Professional Documents
Culture Documents
Cdi Ass Ni Max
Cdi Ass Ni Max
1
borders of a sovereign state or other ➔ Line Intelligence - It is the kind of
self-governing territories, generally intelligence required by the
by upholding the national law and commander to provide for planning
defending against internal security and conduct tactical and
threats. administrative operations in counter
● Public Safety Intelligence insurgency. This pertains to
(PUSINT)- refers to the knowledge knowledge of People, Weather,
essential to ensure the protection of Enemy and Terrain (PWET) used in
lives and properties. planning and conducting tactical and
administrative operations in a
10. Forms of Intelligence counter insurgency.
➔ Sociological Intelligence- deals with Intelligence information to be determined
the demographic and psychological in Line Intelligence are:
aspects of groups of people. It
includes the population and People- living condition of the people,
manpower and the characteristics of sources of income, education of the people,
the people, public opinion-attitude of government livelihood projects, extent of
the majority of the people towards enemy influence to the people.
matters of public policy and
education. Weather - visibility, cloudy, temperature,
➔ Biographical Intelligence - deals precipitation (rain), wind.
with individual's personalities who
have actual possession of power. Enemy - location of the enemy, strength of
➔ Armed Force Intelligence- deals with the enemy, disposition, tactical capability,
the armed forces of the nation. It enemy vulnerability.
includes the position of the armed
forces, the constitutional and legal Terrain- relief and drainage system,
basis of its creation and actual role, vegetation, surface material, man made
the organizational structure and features. There are military aspects of terrain
territorial disposition, and the which includes cover and concealment,
military manpower recruitment and obstacles, critical key terrain features,
Order of Battle. observation and fields of fire, and avenues
➔ Geographical Intelligence deals with of approach.
the progress of research and
development as it affects the ➔ Counter Intelligence (CI) - this kind
economic and military potential of a of intelligence covers the activity
nation. devoted to destroying the
effectiveness of hostile foreign
11. Kinds of Intelligence (SLC) activities and to the protection of
➔ Strategic Intelligence - as defined info against espionage, subversion
earlier, it is an intelligence data that and sabotage. Hence, the three
is not of an immediate value. It is activities of CI are; protection of
usually descriptive in nature, information against espionage;
accumulation of physical description protection of personnel against
of personalities, modus operandi. It subversion, and protection of
does not have immediate operational installations and material against
value but rather long range that may sabotage.
become relevant to future police
operations.
2
Counter Intelligence is also known as Mossad and intelligence services of ASEAN
Negative Intelligence - a generic term countries to counter the threat of terrorism.
meaning three different things;
EXECUTIVE ORDER NO. 246
Security Intelligence- means that the total JULY 24, 1987, PROVIDING FOR THE
sum of efforts to counsel the national CREATION OF THE NATIONAL
policies, diplomatic decisions, military data, INTELLIGENCE COORDINATING
and any other information of a secret nature AGENCY AND FOR OTHER PURPOSES.
affecting the security of the nation form
unauthorized persons. It is an effort to deny 13. Intelligence Cycle (PD, CPAD)
information to unauthorized persons by The single most important part of
restricting to those who are explicitly intelligence activity is understanding the
authorized to possess it. intelligence cycle because MISSION, which
is the core of the cycle, serves as the
Counter-Intelligence- counter intelligence is foundation of all intelligence operations.
the organized effort to protect specific data Every operative must therefore place into
that might be of value to the opponent's own mind the following phases of the cycle:
intelligence organization. Some of its
functions are Censorship of the following: ➔ PHASE 1 - Planning the Collection
correspondence, broadcast. telecast, Effort
telephone conversations, telegrams and This phase of the cycle involves the
cables, etc., prevention of the dissemination determination of the requirements of
of any information that might aid an intelligence. It is concerned with identifying
opponent; maintenance of files of suspect, the so-called Essential Element of
surveillance of suspects, mail reading, Information (EEI) - an item of intelligence
wiretapping and recording; infiltration of the or information of the characteristics of the
enemy intelligence organized to procure area of operations and the enemy, which the
information about its method, personal, commander feels he needs before he can
specific operations and interest. reasonably arrive at a decision.
With this, the intelligence officer must have
Counter-Espionage - In counter-espionage, a thorough knowledge of the available
negative intelligence becomes a dynamic sources of information, the collecting
and active effort. Its purpose is to investigate agencies and the type of info the latter can
actual or theoretical violation of espionage provide. He must understand the operations
laws, to enforce those laws and to apprehend of the command in order to provide the
any violators. particular Intel required for success. He
must have a thorough knowledge of the
12. Major Intelligence service in the tactics, organizations, and characteristics of
Philippines the enemy and be especially competent in
The National Intelligence Coordinating the fields of acquisition of operations.
