Professional Documents
Culture Documents
Untitled
Untitled
POLICE INTELLIGENCE
I. BASIC CONCEPTS
INTELLIGENCE
✔ The word INTELLIGENCE was derived from the Latin word INTELLIGERE which
means to "pick out" or “discern”.
✔ A very general mental capability that, among other things, involves the ability to
reason, plan, solve problems, think abstractly, comprehend complex ideas,
learn quickly and learn from experience. - "MAINSTREAM SCIENCE ON
INTELLIGENCE" (1994)
✔ The capacity to meet situations, especially if new or unforeseen, by a rapid and
effective adjustment of behavior; also, the native ability to grasp the significant
factors of a complex problem or situation.- WEBSTER COMPREHENSIVE
DICTIONARY
✔ End product of information that has been subject to the intelligence process,
which involves planning, direction, collection, evaluation, collation, analysis,
reporting, and dissemination - Royal Canadian Mounted Police (RCMP)
Lord directed Moses to sent into the land of Canaan and records that “all those
men were heads of the children of Israel.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN ✔ Shammua the son of zaccur
– tribe of reuben ✔ Shapat the son of hori – tribe of simeon ✔ Caleb the son of
jephunneh – tribe of Judah ✔ Igal the son of joseph – tribe of Issachar ✔
Hoshea the son of nun – tribe of Ephraim ✔ Palti the son of raphu – tribe of
Benjamin ✔ Gaddiel the son of sodi – tribe of zebulun ✔ Gaddi the son of susi –
tribe of joseph, that is from the tribe of Manasseh
✔ Ammiel the son of gemalli – tribe of dan ✔ Sethur the son of
michael – tribe of asher ✔ Nahbi the son of vopshi – tribe of napthali ✔
Geuel the son of machi – tribe of gad
B. Sun Tzu
✔ He is traditionally believed to be the author of The Art of War, an extremely
influential ancient Chinese book on military strategy.
✔ “Know yourself and your enemy, if you know yourself and not the enemy for
every battle you will be a foul who will meet defeats, but if you know yourself
and the enemy, you need not fear the result of a hundred battles “. In his book
"Art of War.”
C. Delilah
✔ A biblical personality who was able to gain information by using her beauty
and charm. ✔ She was responsible for the fall of Samson a known Israelite
leader who terrorized the Philistines.
H. Karl Schulmeister
✔ He was an Austrian double agent for France during the reign of Napoleon I.
✔ He is famous as "Napoleon's Eye".
✔ He acted as a General in Napoleon's army, undertook espionage missions that
took him into England and Ireland, and was appointed commissioner of police
for Vienna during Napoleon's second occupation in 1809
✔ He was credited for establishing counter intelligence conducted against spies.
✔ He is a master of deceit who used black mail to obtain vital information
pertaining to the personality and identify of the enemies of Napoleon during the
18th Century.
I. Joseph Petrosino
✔ He was a pioneer in the fight against organized crime.
POLICE INTELLIGENCE
✔ The various crime fighting techniques that Petrosino pioneered during his law
enforcement
career are still practiced by various agencies in the fight against crime.
✔ Member, New York Police Department in early 1900, he was the head of the
Italian Squad. ✔ Through extensive intelligence network, he is credited to
smash the Black Society.
J. Joseph Fouche
✔ The French statesman Joseph Fouche (1759 - 1820) served as minister of police
under Napoleon and was influential in the return of Louis XVIII to the throne in
1815.
K. Admiral Yamamoto
✔ He was a Japanese Marshal Admiral and the commander-in-chief of the
Combined Fleet during World War II, a graduate of the Imperial Japanese
Naval Academy.
✔ He was the commander-in-chief during the decisive early years of the Pacific
War and so was responsible for major battles such as Pearl Harbor and
Midway.
✔ April 1943, the Cryptanalysts of the U.S. Navy Communications Intelligence
interpreted a top secret signal relaying the travel of the Admiral En route ha
was intercepted and crashed in the Jungles of Baungainville.
