Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

1.

Police Intelligence In England, Sir Francis Walsingham, under


It is the end product resulting from the Queen Elizabeth, organized the first
collection, evaluation, analysis, integration, National Intelligence Service. He employed
and interpretation of all available spies on the staff of the Admiral in
information regarding the activities of Command of the Spanish Army and was
criminals and other law violators for the able to obtain information regarding the
purpose of ¹affecting their arrest, ²obtaining Spanish Army as to their ships, equipment,
evidence, and ³forestalling them to commit forces and stores. He protected Queen
crime. Elizabeth I from countless assassins.

2. Delilah 6. Napoleon Bonaparte


She is a biblical personality, she was able to According to him, "one spy in the right
gain information by using her beauty and place is equivalent to 20,000 men in the
charm, she was responsible for the fall of field." He maintained military intelligence
Samson, a known Israelite leader and enemy and secret political police service all over
of the Philistines. Europe.
The Philistine used her when she allowed
Philistine spies to hide in her house (Judges 7. Frederick the Great
16). Delilah was an impromptu intelligence Father of organized military espionage. This
agent. Apart from her tonsorial specialty, Prussian master was able to classify his
she also allowed sex to gain intelligence agents into four classes: common spies,
from a powerful enemy. She achieved the double spies, spies of consequence, and
largest effective force of her employer's persons which are involuntarily led to
adversaries and contrived the stroke which undertake espionage.
put that force out of action".
8. Hannibal
3. Sun Tzu Known as one of the greatest Roman
The author of the art of war. A Chinese enemies who ruled and conquered Rome for
philosopher who takes into account practical 15 years by obtaining common street
views in battle. According to him knowledge by posing as a beggar to gather
foreknowledge cannot be elicited from first hand information on the pulse of the
spirits nor from gods nor from analogy with people. His famous feat was at the outbreak
past events nor from calculations. He further of the Second Punic War when he marched
asserted that if you know thy enemy and an army which included elephants from
know thyself, you need not fear the results Iberia to Northern Italy. Military historians
of a hundred battles. consider Hannibal as the "father of strategy"
because his greatest enemy, Rome, came to
4. Alexander the Great adopt the elements of his military tactics in
A Greek Conqueror, was able to identify its own strategic arsenal.
those who are disloyal to him by ordering
the opening of communication letters of his 9. Classification of Police Intelligence
men and was successful in uplifting the ● Criminal Intelligence (CRIMINT)-
esprit de corps and morale of his men. He production of intelligence essential
devised the first letter sorting and opening to to the prevention of crimes and the
obtain information. investigation, arrests, and
¹Horseman prosecution of criminal offenders.
²Carrier Pigeon ● Internal Security Intelligence
³Fire Beacon (Morse code) (INSINT)- refers to the knowledge
essential to the maintenance of peace
5. Sir Francis Walsingham and order. Keeping peace within the

1
borders of a sovereign state or other ➔ Line Intelligence - It is the kind of
self-governing territories, generally intelligence required by the
by upholding the national law and commander to provide for planning
defending against internal security and conduct tactical and
threats. administrative operations in counter
● Public Safety Intelligence insurgency. This pertains to
(PUSINT)- refers to the knowledge knowledge of People, Weather,
essential to ensure the protection of Enemy and Terrain (PWET) used in
lives and properties. planning and conducting tactical and
administrative operations in a
10. Forms of Intelligence counter insurgency.
➔ Sociological Intelligence- deals with Intelligence information to be determined
the demographic and psychological in Line Intelligence are:
aspects of groups of people. It
includes the population and People- living condition of the people,
manpower and the characteristics of sources of income, education of the people,
the people, public opinion-attitude of government livelihood projects, extent of
the majority of the people towards enemy influence to the people.
matters of public policy and
education. Weather - visibility, cloudy, temperature,
➔ Biographical Intelligence - deals precipitation (rain), wind.
with individual's personalities who
have actual possession of power. Enemy - location of the enemy, strength of
➔ Armed Force Intelligence- deals with the enemy, disposition, tactical capability,
the armed forces of the nation. It enemy vulnerability.
includes the position of the armed
forces, the constitutional and legal Terrain- relief and drainage system,
basis of its creation and actual role, vegetation, surface material, man made
the organizational structure and features. There are military aspects of terrain
territorial disposition, and the which includes cover and concealment,
military manpower recruitment and obstacles, critical key terrain features,
Order of Battle. observation and fields of fire, and avenues
➔ Geographical Intelligence deals with of approach.
the progress of research and
development as it affects the ➔ Counter Intelligence (CI) - this kind
economic and military potential of a of intelligence covers the activity
nation. devoted to destroying the
effectiveness of hostile foreign
11. Kinds of Intelligence (SLC) activities and to the protection of
➔ Strategic Intelligence - as defined info against espionage, subversion
earlier, it is an intelligence data that and sabotage. Hence, the three
is not of an immediate value. It is activities of CI are; protection of
usually descriptive in nature, information against espionage;
accumulation of physical description protection of personnel against
of personalities, modus operandi. It subversion, and protection of
does not have immediate operational installations and material against
value but rather long range that may sabotage.
become relevant to future police
operations.

