Download as pdf or txt
Download as pdf or txt
You are on page 1of 266

NATURE OF POLICE

INTELLIGENCE OPERATIONS

There are two (2) kinds of


intelligence operations
1. Overt Operations. - This type of
operations is done even with the
knowledge of the subject. It means that
there are no precautionary measures to
hide the investigation against the
subject. Information or documents are
procured from open sources like
magazines, libraries, newspapers, radio
broadcasts, the internet, the books,
investigations, interrogations, research
papers, raids, search and seizures, etc.
2. Covert Operations - This is
done when the gathering of
information or documents is
without the knowledge of the
subject, or the target
organization. It is also a kind
of operation which is kept
secret from the public or even
from other members of the
intelligence community.
The different types of covert
operations are as follows:
1) Surveillance - It is covert or
secret observation of a person,
vehicle, place, building, house,
installation, or activities
wherein the identity of the
observer is protected against
discovery by the subject or from
the public’s eyes.
It is otherwise known in
police language as either
shadowing or tailing because
the most common application is
observation by following the
movement of persons or vehicles.
2) Casing - This is the observation
upon a place, an area, a building, an
installation, or stationary object in
order to gather information on the
subject. The investigator may even
enter or get inside the place under
investigation provided he has
sufficient cover to allay the subject’s
suspicion. This operation is sometimes
needed before a raid is done against
the installation.
3) Undercover Operation - This is a form of
surveillance or investigative
technique wherein the investigator
discard his true identity and assumed
another one and makes direct contact
with the person, place, or situation
under investigation or joins the
target organization. This is a very
dangerous kind of operation and can be
done in a short time or in a
protracted way. If the investigator is
discovered, his life may be in danger
or his mission aborted. However, the
information gathered is worth the risk.
4) Deep Penetration
This is a type of undercover
operation in which techniques are
applied continuously and not over a
limited period of time. It is
exceedingly the most difficult,
dangerous, time consuming, and most
delicate of all investigative
activity, yet often the most
rewarding. The agent here is always
in danger as he has to infiltrate the
organization for a longer time and be
a part of the said organization.
The agent may be arrested by any
law enforcement officer who has no
knowledge of his being a deep
penetration agent (DPA) or his cover
may be blown and his life and
mission will be over.
5) Use of Photographic Equipment

Night vision cameras, infra red


films or infra red photography and
use of telephoto lenses or other
sophisticated photographic equipment
are necessary to take or record
pictures of persons or activities or
other objects of interest necessary
in the investigation.
6) Surreptitious Entry

This is a type of intelligence


operation wherein the place is
entered secretly by an agent or
agents without the knowledge of the
owner or occupants. The agents may
take photocopies of some documents
or objects and leave the place as it
is, so the documents will not know
that a breach was done against the
place.
7) Use of Bugging Equipment, Wiretapping,
or Electronic Surveillance

This is done to listen the


conversation without the knowledge
of the subject of investigation.
8) Use of Satellites

Satellite communication has


several uses nowadays and it is one
of the most sophisticated means of
communication. It can take pictures,
send messages, and listen to sounds
or signals from afar but can easily
be intercepted with sophisticated
monitoring devices.
9) Use of Radar or Sonar

Radars are used to detect or


monitor flying objects while sonars
are used to detect movements
underwater.
10) Use of Informers or Informants
These are some of the most
important tools in police
intelligence operations. Informants
are people who give information
without expecting rewarding or favor.
They can be used to the advantage of
the investigator. Informers on the
other hand are those that give
information in exchange of something,
like money, goods, accommodations or
favors.
11) Crypt Analysis.

This is a method of intelligence


operation wherein coded messages are
analyzed by experts. (Cryptography -
the process of writing or reading
secret messages or codes)
12) Censorship

This method of intelligence


operation is done by opening
secretly letters to and from the
subject/s of investigation without
their knowledge that information
was breach.
13) Document Exploitation

This is a mode of intelligence


operation wherein documents gathered
or taken from the subject or target
organization are collated, analyzed,
interpreted and evaluated for
immediate or future use.
SURVEILLANCE
This topic is specially discussed because of
its significance to intelligence operations. Most
often, surveillance is used in almost all of the
activities in intelligence. Gathering of
information, identifying suspected persons and
their contacts or associates, identifying
organizations suspected of criminal activities,
and other situations that need covert
investigations.
Different types of surveillance:
1. Stationary or Fixed. The subject of
surveillance is a person, a place, or an activity
that has a fix location. A room opposite the
building or nearby location must be occupied
so the surveillant may have a good view of the
subject. If this is not possible, a surveillance van
with technical equipment or other vehicle may
be used in the observation.
2. Mobile. The subject on this type of
surveillance is moving. Several options are
available for this operation:
a.Foot surveillance. The subject is followed on
foot.
b.Motorized surveillance. Using either car,
motorcycles, or bicycle.
c.Aerial surveillance. Use of airplane or
helicopter
d. Water surveillance. Use of watercrafts.
3. Technical Surveillance. The use of electronic
or bugging devices in the gathering of
information.
B. Methods in Foot Surveillance

1. One man. A one man surveillance or


tail is the most difficult among the three.
He/she is alone in tailing the subject and
could be easily identified if the subject is
also trained in intelligence.
2. Leapfrog. This is a variation of the one
man method wherein the route of the
subject is already known to the
surveillant. He just follows the subject
for a while, cease from tailing, and
follow the subject again in another place
where the subject usually passes.
3. Group. There is greater variation in
this kind of surveillance; the two-man.
three-man or the ABC method, the four-
man or more. This is also the technique
wherein contact with the subject is
constant and the shadow has less risk of
being identified.
C. Purpose or Objectives of Surveillance
1. To detect criminal activities
2.To obtain evidence for use in building up
a case or to be used in a court of law.
3. To locate a subject or his associates
4.To gather detailed information about
the suspect’s activities.
5. To locate subject’s residence, hunts,
office or business establishment or places
frequented by subject or his associates
6. To protect witness
7.To check the reliability of informants or
informers
8. To check the loyalty of members of the
intelligence community or the police
organization
9. To locate stolen property, contraband, or
evidence needed in the prosecution of a
case
10. To obtain evidence necessary for the
issuance of a search warrant.
11.To prevent the commission of an offense or to
apprehend suspects while committing an offense
12.To develop leads or radical information
obtained from other sources
13. To obtain information to be used in the
investigation or interrogation of a suspect.
14.To know the location of a suspect in
particular time
15. To implement in the conduct of background
investigation of subjects, informants, informers,
or applicants to the police, government positions
or those applying for security clearance.
D. Requisites for a Desirable Surveillant
1. Must be of average size, built, or
ordinary appearance which does not
attract attention.

