Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 30

POLICE INTELLIGENCE

POLICE INTELLIGENCE  

I. BASIC CONCEPTS  
INTELLIGENCE  
✔ The word INTELLIGENCE was derived from the  Latin word INTELLIGERE which
means to "pick  out" or “discern”.  
✔ A very general mental capability that, among other  things, involves the ability to
reason, plan, solve  problems, think abstractly, comprehend complex  ideas,
learn quickly and learn from experience. -   "MAINSTREAM SCIENCE ON
INTELLIGENCE"  (1994) 
✔ The capacity to meet situations, especially if new or  unforeseen, by a rapid and
effective adjustment of  behavior; also, the native ability to grasp the  significant
factors of a complex problem or  situation.- WEBSTER COMPREHENSIVE 
DICTIONARY 
✔ End product of information that has been subject to  the intelligence process,
which involves planning,  direction, collection, evaluation, collation, analysis, 
reporting, and dissemination - Royal Canadian  Mounted Police (RCMP) 

In Police Parlance, Intelligence is defined as:  ✔ Organization- An institution


composes of persons  who pursue of preparing plans or formulating  policies.  
✔ Activity- The organized effort to collect  information, to assess it little by little,
and piece it  together until it forms larger and clear patterns.  
✔ Product- The end product resulting from the  collection, evaluation, analysis,
integration, and  interpretation of all available information which may  have
immediate or potential significance to the  development and execution of plan,
policies and  programs of the user.  

NATURE OF INTELLIGENCE FUNCTION  


✔ Intelligence is responsible in procuring and  obtaining political, economic,
psychological,  sociological, military and other information which  may bear
upon, national interest and which had  been collected by the different
government and  agencies.  
✔ Intelligence is knowledge and powerful it can  prevent war and cause one it can
help in crime  control and crime prevention.  

II. HISTORICAL DEVELOPMENTS OF INTELLIGENCE  The first intelligence


operation recorded in history is  found in the Holy Bible.  
A. Number 13:17-32,Old Testament (Holy Bible) – Moses sent twelve (12) scouts
to the land of Canaan  where he detected directed them to spy the land, the  people
and their location and the nature of their cities.  
“And Moses sent them to spy out the land of Canaan and  said unto them, get you
up this way southward, and go up  into the mountain; and see the lands, what it is;
and the  people that dwell therein, whether they are strong or  weak, few or many;
and what the land they dwelt in,  
whether in tents, or in strongholds; and what land is;  whether it be fat or lean,
whether there be wood therein,  or not. And be of good courage and bring of the fruit
of  the land.” The scriptures also named the twelve  intelligence agents whom the
POLICE INTELLIGENCE

Lord directed Moses to sent  into the land of Canaan and records that “all those
men  were heads of the children of Israel.” 

THE 12 MEN SENT BY MOSES TO SPY CANAAN  ✔ Shammua the son of zaccur
– tribe of reuben  ✔ Shapat the son of hori – tribe of simeon  ✔ Caleb the son of
jephunneh – tribe of Judah  ✔ Igal the son of joseph – tribe of Issachar  ✔
Hoshea the son of nun – tribe of Ephraim  ✔ Palti the son of raphu – tribe of
Benjamin  ✔ Gaddiel the son of sodi – tribe of zebulun  ✔ Gaddi the son of susi –
tribe of joseph, that is from  the tribe of Manasseh  
✔ Ammiel the son of gemalli – tribe of dan  ✔ Sethur the son of
michael – tribe of asher  ✔ Nahbi the son of vopshi – tribe of napthali  ✔
Geuel the son of machi – tribe of gad  

B. Sun Tzu  
✔ He is traditionally believed to be the author of The  Art of War, an extremely
influential ancient Chinese  book on military strategy.  
✔ “Know yourself and your enemy, if you know  yourself and not the enemy for
every battle you will  be a foul who will meet defeats, but if you know  yourself
and the enemy, you need not fear the  result of a hundred battles “. In his book
"Art of  War.” 

C. Delilah  
✔ A biblical personality who was able to gain  information by using her beauty
and charm.  ✔ She was responsible for the fall of Samson a  known Israelite
leader who terrorized the  Philistines. 

D. Sir Arthur Wellesly  


✔ One of the leading military and political figures of  the 19th century.  
✔ He is often referred to as the "Duke of Wellington",  even after his death, even
though there have been  subsequent Dukes of Wellington.  
✔ He is regarded as the "Greatest Military Spymaster  at All Time".  
✔ He live by the motto; "All the business of war is to  find out what you don’t
know by what you do." ✔ He always studied the enemy in depth, finding out  not
only where the opposing army was and how  strong it was, but the character of
its commander,  the spirit and training of its troops, their battle  experience, and
how they were supplied with arms  and rations.  
✔ He also studied and mapped the roads, rivers and  topography of the war
theatre.
POLICE INTELLIGENCE

E. Frederick the Great 


✔ "Father of Organized Military Espionage". He  divided his agents into four
classes.  
✔ Common Spies- recruited among poor folk, glad to  earn a small sum or to
accommodate a military  officer;  
✔ Double Spies- the low informers and unreliable  renegades of value chiefly in
spreading false  information to the enemy;  
✔ Spies of Consequences - courtier and noblemen,  staff officers and kindred
conspirators always  requiring a considerable bribe or bat  
✔ Intimidated Spies - Persons who are forced to  undertake espionage against
their will.  

F. Alexander the Great  


✔ A renowned Greek conqueror had his share of  advance information when
rumors of discontent  circulated from among the ranks of his men.  
✔ He was able to identify those disloyal ones by  ordering the communication
letters opened and  was successful in curtailing the decline of esprit de  corps
and morale of his men.  

G. Sir Francis Walsingham of England  


✔ Protector of Queen Elizabeth I who organized the  secret police and established a
spy network to  detect fleet movement of enemies of the British  Empire
particularly the Portuguese.  
✔ He is regarded as the "First Great Spymaster", a  ruthless in the cause, he was
responsible for the  assassination, murdering and execution of people  who
covertly betrayed the queen.  
✔ He oversaw operations that penetrated Spanish  military preparation, gathered
intelligence from  across Europe, disrupted a range of plots against  Elizabeth,
and secured the execution of Mary,  Queen of Scots.  

H. Karl Schulmeister  
✔ He was an Austrian double agent for France during  the reign of Napoleon I.  
✔ He is famous as "Napoleon's Eye".  
✔ He acted as a General in Napoleon's army,  undertook espionage missions that
took him into  England and Ireland, and was appointed  commissioner of police
for Vienna during  Napoleon's second occupation in 1809  
✔ He was credited for establishing counter  intelligence conducted against spies.  
✔ He is a master of deceit who used black mail to  obtain vital information
pertaining to the personality  and identify of the enemies of Napoleon during the 
18th Century.  

I. Joseph Petrosino  
✔ He was a pioneer in the fight against organized  crime.  
POLICE INTELLIGENCE

✔ The various crime fighting techniques that  Petrosino pioneered during his law
enforcement  
career are still practiced by various agencies in the  fight against crime.  
✔ Member, New York Police Department in early  1900, he was the head of the
Italian Squad.  ✔ Through extensive intelligence network, he is  credited to
smash the Black Society. 

J. Joseph Fouche  
✔ The French statesman Joseph Fouche (1759 -  1820) served as minister of police
under Napoleon  and was influential in the return of Louis XVIII to the  throne in
1815.  

K. Admiral Yamamoto  
✔ He was a Japanese Marshal Admiral and the  commander-in-chief of the
Combined Fleet during  World War II, a graduate of the Imperial Japanese 
Naval Academy.  
✔ He was the commander-in-chief during the decisive  early years of the Pacific
War and so was  responsible for major battles such as Pearl Harbor  and
Midway.  
✔ April 1943, the Cryptanalysts of the U.S. Navy  Communications Intelligence
interpreted a top  secret signal relaying the travel of the Admiral En  route ha
was intercepted and crashed in the  Jungles of Baungainville.  
✔ He died during an inspection tour of forward  positions in the Solomon Islands
when his aircraft  (a Mitsubishi G4M "Betty" bomber) was shot down  during an
ambush by American P-38 Lightning  fighter planes.  