Agency or NICA is the primary intelligence
collection and analysis arm of the Philippine Categories of Intelligence Requirements
government in charge of carrying out overt, In relation to use;
covert, and clandestine intelligence A. Executive – are those information
programs. The current head of the Agency is required by executive, governmental
General Cesar Garcia. Its motto is Ang and military commanders; the
Karunungan ay Kaligtasan (translated executive requirements are the basis
"Knowledge is Security"). Presently, NICA for decisions and national policy
is in close coordination with the CIA, making.
3
B. Contributory – information required capability, confirmation, timeliness
to complete the staff process – make and balance.
staff plans and estimates that
contribute to the decision and policy Purpose of the Collection Plan
making. A. To ensure logical and orderly
C. Operational – additional intelligence analysis of the intelligence
required in planning and carrying out requirements.
effectively the decision or policy B. To establish a workable collection
announced. Decisions and policy scheme based on the analysis of the
require implementation. intelligence requirement.
D. Collateral – higher or adjacent C. To provide definite and precise
echelons of the government or directives to collecting agencies.
military establishment may require D. To avoid possibility of omission,
info. conflict or unnecessary duplication
In relation to type; of collection effort.
A. Basic – are general reference
materials for use in the planning Steps in Developing a Collection Plan
regarding the enemies, area of List the requirements in the order of priority
operations, capabilities – static ● Break the requirements into
comprehensive. indication – any evidence of actual
B. Current – are information which are or potential enemy activity or
temporary in nature and narrower in characteristic of an area of operation,
scope. enemy activity or characteristic of an
C. Estimates – are those that determine area of operation, habitual activities
the future courses of action; required – need experience.
by the executives to plan future ● Fit those indications into existing
military operations and policies. situations– critical clues, security
measures, attack, defense, etc.
➔ PHASE 2 - Collection of ● Basis for development for specific
information collection directive - designed to
This phase of the cycle is concerned with exploit to the fullest the collection
identification of the collecting agency, the directive; guide doesn’t limit.
formulation of procedures on the manner of ● Selection of Collecting Agencies –
collecting the information in conjunction criteria for selection – suitability,
with the plans as achieved in phase one. capability, confirmation, timeliness
and balance. Designation of
Selection of Collecting Agencies; particular time and place that the
A. List all available sources; exploit the required information is to be
collecting agencies. reported.
B. Collection will be assigned in
accordance with capabilities; Factors in choosing Collection Agent
C. Collection directives prepared once In choosing collection agents, they must be
the proper collecting agency has selected according to their capability – agent
been selected to exploit a particular placements or access to the target;
source; multiplicity more agents; and balance the
D. Collection directives do not limit the number of agents needed per operation.
activities of the collecting agency; a. Methods of Collection – collection
E. Criteria for the selection of of information can be done through
collecting agency; suitability, overt method (open system) or
covert method (secret/clandestine).
4
b. Collecting Agencies – depending on 7. Deduction- the formulation of
the type of operation, the collecting conclusions from the theory
agency could be Government developed.
Agencies, Intelligence units, or
Organizations Pertinence- does it hold some value to
c. Trade Crafts – includes the use of current operation.
photography, investigations / Reliability- judging the source of
elicitation / interrogation, information or agency.
surveillance, sound equipment, Credibility-truth of information.
surreptitious entry – keys and locks,
use of an artist, communication. Accuracy of Information (CODE:
CPPDIT)
5
X-Observation of government/civilian Examples: info about intelligence
employee operations, troop movements, order of
battle, etc.
Y-Member of the populace ● Confidential-Unauthorized
revelation of which may be injurious
to the reputation of the nation or
Z- Documentary governmental activity or will cause
administrative humiliation or
● Example: SPO3 Juan Cruz evaluated unnecessary injury.
the information gathered as Examples: plans of government projects,
"completely reliable, source routine intelligence reports
probably true". What is the ● Restricted - this is information which
information's evaluation rating? should not be published or
communicated to anyone except for
Answer: A-2 official purposes. These records are
daily files, routine in nature even if
● P01 Juan Cruz submitted an lost or destroyed will not affect
intelligence report evaluated as B-5. operation,
What is the interpretation of this Examples: blotters, daily logbook file, etc.
evaluated intelligence report?
15. Informant (assets)- gives
Answer: Information is usually from a information without any
reliable source and is improbable. consideration.
6
surprising the police about bits of ★ Special Employee– informants who
information. are of a specific operational nature.
