Intelligence

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

Intelligence

Historical Setting
The desire for advance information is no doubt a manifestation of our instinct for
survival. A ruler may ask himself what will happen next? What course of action should I
take? How strong are enemies? What are they planning against me? From the
beginning, we noted that inquiries are made not solely about the situation and prospect
of the single individual but about those of the group – The Tribe, the Kingdom, and the
Nation.
Biblical Beginnings
The earliest sources of intelligence, fathering can be found in the Holy Bible when
Moses was in the wilderness with the children of Israel, he was directed by the Lord to
send a ruler to each of the tribes of Israel to spy out the Land of Canaan which the lord
had designed as their home.
Rahab. The Harlot of Jericho who sheltered and concealed the agents of Israel made a
covenant with the agents and duped their pursuers. She was not only an impromptu
confederate of immense value for the Jewish leader of that fare distant day.
Delilah. The Philistine used her when she allowed Philistine spies to hide in her house.
Delilah was an impromptu intelligence agent. Apart from her torsorial specialty, she also
allowed sex to gain intelligence from powerful enemy. She was responsible for the fall of
Samson, a known Israelite leader who terrorized the Philistines.
EVENTS AND PERSONALITIES IN THE WORLD OF INTELLIGENCE
Sun-Tzu, a Chinese philosopher takes a more practical view according to him, what is
called foreknowledge cannot be elicited from spirits, nor from gods nor from analogy
with past events nor from calculations. He wrote, “It must be obtained from men who
knew the enemy situation.” It is no wonder that Sun-Tzu’s book entitled “The Art of
War” is the favourite readings of the late Mao Tse Tung and required reading material
for the Chinese Communist Tacticians. He further wrote the saying in which most
people in the intelligence service believe became a parlance in the world of intelligence
If you know thy enemy and know yourself, you need not fear the results of a hundred
battles. If you know yourself and not the enemy, for every victory, you will suffer defeat.
If you know neither yourself nor the enemy” you are a fool who will meet defeat in every
battle.
Gen Romano Q Sertorious
He was the Roman Commander in Spain who possessed a White Fawn and allowed it
to become widely known- that the derived secrets and guidance from the fawn. His
intelligence agents credited their information to the supernatural power of animals.
Akbar
He was known as “The Great Mongol “, and sagacious master of Hindustan employed
more than 4,000 agents for the sole purpose of bringing him truth that his throne might
rest upon it.
Genghis Khan. A Mongol, who used intelligence to conquer China and invade Cathay.
He instructed his Generals to send out spies and used prisoners as source of
information. He was the leader of the so-called MONGOL CONQUERORS- who used
effective propaganda machine by spreading reports of Mongol Terror, they collected
information on weaknesses of rivalries of posing themselves as disguised merchants.
RENAISSANCE PERIOD
Napoleon Bonaparte “One Spy in the right place is worth 20,000 men in the field.” He
organized the Bureaus of interest:
Bureau of Intelligence- Consolidate all incoming information regarding the enemy for
presentation of the emperor and to obtain information as desired.
Topographic Bureau- maintains a large map which covers the latest information
regarding both enemy and friendly forces. He maintained a Military Intelligence and
Secret Political Police Service all over Europe. His main arm was “Spy against Spy”
concept.
Frederick The Great. He was the third and the last “king in Prussia; beginning in 1772,
he used the title “King of Prussia”. He was also known as the “Father of Organized
Military Espionage”. He had divided his agents into four classes:
a. Common Spies- those recruited among poor folk, glad to earn a small sum or to
accommodate as military officer.
b. Double Spies- are unreliable renegades, chiefly involved in spreading false
information to the enemy.
c. Spies of Consequence - couriers and noblemen, staff officers and kindred
conspirators, requiring a substantial bribe or bait.
d. Persons who were forced to undertake espionage against their own will.