L. Herbert Yardley  
✔ He was an American cryptologist best known for  his book The American Black
Chamber. 
✔ Yardley began his career as a code clerk in the  U.S. State Department. He
accepted a Signal  Corps Reserve commission and served as a  cryptologic officer
with the American Expeditionary  Forces in France during World War I.  
✔ His career in cryptology began with his work in the  code room, as he broke the
U.S. government  codes that crossed his desk.  
✔ Head of the MI-8, The forerunner of the Top Secret  National Security
Administration a.k.a Black  Chamber, a Cryptanalytic Organization.  

M. Napoleon Bonaparte  
✔ He was a French military and political leader who  rose to prominence during the
latter stages of the  French Revolution and its associated wars in  Europe.  
✔ has been a major influence on many civil law  jurisdictions worldwide, but he is
best remembered  for his role in the wars led against France by a  series of
coalitions, the so-called Napoleonic Wars.  
✔ "One Spy in the right place is worth 20,000 men in  the field".

N. Akbar  
POLICE INTELLIGENCE

✔ Known as Akbar the Great, was Mughal  Emperor from 1556 until his death.  
✔ The "Great Mogul" and wise master of Hindustan  employed more than 4,000
agents for the sole  purpose of bringing him the truth that his throne  might rest
upon it.  

O. Battle of Midway  
✔ It was one of the most important naval battles of  the Pacific Campaign of World
War II.  
✔ In June 1442, the turning point of the Naval in the  Pacific, the victory gained by
the Americans was  due to the disrupted messages from the Imperial  Japanese
Navy.  
✔ Military historian John Keegan called it "the most  stunning and decisive blow in
the history of naval  warfare."  
✔ It was Japan's worst naval defeat in 350 years.  

Q. Julius Caesar  
✔ During his time, the staff of each legion includes  ten "speculators" who served
as an information collecting agency.  
✔ The "speculators" were the first intelligence  personnel to appear definitely in a
military  organization.  
✔ Military success of the Romans was aided by  communication system, Made use
of carrier  pigeons, which made possible the amazing speed  with which
intelligence of the Imperial Rome was  transmitted.  
✔ They also employed ciphers to ensure secrecy of  communications.  

R. Wilhelm Johann Karl Eduard Steiber 


✔ Otto von Bismarck's master spy and director of the  Prussian Feldgendarmerie.  
✔ Stieber was both an agent of domestic surveillance  and an external agent.  
✔ Along with Joseph Fouché, he invented modern  information gathering  
✔ He is known as the Prussia's "King of  Sleuthhounds" as minister of police he
studied the  use of propaganda and censorship as well as  utilizing statistical
intelligence accounting.  
✔ Steiber's thorough organization and ruthless, his  sinister innovations and cold,
calculating  manipulation of human weakness made him the  spymaster who
most shape the course of the 20th  century espionage.  

S. Alfred Redl  
✔ He was one of the leading figures of pre-World War  I espionage.  
✔ His term in office was marked by innovation, and  he used very high technology
for the time to  ensnare foreign intelligence agents  
✔ A homosexual Double Spy who while working as  intelligence direct proof Austria
and Hungary, spied  the Russians.  
✔ His treasons activities were discovered and  compelled to commit suicide.  
✔ His spying led to the death of over 500,000 agents  and soldiers combined in his
13 years episode as a  spy.  
POLICE INTELLIGENCE

T. Sir Samuel Luke  


✔ Chief Scout of Oliver Cromwell who was able to  dethrone King Charles I in
British Civil War of  1640's.  
✔ Sir Samuel Luke was said to be hard-working in  inquiring on the enemy. 

U. John Churchill  
✔ His leadership of the allied armies consolidated  Britain's emergence as a front-
rank power. He  successfully maintained unity among the allies,  thereby
demonstrating his diplomatic skills.  
✔ He told critics of his enormous expenditure on  espionage that “No war can be
conducted  successfully without early and good intelligence,  and such advices
cannot be had but a very great  expense 

V. Edward I  
✔ Also known as Edward Longshanks and the  Hammer of the Scots (Latin:
Malleus Scotorum),  was King of England from 1272 to 1307.  
✔ He was temperamental, and this, along with his  height, made him an
intimidating man, and he often  instilled fear in his contemporaries.  
✔ Modern historians are divided on their assessment  of the king: while some have
praised him for his  contribution to the law and administration, others  have
criticised him for his uncompromising attitude  towards his nobility.  
✔ He is credited with many accomplishments during  his reign, including restoring
royal authority after  the reign of Henry III, establishing Parliament as a 
permanent institution and thereby also a functional  system for raising taxes,
and reforming the law  through statutes.  
✔ An English monarch who started utilizing English  informants especially to
determine seditious  writings against the crown and identify  

W. George Washington 
✔ As Grand Master mobilized the free masons of the  colonies at the outbreak of
the American war of  Independence.  
✔ First President of the United States (1789–1797),  the commander-in-chief of the
Continental Army  during the American Revolutionary War, and one of  the
Founding Fathers of the United States.  
✔ Because of his strategy, Revolutionary forces  captured major British army’s at
Saratoga in 1777  and Yorktown in 1781.  
✔ Historians praise Washington for his selection and  supervision of his generals,
encouragement of  morale and ability to hold together the army,  coordination
with the state governors and state 

militia units, relations with Congress and attention  to supplies, logistics, and
training.  

X. Hannibal 
✔ He was a Punic Carthaginian military commander,  generally considered one of
the greatest military  commanders in history.  
POLICE INTELLIGENCE

✔ He was considered one of the brilliant military  strategists in the history of


military intelligence.  ✔ He had developed an effective intelligence system  for 15
years in Rome.  
✔ He usually roam around the city often disguise  himself as a beggar to gather
first-hand  information.  

III. MOST OUTSTANDING INTELLIGENCE AGENCIES  INTELLIGENCE


AGENCY  
✔ It is a government agency responsible for the  collection, analysis or exploitation
of information  and intelligence in support of law enforcement,  national
security, defense, and foreign policy  objectives.  
✔ Effective instrument of a national power.  
✔ Aggressive intelligence is its primary weapon to  destabilize the target.  
✔ Means of information gathering are both overt and  covert and may include
espionage,  communication, cooperation with other institutions,  and evaluation
of public sources.  

Intelligence agencies can provide the following services for their national
governments.  
✔ Provision of analysis in areas relevant to national  security 
✔ Give early warning of impending crises  
✔ Inform national defense planning and military  operations  
✔ Serve national and international crisis  management by helping to discern the
intentions of  current or potential opponents  
✔ Inform national defense planning and military  operations  
✔ Protect sensitive information secrets, both of their  own sources and activities,
and those of other state  agencies  
✔ May act covertly to influence the outcome of events  in favour of national
interests, or  influence international security  
✔ Defense against the efforts of other national  intelligence agencies  

A. Australian Secret Intelligence Service (ASIS)  ✔ Government intelligence of


Australia which  is responsible for collecting foreign intelligence undertaking
counter-intelligence activities and  cooperation with other intelligence agencies 
overseas.  
✔ Its primary responsibility is gathering intelligence  from mainly Asian and Pacific
interests using  agents stationed in a wide variety of areas.  
✔ Its main purpose, as with most agencies, is to  protect the country’s political and
economic  
interests while ensuring safety for the people of  Australia against national
threats.  

B. Research and Analysis Wing (R&AW or RAW)  ✔ Research and Analysis Wing is
India’s external  intelligence agency.  
✔ It was formed in September 1968 under the  helmsman-ship of its first Director,
R. N. Kao. Its  creation was necessitated by the poor performance  of the
POLICE INTELLIGENCE

Intelligence Bureau (which then handled both  internal and external


intelligence)  
✔ Its primary function is collection of external  intelligence, counter-terrorism and
covert  operations.  
✔ In addition, it is responsible for obtaining and  analyzing information about
foreign governments,  corporations, and persons, in order to advise Indian 
foreign policymakers.  