2
Counter Intelligence is also known as Mossad and intelligence services of ASEAN
Negative Intelligence - a generic term countries to counter the threat of terrorism.
meaning three different things;
EXECUTIVE ORDER NO. 246
Security Intelligence- means that the total JULY 24, 1987, PROVIDING FOR THE
sum of efforts to counsel the national CREATION OF THE NATIONAL
policies, diplomatic decisions, military data, INTELLIGENCE COORDINATING
and any other information of a secret nature AGENCY AND FOR OTHER PURPOSES.
affecting the security of the nation form
unauthorized persons. It is an effort to deny 13. Intelligence Cycle (PD, CPAD)
information to unauthorized persons by The single most important part of
restricting to those who are explicitly intelligence activity is understanding the
authorized to possess it. intelligence cycle because MISSION, which
is the core of the cycle, serves as the
Counter-Intelligence- counter intelligence is foundation of all intelligence operations.
the organized effort to protect specific data Every operative must therefore place into
that might be of value to the opponent's own mind the following phases of the cycle:
intelligence organization. Some of its
functions are Censorship of the following: ➔ PHASE 1 - Planning the Collection
correspondence, broadcast. telecast, Effort
telephone conversations, telegrams and This phase of the cycle involves the
cables, etc., prevention of the dissemination determination of the requirements of
of any information that might aid an intelligence. It is concerned with identifying
opponent; maintenance of files of suspect, the so-called Essential Element of
surveillance of suspects, mail reading, Information (EEI) - an item of intelligence
wiretapping and recording; infiltration of the or information of the characteristics of the
enemy intelligence organized to procure area of operations and the enemy, which the
information about its method, personal, commander feels he needs before he can
specific operations and interest. reasonably arrive at a decision.
With this, the intelligence officer must have
Counter-Espionage - In counter-espionage, a thorough knowledge of the available
negative intelligence becomes a dynamic sources of information, the collecting
and active effort. Its purpose is to investigate agencies and the type of info the latter can
actual or theoretical violation of espionage provide. He must understand the operations
laws, to enforce those laws and to apprehend of the command in order to provide the
any violators. particular Intel required for success. He
must have a thorough knowledge of the
12. Major Intelligence service in the tactics, organizations, and characteristics of
Philippines the enemy and be especially competent in
The National Intelligence Coordinating the fields of acquisition of operations.
Agency or NICA is the primary intelligence
collection and analysis arm of the Philippine Categories of Intelligence Requirements
government in charge of carrying out overt, In relation to use;
covert, and clandestine intelligence A. Executive – are those information
programs. The current head of the Agency is required by executive, governmental
General Cesar Garcia. Its motto is Ang and military commanders; the
Karunungan ay Kaligtasan (translated executive requirements are the basis
"Knowledge is Security"). Presently, NICA for decisions and national policy
is in close coordination with the CIA, making.