Alexander the Great
When Alexander the Great was marching to Asia, where rumors of disaffection growing
among his allies and mercenaries, he sought the truth and got it by simplest expedient
by devising the first “letter sorting” and opening to obtain information
Hannibal - He was considered one of the brilliant military strategists in the history of
military intelligence system for 15 year in Rome. He usually roams around the City often
disguised himself as a beggar to gather first hand information.
Edward I – An English monarch who started utilizing state informants especially to
determine seditious writings against the crown and identify of his enemies.
Julius Caesar - During his time, the staff of each Roman legion includes ten
“speculators” who served as an information-collecting agency. The “speculators” were
the first intelligence personnel to appear definitely in a military organization. Military
success of the Romans was aided by communication system. Made use of carrier
pigeons, which made possible the amazing speed with which intelligence of Imperial
Rome was transmitted. They also employed ciphers to ensure secrecy of
communications.
George Washington - Conspirator under oath abounds in the history of every nation.
George Washington as Grand Master mobilized the free masons of the colonies at the
outbreak of the American war of Independence.
Fouche of France - A Frenchmen born in 1759, rose to become the most feared and
respected intelligence director in French history. He created a network of agent. His
assistance founded the modern system of spying on spies, which later was known as
counter espionage.
Joseph Petrosino - He was member of the New York Police Department in early 1900,
he was the head of the Italian Squad. Through extensive intelligence network, he was
credited to smash and neutralization of the Black Society.
The Federal Bureau of Investigation (FBI). - First established in1908 as an investigative
arm of the U.S Department of Justice. It becomes what is known at the F.B.I. under its
first director John Edgar Hoover in 1924. On September 6, 1939 by a presidential
directive, it came to its responsibility the task of a domestic intelligence.
The National Bureau of Investigation – was established primarily for the purpose of
handling scientific and modern investigation of crimes. It was formerly the Bureau of
Investigation created under Republic act 157 passed into Law last June 19, 1947.
The Central Intelligence Agency - The agency was created under the US National
Security Act of 1947, Public Law 110 established by the late President Truman in
January 1946. The CIA is under the National Security Council. The first Director of the
Agency was Rear Admiral Roscoe Hillenkoetter.
The Scotland Yard, - The London Metropolitan Police Force established by SIR
ROBERT PEEL in 1829.Thus the beginning of a colourful legendary police force and
considered one of the most efficient in the World today.
World War 1
1900- Europe powers developed modern staff systems and place intelligence on the
same level with personnel, operations and logistics. Intelligence then functioned in time
of peace and war. Intelligence during this period, they concentrated on information
about armed forces of the enemy and their capabilities. Wireless telegraph was used
wherein codes and ciphers were applied.
KGB – Is the committee for state security, during the height of the cold war and the
prominence of the defunct USSR, it was the Russian agency whose works are
comparable to that of its American counter-part the CIA. KGB was the umbrella
organization name for the Soviet Union’s Premier Security, Secret Police, and
intelligence agency from 1954- 1991. On the December 21, 1995, Russian President
Boris Yeltsin sign the decree that disbanded the KGB, to be substituted by the Federal
Security Service of the Russian Federation (FSB).
Spying – was employed by the Russians for the purpose of internal security and political
repression, and it was the specialty of the Russians.
The British Secret Service- A parallel ally and intelligence organization of the western
powers. Established by the Committee of Imperial Defense in October 1909. The Secret
Service Bureau was soon abbreviated to Secret Service, or SS’ Bureau. The first head
of foreign section, Captain sir Mansfield Cumming, signed himself MC’ or ‘C’ in green
ink. Thus, began the long tradition of the head of the Service adopting the initial ‘C’ as
his symbol.
British intelligence – succeeded greatly by means of censorship and its Code room
combined with skilful use of covert agents.
Mossad- the Israeli Intelligence agency which are renowned by many as the best due to
the fact that Israel despite of having countless enemies in the Middle East was able to
survive and flourish. Formerly known as the Central Institute for Coordination and the
central institute for Intelligence and security. Mossad was formed on April 1, 1951.