C. General Directorate for External Security  ✔ Directorate General for External


Security is  France’s external intelligence agency.  
✔ Operating under the direction of the French ministry  of defense, the agency
works alongside the DCRI  (the Central Directorate of Interior Intelligence) in 
providing intelligence and national security, notably  by performing paramilitary
and counterintelligence  operations abroad.  
✔ Its primary focus is to gather intelligence from  foreign sources to assist in
military and strategic  decisions for the country.  
✔ The agency employs more than five thousand  people. 

D. Federal Security Service of Russian Federation  (FSD)  


✔ The Federal Security Service of Russian  Federation (FSD) is the main domestic
security  agency of the Russian Federation and the main  successor agency of
the Soviet-era Cheka, NKVD  and KGB.  
✔ The FSD is involved in counter-intelligence, internal  and border security,
counter-terrorism, and  surveillance.  
✔ The FSD is responsible for internal security of the  Russian state,
counterespionage, and the fight  against organized crime, terrorism, and drug 
smuggling.  
✔ The number of FSD personnel and its budget  remain state secrets, although the
budget was  reported to jump nearly 40% in 2006.  

E. Bundesnachrichtendienst (BND)  
✔ The Bundesnachrichtendienst is the foreign  intelligence agency of the
German government,  ✔ The BND acts as an early warning system to alert  
the German government to threats to German  interests from abroad.  
✔ It depends heavily on wiretapping and electronic  surveillance of international
communications.  ✔ It collects and evaluates information on a variety of  areas
such as international terrorism, WMD 

proliferation and illegal transfer of technology,  organized crime, weapons and


drug trafficking,  money laundering, illegal migration and information 
warfare.  
✔ As Germany’s only overseas intelligence service,  the BND gathers both
military and civil intelligence. 

F. Ministry of State Security (MSS)  


POLICE INTELLIGENCE

✔ Ministry of State Security is the security agency of  the People’s Republic of
China. 
✔ Article 4 of the Criminal Procedure Law gives the  MSS the same authority to
arrest or detain people  as regular police for crimes involving state security  with
identical supervision  
✔ One of the primary missions of the MSS is  undoubtedly to gather foreign
intelligence from  targets in various countries overseas.  
✔ Many MSS agents are said to have operated in the  Greater China region.  

G. Central Intelligence Agency (CIA)  


✔ It is an executive agency and reports directly to  the Director of National
Intelligence with  responsibility for providing national  security intelligence
assessment to senior United  States policymakers.  
✔ A predecessor of the Office of Strategic Services  (OSS), which was formed in
1942 and renamed  CIA in 1947.  
✔ CIA is the largest of the intelligence agencies and  is responsible for gathering
data from other  countries that could impact U.S. policy.  
✔ It is a civilian intelligence agency of the United  States government responsible
for providing  national security intelligence to senior United  States
policymakers.  
✔ The CIA also engages in covert activities at the  request of the President of the
United States of  America.  
✔ It has failed to control terrorism activities including  9/11, Not even a single top
level Al-Qaeda leader  captured own its own in the past 13 years –.  
✔ Highly funded and technologically most advanced  Intelligence set-up in the
world.  
✔ The First Director of the Agency was Rear Admiral  Roscoe Hillenkoetter  

H. Secret Intelligence Service (SIS) MI-6  


✔ The Secret Intelligence Service (SIS) supplies  the British Government with
foreign intelligence.  ✔ It operates under the formal direction of the Joint  
Intelligence Committee (JIC) alongside the  internal Security Service (MI5), the
Government  Communications Headquarters (GCHQ) and  the Defense
Intelligence (DI).  
✔ It is frequently referred to by the name MI6, a name  used as a flag of
convenience during the Second  World War when it was known by many
names.  
✔ The existence of MI6 was not officially  acknowledged until 1994.  
I. Mossad  
✔ The Mossad is responsible for intelligence  collection and covert operations
including  paramilitary activities.  
✔ It is one of the main entities in the Israeli  Intelligence Community, along with
Aman (military  intelligence) and Shin Bet (internal security), but its  director
reports directly to the Prime Minister.  

J. Inter-Services Intelligence (ISI)  


POLICE INTELLIGENCE

✔ With the lengthiest track record of success, the  best know Intelligence so far on
the scale of  records is ISI.  
✔ The Inter-Services Intelligence was created as an  independent unit in 1948 in
order to strengthen the  performance of Pakistan’s Military Intelligence  during
the Indo-Pakistani War of 1947.  
✔ The best of its time, failed to counter ISI and  protect Soviet interests in Central
Asia.  
✔ It has protected its Nuclear Weapons since formed  and it has foiled Indian
attempts to attain ultimate  supremacy in the South-Asian theatres through 
internal destabilization of India. It is above All laws  in its host country Pakistan
‘A State, with in a  State’. 
✔ Its personnel have never been caught on camera.  ✔ It is believed to have the
highest number of agents  worldwide, close to 10,000.  

NATIONAL INTELLIGENCE COORDINATING AGENCY  (NICA)  


It is the primary intelligence gathering and  analysis arm of the Philippine
government, which is under  the Office of the National Security Adviser; NICA is in 
charge of carrying out overt, covert,  and clandestine intelligence programs. Its
motto  is: "Knowledge is Safety”. Presently, NICA is in close  coordination with the
CIA, Mossad, Secret Intelligence  Service and intelligence services of ASEAN
countries to  counter the threat of terrorism.  
The agency is led by a Director-General and is  assisted by a Deputy
Director-General. The former  reports directly to the President. The NICA has a
National  Intelligence Board that serves as an advisory board to the  Director-
General before he would submit his findings to  the President relating to national
security matters  affecting the Philippines.  

IV. PRINCIPLES OF INTELLIGENCE  


A. INTELLIGENCE AND OPERATION ARE  INTERDEPENDENT  
✔ Intelligence provides valuable inputs for  effectiveness of police operation on the
other hand  operation likewise is needed for continuity of  intelligence activities. 
✔ Operation and intelligence planners work hand and  hand to attain greater
degree of success in their  common effort. 

B. INTELLIGENCE IS CONTINUOUS  
✔ The basic principle of intelligence operations is that  intelligence activities follow
a simple cycle, which is  continuous at the same time that new information is 
being collected in response to direction, other  information is being processed
and intelligence is  being used.  

C. INTELLIGENCE MUST BE USEFUL  


✔ It must serve the commander’s need and  requirements so that effort will not
be wasted.  ✔ It should have an application and significance to  the operation.  

D. INTELLIGENCE MUST BE AVAILABLE ON TIME  


C. MILITARY INTELLIGENCE – refers to the knowledge  by the military institution
essential in the preparation and  execution of military plans, policies and
programs.  
POLICE INTELLIGENCE

VI. INTELLIGENCE CYCLE PLANNING

✔ Intelligence must be communicated to the decision  maker at the appropriate


time to permit its most  effective use.  

✔ It must reach the user in time to serve as basis for  appropriate action. Intel data
must be disseminated  on time because late arrival is as good as useless.  

✔ The success of objective is paramount importance.  Intelligence personnel are


reminded to refrain from  utilizing criminal elements in Intel operation.  
✔ They must use their resourcefulness to obtain more  than what is normally.  

F. INTELLIGENCE MUST BE FLEXIBLE  


✔ Intelligence Operations must be changeable  according to the present situation,
condition and  other factors, Intelligence Operations are based on  reason and
sound judgment.  
✔ Procedures which do not readily adapt to a given  situation are generally
discarded.  

G. INTELLIGENCE REQUIRES CONTINUOUS  SECURITY MEASURES 


✔ Deny unauthorized personal information about  operation and intelligence product, its
source and  organization itself.  
✔ In the handling of classified materials there  should be a working balance between
secrecy  and operational convenience  

V. CATEGORIES OF INTELLIGENCE  
A. NATIONAL INTELLIGENCE- integrated product of  intelligence developed by all
government departments  concerning the broad aspect of national policy and 
national security. 
▪ National Policy – specific courses of action to  achieve the national objectives.  
▪ National Security – this relate to the protection and  preservation of military,
economic and a productive  strength of a country including the security of the 
government and domestics and foreign affairs against  espionage, sabotage and
subversion.  