2.Must not have noticeable peculiarities


that can easily be remembered.

3.Must not wear attractive clothing or


jewellery
4.Must be a good actor, talker, who can talk
his way out of an embarrassing situation
without arousing suspicion

5.Must have the ability to act naturally in


any situation and must have at least two
standard line of reasons regarding his
presence in the area if confronted by the
subject or other people.

6. Must be alert and full of energy


7.Must be versatile, resourceful and
quick-witted

8.Must have good memory and power of


detailed observation

9.Must have perseverance, patience,


endurance and can wait or work for
several hours.
E. Preparations for Surveillance Operations

A briefing must be conducted before


surveillance is done regarding the
background of the case, the objectives of
the surveillance, actions to be taken in
case of emergency, and details of the
following:
1.Subject – name and aliases, description
including photos, known associates, habits
and hangouts, training or ability to elude
arrest, and other information useful in the
operation.
2.Geographic location – type of
neighbourhood, inhabitants, language and
dialects, meeting place and hangouts, traffic
and mode of transportation, maps for
names and locations of streets and places
frequented by subject.
3.Vehicle used – description, make,
model, color and plate number

4.Associates – identities, description with


photos, hangouts, involvement in illegal
activities
Note:
Espionage – is the act or practice of
spying. This also refers to the use of a spy
by a government in order to discover the
military or political secret of other nations.

Sabotage – is the destruction of property


or obstruction of public service to
undermine a government, police, or
military effort.
Subversion – is an act that seeks to
overthrow a constituted government. It is
also an act or instance of subverting.
Treason – is disloyalty to one’s own
country by giving away or selling its secret
to the enemy or by trying to overthrow it.
Sedition – is any action promoting or
inciting discontent or rebellion against a
government.
FUNDAMENTALS OF
CRIMINAL INVESTIGATION
SURVEILLANCE, CASING AND UNDERCOVER
OPERATIONS
SURVEILLANCE DEFINED

• SURVEILLANCE – is the secretive watching of


persons, vehicles, places or objects to obtain
information concerning the activities and identities
of individuals.
RELATED TERMS TO
SURVEILLANCE
• Surveillant – is the person who performs or does
the surveillance. Also known as “operative”.

• Subject – is the person, place or thing under


surveillance. Also known as “target”.

• Convoy – is an associate of the subject who


attempts to detect
surveillance.

• Stake-out – is a form of close surveillance of a


particular place at which a particular action,
Related Terms to Surveillance
(Cont’n)
• Contact – any person with whom the subject
speaks, to whom he passes articles, or from
whom he receives articles.

• Made – the surveillant being recognized as the


surveillant by the subject or
convoy.

• Lost – The subject is lost when he (subject)


eluded the surveillant, or the latter no longer find
the whereabouts of the former .
Related Terms to Surveillance
(Cont’n)
• Put the finger on – identifying a subject by
pointing him out either in person or in photograph.

• Put to bed – when the subject under


surveillance has returned to his quarter and
apparently retired for the night.

• Shadow and tail – to follow an individual


whenever he goes, on
foot or by vehicle.

• Casing – A discreet observation of a building,


GENERAL TYPES OF
SURVEILLANCE

• Moving surveillance – referred to as a tail or


shadow. It is conducted when a person, object or
activity being watched move from one place to
another.

• Fixed surveillance – referred to as a stakeout . It


is conducted when a person, object, or activity
being watched is not expected to move from one
area to another place.
METHODS OF
SURVEILLANCE
• Loose surveillance – Observation of the subject or
object is not continuous. The surveillance maybe
discontinued if the subject becomes suspicious or
when the services of another surveillant are required.

• Close Surveillance – Continuous observation of the


subject is maintained at all times, even if the subject
appears to become suspicious or openly accosts the
surveillant and accuses him of watching or following
him.

• Combination of Loose and Close Surveillance. This


method is applied dependent on the specific act of
TECHNIQUES OF
SURVEILLANCE
One-Man Surveillance

Two-Man or “AB”
Surveillance

Three-Man or ABC

Surveillance Leapfrog

Surveillance
One-Man
Surveillance

• Only one surveillant is involved in the conduct of


the surveillance.

• It is best employed in a fixed surveillance.

• It should be avoided in moving surveillance


because it provides the least amount of flexibility
on the part of the surveillant.
Two-Man or “AB”
Surveillance

• Under this technique, the surveillant behind the


subject is always known as “A” surveillant. “A”
follows the subject and “B” either follows on the
same side of the street or from across the street.

• When both “A” and “B” operate on the same side


of the street as the subject turns a corner. “A”
shall cross the street and “B” turns the corner
behind the subject and assumed the position of
“A”. “A” now becomes “B” and operates across
the street nearest from the subject.
Three-Man or “ABC”
Surveillance

• The most effective technique of foot


surveillance is the “ABC”
technique.

• It employs three surveillants, and is intended to


keep two sides of
the subject covered.

• “A” follows the subject. “B” follows “A” and


concentrates on
Three-Man or “ABC”
Surveillance

• “B” also watches for The normal “B”


convoys. behind position for
“A”. is
• “C” normally operates across the street from
slightly to the rear
of the subject
Leapfrog
Surveillance

• Under this or more surveillants are


technique, used to This is a
two variation of the
conduct the “AB” and
surveillance.
• It is simple
“ABC” to execute and greatly reduces
methods.
the chances of the subject
recognizing the surveillants.

• Surveillant “A” follows “B” on the same side of


the street as the subject.
Leapfrog
Surveillance

• After a variable time or distance has elapsed


by prearrangement of signals, “A” falls back and
allows “B” to assume the position of “A” and “A”
becomes “B”.

• After another lapse of time or distance, the


surveillants resume their original positions. They
continue until the surveillance is completed.
Progressive
Surveillance

• The Progressive technique of surveillance is


used when extreme caution is
mandatory and the subject is elusive.

• It is a slow technique and limited to subject


who follows habitual
daily routines.
Progressive Surveillance
(Cont’n)

• The surveillance works in the following manner: A


subject is followed at a certain distance and is
discontinued. The next day surveillant picks up
the subject at the time when the surveillance
was previously discontinued and follows the
subject for another short distance.