Mossad was established by then Prime Minister David Ben Gurion, who gave as
Mosaad’s primary directive: “for our state which since its creation has been under siege
by its enemies, intelligence constitutes the first line of defense... we must learn well how
to recognize what is going on around us.”
The institute for intelligence and special Tasks Mosaad (Hebrew for “Institute”) has
responsibility for human intelligence collection, covert action, and counterterrorism. Its
focus is on Arab nations and organizations throughout the world. Mossad also is
responsible for the clandestine movement of Jewish refugees out of Syria, Iran, and
Ethiopia. Mossad agents are active in the former communist countries, in the West, and
at the UN.
At present, every country in the World has its own intelligence organization to ensure
their survival in the face of modern adversities. As rule intelligence organizations is
vested with practice of protection, preservation, safeguard and security. Every nation
recognizes the truth that the need for timely and accurate information can never be over
emphasized.
The FSB (Federal Security Service) is the leading secret police organization of the
Russian Federation and main successor of the Soviet Checka, and KGB. Its
headquarters are still in Lubyanka Square, Moscow. FSB is engaged mostly in domestic
affairs and is responsible for internal security of the Russian state, counterespionage,
and the fight against organized crime, terrorism, and drug smuggling.
INTERPOL – Known as “The International Police Organization established after the
World War II, with its headquarters is in Paris; it serves as a clearing house of records
that provides communicating information from the police force of one country to those of
another. Interpol has been the official means of international co-operation between
police forces since 1956.
The Home Office has been taking the lead in developing, with other European
Community countries, a European police organization – Europol, which will have
increasing significance in combating crime within the EC as its internal frontiers become
more relaxed.
World War II
German Intelligence – started the war with the world’s best organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
The German intelligence weakened by the attitude of the Officer Group wherein they
subordinated intelligence to operation and did not regard intelligence assignment worthy
of a soldier.
Japanese intelligence – failed because it was not provided with sufficient number of
trained personnel to assemble and evaluate the mass of materials which were collected
although Japanese intelligence was involved in short war and defensive in nature.
US intelligence – in 1941, the US strategic service was established to research and
analyze military, political and economic information as it affected the security of the
country.
Chinese intelligence – in 1932, organized the China’s Secret Police (the BIS) to conduct
espionage and counter espionage against Japanese Spies and Chinese communists.
POST WAR PERIOD: The superpowers
Soviet Intelligence system – described as omnipotent and omnipresent for its vast
intricate organization involving millions of people. Soviet Counter Intelligence – “iron
curtain”. That no one may cross the border of the USSR without being detected. All
communications are rigidly controlled. Its contribution to modern intelligence was the
dissemination of false information designed to mislead and confuse opponents and
prospective victims.
Red Gestapo – security service of the east Germany organized to combat the covert
activities of the West Germany Group when it was still divided by the Berlin Walls.
Intelligence According to Police Parlance- The end product resulting from the collection,
evaluation, analysis, integration and interpretation of all available information regarding
the activities of criminal and other law violators for the purpose affecting their arrest,
obtaining evidence, and forestalling plan to commit crime.
Basic Functions of Intelligence in General
1. The collection or procurement of information.
2. The evaluation of information which then become intelligence
3. The dissemination of intelligence to those who need it.
4. Counter intelligence – it is known as negative intelligence. It is an activity dedicated to
the concealment and protection of one’s own information from the adversary intelligence
operation. It is a defensive function of intelligence.
Immediate Area concern and Interest in Police Intelligence
1. Crime prone community relating to vices, juvenile delinquency, crime and indication
of subversion and insurgency.
2. All matters pertaining to personnel security, physical security, and classified
documents.
3. Cases under follow-up
4. Personalities directly or indirectly involved in criminal activities
5. Personalities, places, events involved in insurgency and subversion
6. Police operation regarding its effectiveness and quality
7. Police personnel, its equipment, funds and materials.
8. Aspects of crime prevention and control
9. Aspects of management for planning and organization improvement purposes
10. And other as directed by higher authorities
Importance of intelligence
1. It is vital to enable a nation to formulate policies, strategic plans and conducts its
diplomacy.