B. DEPARTMENT INTELLIGENCE – the intelligence  required by department or


agencies of the government to  execute its mission and discharge its
responsibilities.  

Planning and Supervision of the Collection Effort  ✔ The intelligence officer must
have a thorough  knowledge of the available sources of information,  the collecting
agencies and type of information the  latter can provide.  
✔ He must understand the operations of the  command in order to provide the
particular  intelligence required for success.  
✔ He must have a thorough knowledge of the tactics,  organizations and
characteristics of the enemy.  ✔ He must be especially competent in the fields of 
POLICE INTELLIGENCE

surveillance, reconnaissance, counter reconnaissance, and acquisition of


operations.  

A. PLANNING AND DIRECTING THE COLLECTION  EFFORTS  


1. Determination of Requirements  
✔ Enemy capabilities, including time, place, strength,  or other details  
✔ Enemy vulnerabilities, including nature, extent,  performance and other details  
✔ Enemy order of battle and factors  
✔ Terrain, including natural and artificial obstacles  ✔ Weather  
✔ Information desired by higher, lower or adjacent  headquarters  

2. Determination of the Priority Intelligence  Requirement {PIR formerly


Essential Elements of  Information (EEI)}  
✔ Is an item of intelligence or information of  characteristics of the area of
operations and the  enemy, which the commander feels he needs  before he can
reasonably arrive at a decision.  

3. Establishment of Priorities  
✔ Priorities reflect the criticality of the need for the  particular information. No
formula exists which can  automatically determine priorities. Such 
determination is a matter of judgment.  

B. COLLECTION OF INFORMATION  
To successfully plan and perform the collection effort, the  intelligence officer must
have thorough knowledge of the  available sources of information and collecting
agencies  and the type of information they can provide and consider  the
following:  
✔ Determine collecting agency  
✔ Send orders or request  
✔ Supervise collection efforts  
✔ Use tools or technique in collection  
✔ Ensure timely collection  

FACTORS IN CHOOSING COLLECTION AGENTS  ✔ Capability – agents placement


or access to other  target  
✔ Multiplicity – more agents  
✔ Balance – number of agents needed in operation  ✔ Suitability – consistent
with primary mission  

C. PROCESSING THE COLLECTED INFORMATION  Five steps in processing


collected information which is  then converted into Intelligence  

1. Recording – is the reduction of information into  writing or some other form of


graphical representation and the arranging of this information into groups  related
items.  
POLICE INTELLIGENCE

COMMON MEANS OF RECORDING  


▪ Journal 
✔ Permanent chronological record of reports &  messages that have been
received & transmitted  ✔ Action taken in response, usually 24 hours  ✔ Journal
entries should reflect  
1. An accurate and concise statement of the message,  report, or event  
2. A notation as to the sender or individual making the  reports, to include specific
unit position  
3. The time of receipt or dispatch and method of  transmission  

▪ Intelligence Situation Map 


✔ A temporary graphic display of the current  dispositions and major activities of
the enemy  ✔ Information of the friendly forces on this map is  usually limited to
boundaries  
✔ Location of command posts of higher, lower and  adjacent units; and forward
edge of the battle area  ✔ The latest time at which an activity was observed or 
the disposition confirmed should be indicated when  plotting enemy activities
and dispositions  
✔ The intelligence Officer keeps the situation map or  overlay as simple as
possible  
✔ He should use authorized conventional or standard  signs, symbols and
abbreviations  
✔ Some of the primary intelligence uses of the  situation map are the following:  
✔ To display the enemy disposition and situation  ✔ To provide a basis for
comparison in order to  determine the significance of newly received data 
pertaining to the enemy  
✔ To provide a background basis for briefings and  other required intelligence
reports  
✔ To provide the basis for overlays which graphically  portray the enemy situation  
✔ To assist in the determination of the patterns of  movement of guerilla insurgent
forces  
✔ To focus attention on possible intelligence gaps  which require redirection of
the collection effort  

▪ Intelligence Workbook or Worksheet 


▪ Systematic arrangement by subject heading which  aids in the sorting, evaluation
and interpretation of  information and in the preparation of intelligence 
reports  
▪ It can be maintained depending on the  requirements of the unit  

▪ Intelligence Files 
✔ It necessary to permit ready access to all available  information and not just the
current ones  
✔ These are usually special file that may be kept by  the unit  
POLICE INTELLIGENCE

2. Evaluation 
✔ Determination of the pertinence of the  information to the operation, reliability of the 
source of or agency and the accuracy of the  information.  
✔ Process by which the intelligence officer makes  decisions about the information
contained in a  report  

Evaluation to Determine:  
a) Pertinence  
The question of pertinence is one of the first  questions that must be answered 
1. Is this information about any of the requirements that  I have? Does it pertain to
any of the problems that I  must solve? 
2. Is this information needed immediately? If so, who  needs it? 
3. Is this information of present or future value? If so, to  whom? 

b) Reliability – judging the source of information or  agency  

c) Accuracy – truth of information  

Is it possible for the reported fact or event to  have taken place?  
✔ Is the report consistent within itself?  
✔ Is the report confirmed or corroborated by  information from different
sources or agencies.  ✔ If the report does not agree with information from 
other sources which one is more likely to be true 

EVALUATION GUIDE FOR COLECTED INFORMATION  


VII. POLICE INTELLIGENCE OPERATIONS  

Reliability of  Information  CODE:  


CUFNUR  

Completely  Reliable  

Usually  
Reliable  

Fairly  
Reliable  

Not Usually  Reliable  
E  
Unreliable  

F  
Reliability  
Cannot Be  Judged  
POLICE INTELLIGENCE

Accuracy of  Information  CODE:  


CProPoDIT  1  
Confirmed By  Other Sources  2  
Probably  
True  
3  
Possibly  
True  
4  
Doubtfully  
True  
5  
Improbable  

6  
Truth Cannot  Be Judged  

Source of the  
Information  

T – Direct Observation  by a commander or  Unit  


U – Report by a  penetration or resident  agent  
V – Report by an AFP  trooper or PNP  personnel in operation  W – Interrogation of a 
captured enemy or  agent  
X – Observation by a  government or civilian  employee or official  Y – Observation by
a  member of populace  
Z - Documentary 
POLICE INTELLIGENCE – The end product resulting  from the collection, evaluation,
analysis, integration and  interpretation of all available information regarding the 
activities of criminals and other law violators for the  purpose of affecting their arrest,
obtaining evidence, and  forestalling plan to commit crimes.  

A. CATEGORIES OF POLICE INTELLIGENCE  1. STRATEGIC INTELLIGENCE –


knowledge pertaining  to the capabilities and vulnerabilities of a foreign nation,  which
is required by the National Planners for the  formulation of an adequate National
Defense in peace  and forms the basis for, projected. This is intelligence  information
which is not immediate operational but rather  long range.  

Components of Strategic Intelligence  


▪ Political Intelligence – deals with Domestic and  Foreign affairs and relation of
government operations;  ✔ Basic Principles of the Government  
✔ Government Structures  
✔ Public Order and Safety  
✔ Subversion  
✔ Intelligence and Security Organization  

NOTE: You should LEARN BY HEART this Evaluation  Guide  


POLICE INTELLIGENCE

3. Analysis – This is the stage in which the collected  information is subjected to


review in order to satisfy  significant facts and derive conclusion there from.  

4. Integration – The combination of the elements isolated analysis with other


known information related to  the operation.  

5. Interpretation  
✔ Process of determining the significance of new  information in the possible
alternatives.  
✔ The interpreter determines the significance of the  information as to the meaning of
the interpreted  information.  