✔ He died during an inspection tour of forward positions in the Solomon Islands
when his aircraft (a Mitsubishi G4M "Betty" bomber) was shot down during an
ambush by American P-38 Lightning fighter planes.
L. Herbert Yardley
✔ He was an American cryptologist best known for his book The American Black
Chamber.
✔ Yardley began his career as a code clerk in the U.S. State Department. He
accepted a Signal Corps Reserve commission and served as a cryptologic officer
with the American Expeditionary Forces in France during World War I.
✔ His career in cryptology began with his work in the code room, as he broke the
U.S. government codes that crossed his desk.
✔ Head of the MI-8, The forerunner of the Top Secret National Security
Administration a.k.a Black Chamber, a Cryptanalytic Organization.
M. Napoleon Bonaparte
✔ He was a French military and political leader who rose to prominence during the
latter stages of the French Revolution and its associated wars in Europe.
✔ has been a major influence on many civil law jurisdictions worldwide, but he is
best remembered for his role in the wars led against France by a series of
coalitions, the so-called Napoleonic Wars.
✔ "One Spy in the right place is worth 20,000 men in the field".
N. Akbar
POLICE INTELLIGENCE
✔ Known as Akbar the Great, was Mughal Emperor from 1556 until his death.
✔ The "Great Mogul" and wise master of Hindustan employed more than 4,000
agents for the sole purpose of bringing him the truth that his throne might rest
upon it.
O. Battle of Midway
✔ It was one of the most important naval battles of the Pacific Campaign of World
War II.
✔ In June 1442, the turning point of the Naval in the Pacific, the victory gained by
the Americans was due to the disrupted messages from the Imperial Japanese
Navy.
✔ Military historian John Keegan called it "the most stunning and decisive blow in
the history of naval warfare."
✔ It was Japan's worst naval defeat in 350 years.
Q. Julius Caesar
✔ During his time, the staff of each legion includes ten "speculators" who served
as an information collecting agency.
✔ The "speculators" were the first intelligence personnel to appear definitely in a
military organization.
✔ Military success of the Romans was aided by communication system, Made use
of carrier pigeons, which made possible the amazing speed with which
intelligence of the Imperial Rome was transmitted.
✔ They also employed ciphers to ensure secrecy of communications.
S. Alfred Redl
✔ He was one of the leading figures of pre-World War I espionage.
✔ His term in office was marked by innovation, and he used very high technology
for the time to ensnare foreign intelligence agents
✔ A homosexual Double Spy who while working as intelligence direct proof Austria
and Hungary, spied the Russians.
✔ His treasons activities were discovered and compelled to commit suicide.
✔ His spying led to the death of over 500,000 agents and soldiers combined in his
13 years episode as a spy.
POLICE INTELLIGENCE
U. John Churchill
✔ His leadership of the allied armies consolidated Britain's emergence as a front-
rank power. He successfully maintained unity among the allies, thereby
demonstrating his diplomatic skills.
✔ He told critics of his enormous expenditure on espionage that “No war can be
conducted successfully without early and good intelligence, and such advices
cannot be had but a very great expense
V. Edward I
✔ Also known as Edward Longshanks and the Hammer of the Scots (Latin:
Malleus Scotorum), was King of England from 1272 to 1307.
✔ He was temperamental, and this, along with his height, made him an
intimidating man, and he often instilled fear in his contemporaries.
✔ Modern historians are divided on their assessment of the king: while some have
praised him for his contribution to the law and administration, others have
criticised him for his uncompromising attitude towards his nobility.
✔ He is credited with many accomplishments during his reign, including restoring
royal authority after the reign of Henry III, establishing Parliament as a
permanent institution and thereby also a functional system for raising taxes,
and reforming the law through statutes.
✔ An English monarch who started utilizing English informants especially to
determine seditious writings against the crown and identify
W. George Washington
✔ As Grand Master mobilized the free masons of the colonies at the outbreak of
the American war of Independence.
✔ First President of the United States (1789–1797), the commander-in-chief of the
Continental Army during the American Revolutionary War, and one of the
Founding Fathers of the United States.