• This continues day after day until the


surveillance is completed.
VEHICLE
SURVEILLANCE

• Vehicle Surveillance – the kind of surveillance


that involves the use of
vehicle.
VEHICLE SURVEILLANCE
TECHNIQUES

One Vehicle
Technique

Two-Vehicle

Technique Four-

Vehicle
One-Vehicle
Technique
• This technique is conducted by one vehicle
following the subject alone through observing his
movements and far behind to avoid ready
detection.

• The distance between the subject’s


vehicle and the
surveillant’s
vehicle will depend upon the area of operation.

• In city or building area, the distance should be


close enough to
Two-Vehicle
Technique
• This technique is conducted by two vehicles to
follow the subject at different distance on the
same street.

• This technique is more reliable than the one-


vehicle technique as the two vehicles can
exchange places from time to time, or one
vehicle ahead of the subject, if the destination
becomes apparent, and set up fixed surveillance
post.
Four-Vehicle
Technique
• The four-vehicle technique of surveillance is
conducted with four vehicles following the
subject.

• Radio contact is necessary among the vehicles


involved. As to positions of the surveillance
vehicle, one is in front of the subject, one
behind, one to go left of a parallel street, and
one to his right on a parallel street.

• This technique offers maximum flexibility


where surveillants are
able to move with the subject.
COVER AND UNDERCOVER
OPERATIONS
• COVER – is the means by which an individual,
group or organization conceals the true nature of
its activities, and/or its existence from the
observer.

• An operation where the intelligence officer hides


his true identity to enable him to associate with
and get information from criminal elements.

• Unlike in surveillance, the intelligence officer


comes in direct contact with those whom he
seeks information.
USES OF
COVER

• To make the operations secret/not known to the


target as well as
to others not needing to know such operation.

• To ensure successful accomplishment of the


mission.
PLANNING AND PREPARATION FOR COVER AND
UNDERCOVER OPERATIONS

1. Mission Analysis and Target Area Study

2. Selection of Personnel

3. Factors that help in the determination of


appropriate cover

4. Meaning of cover story

5. Types of cover story


Mission Analysis and Target Area
Study

• Mission analysis is intended to define the


objectives, establish priorities and lay-out
operational limitations and isolate the problem
of the Order of Battle operations.
Selection of
Personnel

• Undercover agents must have ingenuity,


resourcefulness combined with common sense
and good judgment.
General
Qualifications
• Above average
mental ability;
• Perceptible senses;
• Have self-confidence;
• Good memory;
• Long physical
endurance;
• Good character;
• Strong personality;
• Natural attitude;
• Perseverance;
Specific
Qualifications
• Knowledge of the language;
• Knowledge of the area background and
current events;
• Knowledge about the people’s customs
and habits;
• Physical appearance can blend to the
area of operation.
Factors that help in determination of
Appropriate Cover

• Provides freedom of movement;

• Protects the agent in case of compromise;

• Provides adequate leisure time;

• It must be flexible to meet changing


situations;

• Consistent with the financial resources


MEANING OF COVER
STORY

• A biographical account, true or fictional, or a


combination of true or fiction which portrays the
undercover agent’ past history and current
status.
TYPES OF COVER
STORY
• Natural Cover Story – story using actual
background data with minor
adjustments to fill and/or fit the situation.

• Artificial Cover Story – using biographical data


which are invented for the purpose.

• Combination of True and False Personal Data

• COVER SUPPORT – Agents in target areas with a


primary mission of supporting the cover story.
DOCUMENTATION OF COVER
STORY
• It is necessary to support the cover story. It
includes documents which should be in the
personal possession of the undercover agent
and those which should be on file in official and
private offices in connection with some phase of
the assumed background.

• ALIAS – a fictitious name of a person. A


pseudonym.

• BACKSTOP – refers to falsified documents and


materials prepared
T R A DECRAFT

Tradecra within the


ft refers intellig
methods
com m u n and
to technologies
ence theused
in
ity,modern espionage (spying) and
techni
generally, a s part of quthe
es, activity
of intelligence assessment .
T R A DECRAFT
There is no difference on how
hum a n agents perform
clandestine intelligence
operations, whether these were
conducted in the eighteenth
century or in the twenty first
century, they always have
common characteristics . Five
categories of recruitment and
agent handling are so universal
and fundamental that they are
T R A D E C R A F T , ITS PILLARS

1. ASSESSMENT
2 . C OV E R AND
DISGUISE
3 . C ON C E A L M E N T
4. C L A N D ESTINE
S U RV E I L L A N C E
5 . C OV E R T
C OMMU N I C ATI ON S
1. ASSESSMENT

The first step in recruiting a


spy. This is the selection of
the right person who could
potentially help the
intelligence service. it is the
selection of one or two with
MOTIVATION and ABILITY to
sustain the double life
required by espionage
ASSESSMENT

The process that precede the


decision whether or not to
recruit or not to recruit the
person.
T H E M OTIVATIONS

M
O
N
E
Y

I
D
E
2. C O V E R AND D I S G U I S E D

False and assumed identities


are a way of life for intelligence
officers. While conducting
their work, they
learned to live NORMALLY with
alias names by
com bining a con man’s
verbal sk ills to
spin a plausible cover story
COVER

The intelligence officer


should have to convince
the public that he is what
he claims he is.
DISGUISE

This is a support to cover. It


involves changing the
physical appearance of a
person to mat ch with his
cover. It can either
complement an alias or
obscure the identity of the
user.
3. C ONC EALMENT

The act of hiding th e object


and making it
appear that the object has no
relationship to a clandestine
operation.
Camouflage is a less
secure means of hiding.
Like cover, if
PURPOSE OF
CONCEALMENT

Concealment serves
the following
purposes:
s
t
o
r
i
4. CLANDESTINE
SURVEILLANCE
Is used for both offensive and defensive
purposes
by secretly collecting information about
the movement and activity of recruitment
targets and using counter surveillance to
protect officers engaged in clandestine
operations.
5 . C O V E R T or Cl ande sti ne
COMMUNICATIONS
Face-to-face meetings, conducted secretly
between operational personnel are
known as clandestine meetings and are
employed frequently in the field. In
general, the advantages of clandestine
meetings are:
• They save time
• They are used as a counter measure against
some forms of eavesdropping.
• They offer a measure of certainty
• They provide a means of exercising control
The stress and delicacy of secret work
make human contact between an agent
and his handler imperative, if an
operation or organization is to survive and
function effectively.
Clandestine meetings are divided into four
categories:

1.Meetings between unacquainted


operatives. – The general description and
distinguishing features of each operative
must be established and according to
operational necessity known to one or both.