D. Dissemination  
✔ Processed information or intelligence data are  disseminated to end users.  
✔ Common methods of disseminating Intel data are  conferences, briefing and person
to person  exchanges. 
✔ Those in charge of the entire intelligence operation  must make it a point that
intelligence gets into the  hands of those who commissioned it and those who 
needs it (whether they know that they need it or not)  
✔ Using the intelligence, policy-makers come to  decisions, decisions that may well
carry with them the  need for more intelligence (and their trigger the  intelligence
cycle again)  
✔ “Intelligence does no good at all if it simply  languishes on an analyst's desk
or in dust collecting files” 
✔ In this process, consider the factors of timeliness,  correctness and security.  
▪ Economic Intelligence – deals with the extent and  utilization of Natural and
Human resources to the  industrial potential of the Nations  
▪ Transportation and Telecommunication  Intelligence – concerned with the
operations and  facilities not only the Military but also the Civilians.  
▪ Sociological Intelligence – deals with the  demographic and psychological aspects
of groups of  people.  
✔ Population and Manpower  
✔ Characteristics of the People  
✔ Public Opinion – attitudes of the majority of  the people towards matters
of public policy.  ✔ Education – based on literacy rate  
▪ Biographical Intelligence – deals with individual  personalities who have actual
possession of power  ▪ Armed Forces Intelligence – deals with the armed  forces
of the Nation.  
✔ Position of the Armed Forces – constitutional  and legal basis of its
creation and actual role.  ✔ Organization and structure and territorial 
disposition  
✔ Military Manpower Recruitment  
✔ Order of Battle- arrangement of military troops  for battle.  
▪ Geographical Intelligence – deals with the natural as  well as manmade features of
the physical environment  of man considered from the point in view of military 
operations.  
POLICE INTELLIGENCE

✔ Location – military and economic importance  ✔ Size – measurement of


which a nation can  exchange space or time during war.  
✔ Shape  
✔ Weather and Climate  
▪ Scientific Intelligence – deals with the progress of  the research and development
as it affects the  economic and military potential of a nation.  

2. COUNTER - INTELLIGENCE – phase of intelligence  covering the activity


devoted in destroying the  effectiveness of hostile foreign activities and the 
protection of information against espionage, subversion  and sabotage. It also
includes protection the organization  itself.  
a. Types of Counter-Intelligence  
✔ Passive CI Measures – protection of classified  and sensitive information to the
unauthorized  through secrecy, communication security, and  other various
safeguards.  
✔ Active CI Measures – are those measures,  which seek actively to block the
enemies’ effort to  gain information or engage in espionage,  subversion, and
sabotage.  
b. Concept of Counter - Intelligence  
✔ Detection – knowing the clandestine operation of  the enemy.  
✔ Prevention – Application of CI measures to avoid  enemy activities.  
✔ Neutralization – It is the containment of enemy  activities.  
c. Objectives and importance of counter-intelligence  ✔ It Denies information
to the enemy  
✔ It Reduces the risk of a command  
✔ Aids in achieving surprises  
✔ Increases the security of the command  
✔ Decreases the enemy ability to create  information about the forces.  
d. Activities and Function of Counter-Intelligence  ✔ Protection of information
against espionage  ✔ Protection of personnel against subversion  ✔ Protection of
installations and materials against  sabotage  
e. Categories of Counter-Intelligence operation  ✔ Military Security – it
encompasses the  measures taken by a command to protect itself  against
espionage, enemy operation, sabotage,  subversion or surprise.  
✔ Port boundary and Travel Security – has to do  with the application of both
military and civil  security measures for counterintelligence control  at point of
entry and departure, international  borders and boundaries.  
✔ Civil Security – it encompasses active and  passive counterintelligence
measures affecting  the non-military nationals permanently or  temporarily
residing in an area under military  jurisdiction.  
✔ Special Operations – counter subversion,  sabotage and espionage.  

3. LINE OR TACTICAL INTELLIGENCE – it is the  intelligence information which


directly contributes to the  accomplishment of specific objectives and immediate in 
nature, necessary for more effective police planning and  operation.  

INTEL INFORMATION TO BE DETERMINED IN LINE  INTELLIGENCE (PWET)  


POLICE INTELLIGENCE

▪ People – Living Condition of the people, sources of  income, education of the
people, government  
livelihood projects, extent of enemy influence to the  people.  
▪ Weather – Visibility, Cloudy, Temperature,  Precipitation, Tactical capability,
Enemy Vulnerability.  ▪ Enemy – Location of the enemy, Strength of the  enemy,
Disposition, Tactical Capability, Enemy  Vulnerability  
▪ Terrain – relief and drainage system, vegetation,  surface material, Man – Made
features.  

B. FUNCTIONAL CLASSIFICATIONS OF POLICE  INTELLIGENCE  


✔ Criminal Intelligence (CRIMINT) – refers to the  knowledge essential to the
prevention of crimes and  the investigation, arrest, and prosecution of criminal 
offenders.  
✔ Internal Security Intelligence (INSINT) – refers to  the knowledge essential to
the maintenance of  peace and order.  
✔ Public Safety Intelligence (PUSINT) – refers to the  knowledge essential to
ensure the protection of lives  and properties.  

VIII. METHODS AND TECHNIQUES OF COLLECTING  INFORMATION  


Information – All evaluated materials of every  description including those derived
from observation,  reports, rumors, imagery, and other sources from which 
intelligence is produced.  

TYPES OF AGENT USED IN COLLECTING OF  INFORMATION  


✔ Agent of Influence- Agent who uses authority to  gain information  
✔ Agent in Place- Agent who has been recruited  within a highly sensitive target  
✔ Penetration Agent- Agent who have reached to  the enemy, gather information
and able to get back  without being caught.  
✔ Expendable Agent- Agent who leaks false  information to the enemy.  
✔ Double Agent- An enemy agent, who has been  taken into custody, turned around
and sent back  where he came from as an agent of his captors.  

CLASSIFICATIONS OF SOURCES OF INFORMATION  A. Open Sources – 99% of


the information collected are  coming from open sources or obtained from Overt 
Operation.  

Overt Operation – also known as Open Operation,  method of collecting


information openly regardless the  subject is aware that we are collecting
information,  commonly is by use of clipping. 
✔ Enemy Activities  
✔ Captured Documents  
✔ Map  
✔ Weather Forecast, Studies, Reports  
✔ Agencies  
POLICE INTELLIGENCE

B. Close Sources – Only 1% of information are obtained  from clandestine


operation. 

Covert Operation – also known as Clandestine  Operation or Close Operation,


method of collecting  information secretly or by using a cover without the 
knowledge of the subject.  

ELEMENTS OF COVERT OPERATION  


1. Sponsor – directs the organization conducting the  clandestine activity.  
2. Target – Person, place or things against which the  clandestine activity is to be
conducted.  
3. Agent – It refers to a person who conducts the  clandestine Operations to
include Principal Agents,  Action Agents, and Support Agents.  
✔ Principal Agent – Leader or management Agent in  clandestine operation usually
undertaken by the case  officer.  
✔ Action Agent – The who one who conducts the  clandestine Operation that
includes:  
✔ Espionage Agent – Agent who clandestinely procure  or collect information.  
✔ Propagandist – Agents who molds the attitudes,  opinions, and actions of an
individual group or nation.  ✔ Saboteur – Agents who undertakes positive actions 
against an unfriendly power, resulting in the loss of  use temporarily or
permanently of an article or others.  ✔ Guerilla – Agent who is a member of
paramilitary  group organized to harass the enemy in a hot war  situation.  
✔ Strong Arm – Agent who is made to provide special  protection during dangerous
phase of clandestine  operations.  
✔ Provocateur – Agent who induces an opponent to  act to his own detriment by
discrediting himself or by  revealing his true purpose or identity.  
✔ Support Agent – Agent who is engaged in activities  which supports the clandestine
operations and or the  action agent in his operations that includes the  following:  
✔ Surveillant – Agent who observes persons and  places of operations of interest.  
✔ Investigator – Agent who undertake to procure  information or things of
clandestine operation.  ✔ Procurer of Funds – Agent who obtain money when 
needed for operational use.  
✔ Safe house Keeper – Agents who manages and  maintains a safe house for
clandestine operations  like meetings, safe heavens, training, briefing, and 
debriefing.  
✔ Communication Agent – Agent who is detailed as  securing of clandestine
communications.  

KINDS OF COVERT OPERATION  


1. SURVEILLANCE – is the covert, discreet observation  of people and places for
the purpose of obtaining  information concerning the identities or activities of 
subjects.  