➔ Double Crosser - wants to get more
information from the police more 17. Types of surveillance
than what he gives. a. According to Intensity and
➔ Special/legitimate informant- those Sensitivity
who give information concerning ● Discrete- Discreet surveillance of
specialized cases. Usually they are people and facilities is defined as
regarded with special treatment by secret monitoring and surveillance of
the operatives. (Ex. Teachers, people, facilities and vehicles for the
businessmen, etc.) purpose of collecting findings and
➔ Voluntary informant-gives evidence related to specific
information freely and willfully as a activities, people's identities and
witness to a certain act. meetings, previously defined by the
➔ Rival elimination informant- client requesting the surveillance.
informant who gives information to ● Close- surveillance maintained
eliminate rivalry. where the prevention of loss of the
➔ Mercenary informant-informant who subject is paramount.
gives Information for remuneration ● Loose- involves the exercise of
or compensation. caution, preferring to lose the subject
➔ Criminal Informant – informant who rather than risk detection or
gives information to the police exposure.
pertaining to the underworld about
organized criminals with the b. According to Methods
understanding that his identity will ● Stationary Surveillance - also
be protected. referred to as Fixed or Stakeout
➔ Confidential Informant – is similar to Surveillance - is used when you
the former but he gives information know or suspect that a person is at or
that violates the law to include will come to a known location, when
crimes and criminals. you suspect that stolen goods are to
➔ Incidental Informant – a person who be dropped or when informants have
casually imparts information to an told you that a crime is going to be
officer with no intention of providing committed.
subsequent information ● Technical- surveillance by the use of
➔ Recruited Informant – A person who communications and electronic
is selected, cultivated and developed hardware, gadgets, etc.
into a continuous source of info. ● Moving Surveillance/ Shadowing/
Tailing - simply the act of following
Categories of Recruited Informants: a person.
7
official identity is concealed to accomplish For two-man foot surveillance, use
an investigative mission. the “AB” technique. The person right
behind the subject has the A
2. Surveillance of place (fixed/ stake-out) – position. The other surveillant has
careful survey of the surrounding area the B position. When using the AB
should be made. The character of the technique, A follows the subject and
neighborhood, residents and transients B follows A. B may be on the same
should be noted. The observation point side of the street as A. Or he may be
should be selected properly. When on the opposite side of the street.
observation is conducted from a ‘plant’,
surveillance agents must be extremely When both A and B are on the same
careful not to reveal their true activity. side of the street, and the subject
Observation may be made through a window turns a corner to the right, A
or other aperture so as to be unnoticed from continues across the street. Then he
the outside. Venetian blinds afford the best signals B what action to take. The
coverage, but may appear to be out of place subject’s actions may require B to
in some buildings. take the A position, and A to take the
B position. Signals between A and B
3.Tailing or shadowing – Is the act of should attract as little attention as
following a person, depending on the possible.
number of surveillant available, volume of
pedestrian traffic and importance of When B is across the street and the
concealing the surveillance. subject turns the corner to the right–
away from B–B crosses and takes the
A position. This step should be
19. Method of foot surveillance prearranged so no signals will be
➔ One man- Extremely difficult and needed. If the subject turns the
should be avoided, if unavoidable corner to the left and crosses toward
keep the subject in view at all times. B, B drops back to avoid contact. B
If one-man foot surveillance must be then waits for a signal from A before
used, be cautious when you are on making the next move.
the same side of the street as the ➔ ABC method or Three-man- reduces
subject. Stay to the rear and vary the risk of losing the subject, affords
your distance from the subject. Set greater security agents detection.
your distance according to physical For three-man foot surveillance, the
conditions like size of crowds and “ABC” technique offers ease. And it
number of exits. is consistent with reasonable
manpower resources. Use this
If the subject turns a corner, continue technique for close foot surveillance
across the street, keeping the subject unless you lack the manpower. The
in view. Then, operating from across main advantage of the ABC
the street, you can fall in behind or technique is that it lets you cover the
move to the front or side of the subject from two sides. As in the AB
subject. Decide which position will technique, A follows the subject and
give you the best view. When the B follows A. C normally stays across
subject turns a corner, you may want the street and just to the rear of the
to be abreast of him to see if he subject.
makes a contact or enters a building.
➔ Two-man- two agents are employed The ABC technique allows several
to follow the subject. choices when the subject turns the
8
corner. Assume A and B are behind
the subject and C is across the street
when the subject turns the corner
away from C. A could keep going
straight and B would take the A
position. C would move across to the
B position. A would stay across the
street, moving as C had done before.