2. Intelligence is needed in order to enable a nation to forestall the activities of its
internal and external enemies.
3. It is necessary to detect and prosecute the activities of criminals and subversive
elements.
4. It is vital in providing ample security for the people and the state.
5. Intelligence plays an important role in the life and survival of a country by providing
advance and exact knowledge of the intentions and of its enemies.
Purposes of Police Intelligence
Covert and Overt Intelligence Operation maybe used to;
1. Check the condition of the community relating to crime, vices, juvenile delinquency
and indications of subversion and insurgency
2. Determine through counter intelligence applicant matters pertaining to personnel
security, physical security and document security of the police organization.
3. Determines the follow up leads and helps in the solution of individual criminal cases
4. Identify criminals’ elements and other Law breakers as well as their associates.
5. Assists in the arrest of wanted criminals and those under RA 1700 otherwise known
as the Anti-Subversion Law.
6. Check the quality and effectiveness of the operation of the police.
7. Check the security conditions of the PNP personnel, funds, equipment and materials.
8. Help in crime control prevention.
9. Serves as tools of management for planning and organizational employment
purposes.
Functional Classification of Police Intelligence
1. Criminal Intelligence (CRIMINT)- refers to the knowledge essential to the prevention
of crimes and the investigation, arrests, and prosecution of criminal offenders.
2. Internal Security Intelligence (INSINT) - refers to the knowledge essential to the
maintenance of peace and order.
3. Public Safety Intelligence (PUSINT) - refers to the knowledge essential to ensure the
protection of lives and properties.
Forms of Intelligence
1. Sociological Intelligence- deals with the demographic and psychological aspects of
groups of people. It includes the population and manpower and the characteristics of
the people, public opinion- attitude of the majority of the people towards matter of public
policy education.
2. Biographical Intelligence- deals with individual’s personalities who have actual
possession of power.
3. Armed Force Intelligence- deals with the armed forces of the nation. It includes the
position of the armed forces, the constitutional and legal basis of its creation and actual
role, the organizational structure and territorial disposition, and the military manpower
recruitment and Order of Battle.
4. Geographical Intelligence- deals with the progress of research and development as it
affects the economic and military potential of nature.
Types or Kinds of Intelligence (Common to all Intelligence activities)
a. Military Intelligence – Refers to the use of processed information for formulating
military plans, programs and policies. This would include strategic and combat
intelligence.
b. Police Strategic Intelligence- Refers to intelligence data that are not of an immediate
value. It is usually descriptive in nature, accumulation of physical description of
personalities, modus operandi. It does not have immediate operational value but rather
long range that may become relevant to future police operation.
c. Police Intelligence- Refers to the output or end product resulting from the collection,
evaluation, analysis, integration and interpretation of all available facts which concerns
the activities of criminal elements and its significant to police planning and operation.
d. disturb and disrupt the enemy’s state of finances and destroy the stability and
foundation of its organization. Also provide for planning and conduct tactical and
administrative operation in counter insurgency. This pertains to knowledge of People,
Weather, Enemy and terrain (PWET) used in planning and conducting tactical and
administrative operation in a counter.
e. Combat intelligence – Refers to that intelligence utilized to designing plans and
conducting tactical and administrative operation.
f. Counter intelligence – are measures undertaken to deny the enemy of any information
consisting of passive and active intelligence measures. In passive counter intelligence,
secrecy discipline, movement control, camouflage and proper handling of information is
practiced. Active counter intelligence on the other hand, covers reconnaissance,
patrolling sabotage, espionage, interior guard duty and fortification of vital facilities.
Intelligence information to be determined in Line Intelligence are:
1. People- living condition of people, sources of income, education of the people,
government livelihood, projects, extent of enemy influence to the people.