2. Meetings between acquainted operatives.


3. Meetings between operatives and
outsiders. - In practice it should be avoided
but sometimes become necessary. A classic
example is a stranger who approaches an
operative asking him to join or help in the
success of the police mission.
4. Silent meetings, or brush contacts – Are
arguably not meetings at all. It is used solely to
pass something physical. Examples are
exchanges of identical brief cases in a crowded
airport, or the exchange of folded newspapers
during a momentary pause on a park bench.
ELICITATI
ON
E L IC ITATIO
N DEFINED
The strategic use of conversation
to extract information from
people without giving them the
feeling they are being
interrogated. Elicitation attempts
can be simple, and sometimes
are obvious. If they are obvious,
it is easier to detect and deflect.
O n the other ha n d , elicitation
may be imaginative, persistent,
involve extensive planning, and
may employ a co-conspirator.
E L IC I TATIO
N DEFINED
Elicitors may use a cover story to
account for the conversation
topic and why they ask certain
questions. Elicitation is a
technique used to discreetly
gather information. It is a
conversation with a specific
purpose: collect information that
is not readily available and do so
without raising suspicion that
specific facts are being sought .
It is usually non-threatening,
easy to disguise, deniable, and
effective. The conversation ca n
E L IC ITATIO
N DEFINED

Elicitation is gaining information


through direct communication,
where one or more of the involved
parties is not aware of the
specific purpose of the
conversation. Elicitation is a
planned, systematic process
requiring careful preparation.
P R O B IN
G
D E F IN E
DProbing – Is exploring or
investigating something like
for example when the police
investigate a case to learn the
identity of the criminal.
P R O B IN
G
D E F IN E
Moreover, “Probing” means to
D
as k a lot of questions in order
to find secret or hidden
information about someone or
something.
P R O B IN
G
D E F IN E
D
Probing questions – are a type
of follow up question. They
direct your conversation
partner towards providing
further details about
something they have said.
PLANNING T H E
ELIC IT
ATION
A.
T
HE
PLAN
NING
Always
apply
elicitation
PLANNING T H E
ELICITATION

1. Th e ob je cti ve , or i n f or m a ti o n
d e s i r e d , i s t h e k e y fact or i n
de t e rm i n in g t h e S U B J E C T , t h e
elici tor, a n d t h e s e t t i n g .

2 . O n c e the S U B J E C T h a s b een
se le c te d b e c a u s e of h i s or h e r
a c c e s s to or kn ow le dg e of t h e
des ir ed i n f o r m a t i o n , n u m e r o u s
a r e a s of s o c i a l a n d official
d e a l i n g s m a y provide t h e
setting.
PLANNING T H E
ELIC IT
ATION 3 . Before the a p p r oa c h ,
review all available
intelligence files a n d
records , personality
dos sie rs , a n d knowledge
pos ses se d by othe rs who
have previously dealt
with the S U B J E C T .
This will help to
determine the
S U B J E C T ' s b a c k g ro u n d ,
motivation, e mot io ns,
a n d psychological
nature.
PLANNING T H E
ELICITATION

B . THE
APPROACH:
Approach the SUBJECT in normal
surroundings to avoid suspicion. There
are two basic elicitation approaches:
flattery
and provocation.
PLANNING T H E
ELICITATION
The following variations to these
approaches may be used:
By appealing to the ego, self-
esteem, or prominence of the
S U B J E C T, you may be able to guide
him or her into a conversation on the
area of operation:
1. By soliciting the S U B J E C T ' s
opinion and by insinuating that
he or she is a n authority on a
particular topic.
PLANNING T H E
ELIC IT
ATION
2. By adopting a n
unbelieving attitude, you
may be able to cause the
S U B J E C T to explain in detail
or to answer out of irritation.
The Intel agent should not
provoke the subject to the
point where rapport is
broken.
PLANNING T H E
ELIC IT
ATION
3. By inserting bits of factual
information on a particular topic,
you may be able to influence the
S U B J E C T to confirm and further
expound on the topic. Use this
approach carefully since it does
not lend itself to sudden impulse.
Careless or over use of this
technique may give away more
information than gained.
PLANNING T H E
ELICITATION

4. By offering sincere and


valid assistance, you
may be able to determine
the S U B J E C T ' s specific
area of interest.
PLANNING T H E
ELIC IT
ATION

Conversation.
Once the approach ha s
succeeded in opening the
conversation, devise
techniques to channel the
conversation to the area of
interest.
1. Attem p t to ob ta in more
informa t ion by a va gu e , incomplete, or a
general response.
2. request for additional information
where the
an actual situation will express an
opinion on hypothetical situations.

agree; however, what did you mean by...?“


3. hypothetical situation which can be associated with a
thought or idea expressed by the SUBJECT. Many
people who would make no comment concerning

SUBJECT'sresponse is unclear; for


example, "I
C O MMO N
T EC H N I Q U ES
U S ED IN
CO N VERS A T I O
N
Assumed
Knowledge: Pretend
to have knowledge
or associations in
common with a
person. “According to
the computer
network guys I
used to work
Bracketing:
Provide a high and
low estimate in
order to entice a
more specific
number.
Can you top
this?
Tell an extreme
story in hopes
the person will
want to top
it.
Confidential Bait:
Pretend to divulge
confidential
information in
hopes of receiving
confidential
information in
return.
Criticism:
Criticize an
individual or
organization in
which the person
has an interest
in hopes the
person will
disclose
information
Deliberate False Statements /
Denial of the Obvious: Say
something wrong in the hopes
that the person will correct
your statement with true
information.
Feigned Ignorance:
Pretend to be ignorant of a
topic in order to exploit the
person’s tendency to educate.
Flattery:
Use praise to coax a
person into providing
information.
The Leading Question:
Ask a question to which the
answer is “yes” or “no,” but
which contains at least one
presumption.
Good Listener:
Exploit the instinct to complain
listenin patiently and
or brag, by
g validating the
person’ feelings (whether
If a person feels
s
someone tothey positive
confide in,have
he/she
may or more information.
share
negativ
e).
Mutual Interest:
Suggest you are
similar
to a person based on
shared interests,
hobbies, or
experiences, as a way
to obtain
information or build
a rapport before
soliciting
Oblique
Reference:
Discuss one topic
that may provide
insight into a
different topic.
Macro to
Micro:
Start a
conversation on
the macro level,
and then gradually
guide the person
toward the topic of
actual
interest.
Opposition/Feigned
Incredulity:
Indicate disbelief
or opposition in order
to prompt a person to
offer information in
defense
of
thei
r
posi
tion
.
Ruse Interviews:
Someone
pretending to be a
headhunter calls
and asks about
your experience,
qualifications, and
recent projects.
Quote Reported Facts:
Reference real or false
information so the
person believes that
bit of information is in
the public domain.
“Will you comment on
reports that your
company is laying off
employees?”
FUNDAMENTALS OF INVESTIGATION AND
INTELLIGENCE
Provocation/Provocative Statement:

Entice the person to direct a question


toward you, in order to set up the
rest of the conversation. “I could kick
myself for not taking that job offer.”
Response: “Why didn’t you?” Since
the other person is asking the
question, it makes your part
in the subsequent conversation more
innocuous.
FUNDAMENTALS OF INVESTIGATION AND
End …….. INTELLIGENCE
OBS E RVAT ION AND DESCRIPTION
(ODEX)
OBS E RVATI ON
Is a complete and accurate
awareness by an individual of his
surroundings and encompasses the
use of all of our major senses to
register and recognize its
operational and/or intelligence
significance.
D E S C R IPTION

Is the actual and factual


reporting of one’s own
observations an account which
explains what they are or what
they look like.
TH R E E (3) PSYC H OL OGI C A L
P R O C E S S E S F O R AC C U R ATE
OBS E RVATI ON

A. ATTENTION - consists of the


psychological process involved
in becoming aware of a fact
(aware of the existence of a
fact).
B . P E R C EPT IO N - consists of the
psychological process involved in
understanding this fact of
awareness.

= through understanding (smell of


a flower, you can gue ss the name
of the flower)
C . REPORT - used in two (2) senses.
1.The first in the psychological
process involved in identifying by
name in ones own mind some
facts which have been perceived.

2.Report - narration of what you


perceived/identified.
T H R E E (3) TYPES O F ATTENTION

A. INVOLUNTARY (least
reliable) - you have no
control and it requires no
effort.
Atten tion is captured by a
prominent or salien t stim u l u s –

for example, in the peripheral


visual field – rather than
deliberately.

- important information might not get


into memor y
For exa mple, though the stud ent is
listening to a lecture with all
interest, some loud s ou nd outside
the classroom m a y d r a w his
attention towards it.
B . VOLUNTARY ATTENTION- this
type is more reliable but not
nearly as dependable as habitual.

Attention that is deliberately


applied and controlled by the
individual.
For example, while sitting in a cla ss,
the st udents divert their attention
towards the lecture ev en if it is not
interesting, beca use they have to
p a s s the examination.
C . HABITUAL ATTENTION- an
attention which is distinguished
by little effort with a m aximum of
control. This is most reliable.
In some situations, reaction to a
stimulus or attending to a
stimulus becomes a habit. S o the
individual will automatically
divert his attention towards that
stimulus.

For e xample , a s tud e nt w ho is


interested to a certain subject.
A musician’s attention will
automatically be diverted towards
the sound of music even if he is
b u s y engaged in talking to
somebod y.
Attention of a devotee will be
diverted towards the temple which
he is visiting regularly, the moment
he p a s s e s through that w a y.
FAC TO R S THAT INFLU E N C E
ATTENTION

1 . S I Z E (normal to abnormal size)


2 . C H A N G E (from silence to noise)
3.REPETITION (shots is fired in
every one minute)
4. STRIKIN G QUA LITY (to attract
attention – wearing of clothes)

5. INTE R E ST (interest in some


objects – sexy women)
6. MOVEMENT OF STIMULUS.

The moving
stimulus
catches our
attention more
quickly t h a n a
stimulus th a t
does not move.
try to catch the a tte
We ntion areof people
more
through moving sensitive
electric lights
to.
objects th a t
move in ou r
7.ORGANIC CONDITION (organic
condition of the observer)
FAC TORS I N VOLV ED IN
PERCEPTION

Perception – is the organization,


identification, and interpretation
of sensory information in order to
represent and understand the
environment.
Perception – includes all those
processes by which a n individual
receives information about his
environment – seeing, hearing,
feeling, tasting and smelling.
FAC TORS I N VOLV ED IN
PERCEPTION

1. MENTAL C APACITY - one must


have enough intelligence to
understand the m eanings of a
fact before he can perceive it.
2. EDUCATIONAL BA C KG R O U N D

3.EMPIRICAL BA C KG R O U N D -
one has acquired by experience
throughout his life.
4. OCCUPATIONA L BA C KG R O U N D
FAC TORS GOV E R N I N G
R E PORTS

1 .VOC A BU L ARY - words which


an individual finds to express
himself.
2.TIME L AG - accurate reporting
depends entirely on timeliness.
Delay in reporting results in u n
conscious omission of details.
3. R E C U R R E N C E O F S IM ILAR
INCIDENT

= in ve s tiga tor
in ve s tiga te s th e
incidents.
M E M ORY RETENTION - Make
notes on things that is difficult to
remember

1 hour -100%
2 hours - 75%
3 hours - 50%
4 hours - 25%
ME MORY (has bearing in
evaluation of information)

- It refers to a complex group of


mental functions and states of
awareness that are concerned
with the storing of experience and
its reappearance in consciousness
or its utilization in subsequent
activities.
M E MORY
Types
1.Sensory - that of learning
repetition (relating to the Physical
Senses)
2.Intellectual - involving ability of
a person to think and understand
ideas and information (higher
evaluation)
Functions
3.Storing Information -
systematic filing
4. Recollection - returning to
conscious memory that which
has been stored.
How recollection may be brought
about:
1. Recall a process of
reproducing a past experience
2. Recognition process of
identifying perception a s having
been experience at some time in
the past .
One of the most important
fundamentals of memory a nd memory
training must be the creation of
interest.
Object itself a nd the interest aroused
b y this object are of great importance
to memory
M e ans of Reception:

1. Eye Minded
2. Ear Minded
3. Motor – Minded
Motor involves touch, smell a nd
taste
TEST YOU RS E L F

1.You must intend (or what) to


remember

2.Develop the confidence to


remember - do not let your
memory remain dormant
4.Develop the strongest possible
motive for remembering any
particular fact.
5.Try to understand clearly the
meaning of which is to be
remembered.
6.You must be able to visualize,
when possible, the fact to be
remembered.
7.Remember by repetition - a
good policy to over learn allowing
the memory trace or impressions
the chan ce to “set”.