OBJECTIVES OF SURVEILLANCE  
POLICE INTELLIGENCE

✔ To identify persons involved in certain activities  ✔ To secure basis for


securing search warrant  ✔ To obtain detailed information about the nature, 
scope of subjects activities  
✔ To check on source of information  
✔ To develop leads to vital information  
✔ To confirm or deny allegations  
✔ To provide protection  

TERMS TO PONDER IN SURVEILLANCE 


▪ Surveillant – is the plainclothes investigator assigned  to make the observation.  
▪ Subject – is who or what is observed. It can be a  person, place, property, and
vehicle, group of people,  organization or object.  
▪ Area Target Study – refers to area of operation of  surveillance activities  
▪ Log – chronological records of activities that took  place in the establishment
under surveillance.  ▪ Safe house- Refers to a place where agents meet  each other
for purposes of de-briefing and reporting.  ▪ Live Drop- Refers to a place where
agents or  informants leave their messages to the other Agents.  ▪ Decoy- A person
or object used by the subject in  attempt to elude Surveillant  
▪ Convoy- An associate of the subject who follows him  to detect surveillance. 
▪ Contact - Any person whom the subjects picks or  deals with while he is under
observation and identifies  the observer  
▪ Made – when subject under surveillance becomes  aware that he is under
observation and identifies the  observer also known as “ Burnt out” 
▪ Lost – when the surveillant does not know the  whereabouts of his subject or the
subject had eluded  the surveillance.  

TYPES OF SURVEILLANCE  
A. ACCORDING TO METHODS 
✔ Stationary Surveillance – also referred to as Fixed  and Stakeout Surveillance –
is used when you know  or suspect that a person is at or will come to a  known
location when you suspect that stolen goods  are to be dropped or when
informants have told you  that a crime is going to be committed.  
✔ Technical Surveillance – by the use of  communications and electronics gadgets,
system and  equipment.  
✔ Moving Surveillance or Shadowing or tailing – simply the act of following a
person.  

B. ACCORDING TO INTENSITY AND SENSITIVITY ✔ Loose tail – employed


where a general impression  of the subject’s habits and associates is required. 
Employed also when the subject is a material witness  and must be protected from
harm or other  undesirable influences.  
✔ Close tail – extreme precautions are taken against  losing the subject is employed
where constant  surveillance is necessary.  
✔ Rough Shadowing – employed without special  precautions, the subject maybe
aware of the  surveillance.

Methods of shadowing  
POLICE INTELLIGENCE

✔ One man – Extremely difficult and should be  avoided, if unavoidable keep subject
in view at all  times.  
✔ Two man – two agents are employed to follow the  subject  
✔ ABC method – reduces the risk of losing the subject,  affords greater security
agents detection  
✔ Progressive/ Leap from method – poor chances of  obtaining good results, agents
are stations at a fixed  point assuming that subject followed the same  general
route each day.  
✔ Combined foot-auto surveillance – employment of  surveillant on foot and
agents in an automobile.  

WHAT ARE THE THINGS SHOULD BE AVOIDED IN  SURVEILLANCE  


✔ Don’t meet the eye of the subject 
✔ Don’t adopt a slinking, sleuthing, creeping  manner  
✔ Don’t wear story book disguises 
✔ Don’t carry noticeable items 
✔ Don’t greet fellow agents 
✔ Don’t make entries in your notebook in public  place  
✔ Don’t Spent money to much 

ESSENTIAL REQUIREMENTS AND APPEARANCE  ✔ Always be alert  


✔ Be a good talker  
✔ Be resourceful  
✔ Average size, built and general appearance  ✔ Have no peculiarities in
appearance  
✔ Should have perseverance and able to wait for  hours  

2. CASING – It is the careful inspection of a place or  building to determine its


suitability for a particular  operational purpose. It is also known as the 
RECONNAISSANCE or RECCE in Military term.  

PRINCIPLES IN CASING  
✔ Know the best route to get there  
✔ Know how to conduct yourself without attracting  attention  
✔ Know what security hazards are in the area and  how can they avoid or
minimize.  
✔ Know the best route to extricate from the area.  

TYPES OF CASING  
✔ External – close observation and clear description of  an area, building or
installation, particularly its  location, approaches and exits and its immediate 
vicinity.  
✔ Internal – close observation and clear description of  the layout of a building, an
office or a room etc.  

METHODS OF CASING  
POLICE INTELLIGENCE

✔ Personal Reconnaissance – most effective method  and will produced the most
info since you know what  you’re looking for. 
✔ Map Reconnaissance – it may not sufficient but it can  produce a certain
amount of usable information  ✔ Research – more information can be acquired
best  used with other methods.  
✔ Prior Information – those records in your file unit that  may provide valuable
information.  
✔ Hearsay – Information usually gain by the person  operating in the area and
performing casing job.  

BASIC PROCEDURES IN THE CONDUCT OF CASING  ✔ Preparation of general


location map  
✔ Sketch of the adjoining establishment and prominent  features  
✔ Specific sketch or floor plan of main target  ✔ Detailed features of inner portion
of target and its  description  
✔ Photograph of the casing target (general to specific)  

3. ELICITATION – The process of extracting information  from a person believes to


be in possession of vital  information without his knowledge or suspicion.  

TRAITS ON WHICH ELICITATION IS BASED  ✔ It is a natural tendency for people


to talk about  matters that may or may not concern him directly.  People also have
a desire to correct the mistakes  of others and to express curiosity in things they
are  not totally familiar with. Another tendency is the  desire to gossip.  
✔ There is a general inability to keep secrets.  ✔ There is a need to be recognized,
particularly the  lonely, neglected, vain, and those with feelings of  inferiority.  
✔ There is tendency to underestimate the importance  of the information imparted.  
✔ There are habits derived from certain occupations  of advising, teaching,
correcting, substantiating and  challenging.  
✔ There is a tendency to be indiscrete when not in  control of one’s emotions. 
✔ There is a tendency for professionals to share  confidence or show off expertise to
another of  his/her profession.  

TWO DEVICES IN THE CONDUCT OF ELICITATION  APPROACH 


It is the process of setting people to start talking, or to  shift the direction of an
existing conversation.  

TYPES OF APPROACH  
A. Flattery – people are susceptible to praise so use  these weaknesses as a way of
approaching the subject  for elicitation. 
✔ Teacher–Pupil Approach – the subject is  treated as an authority than solicits
his view point  and opinion on a subject matter.  
✔ Good Samaritan Approach – is the sincere and  valid offers of help and
assistance are made to  the subject  
✔ Kindred Soul Approach – The subject is placed  in a pedestal having some
specialized quality  then flatter him by showing enough concern for 
his welfare to pay special attention to his  employment.  
POLICE INTELLIGENCE

✔ Partial disagreement Approach – Seek to  produce talking by the word “I’m
sure if I fully  agree”. 

B. Provocative Approach – this are designed to induce  the source to defend a


position, or correct a wrong  impression.  
✔ Teaser Bait Approach – The elicitor  accumulates sources of knowledge about
a  particular subject to tempt the subject to give his  views.  
✔ Manhattan from Missouri Approach – The  elicitor adopts an unbelievable
attitude above  anything, he questions all the statements and  propositions.  
✔ Joe Blow Approach – Is “I” know the answer to  everything approach, the
elicitor adopts the  attitude of being approachable to any field.  
✔ National Pride Approach – Nature propensity of  all persons to defend their
country and its  policies.  

PROBES  
A probe is an attempt to obtain more information after the  subject gives a vague,
incomplete general response. A  probe is used with an approach in order to sustain
a  conversation.  
✔ Completion – By inserting bits of factual  information on a particular topic, the
source may  be influenced to confirm and further expand on  the topic.  
✔ Clarity – A request for additional information  where the source’s response is
unclear. For  example, “I agree, but what do you mean  by…….?” 
✔ Hypothetical – Can be associated with a thought  or idea expressed by the
source. Many people  who might not make a comment concerning an  actual
event may express an opinion on a  hypothetical situation.  
✔ High Pressure Probe – it serves to pin down a  subject in a specific area or it
may be used to  point out contradictions in what the subject has  said  

Guidelines in Conducting Elicitation:  


✔ Begin with a topic of mutual interest.  
✔ LISTEN to the source and be PATIENT  
✔ Gradually steer the topics to the areas of interest.  ✔ Use approaches and
probes when the opportunity  arises.  
✔ Exploit the topic until it begins to deteriorate.  ✔ Switch to an innocent subject
before departing or  terminating the interview.  
✔ Leave an opening for future access.  
✔ Record information when security considerations  allow. Do not take notes in the
presence of the  source. Try to remember all the pertinent information 
discussed.  
4. Employment of Technical Means  
▪ Bugging – The use of an equipment or tool to listen  and record discreetly
conversations of other people.  ▪ Wire Tapping - A method of collecting
information  thru interception of telephone conversation.  