2. Weather- visibility, cloudy, temperature, precipitation (rain), wind
3. Enemy- location of the enemy, strength of the enemy, disposition, tactical capability,
enemy vulnerability
4. Terrain- relief and drainage system, vegetation surface material, man-made features.
There are military aspects of terrain which includes cover and concealment, obstacle,
critical key terrain features, observation and fields of fire, and venues of approach.
g. Police Counter Intelligence – Activity which is intended to build an organization
against the enemy by ensuring loyalty of its members through stringent background
investigation. Designed to thwart attempts and neutralize penetration activities, this
endeavour will ensure integrity among members of police intelligence community.
Three (3) activities of Counter Intelligence:
a. Protection of information against espionage:
b. Protection of personnel against subversion; and
c. Protection of installations and material against sabotage.
Principles of Intelligence Operations:
1. Intelligence is Continuous
2. Intelligence Operations and Tactical Operations are Interdependent
3. Intelligence Must be Useful
4. Intelligence Must Be Timely
5. Intelligence Operations Must Be Flexible
6. Intelligence Operations Require Imagination and Foresight
7. Intelligence Requires Constant Security Measures
General qualifications of Intelligence officer
1. College Graduate
2. Passed the prescribed test for Intelligence Officer
3. Passed background investigation (BI)
4. Good moral character
5. Loyal to the Republic of the Philippines
6. No undesirable traits such as, gambling, excessive drunkenness, drug addiction, etc
7. Passed by the screening committee
INTELLIGENCE CYCLE
Intelligence is different from mere information - processing it’s not the sort of brain
intelligence, or small – letter of intelligence that psychologist’s study. Intelligence is
@secret knowledge of an enemy the kind of knowledge which stands independently of
the means by which it is obtained and the process by which it is distilled@
Intelligence Operational Cycle (Production Cycle)- refers to the chronological
development of collection activities from the time of receipt of the mission to the time of
submission of the final product. The intelligence activities connected with the production
of intelligence follow a step-in intelligence cycle.
Intelligence Cycle
1. Planning and Direction
2. Collection of information
3. Processing the collected information
4. Analysis and Production
5. Intelligence Dissemination – evaluation and
Feedback
Finished intelligence is hand-carried daily to the President and key national security
advisers. The policymakers, the recipients of finished intelligence, then make decisions
based on the information, and these decisions may lead to the levying of more
requirements, thus triggering the Intelligence Cycle.
Categories of Intelligence requirements , In relation to use:
1. Executive – intelligence required by executive governmental and military
commanders; the executive requirements are the basis for decisions and national policy
making.
2. Contributory – the intelligence required to complete the staff process – make staff
plans and estimates that contribute to the decision and policy making.
3. Operational – additional intelligence required in planning and carrying out effectively
the decision or policy announced.
4. Collateral – higher or adjacent echelons of the government or military establishment
may require info.
Collection Agencies- is individuals, organizations or units that has access to sources of
information and the capability of collecting information from them. It has the
responsibility for procurement, collection, and transmitting all information perceived
intelligence value to adjacent and higher headquarters with the least possible delay
even in the absence of specific instruction.
Criteria in Selecting Collection Agency
1. Capability- an agency must be physically capable of providing the desired information
in a timely manner
2. Suitability- the collection task assigned to a unit must be compatible with its primary
mission.
3. Multiplicity- evaluation of information requires that it be compared with information
received from other sources and agencies. Subject to the considerations of capability
and suitability, that one agency is used to obtain each item or required information.
4. Balance- within in the limits imposed by other considerations, the collection workload
is balance among agencies. Balance is minor consideration when compared with the
importance of other factors.
Collection Plan- is a logical orderly process, analyzes the intelligence requirements for
indications, and translates the indications to specific missions or requests and tasks
collection agencies.
Purpose of the collection plan
1. To ensure logical and orderly analysis of the intelligence requirements
2. To establish a workable collection scheme based on the analysis of the intelligence
requirements.