8.Remember everything new by


connecting with something that
you already know.
BAS I C R U L E S
O F ASSOCIATION(Aristotle and
Aquinas)

1. Law of Similarity
2. Law of Contrast (difference)
3.Law of Propinquity - implies the
nearness of place, time or some
other relationship.
Fo r F INALS
MEMORANDUM CIRCULAR NO.
78 s . 1964
SECURITY O F C L AS S I FIED
MATTER IN GOVERNMENT
OFFICES.
Classification Categories

Official matter which requires


protection in the interest of national
security shall be limited to four (4)
categories of classification which, in
descending order of importance,
shall carry one of the following
designations:
1. TOP S E C R E T
2. SECRET
3. CONFIDENTIAL
4 . R E STR I C TE D

The classifications mentioned above


shall not be attached to a matter
which does not involve the national
secu rity or which does not relate to
any one of those specifically
enumerated as top secret; secret;
confidential; & restricted.
Definition of some important terms

The term “matter” includes


everything, regardless of its physical
character, on, or in which
information is recorded or embodied.
Document s, equipment , projects,
books, reports, articles, notes, letters,
drawings, sketches, plans,
photographs, recordings, machinery,
models, apparatus, devices, and all
other produ cts or su bstan ces fall
within the general term “matter”.
Information which is transmitted
orally is considered as “matter” for
purposes of security.
The term “document” covers any
form of recorded information,
including printed, written, drawn or
painted matter, sound recordings,
photographs, films, etc. “Documents”
are included in “matter.”
“Security Clearance”

is the certification by a responsible


authority that the person described
is cleared for access to classified
matter at the appropriate level.
The term “need to know”

is the principle whereby access to


classified matter may only be given
to those persons to whom it
necessary for the fulfillment of their
duties.
The term “custodian”

is an individual who has possession


of or is otherwise charged with the
responsibility for safeguarding and
accounting of classified material.
“Certificate of Destruction”

is the certification by a witnessing


officer that the classified matter
described therein has been disposed
of, in his presence, by approved
destruction methods.
The term “physical security”

is the safeguarding by physical means,


such as guards, fire protection
measures and other similar means, of
information, personnel, property,
utilities, facilities and installations
against compromise, trespass,
sabotage, pilferage, theft, espionage or
any other dishonest or criminal act .
“Security Officers”

A properly trained and cleared


Security Officer shall be appointed in
every Department of the Government
which handles classified matter. He
shall undergo training to be
con du cted by the National
Intelligence Coordinating Agency
(NICA) or Armed Forces of the
Philippines intelligence agencies (AFP
IAs)
He shall be responsible to the Head of
the D epartment for the
implementation and enforcement of
these regulations and the necessary
action on breaches of security.
Before appointment as a S ecu rity
O fficer, an officer m ust first be
cleared by the H ead of the
Department for access to the highest
classified matter. In providing this
clearance, the H ead of the
Department may coordinate with the
National Intelligence Coordinating
Agency or the Department of National
Defense.
“TOP SECRET” MATTE R

Information and material (matter)


the u nau thorized disclosu re of
which would cause exceptionally
grave damage to the nation,
politically, economically, or from a
secu ring aspect. This category is
reserved for the nation’s closest
secrets and is to be u sed with great
reserve.
Exam ples:

a. Very important political as


negotiations for major alliances.
docum ents dealing with su ch
matters
b . Major governmental projects such
as drastic proposals to adjust the
nation’s economy (before official
publication).
c. Matter relating to new and far
reaching experimental, technical and
scientific developments in methods of
warfare or defense, e.g., vital matter
relating to atomic warfare, defense
against biological warfare, or matter
affecting future operational strategy.
Classification Authority

a. Original classification aut h ority for


assignment of TO P SE CRET
classification rests exclusively with
the H ead of the D epartment. This
power may, however, be delegated to
authorized officers in instances when
the necessity for such arises.
b. D erivative classification aut h ority
for TO P S E C R E T classification may
be granted those officers who are
required to give com ments or
responses to a comm u nication that
necessitates TOP S E C R E T response.
Reproduction

a . TOP S E C R E T matter may be copied,


extracted, or reproduced only when the
classifying authority ha s authorized
suc h action. Permission to reproduce
shall not extend beyond a specified
number of copies which are to be
accorded the same treatment a s the
original.
At the time of issuance of any TOP
S E C R E T document , the classifying
authority shall insure that each copy
of the document contains a notation
sub stantially as follows:
(1) “Reproduction of this document
in whole or in part is prohibited
except with the permission of the
issuing office or higher authority;”
or
(2) “Reprodu ction of paragraph (s)
of this document is prohib ited
except with the permission of the
issuing office or higher au thority;
other paragraphs m ay be
reproduced.”
b . The reproduction of TOP S E C R E T
matter shall be carried out under the
supervision of an authorized officer.
All materials and waste incidental to
the reproduction shall be accounted
for and disposed of.
Inventory

The Head of the Department shall


require physical inventory of all TOP
S E C R E T matter in the custody of
his Department at least once a year.
Appropriate action on custodial
deficiencies shall be made.
Transmission

a. TOP S E C R E T matter shall be


transmitted by any of the following
means:
(1) By direct contact of officers
concerned.
(2) By the officially designated
courier.
(3) By accompanied D epartm ent of
Foreign Affairs diplomatic pouch.
b. TO P S E C R E T m atter shall not be
transmitted by mail, express or
electrical means, u nless in
cryptographic form .
Storage

TOP S E C R E T matter shall be stored:


a. In a safe, steel file cabinet or other
steel container equipped with a built-
in, three-position, dial-type
combination lock which is of such
weight, size and construction as to
minimize possibility of physical theft
or damage by fire or tampering.
b . In a secure room of vault which is
approved for such use by the Head
concerned and which assures
protection.
Destruction

TOP S E C R E T matter, which


becomes eligible for destruction in
accordance with approved
schedules, shall be destroyed as
prescribed below:
a.Destruction shall be accomplished
by burning or pulping by the
custodian in the presence of a
witnessing officer designated by the
responsible H ead. Witnessing
personnel must have a TOP S E C R E T
clearance.

b.A certificate of destruction shall be


prepared and forwarded to the
originating office.
“S E C R E T ” MATTE R

Information and material (matter)


the unauthorized disclosure of
which would endanger national
security, cause serious injury to the
interest or prestige of the nation or
of any governmental activity or
would be of great advantage to a
foreign nation.
Examples:

a. H igh level directives dealing with


important negotiations (as distinct
from major negotiations which
would be in the TOP S E C R E T
category) with other countries.
b . Proposals for new schemes of
governmental or other controls,
forek nowledge of which would
seriously prejudice their operation.