5. Tactical Interrogation – The need for obtaining  information of the highest


degree of credibility taken on  the minimum of time can be through interrogation
which  varies and dependent entirely on the situation.  
POLICE INTELLIGENCE

INTERROGATION TECHNIQUE  
TERMS TO PONDER  
✔ Interrogator – person who does the questioning  ✔ Source – a person who for
any reason submits  information of intelligence interest usually on a  voluntary
basis  
✔ Suspect – a person who for any reason believed to  be associated with prohibited
activity  
✔ Witness – any person who has direct knowledge of  facts concerning an event or
activity  
✔ Interrogee – any person who is subjected to the  interrogation process in any of
its forms and phases  ✔ Interrogation report – an oral or written statement of 
information by the questioning of in interrogee  

PHASES OF INTERROGATION 
▪ Planning and Preparation  
▪ Approach (Meeting the Interrogee)  
▪ Questioning  
▪ Termination  
▪ Recording  
▪ Reporting  

6. Observation and Description (ODEX) 


✔ Observation – a complete and accurate  observation by an individual of his
surroundings  and encompasses the use of all the major sense  to register and
recognized its operational or Intel  significance.  
✔ Description – the actual and factual reporting of  one’s observation of he
reported sensory  experience recounted by another.  

Psychologist estimate that approximately  ✔ 85% of your knowledge is gathered


through sight  ✔ 13% of your hearing  
✔ 2% of your other three senses  

IX. COVER AND UNDERCOVER OPERATIONS  ✔ Undercover Operations- also


referred to as  “Roping” Undercover is disguising one's own  identity or using an
assumed identity for the  purposes of gaining the trust of an individual or 
organization to learn secret information or to gain  the trust of targeted individuals
in order to gain  information or evidence.  
✔ Cover – It refers to the changing, forging or  falsifying agent’s real personality
including but not  limited to things, location, job, and others that will  be used in
undercover assignment. 

✔ Cover Story – A biographical data through fictional  that will portray the
personality of the agent he  assumed, a scenario to cover the operation.  
✔ Cover Support – An agent assigned in target  areas with the primary mission of
supporting the  cover story.  

IMPORTANCE OF COVER  
POLICE INTELLIGENCE

✔ Secrecy of Operation against enemy intelligence  ✔ Secrecy of Operation against


friendly agencies who do  not have the need to know  
✔ Successful Accomplishment of the mission  

TYPES OF COVER  
▪ Artificial – altering the background that will  correspond to the operation  
▪ Multiple – Includes different cover  
▪ Natural – Actual or True Background.  

ORGANIZATIONAL COVER  
✔ An account consisting of biographical data which  when adopted by individual
will assume the  personality he want to adopt.  

OBJECTIVES OF ORGANIZATIONAL COVER  1. To camouflage and protect


operational personnel and  their activities.  
2. Protect installation in which clandestine activities are  based.  

GUIDELINES TO ORGANIZATIONAL COVER  ▪ Organizational cover must appear


to produce  something.  
▪ Should device that not all personnel will work together  at the same time.  
▪ Cover should be devoted to mission.  
▪ Start with small organizational cover and provide room  for expansion as it continue
to grow.  

GUIDELINES WHEN COVER AND  ORGANIZATIONAL COVER IS


COMPROMISED  
In case cover is compromised, the following must be  observed:  
✔ move-out immediately  
✔ start new facility for operations and develop it  ✔ build entirely new
cover  
✔ use circuitous route and provide careful counter surveillance  
✔ Be patient, build slowly and carefully.  

If organizational cover is compromised, the following  are the things to be


considered  
✔ make a physical move or re-location  
✔ start new facility for old operation and let it grow  ✔ use new personnel  
✔ let old personnel remain in place  
✔ Build entirely new cover identity.  

HAZARDS OF UNDERCOVER OPERATIONS  ✔ Reintegration back into normal


duty – Agents work  their own hours, they are removed from direct  supervisory
monitoring and they can ignore the dress  
and etiquette rules. So the resettling back into the  normal police role requires
the coming off of old  habits, language and dress. After working such free 
lifestyles, agents may have discipline problems or  exhibit neurotic responses.  
POLICE INTELLIGENCE

✔ Maintenance of identity – Living a double life in a  new environment presents


many problems.  Undercover work is one of the most stressful jobs an  agent can
undertake. The largest cause of stress  identified is the separation of an agent from
friends,  family and their normal environment. This simple  isolation can lead to
depression and anxiety. 

PLANNING UNDERCOVER ASSIGNMENT  ✔ Determine the level of which


investigation is  intended.  
✔ Developing appropriate cover story and cover  ✔ Selection of qualified
personnel.  
✔ Considerations of all undercover operations details  to include documentation  
✔ Briefing, coaching, and rehearsing.  

SPECIAL QUALIFICATION OF UNDERCOVER AGENT  1. Thorough knowledge of


the area, the people and  customs were agent will operate  
2. Preferably single and unmarried  
3. Thorough knowledge of the language or dialect  spoken in the area of
operation.  

USES AND TYPES OF UNDERCOVER ASSIGNMENT  ✔ Residential/Dwelling


Assignment- It is related to the  neighborhood of the subject, where the agent will
live  as a new resident without making any suspicion. His  mission is to make
friends within its neighborhood and  gather information regarding the subject and
possibly  getting closer to the subject  
✔ Social Assignment- The agent will gain access to the  subject by going to the
different hang out places of the  subject and gather information like knowing how
to  drink socially without getting drunk.  
✔ Work Assignment- The agent will be employed  where the subject work to acquire
information. The  agent must know his work and focus his mind set and  habit to
his work assignment or getting employed  where the investigator can observe the
activities of the  subject at his place of work.  
✔ Subversive Organization- This is the most  dangerous of all the undercover
assignment; the agent  will join the organization of the subject itself he must  know
the ideologies of the group and the actions while  inside should conform to the
organization to avoid any  suspicion.  
✔ Personal Contact Assignment – the investigator  required to develop the
friendship and trust of the  subject.  
✔ Multiple Assignment – The investigator is tasked to  cover two (2) or more of the
above specific  assignments simultaneously, it can produce extensive  information
with minimum expenses but more prone to  compromise. 

OPERATIONAL SECURITY GUIDELINES ON  UNDERCOVER ASSIGNMENTS  


1. The agent’s appearance must be inconspicuous 2. The SUBJECT should
cultivate the AGENT, rather  than the reverse  
3. Analyze SUBJECT and appeal to his ego, vanity  and interest  
4. Obtain SUBJECT’S confidence (Rapport) 5. Play along with the
SUBJECT’S plan 
POLICE INTELLIGENCE

6. Don’t be impatient, over-anxious or too eager  7. Don’t displayed more interest


in statements or  actions of the SUBJECT and of the SUBJECT’S  associates than
is compatible with the cover story.  8. Don’t betray knowledge of the SUBJECT’S 
background which was gained from the preliminary  investigation or files.  
9. Don’t get involved with SUBJECT’S girlfriend. 10. Don’t let any relations with
SUBJECT incur enmity,  envy or jealousy of the SUBJECT’S associates. 11. Don’t
become unnecessarily friendly with women 12. Don’t overact the cover story.  
13. Don’t reveal more cover story details than  necessary.  
14. Don’t carry weapons unless told to do so 15. Don’t make unexplainable trips
or phone calls 16. Don’t maintain contact with personal friends or  relatives  
17. Don’t display money more than the amount  provided for by the cover story  
18. Don’t reveal the true identity unless is a part of  preconceived plan  
19. Don’t drink intoxicating beverages if it can be  avoided.  
20. Don’t assume the “big shot” attitude. An  outstanding characteristic will bring
the AGENT  under scrutiny.  
21. Beware of entrapment  
REMEMBER: THE COMPROMISE OF YOUR TRUE  IDENTITY COULD ENDANGER
YOUR LIFE OR  COMPROMISE THE MISSION.  