3. To provide definite and precise directives to collecting agencies
4. To avoid possibility of omission, conflict or unnecessary duplication of collection
effort.
Steps in Processing Raw Information
Collation – organization of raw data and information into usable form; grouping similar
items of information so that they will be readily accessible.
Recording – is the reduction of info into writing or some other form of graphical
representation and arranging of this info into writing or some form of graphical
representation and the arranging of this into groups of related items.
Police log book and journal
Intel – work sheet – intelligence files
Situation maps – rouge’s gallery
Modus Operandi files
3. Evaluation – examination of raw information to determine intelligence value,
pertinence of the information, reliability of the source and agency, and its credibility or
truth of information. Likewise, this determine the pertinence of the information to the
operation, reliability of the source of or agency and the accuracy of the information and
evaluation determines the following:
Pertinence – does it hold some value to current operation?
Reliability – judging the source of information by the agency
Credibility – truth of information; is it possible for the reported fact or event to have
taken place? Is the report consistent within itself? Is the report confirmed?
Other parts of processing the information. It involves the following activities:
Analysis – shifting and isolating those elements that have significance in light of the
mission or national objective.
Integration – combining the elements isolated in analysis and known information to form
a logical picture or theory.
Deduction – the formulation of conclusions from the theory developed, tested and
considered valid- determination of effort and meaning of the information.
Dissemination and Use of information. Phase of the cycle that refers to the activities of
transferring the process of information to the proper users, most particularly the
authority that requires the activity. Processed information can be disseminated through
annexes, estimates, briefing, message, reports overlays or summaries.
Dissemination, this logically feeds into the first, is the distribution of the finished
intelligence to the consumers, the same policymakers whose needs initiated the
intelligence requirements.
Finished intelligence is hand-carried daily to the President and key national security
advisers.
The policymakers, the recipients of finished intelligence, then make decisions based on
the information, and these decisions may lead to the levying of more requirements, thus
triggering the Intelligence Cycle.
COVER AND UNDERCOVER
Cover- an individual group of organization conceals the true nature of its acts or
existence from the observer
Cover story- a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation.
Cover support- an agent assigned in target areas with the primary mission of supporting
the cover story.
Importance of cover
1. Secrecy of operation against the enemy intelligence
2. Secrecy of operation against friendly agencies who do not have the need to know
3. Successful accomplishment of the mission
Types of cover
a) Natural cover-using actual or true background
b) Artificial- using biographical data adopted for the purpose
c) Cover with in a Cover- justification of existence
d) Multiple Cover- any cover you wish
Hazards of cover
1. Static or dormant opposition (ordinary citizen)
2. Unhostile active opposition (Political Security agencies)
3. Hostile active opposition (enemy intl. Operatives)
Precautions in Case of Compromise
1. Move out immediately
2. Start new facility for operation and develop it
3. Build entirely new cover
4. Use circuitous and provide careful counter surveillance measures
5. Be specifically careful to former contacts with non-intelligence personnel
6. Be patient, slowly and careful
Organizational Cover- is an account consisting of biographical which when adopted by
an individual will assume the personality he wants to adopt.
Undercover assignment - is an investigative technique in which agent conceal his
official identity and obtain information from that organization
Two General classifications of sources of information:
1. Open Sources- 99% of the information collected are coming from open sources.
2. Close Sources- 1% of information are collected from close sources.
Method of Collection of Information:
1. Covert Method (secret)– Is the clandestine or secret means of obtaining information
this would include the following activities:
* Infiltration – gradual penetration into enemy domain and territory
* Surveillance by utilizing satellite, photo, audio electronic gadgets and
advance communications systems.
* Elicitation made through Interview, Interrogation and Instrumentation
Overt Method - is the gathering of information or documents procured openly without
regard as to whether the subject or target becomes knowledgeable of the purpose.
Open sources: includes information taken from Enemy activity, and Civilians, Captured
documents, Map- weather, forecast, studies, report- Agencies
Covert Intelligence- is the secret procurement of information, which is obtained without
the knowledge of the person or persons safeguarding vital intelligence interest.