3
B. Contributory – information required capability, confirmation, timeliness
to complete the staff process – make and balance.
staff plans and estimates that
contribute to the decision and policy Purpose of the Collection Plan
making. A. To ensure logical and orderly
C. Operational – additional intelligence analysis of the intelligence
required in planning and carrying out requirements.
effectively the decision or policy B. To establish a workable collection
announced. Decisions and policy scheme based on the analysis of the
require implementation. intelligence requirement.
D. Collateral – higher or adjacent C. To provide definite and precise
echelons of the government or directives to collecting agencies.
military establishment may require D. To avoid possibility of omission,
info. conflict or unnecessary duplication
In relation to type; of collection effort.
A. Basic – are general reference
materials for use in the planning Steps in Developing a Collection Plan
regarding the enemies, area of List the requirements in the order of priority
operations, capabilities – static ● Break the requirements into
comprehensive. indication – any evidence of actual
B. Current – are information which are or potential enemy activity or
temporary in nature and narrower in characteristic of an area of operation,
scope. enemy activity or characteristic of an
C. Estimates – are those that determine area of operation, habitual activities
the future courses of action; required – need experience.
by the executives to plan future ● Fit those indications into existing
military operations and policies. situations– critical clues, security
measures, attack, defense, etc.
➔ PHASE 2 - Collection of ● Basis for development for specific
information collection directive - designed to
This phase of the cycle is concerned with exploit to the fullest the collection
identification of the collecting agency, the directive; guide doesn’t limit.
formulation of procedures on the manner of ● Selection of Collecting Agencies –
collecting the information in conjunction criteria for selection – suitability,
with the plans as achieved in phase one. capability, confirmation, timeliness
and balance. Designation of
Selection of Collecting Agencies; particular time and place that the
A. List all available sources; exploit the required information is to be
collecting agencies. reported.
B. Collection will be assigned in
accordance with capabilities; Factors in choosing Collection Agent
C. Collection directives prepared once In choosing collection agents, they must be
the proper collecting agency has selected according to their capability – agent
been selected to exploit a particular placements or access to the target;
source; multiplicity more agents; and balance the
D. Collection directives do not limit the number of agents needed per operation.
activities of the collecting agency; a. Methods of Collection – collection
E. Criteria for the selection of of information can be done through
collecting agency; suitability, overt method (open system) or
covert method (secret/clandestine).

4
b. Collecting Agencies – depending on 7. Deduction- the formulation of
the type of operation, the collecting conclusions from the theory
agency could be Government developed.
Agencies, Intelligence units, or
Organizations Pertinence- does it hold some value to
c. Trade Crafts – includes the use of current operation.
photography, investigations / Reliability- judging the source of
elicitation / interrogation, information or agency.
surveillance, sound equipment, Credibility-truth of information.
surreptitious entry – keys and locks,
use of an artist, communication. Accuracy of Information (CODE:
CPPDIT)

➔ PHASE 3 PROCESSING 1 Confirmed By Other Sources


ANALYSIS- The stage in which the 2-Probably True
collected information is subjected to 3-Possibly True
review in order to satisfy significant 4-Doubtfully True
facts and derive conclusions there 5 -Improbable
from. 6-Truth Can Not Be Judged

Steps in Processing Reliability of Information (CODE:


CUFNUR)
1. Collation-organization of raw data
and information into usable form, A-Completely reliable
grouping similar items of B-Usually Reliable
information so that they will be C-Fairly Reliable
readily accessible. D-Not Usually Reliable
2. Recording- is the reduction of info E-Unreliable
writing or some other form of F-Reliability Cannot be judged
graphical representation and the
arranging of this into groups of Evaluation of Source of Information
related items.
3. Evaluation-examination of raw T-Direct observation by Commander/Chief
information to determine intelligence of Unit
value, pertinence of the information, U- Report by resident agent V- Report by
reliability of the source of PNP/AFP Troops
information and its credibility. W-Interrogation of captured enemy
4. Analysis - is the stage in which the X-Observation of government/civilian
collected information is subjected to employee
review in order to satisfy significant Y-Member of the populace
facts and derive conclusions there Z- Documentary
from.
5. Integration - the combination of the Evaluation of Source of Information
elements isolated analysis with other
known information related to the T-Direct observation by Commander/Chief
operation. of Unit
6. Interpretation-process of determining U-Report by resident agent
the significance of new information V-Report by PNP/AFP Troops
and its meaning. W-Interrogation of captured enemy