✔ Because of his strategy, Revolutionary forces captured major British army’s at
Saratoga in 1777 and Yorktown in 1781.
✔ Historians praise Washington for his selection and supervision of his generals,
encouragement of morale and ability to hold together the army, coordination
with the state governors and state
militia units, relations with Congress and attention to supplies, logistics, and
training.
X. Hannibal
✔ He was a Punic Carthaginian military commander, generally considered one of
the greatest military commanders in history.
POLICE INTELLIGENCE
Intelligence agencies can provide the following services for their national
governments.
✔ Provision of analysis in areas relevant to national security
✔ Give early warning of impending crises
✔ Inform national defense planning and military operations
✔ Serve national and international crisis management by helping to discern the
intentions of current or potential opponents
✔ Inform national defense planning and military operations
✔ Protect sensitive information secrets, both of their own sources and activities,
and those of other state agencies
✔ May act covertly to influence the outcome of events in favour of national
interests, or influence international security
✔ Defense against the efforts of other national intelligence agencies
B. Research and Analysis Wing (R&AW or RAW) ✔ Research and Analysis Wing is
India’s external intelligence agency.
✔ It was formed in September 1968 under the helmsman-ship of its first Director,
R. N. Kao. Its creation was necessitated by the poor performance of the
POLICE INTELLIGENCE
E. Bundesnachrichtendienst (BND)
✔ The Bundesnachrichtendienst is the foreign intelligence agency of the
German government, ✔ The BND acts as an early warning system to alert
the German government to threats to German interests from abroad.
✔ It depends heavily on wiretapping and electronic surveillance of international
communications. ✔ It collects and evaluates information on a variety of areas
such as international terrorism, WMD
✔ Ministry of State Security is the security agency of the People’s Republic of
China.
✔ Article 4 of the Criminal Procedure Law gives the MSS the same authority to
arrest or detain people as regular police for crimes involving state security with
identical supervision
✔ One of the primary missions of the MSS is undoubtedly to gather foreign
intelligence from targets in various countries overseas.
✔ Many MSS agents are said to have operated in the Greater China region.
✔ With the lengthiest track record of success, the best know Intelligence so far on
the scale of records is ISI.
✔ The Inter-Services Intelligence was created as an independent unit in 1948 in
order to strengthen the performance of Pakistan’s Military Intelligence during
the Indo-Pakistani War of 1947.
✔ The best of its time, failed to counter ISI and protect Soviet interests in Central
Asia.
✔ It has protected its Nuclear Weapons since formed and it has foiled Indian
attempts to attain ultimate supremacy in the South-Asian theatres through
internal destabilization of India. It is above All laws in its host country Pakistan
‘A State, with in a State’.
✔ Its personnel have never been caught on camera. ✔ It is believed to have the
highest number of agents worldwide, close to 10,000.
B. INTELLIGENCE IS CONTINUOUS
✔ The basic principle of intelligence operations is that intelligence activities follow
a simple cycle, which is continuous at the same time that new information is
being collected in response to direction, other information is being processed
and intelligence is being used.
✔ It must reach the user in time to serve as basis for appropriate action. Intel data
must be disseminated on time because late arrival is as good as useless.
V. CATEGORIES OF INTELLIGENCE
A. NATIONAL INTELLIGENCE- integrated product of intelligence developed by all
government departments concerning the broad aspect of national policy and
national security.
▪ National Policy – specific courses of action to achieve the national objectives.
▪ National Security – this relate to the protection and preservation of military,
economic and a productive strength of a country including the security of the
government and domestics and foreign affairs against espionage, sabotage and
subversion.
Planning and Supervision of the Collection Effort ✔ The intelligence officer must
have a thorough knowledge of the available sources of information, the collecting
agencies and type of information the latter can provide.
✔ He must understand the operations of the command in order to provide the
particular intelligence required for success.
✔ He must have a thorough knowledge of the tactics, organizations and
characteristics of the enemy. ✔ He must be especially competent in the fields of
POLICE INTELLIGENCE
3. Establishment of Priorities
✔ Priorities reflect the criticality of the need for the particular information. No
formula exists which can automatically determine priorities. Such
determination is a matter of judgment.