Close Sources: Include information which may be taken through:
Surveillance Elicitation
Casing Surreptitious entry
Employment of technical means (Bugging and Tapping device)
Tactical Interrogation- Observation and Description (ODEX
Other sources of Information: In Overt and Covert
Routine patrol and criminal investigation
Use of informants and Interrogation
Search and seizures and Cordon and scratch
Checkpoints and Police public relation activities
Coordination with law enforcement agencies
Inmates of various city jails, national penitentiary, military stockade.
Statistics
Persons as source of information
Informant Net- it is a controlled group of people who worked through the direction of the
agent handler. The informants, principal or cut outs supply the agent handler directly or
indirectly with Intel information.
Informants (Asset)- people selected as sources of information, which could be
voluntary, or in consideration of a price.
Informant- refers to a person who gives information to the police voluntarily or
involuntarily without any consideration whereas, Informer- are those who give
information to the police for price and reward
Types of Informants:
1. Criminal Informant- an informant who give information to the police pertaining to the
underworld about organized criminals with the understanding that his identity will be
protected.
2. Confidential Informant- is similar to the former but he gives information violate of the
law to include crimes and criminals
3. Voluntary Informant- a type of informant who give information freely and wilfully as a
witness to a certain act.
4. Special Informant- those who gives information concerning specialized cases only
and it is regarded a special treatment by the operatives (ex. Teachers, businessmen)
5. Anonymous Informant- those who give information through telephone with the hope
that the information cannot be identified.
Who are users of intelligence?
1. National leaders and military commanders- formulation and implementation of
national policies.
2. Advisors and Staff – preparations of plans and estimates
3. Friendly nations or other branches of the armed forces
4. Processor – basis for evaluation and interpretation
The Undercover Agent - Special qualifications include knowledge of the language, area
background regarding events, knowledge about the custom and habits, physical
appearance, and must be an artist
Methods of Covert Intelligence
Surveillance
A form of clandestine investigation which consists of keeping persons, place or other
targets under physical observation in order to obtain evidence or information pertinent to
an investigation. Surveillance of a person is called Tailing or Shadowing, surveillance
of place is called Casing or Reconnaissance, and surveillance of other things, events,
and activities is called Roping.
Considerations in Surveillance Planning
1. Pre-Surveillance Conference- a conference held among the team members, the
police intelligence unit before surveillance is conducted.
2. Surveillance Plan- a plan established as the required according to type of personnel,
and the general and specific instruction for surveillance
3. Area Target Study- refers to the area of operation of surveillance activities.
4. Surveillant- a person who conducts surveillance with includes only observations.
5. Stakeout or Plant- is the observation of places or areas from fixed point.
6. Tailing or Shadowing- it is the observation of a person’s movement
7. Undercover Man- it refers to a person trained to observe and penetrate certain
organization suspected of illegal activities and later reports the observation and
information’s that proper operational action can be made.
8. Liaison Program- the assignment of trained intelligence personnel to other agencies
in order to obtain information of police intelligence value. (Agencies like the press, credit
agencies, labor unions, telephone companies).
9. Safe House- a place, building, enclosed mobile, or an apartment, where police
undercover men meet for debriefing or reporting purposes.
10. Drop- any person is a convenient, secure and unsuspecting place where police
undercover men meet his action agent for debriefing or reporting purposes.
11. Convoy- an accomplice or associate of the subject used to avoid or elude surveillant
12. Decoy- a cover supporting the surveillant who can become a convoy whenever
surveillant is burned.
13. Contact- any persons whom the subject picks or deals with while he is under
observation and identifies the observer.
14. Made- when subject under surveillance becomes aware that he is under observation
and identifies the observer.
15. Lost- when the surveillant does not know the whereabouts of his subject or the
subject had eluded the surveillance.