c. Matter relating to certain new


methods of warfare or defen se,
including scientific and technical
developments, not classified as TOP
S E C R E T, e.g., new designs of Service
aircraft, guided projectiles, t ank s,
radar and anti-submarine devices.
d. Plans or details of schemes for the
defen se of areas other than vital
strategic areas, including plans or
particu lars of operations connected
with them.
e. Vital military information,
including photographs, maps, etc.,
relating to important defenses,
establishments, and installations.
f. Intelligence which is not in the TOP
S E C R E T category but which would
reveal a secret source, or the value of
which depends upon concealing the
fact that we possess it.
g. C ryptographic devices an d
equipment unless specifically
assigned to a lower classification.

h . Certain compilations of data or


items which individually may be
classified CONFIDENTIAL or lower,
but which collectively should be put
in a higher grade.
Classification Authority

Same as for TOP S E C R E T matter.


Reproduction

Same as for TOP SECRET


matter.
Transmission.

S E C R E T m atter shall be transmitted


as indicated below:

a. B etween points within the


Philippines:
(1) Direct contact of officers
concerned.
(2) Electrical means in cryptographic
form.

( 3 ) C ou rier specifically au thorized by


the transmitting agency.

(4) Philippine registered mail.


b . Between points from within and
outside the Philippines and vice-
versa, and between points ou tside the
Philippines:

(1)As authorized in sub-paragraphs


a (1) through (3) above.
(2)Accompanied Department of
Foreign Affairs diplomatic pou ch.
Storage

S E C R ET matter shall be stored in


a manner authorized for TOP S E C R ET
documents, or in metal file cabinets
equipped with a steel lock bar and
combination padlock of which the
manufacturer’s identification numbers
have been obliterated
The file cabinets must be of su ch
size, weight, construction or
installation so as to minimize the
chance of u nau thorized physical
removal or the possibility of persons
gaining u n au thorized access by
transferring or m anipulation or
damage by fire.
Destruction

Same as for TOP S E C R E T matter


except that the witnessing officer
need have S E C R E T clearance only
and that no certificate of
destruction need be prepared. Only
records of destruction shall be
maintained.
“C O N F I D E N TIAL” MATTE R

Information an d m aterial (matter) the


u nau thorized disclosu re of which,
while not endangering the national
security, would be prejudicial to the
interest or prestige of the nation or any
government activity, or would cause
administrative embarrassment or
unwarranted injury to an individual or
would be of advantage to a foreign
nation.
Examples:

a.Plans of Government projects such


as land development, hydro- electric
schemes, road development, or
development of areas.
b.Routine Service reports, e.g., on
operations and exercises, which
contain information of value but not
of vital interest to a foreign power.
c. Routine Intelligence reports.

d. Technical matter not of major


importance but which has a distinct
military value or requires protection
otherwise, e.g., new weapons
calculated to influence minor tactics
or service tests of war equipment of a
standard pattern.
e. C ertain personnel records and staff
matters.

f. C ertain compilations of data or


items which individually m ay be
classified RESTRICTED, or which
may be u nclassified, but the
aggregation of which enhances their
security value.
g. Matters, investigations an d
docu ments of a personal an d
disciplinary nature, the knowledge of
which is desirable to safeguard for
administrative reasons.

h . Identification of personnel being


investigated for misconduct , anomaly
or fraud prior to the filing of
appropriate charges or completion of
the findings of boards created for
such purpose.
Classification Authority

Any officer is authorized to assign


CONFIDENTIAL classification to any
matter in the performance of his
duties.
Reproduction

The copying, extracting from or


reproduction of CONFIDENTIAL
matter is authorized except when
the originator or higher au thority
has specifically denied this authority
Transmission

Same as for S E C R E T matter


Storage

Same as for S E C R E T matter.


Destruction

Same as for S E C R E T matter


except that the presence of a
witnessing officer and records of
destruction are not required.
“R E S T R I C T E D ” MATTE R

Information and material (matter)


which requires special protection
other than that determined to be
TOP S E C R E T, SECRET or
CONFIDENTIAL .
Examples:

a. Departm ental book s of


instruction and training an d
technical documents intended for
official u se only or not intended for
release to the public.
b. Rou tine information relating to
the supply and procu rement of
military stores.
c . Minor modifications and rou tine
tests of equipment.

d. C ertain compilations of data or


items which individually m ay be
unclassified but which in the
aggregate warrant a classification.
Authority to Classify,
Reproduction, Dissemination,
and Destruction.

Au thority to classify shall be the


same as for CONFIDENTIAL matter.
Reproduction is authorized.

Tran smission shall be throu gh the


normal dissemination system.

Destru ction shall be the sam e as for


that of CONFIDENTIAL matter.
REGRADING AND
D E C L A S S I FI C AT I O N
Responsibility for regrading

a. Each
Departm ent H ea d
shall keep
under
continuing
will initiate downgrading
review or
all
declassifying action as soon as
classified
conditions warrant. information in
his c ust ody ,
or of primary
interest to
him, and
b. In obvious cases of over
classification or under classification,
higher authority may adjust the
classification without referral to the
originator, except to notify the
originator of the change of
classification.
Cover Sheets – Classified
documents shall be covered with
cover sheets as follows:

For TOP S E C R E T

8″ x 13″ white paper lined with ½”


green border.
For S E C R E T

8″ x 13″ white paper lined with ½”


red border.

For CONFIDENTIAL

8″ x 13″ white paper lined with ½”


blue border.
Some definitions that provide
the framework and
understanding for Police
Intelligence Operations:
Police information
is information collected during military police
operations concerning crime, disorder, criminal
activity, and criminal threats. Police information
includes, but is not limited to, a variety of data
and information about crime, law enforcement,
police institutions and their effectiveness, and
other general information in the operational
environment that is collected for analysis
through a policing lens to solve crime and
disorder problems. Police information is
analyzed to produce police intelligence.
Crime analysis

is the systematic examination and


interpretation of police information to
determine when, where, and why crime,
disorder, fear of crime, and other destabilizing
events occur in specific places. It may be
specifically categorized as administrative,
tactical, or strategic crime analysis based on
the focus of analysis and the purpose it is
intended to serve.
Criminal intelligence

is police information compiled, analyzed, and


disseminated in an effort to anticipate,
prevent, or monitor criminal activity. It may
be specifically categorized as tactical or
strategic criminal intelligence based on the
direction given to analysis and the purpose it
is meant to serve.
Police intelligence

is the product resulting from the collection,


processing, analysis, and integration of
criminal intelligence and crime analysis about
crime, disorder, criminal activity, and criminal
threats. Police intelligence provides
commanders and military police with an in-
depth picture of the criminal environment.
Crime Mapping
Crime mapping uses location data (address, X-Y
coordinates) to graphically depict crimes or
other incidents on a map. Crime maps
document cumulative crime incidents that have
occurred in the area of operations. Crime maps
are critical tools in geographic distribution
analysis and crime pattern analysis because the
visual depiction of crimes and their uneven
distribution results in identifiable patterns that
police intelligence analysts can use to deduce
meaning.
Hotspots