B. COLLECTION OF INFORMATION
To successfully plan and perform the collection effort, the intelligence officer must
have thorough knowledge of the available sources of information and collecting
agencies and the type of information they can provide and consider the
following:
✔ Determine collecting agency
✔ Send orders or request
✔ Supervise collection efforts
✔ Use tools or technique in collection
✔ Ensure timely collection
▪ Intelligence Files
✔ It necessary to permit ready access to all available information and not just the
current ones
✔ These are usually special file that may be kept by the unit
POLICE INTELLIGENCE
2. Evaluation
✔ Determination of the pertinence of the information to the operation, reliability of the
source of or agency and the accuracy of the information.
✔ Process by which the intelligence officer makes decisions about the information
contained in a report
Evaluation to Determine:
a) Pertinence
The question of pertinence is one of the first questions that must be answered
1. Is this information about any of the requirements that I have? Does it pertain to
any of the problems that I must solve?
2. Is this information needed immediately? If so, who needs it?
3. Is this information of present or future value? If so, to whom?
Is it possible for the reported fact or event to have taken place?
✔ Is the report consistent within itself?
✔ Is the report confirmed or corroborated by information from different
sources or agencies. ✔ If the report does not agree with information from
other sources which one is more likely to be true
F
Reliability
Cannot Be Judged
POLICE INTELLIGENCE
6
Truth Cannot Be Judged
Source of the
Information
5. Interpretation
✔ Process of determining the significance of new information in the possible
alternatives.
✔ The interpreter determines the significance of the information as to the meaning of
the interpreted information.
D. Dissemination
✔ Processed information or intelligence data are disseminated to end users.
✔ Common methods of disseminating Intel data are conferences, briefing and person
to person exchanges.
✔ Those in charge of the entire intelligence operation must make it a point that
intelligence gets into the hands of those who commissioned it and those who
needs it (whether they know that they need it or not)
✔ Using the intelligence, policy-makers come to decisions, decisions that may well
carry with them the need for more intelligence (and their trigger the intelligence
cycle again)
✔ “Intelligence does no good at all if it simply languishes on an analyst's desk
or in dust collecting files”
✔ In this process, consider the factors of timeliness, correctness and security.
▪ Economic Intelligence – deals with the extent and utilization of Natural and
Human resources to the industrial potential of the Nations
▪ Transportation and Telecommunication Intelligence – concerned with the
operations and facilities not only the Military but also the Civilians.
▪ Sociological Intelligence – deals with the demographic and psychological aspects
of groups of people.
✔ Population and Manpower
✔ Characteristics of the People
✔ Public Opinion – attitudes of the majority of the people towards matters
of public policy. ✔ Education – based on literacy rate
▪ Biographical Intelligence – deals with individual personalities who have actual
possession of power ▪ Armed Forces Intelligence – deals with the armed forces
of the Nation.
✔ Position of the Armed Forces – constitutional and legal basis of its
creation and actual role. ✔ Organization and structure and territorial
disposition
✔ Military Manpower Recruitment
✔ Order of Battle- arrangement of military troops for battle.
▪ Geographical Intelligence – deals with the natural as well as manmade features of
the physical environment of man considered from the point in view of military
operations.
POLICE INTELLIGENCE
▪ People – Living Condition of the people, sources of income, education of the
people, government
livelihood projects, extent of enemy influence to the people.
▪ Weather – Visibility, Cloudy, Temperature, Precipitation, Tactical capability,
Enemy Vulnerability. ▪ Enemy – Location of the enemy, Strength of the enemy,
Disposition, Tactical Capability, Enemy Vulnerability
▪ Terrain – relief and drainage system, vegetation, surface material, Man – Made
features.
OBJECTIVES OF SURVEILLANCE
POLICE INTELLIGENCE
TYPES OF SURVEILLANCE
A. ACCORDING TO METHODS
✔ Stationary Surveillance – also referred to as Fixed and Stakeout Surveillance –
is used when you know or suspect that a person is at or will come to a known
location when you suspect that stolen goods are to be dropped or when
informants have told you that a crime is going to be committed.