5
X-Observation of government/civilian Examples: info about intelligence
employee operations, troop movements, order of
battle, etc.
Y-Member of the populace ● Confidential-Unauthorized
revelation of which may be injurious
to the reputation of the nation or
Z- Documentary governmental activity or will cause
administrative humiliation or
● Example: SPO3 Juan Cruz evaluated unnecessary injury.
the information gathered as Examples: plans of government projects,
"completely reliable, source routine intelligence reports
probably true". What is the ● Restricted - this is information which
information's evaluation rating? should not be published or
communicated to anyone except for
Answer: A-2 official purposes. These records are
daily files, routine in nature even if
● P01 Juan Cruz submitted an lost or destroyed will not affect
intelligence report evaluated as B-5. operation,
What is the interpretation of this Examples: blotters, daily logbook file, etc.
evaluated intelligence report?
15. Informant (assets)- gives
Answer: Information is usually from a information without any
reliable source and is improbable. consideration.

➔ PHASE 4 DISSEMINATION- Other meanings of "Informants":


Processed information or intelligence 1. Obnoxious - the view of the public to
data are disseminated to end users, a person selling information to
common methods of disseminating another or money motivated.
Intel data are conferences, briefing 2. Stool Pidgeon - the view of the
and person to person exchanges. In underworld to a person who exposes
this process, consider the factors of their activities and Identities.
timeliness, correctness and security. 3. Savior - the view of the police to a
person who gives information,
14. Four Categories of classified without his valuable reports or
matters revelations the crime would remain
● Top Secret- calls for the utmost unsolved.
degree of protection. Unauthorized
revelation of these materials and Informer- gives information in exchange
information will cause extremely for a reward or a price.
severe damage to the nation,
politically, economically, or 16. Types of informant
militarily. ➔ Anonymous- those who give
Examples: political negotiations, military information through telephone with
defense, war strategic plans, etc. the hope that the informant cannot be
● Secret- unauthorized disclosure of identified.
these documents or things may put ➔ False Informant - reveals information
national security at risk and cause of no consequences or value.
serious injury to the reputation of the ➔ Self-Aggrandizing - moves around
nation. the center of criminals delight in

6
surprising the police about bits of ★ Special Employee– informants who
information. are of a specific operational nature.
➔ Double Crosser - wants to get more
information from the police more 17. Types of surveillance
than what he gives. a. According to Intensity and
➔ Special/legitimate informant- those Sensitivity
who give information concerning ● Discrete- Discreet surveillance of
specialized cases. Usually they are people and facilities is defined as
regarded with special treatment by secret monitoring and surveillance of
the operatives. (Ex. Teachers, people, facilities and vehicles for the
businessmen, etc.) purpose of collecting findings and
➔ Voluntary informant-gives evidence related to specific
information freely and willfully as a activities, people's identities and
witness to a certain act. meetings, previously defined by the
➔ Rival elimination informant- client requesting the surveillance.
informant who gives information to ● Close- surveillance maintained
eliminate rivalry. where the prevention of loss of the
➔ Mercenary informant-informant who subject is paramount.
gives Information for remuneration ● Loose- involves the exercise of
or compensation. caution, preferring to lose the subject
➔ Criminal Informant – informant who rather than risk detection or
gives information to the police exposure.
pertaining to the underworld about
organized criminals with the b. According to Methods
understanding that his identity will ● Stationary Surveillance - also
be protected. referred to as Fixed or Stakeout
➔ Confidential Informant – is similar to Surveillance - is used when you
the former but he gives information know or suspect that a person is at or
that violates the law to include will come to a known location, when
crimes and criminals. you suspect that stolen goods are to
➔ Incidental Informant – a person who be dropped or when informants have
casually imparts information to an told you that a crime is going to be
officer with no intention of providing committed.
subsequent information ● Technical- surveillance by the use of
➔ Recruited Informant – A person who communications and electronic
is selected, cultivated and developed hardware, gadgets, etc.
into a continuous source of info. ● Moving Surveillance/ Shadowing/
Tailing - simply the act of following
Categories of Recruited Informants: a person.