When crime is mapped, the distribution of


crimes often results in identifiable patterns
and concentrations at or surrounding
specific places. The places at which crimes
concentrate are known as crime hotspots
When crime mapping reveals crime hotspots,
police intelligence analysts can begin to
understand the factors contributing to crime
across a particular area of operations by
seeking to understand the conditions,
situational circumstances, and environmental
factors of those hotspots to determine why
crime is occurring at those places but not at
others.
Understanding the specific factors that
generate crimes, attract potential criminal
offenders, or facilitate the ability of offenders
to commit crimes at a specific place is an
essential precondition to developing effective
policing strategies and responses to prevent
and reduce crime.
Law enforcement intelligence
Law enforcement intelligence is the end
product (output) of an analytic process that
collects and assesses information about
crimes and criminal enterprises. Its purpose is
to make judgments and inferences about
community conditions, potential problems,
and criminal activity with the intent to
pursue criminal prosecution or project crime
trends or to support informed decision
making by management.
Targeting

is the process of selecting and prioritizing


targets and matching the appropriate
response to them, considering operational
requirements and capabilities. Targeting
means can range from lethal engagements to
nonlethal weapons to informational
engagements. Targeting begins in the
planning process and continues throughout
the operation.
Risk management

is the process to identify, assess, and control


risks and make decisions that balance risk
cost with mission benefits. Throughout the
operations process, commanders and staffs
use risk management to identify and mitigate
risks associated with hazards that have the
potential to injure or kill friendly and civilian
personnel, damage or destroy equipment, or
otherwise impact mission effectiveness.
Risk is the exposure of someone or
something valued to danger, harm, or loss. It
is inherent in all operations.
Area Security Operations

Area security is
a form of
security
operation
conducted to protect
friendly forces,
installation
routes, and
actions within a
specific area.
Military police
Analysis

is the process by which collected information


is evaluated and integrated with existing
information to produce intelligence that
describes the current—and attempts to
predict the future—impact of the threat,
terrain and weather, and civil considerations
on operations.
Assessment

is the continuous monitoring and evaluation


of the current situation and progress of an
operation. Continuous assessment plays a
critical role in evaluating the information
collected during the PIO process.
Dissemination
entails delivering timely, relevant, accurate,
predictive, and tailored police intelligence to
appropriate and authorized stakeholders.
Identifying recipients, determining the product
format, and selecting the means of delivery are
key aspects of dissemination. Recipients of
information and police intelligence generated
through PIO efforts must be evaluated to
ensure compliance with any legal
dissemination restrictions, mission
requirements, and protection considerations
The intelligence cycle

is an organized process by which information


is gathered, assessed, and distributed in
order to fulfill the goals of the intelligence
function.
The cycle has six (6) integral steps or process
which facilitate the assessment and
application of intelligence information, these
are:
1. Collection
2. Evaluation
3. Collation
4. Analysis
5. Reporting
6. Dissemination
The Intelligence Cycle is viewed as the heart
of the intelligence function because it
provides a framework to perform all activities
related to Law Enforcement Intelligence.
Other definitions of terms related to Police
Intelligence Operations:
Bird

Slang for an informer.


Clandestine Operation

An operation conducted in secrecy, but with


no effort to disguise its nature.
Classified Matters

Information in any form, which, in the


interest of national security, must be
safeguarded in the manner and to the extent
required by its importance.
Clipping Service

Publications of local and foreign news cut


and posted with captions.
Collation

Refers to the process of organizing raw data


into useable form grouping of similar items of
information.
Cover

It is the change forging and screening of


person’s real personality, things, events and
places.
Covert Intelligence

Information gathering which are clandestine


in nature.
Dead Drop

A dead drop or dead letter box is a location


used to secretly pass items between two
people, without requiring them to meet.
Spies have been known to use dead drops,
using various techniques to hide the items
and to signal that the drop has been made.
Debriefing

An interview with personnel from a mission


or captivity to get information of particular
interest.
Decoy vehicle

In a convoy deployments it is an identical


vehicle with that of the vehicle where the
principal may be located, it usually tails or
fronts the principal’s vehicle.
Evaluation

Appraisal of information with regards to its


accuracy.
Eye

A slang term for a person conducting


surveillance on a specific
person.
Infiltration

Is the penetration of an agent to an


intelligence target either in the land, air, or
sea either through mechanical or electronic
devices.
Integration

Hypothesis developed and considered valid


as a result of such activity. It is the process of
combining the information isolated in
analysis and known element to form logical
theory or picture.
Intelligence Community

Conglomeration of all intelligence units and


agencies in a country composed of civilians,
military and quasi-military organizations
Intelligence Journal

A chronological log of activities.


INTERPOL

An acronym for
the International
Criminal Police
Organization, where
member countries
assist one
another in the
pursuit of
Interpretation

Result of critical judgment involving three


factors namely: analysis, integration and
deduction. It is the determination of the
significance of the intelligence data in
relation to other data at hand.
Order of Battle

Intelligence list containing the main or


primary threat to a nation’s security and
peace and order.
Principal vehicle

In a convoy deployment, it is the object of


protection where the VIP may be located.
Psychological Warfare

The planned used of propaganda and other


psychological actions having the primary
purpose of influencing the opinions,
emotions, attitudes and behavior of the
hostile groups to support the achievement of
national objectives.
Rabbit

Refers to the subject or person being


followed in a surveillance operation.
Recon vehicle

Also known as a counter attack vehicle in a


convoy deployment. It fronts the principal’s
vehicle to neutralize all possible threats.
Safe House

Is a place, enclosed building or apartment


where police undercover and operatives
meet for purpose of the briefing or plainly to
report.
Shield vehicle

A heavily armored vehicle located at the side


of the principal’s vehicle.

You might also like