✔ Technical Surveillance – by the use of communications and electronics gadgets,
system and equipment.
✔ Moving Surveillance or Shadowing or tailing – simply the act of following a
person.
Methods of shadowing
POLICE INTELLIGENCE
✔ One man – Extremely difficult and should be avoided, if unavoidable keep subject
in view at all times.
✔ Two man – two agents are employed to follow the subject
✔ ABC method – reduces the risk of losing the subject, affords greater security
agents detection
✔ Progressive/ Leap from method – poor chances of obtaining good results, agents
are stations at a fixed point assuming that subject followed the same general
route each day.
✔ Combined foot-auto surveillance – employment of surveillant on foot and
agents in an automobile.
PRINCIPLES IN CASING
✔ Know the best route to get there
✔ Know how to conduct yourself without attracting attention
✔ Know what security hazards are in the area and how can they avoid or
minimize.
✔ Know the best route to extricate from the area.
TYPES OF CASING
✔ External – close observation and clear description of an area, building or
installation, particularly its location, approaches and exits and its immediate
vicinity.
✔ Internal – close observation and clear description of the layout of a building, an
office or a room etc.
METHODS OF CASING
POLICE INTELLIGENCE
✔ Personal Reconnaissance – most effective method and will produced the most
info since you know what you’re looking for.
✔ Map Reconnaissance – it may not sufficient but it can produce a certain
amount of usable information ✔ Research – more information can be acquired
best used with other methods.
✔ Prior Information – those records in your file unit that may provide valuable
information.
✔ Hearsay – Information usually gain by the person operating in the area and
performing casing job.
TYPES OF APPROACH
A. Flattery – people are susceptible to praise so use these weaknesses as a way of
approaching the subject for elicitation.
✔ Teacher–Pupil Approach – the subject is treated as an authority than solicits
his view point and opinion on a subject matter.
✔ Good Samaritan Approach – is the sincere and valid offers of help and
assistance are made to the subject
✔ Kindred Soul Approach – The subject is placed in a pedestal having some
specialized quality then flatter him by showing enough concern for
his welfare to pay special attention to his employment.
POLICE INTELLIGENCE
✔ Partial disagreement Approach – Seek to produce talking by the word “I’m
sure if I fully agree”.
PROBES
A probe is an attempt to obtain more information after the subject gives a vague,
incomplete general response. A probe is used with an approach in order to sustain
a conversation.
✔ Completion – By inserting bits of factual information on a particular topic, the
source may be influenced to confirm and further expand on the topic.
✔ Clarity – A request for additional information where the source’s response is
unclear. For example, “I agree, but what do you mean by…….?”
✔ Hypothetical – Can be associated with a thought or idea expressed by the
source. Many people who might not make a comment concerning an actual
event may express an opinion on a hypothetical situation.
✔ High Pressure Probe – it serves to pin down a subject in a specific area or it
may be used to point out contradictions in what the subject has said
INTERROGATION TECHNIQUE
TERMS TO PONDER
✔ Interrogator – person who does the questioning ✔ Source – a person who for
any reason submits information of intelligence interest usually on a voluntary
basis
✔ Suspect – a person who for any reason believed to be associated with prohibited
activity
✔ Witness – any person who has direct knowledge of facts concerning an event or
activity
✔ Interrogee – any person who is subjected to the interrogation process in any of
its forms and phases ✔ Interrogation report – an oral or written statement of
information by the questioning of in interrogee
PHASES OF INTERROGATION
▪ Planning and Preparation
▪ Approach (Meeting the Interrogee)
▪ Questioning
▪ Termination
▪ Recording
▪ Reporting
✔ Cover Story – A biographical data through fictional that will portray the
personality of the agent he assumed, a scenario to cover the operation.
✔ Cover Support – An agent assigned in target areas with the primary mission of
supporting the cover story.
IMPORTANCE OF COVER
POLICE INTELLIGENCE
TYPES OF COVER
▪ Artificial – altering the background that will correspond to the operation
▪ Multiple – Includes different cover
▪ Natural – Actual or True Background.
