less suspicion. Besides, they could mingle with the crowd
easily and could obtain information more than their male counterparts, especially
if their beauty attracts attention. They have easier access to women associates of
male criminals. However, care should be employed as they could easily doubts-
cross the police once they fall in love with criminals.

Motives of Informants
The following are reasons why informant give information:
1. Vanity – The motive is for self-aggrandizement by gaining favorable attention and
importance by police.
2. Civic Mindedness – Informants provide information because they are imbued with the
sense of duty and obligation to assist the police in their task.
3. Fear – It is engendered illusion of oppression from enemies or from impending dangers.
4. Repentance – Those lesser criminals such as accomplices or accessories will have a
change in heart to unburden their conscience.

What is informer?
An informer is person who provides information to the police on a regular basis. They are
either paid regularly or in a case-to-case basis, or none all. They are cultivated and established
by the police on a more or less permanent character as long they are loyal and useful to the
police organization.

|
Selection of Informers
There is no hard and fixed rule in the selection of informants. The informers must be
indoctrinated that they are not immune from arrest and prosecution if they commit crimes. They
should not bring shame and dishonor to the police service. When they will commit crimes, they
should be punished like the rest. All the sectors of the society must be covered and their
composition included but not limited to taxi drivers, jeepney and bus drivers, vendors,
conductors, waiters, dancers, ex-convicts, shady or businessmen, prostitutes, the elite in the
society and others. They should be planted as moles or stole pigeons practically in all the corners
of the social order.

Critical areas in the Deployment of Informers


Informer may be deployed into dangerous areas such as:
 Within the ranks of criminals and criminal syndicates
 Associates and friends of criminals
 Places of hang-outs of criminals such as night clubs, bars, hotels, billiard halls and other
places
 Slums and residential places where criminals have their contacts
 Detention centers such as jails, prison, and temporary detention centers, etc.
 Places where criminals dispose their loots

Two Classical System of Gathering Information


1. English System
 This system involves gathering information that has a little consideration on paid
informants. This system relies more on the information provided voluntarily or
willingly by patriots or civic-minded informants.

2. French System
 This involves the practice of obtaining information that relies heavily on buying
information; this advocates the extensive use of informers.

You might also like