★ Spontaneous or Automatic 18. Kinds of surveillant


Informant– Informants who by the The Following are the Kinds of Surveillance
nature of their work or position in (UST):
society have certain legal, moral or
ethical responsibilities to report info 1. Undercover or roping – Is a form of
to the police. investigation in which the investigator
★ Ordinary (out-of-their-will) assumes a different and unofficial identity in
Informants– Informants that are order to obtain information; an investigative
under the compulsion to report info technique in which the agent’s/investigator’s
to the police.

7
official identity is concealed to accomplish For two-man foot surveillance, use
an investigative mission. the “AB” technique. The person right
behind the subject has the A
2. Surveillance of place (fixed/ stake-out) – position. The other surveillant has
careful survey of the surrounding area the B position. When using the AB
should be made. The character of the technique, A follows the subject and
neighborhood, residents and transients B follows A. B may be on the same
should be noted. The observation point side of the street as A. Or he may be
should be selected properly. When on the opposite side of the street.
observation is conducted from a ‘plant’,
surveillance agents must be extremely When both A and B are on the same
careful not to reveal their true activity. side of the street, and the subject
Observation may be made through a window turns a corner to the right, A
or other aperture so as to be unnoticed from continues across the street. Then he
the outside. Venetian blinds afford the best signals B what action to take. The
coverage, but may appear to be out of place subject’s actions may require B to
in some buildings. take the A position, and A to take the
B position. Signals between A and B
3.Tailing or shadowing – Is the act of should attract as little attention as
following a person, depending on the possible.
number of surveillant available, volume of
pedestrian traffic and importance of When B is across the street and the
concealing the surveillance. subject turns the corner to the right–
away from B–B crosses and takes the
A position. This step should be
19. Method of foot surveillance prearranged so no signals will be
➔ One man- Extremely difficult and needed. If the subject turns the
should be avoided, if unavoidable corner to the left and crosses toward
keep the subject in view at all times. B, B drops back to avoid contact. B
If one-man foot surveillance must be then waits for a signal from A before
used, be cautious when you are on making the next move.
the same side of the street as the ➔ ABC method or Three-man- reduces
subject. Stay to the rear and vary the risk of losing the subject, affords
your distance from the subject. Set greater security agents detection.
your distance according to physical For three-man foot surveillance, the
conditions like size of crowds and “ABC” technique offers ease. And it
number of exits. is consistent with reasonable
manpower resources. Use this
If the subject turns a corner, continue technique for close foot surveillance
across the street, keeping the subject unless you lack the manpower. The
in view. Then, operating from across main advantage of the ABC
the street, you can fall in behind or technique is that it lets you cover the
move to the front or side of the subject from two sides. As in the AB
subject. Decide which position will technique, A follows the subject and
give you the best view. When the B follows A. C normally stays across
subject turns a corner, you may want the street and just to the rear of the
to be abreast of him to see if he subject.
makes a contact or enters a building.
➔ Two-man- two agents are employed The ABC technique allows several
to follow the subject. choices when the subject turns the

8
corner. Assume A and B are behind
the subject and C is across the street
when the subject turns the corner
away from C. A could keep going
straight and B would take the A
position. C would move across to the
B position. A would stay across the
street, moving as C had done before.

Another approach would be for C to


move into the A position. A would
go across and take up the C position,
while B keeps his own. What if the
subject turns left and crosses the
street toward C? C drops back and A
continues in the original direction
and becomes C. Then B moves into
the A position, and C becomes B.
➔ Progressive/Leap frog method- poor
chances of obtaining good results,
agents are stationed at a fixed point
assuming that subject followed the
same general route each day.
➔ Combined foot-auto surveillance-
employment of surveillant on foot
and agents in an automobile.

20. Common tricks of the subject in


surveillance
1. Test For Tailing = When the subject is
conscious that he is being tailed while about
to board a public conveyance, is to jump off
the vehicle. If somebody also jumps off, he
then recognizes the shadower, which will be
his basis for future recognition.

2. Use of Convoy = The subject employs


other partners to detect if he is being tailed.
The convoy which may employ the ABC
method would be very easy to detect
shadowers. If the subject uses this, the
shadower must be behind the convoy and
follow them instead.

You might also like