ORGANIZATIONAL COVER
✔ An account consisting of biographical data which when adopted by individual
will assume the personality he want to adopt.
Informant Net – It refers to a controlled group of people who worked through the
direction of the agent handler.
TYPES OF INFORMANTS
✔ Anonymous – Unidentified or unknown informants ✔ False Informant – reveals
information of no consequences, value or stuff connected within thin air.
✔ Frightened Informants – weakest link in criminal chain, motivated by anxiety.
✔ Self-Aggrandizing – moves around the center of criminals delight in surprising
the police about bits of information.
✔ Mercenary – Information for sale needed something for exchange of information.
✔ Double-Crosser – He wants to get more information from the police more than he
gives.
✔ Women – Most dangerous
✔ Legitimate – operators of business desire to give information for legitimate
reasons.
MOTIVES OF INFORMANTS
POLICE INTELLIGENCE
TREATMENT OF INFORMANT
✔ Avoid using derogatory terms in referring to informants ✔ Avoid disclosing the
real identity of the informant ✔ Protect the interest of the informant and consider
all the information from known to unknown
✔ Consider all information from known to unknown information as valuable until
proven otherwise. ✔ Express appreciation for all information received regardless
of its value
✔ Keep appointment on time even though informant may not
✔ Don’t get over anxious, be patient and take your time ✔ Don’t become an
informant’s informant.
✔ It was derived from the Greek work “Kryptos” which means “secret” and
“graphos” which means “writing”. ✔ It is defined as an art and science of codes
and ciphers.
✔ This is done through the use of “Speech Inverter” whereby essential speech
frequencies are divide into several ranges by filters then inverted to produce it
scrambled speech when intercepted.
TERMS TO PONDER
✔ Cryptanalysis – This is the process of converting cryptograms into plain text
without the key from a code book.
✔ Crypto Analyst – Refers to those persons who break intercepted codes.
✔ Cryptographer – It refers to a person who is highly skilled in converting message
from clear to unintelligible forms by use of codes and cipher.
✔ Coding – It is the changing of message from plain clear text to unintelligible form
also known as “Encrypting”.
✔ Decoding – Transforming of coded message into plain text also known as
“Decrypting”.
✔ Plain text – also known as clear text, it is the original communication to be
scrambled or enciphered. ✔ Cryptogram – also known as ciphertext, the product
of the enciphering process.
TYPES OF CRPTOGRAPHY
✔ Codes – it rely on code books, substitution of coded message to the code books.
✔ Stenography – It is a method of hiding the existence of a message using tools.
✔ Ciphers – it include both computer generated ciphers and those created by
encryption method
✔ ROT1 – each letter of the alphabet is replaced with the following letter, so A is
replaced with B, B is replaced with C, and so on. “ROT1” literally means “rotate 1
letter forward through the alphabet.”
✔ Transposition – the letters are rearranged according to some predetermined rule
or key.
✔ Morse Code – Morse code is not a code but a cipher. Each letter of the alphabet,
the digits 0-9, and certain punctuation symbols, is replaced by a sequence of
short and long beeps, often called “dots and dashes.” A becomes “•-”, B becomes “-
•••” and so on.
COMPLICATIONS OF CRPYTOGRAPHY
✔ They are easy to decipher once they discovered the codes
✔ They are usually impossible to read without the key code book
✔ It includes computerized encryption to protect transmissions of data and
messages
✔ Difficulty of printing and distributing codebooks under conditions of absolute
secrecy
PRINCIPLES OF CRPYTOGRAPHY
✔ The system should be, if not theoretically unbreakable, unbreakable in practice.
POLICE INTELLIGENCE
✔ The design of a system should not require secrecy and compromise of the system
should not inconvenience the correspondents.
✔ The key should be memorable without notes and should be easily changeable
✔ The cryptograms should be transmittable by telegraph ✔ The apparatus or
documents should be portable and operable by a single person
✔ The system should be easy, neither requiring knowledge of a long list of rules nor
involving mental strain.