XI. INFORMERS AND INFORMANTS  


A. Informants – Any person who hand over information  to the agents which is
relevant to the subject. The  informant may openly give the information
clandestinely  and choose to remain anonymous.  

Informant Net – It refers to a controlled group of people  who worked through the
direction of the agent handler.  

PURPOSES OF INFORMANTS IN INTELLIGENCE  OPERATIONS  


▪ Gain access to areas and targets inaccessible to  intelligence.  
▪ Provide anonymity to investigation and operation.  ▪ Increase the scope of
area and target coverage.  

TYPES OF INFORMANTS  
✔ Anonymous – Unidentified or unknown informants ✔ False Informant – reveals
information of no  consequences, value or stuff connected within thin air. 
✔ Frightened Informants – weakest link in criminal  chain, motivated by anxiety.  
✔ Self-Aggrandizing – moves around the center of  criminals delight in surprising
the police about bits of  information.  
✔ Mercenary – Information for sale needed something  for exchange of information.  
✔ Double-Crosser – He wants to get more information  from the police more than he
gives.  
✔ Women – Most dangerous  
✔ Legitimate – operators of business desire to give  information for legitimate
reasons.  

MOTIVES OF INFORMANTS  
POLICE INTELLIGENCE

✔ Vanity – conceited act/character of the criminal  resulting to self - betrayal or


tantamount to guilt,  gaining favorable attention and importance by the  police.  
✔ Civic-mindedness – sense of duty and obligation to  assist the police.  
✔ Fear – A person under an illusion of oppression by  enemies or of other impending
danger.  
✔ Repentance – One who has a change of heart and  wishes to report a crime that is
preying on his  conscience.  
✔ Gratitude or gain – An expression of appreciation to  obtain a privilege or an
interest in the welfare of his  family during his detention.  
✔ Revenge – To settle a grudge due to settle a previous  injury  
✔ Jealousy – envious of the accomplishments or  possessions of another and
wishes to humiliate him.  ✔ Remuneration – a person who informs solely for the 
pecuniary or other material gain he is to receive.  

STEPS IN RECRUTMENT OF INFORMANT  ✔ Selection – to identify and recruit


an informant who  has access to several subversive organizations,  Access is the
valuable factor in recruiting the potential  informant. 
✔ Investigation – It must establish possible existing  motives as to this person might
assist the officer, if  necessary conduct a Complete Background  investigation to
the possible informant.  
✔ Approach – it must be done in a place conducive to  the possible informant, avoid
places which might have  any probability of compromise, approach must be  done
in a foreign territory.  
✔ Testing – It must commence with limited assignment,  with a gradual integration
into more important mission.  

TREATMENT OF INFORMANT  
✔ Avoid using derogatory terms in referring to informants  ✔ Avoid disclosing the
real identity of the informant  ✔ Protect the interest of the informant and consider
all  the information from known to unknown  
✔ Consider all information from known to unknown  information as valuable until
proven otherwise.  ✔ Express appreciation for all information received  regardless
of its value  
✔ Keep appointment on time even though informant may  not

✔ Don’t get over anxious, be patient and take your time ✔ Don’t become an
informant’s informant. 

✔ Informers – refers to any person who provides  information to the agents in a


regular basis regarding  to the subject they are either paid regularly or in base to-
case basis.  

XII. CRYPTOGRAPHY: CODES AND CIPHERS  


CRYPTOGRAPHY  
POLICE INTELLIGENCE

✔ It was derived from the Greek work “Kryptos” which  means “secret” and
“graphos” which means “writing”. ✔ It is defined as an art and science of codes
and  ciphers.  
✔ This is done through the use of “Speech Inverter”  whereby essential speech
frequencies are divide into  several ranges by filters then inverted to produce it 
scrambled speech when intercepted.  

TERMS TO PONDER  
✔ Cryptanalysis – This is the process of converting  cryptograms into plain text
without the key from a code  book.  
✔ Crypto Analyst – Refers to those persons who break  intercepted codes.  
✔ Cryptographer – It refers to a person who is highly  skilled in converting message
from clear to  unintelligible forms by use of codes and cipher.  
✔ Coding – It is the changing of message from plain  clear text to unintelligible form
also known as  “Encrypting”. 
✔ Decoding – Transforming of coded message into  plain text also known as
“Decrypting”. 
✔ Plain text – also known as clear text, it is the original  communication to be
scrambled or enciphered.  ✔ Cryptogram – also known as ciphertext, the product 
of the enciphering process.  

TYPES OF CRPTOGRAPHY  
✔ Codes – it rely on code books, substitution of coded  message to the code books.  
✔ Stenography – It is a method of hiding the existence  of a message using tools.  
✔ Ciphers – it include both computer generated ciphers  and those created by
encryption method  
✔ ROT1 – each letter of the alphabet is replaced with the  following letter, so A is
replaced with B, B is replaced  with C, and so on. “ROT1” literally means “rotate 1 
letter forward through the alphabet.” 
✔ Transposition – the letters are rearranged according  to some predetermined rule
or key.  
✔ Morse Code – Morse code is not a code but a cipher.  Each letter of the alphabet,
the digits 0-9, and certain  punctuation symbols, is replaced by a sequence of 
short and long beeps, often called “dots and dashes.”  A becomes “•-”, B becomes “-
•••” and so on. 

COMPLICATIONS OF CRPYTOGRAPHY  
✔ They are easy to decipher once they discovered the  codes  
✔ They are usually impossible to read without the key  code book  
✔ It includes computerized encryption to protect  transmissions of data and
messages  
✔ Difficulty of printing and distributing codebooks under  conditions of absolute
secrecy  

PRINCIPLES OF CRPYTOGRAPHY  
✔ The system should be, if not theoretically unbreakable,  unbreakable in practice.  
POLICE INTELLIGENCE

✔ The design of a system should not require secrecy  and compromise of the system
should not  inconvenience the correspondents.  
✔ The key should be memorable without notes and  should be easily changeable  
✔ The cryptograms should be transmittable by telegraph  ✔ The apparatus or
documents should be portable and  operable by a single person  
✔ The system should be easy, neither requiring  knowledge of a long list of rules nor
involving mental  strain.  

XIII. SECURITY MEASURES & OPERATIONS IN  RELATION TO


INTELLIGENCE  
A. Physical Security – The broadest type of security that  is concerned with the
physical measures designed to  safeguard personnel and prevent unauthorized
access to  equipment, facilities, materials, documents, and to protect  them from
espionage, sabotage, damage or theft  
B. Communication Security – The protection resulting  from the application of
various measures which prevent  or delay the enemy or unauthorized person in
gaining  information through communication. This includes  transmission,
cryptographic and physical security.  
C. Document Security – Protection of documents,  classified matters and vital
records from loss, access to  unauthorized persons, damage, theft and
compromise  through proper storage and procedures.  
✔ Classify – Assigning of Information or material to  one of the four security
classification after  determining that such information requires security  as
prescribed by PNP regulation 200-012.  
✔ Reclassify – The act of changing the assigned  classification of a document or
material.  
✔ Declassify – The removal of the security  classification from classified
document or material.  ✔ Upgrading – The process of assigning higher  
category of document or information according to  the degree of security
needed  
✔ Compartmentation – The granting of access to  classified document or
information only to properly  cleared persons when such classified information is 
required in the performance of their official duties,  and restricting it to specific
physical confines when  feasible.  
✔ Security Clearance – is the certification by a  responsible authority that the
person describe is  cleared for access to classified matter at appropriate  level.  
1. Interim Clearance – Effectivity Two (2) Years  2. Final Clearance –
Effectivity Five (5) Years  

You might also like