Types of Surveillance, According to Intensity and Sensitivity
1. Discreet- subject person to be watch is unaware that he is under observation.
2. Close- subject is aware that he is under observation varied on each occasion.
3. Loose- period of observation varied on each occasion applied frequently or
infrequently.
According to Methods
1. Stationary- this is observation of place usually a bookie stall, a gambling, joint, a
residence where illegal activities are going on (fixed position).
2. Moving- surveillance follow the subject from the place to place to maintain continuous
watch of his activities.
Technical- this is a surveillance by the use of communications and electronic
hardware’s, gadgets, system and equipment
Some Do’s and Don’ts in Surveillance
1. Do not make abrupt or unnatural movements
2. Do not make use of disguise that will attract attention
3. Never stare at the subject.
4. Do not attempt to appear innocent when assisted by the subject
5. Never speak to another surveillant unless absolutely necessary to accomplish the
mission.
6. Plan ahead and be aware on changes of action
7. Take down notes safely.
8. Make use of street furniture (telephone booth, sidewalk, vendors, waiting shades).
Don’t drink while working undercover.
9. Don’t take a woman on an undercover assignment and don’t claim to be a “big shot.”
Basic Preparations in Surveillance
1. Study the Subject- name, address, description, family and relatives, associates,
character and temperament, vice, hobbies, education, others
2. Knowledge of the area and terrain- maps, national and religious backgrounds,
transportation, public utilities
3. Subversive Organization- history and background, biography of the official, identity
and background of members and former members, method of identification employed
by the members, files and records, nature, location and accessibility, meeting
4. Cover Story- the scenario must be appropriate to cover up operation and avoidance
of identification of the mission.
Factors considered in Fixed Surveillance
1. Determine base of operation
2. Maintain a thorough, cautious reconnaissance of the area
3. Obtain necessary equipment's
4. Assignment of specific duties to each member of the team
5. Prepare alternative course of action
6. Provide for relief teams
7. Arrange for communications signals
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel of
the base of operation
Counter Surveillance- the conduct of operation is coupled with counter intelligence
measures such as window shopping, use of convoys and decoys, stopping immediately
on blind corners, getting out immediately on public conveyances, retracing, entering,
mobile housing
Difference between Surveillance and Reconnaissance.
Surveillance is continuing while Reconnaissance is Intermittent.
Reconnaissance has specific objectives while surveillance has general objectives
Casing or Reconnaissance. Casing is the term use in the Police organization while
Reconnaissance is used in Military term. It is the Surveillance of the building, place or
area to determine its suitability for Intel use or its vulnerability in operations. It aids in the
planning of an operation by providing needed information. Casing is also considered a
security measure because it offers some degree of protection for those operating in an
area unfamiliar to them.
General Principles in Casing
Know the best route to take get there
Know how to conduct yourself without attracting attention
Know what security hazards art in the area and how they can avoided or minimized
Know the best route to extricate the area
Observation and Description (ODEX)
Observation – a complete and accurate observation by an individual of his surroundings
an encompasses the use of all the major sense of register and recognized its
operational or Intel significance.
Description – the actual and factual reporting of one’s observation of the reported
sensory experience recounted by another. Psychologists estimate that approximately
85% of our knowledge is gathered through sight
13% of your hearing
2% through the three senses
Psychological processes for accurate observation
Attention – consist of the psychological process involve in becoming aware of an
existence of fact.
Perception – involve in the understanding its fact of awareness
Report – involve in the identifying the name in one owned mind and some fact which
has been perceived, narrated and identified.
Types of attention
1. Involuntary – you have no control and requires no effort
2. Voluntary – this is more reliable but not dependable
3. Habitual – little effort with maximum of control.
ELICITATION
It is a system or plan whereby information of intelligence value is obtained through the
process direct intercommunication in which one or more of the parties to the common is
unaware of the specific purpose of the conservation. The three phases are (1)
determination of the mission, (2) selection of the subject, and (3) accomplishment of the
mission.
Two Devices in the conduct of Elicitation
Approach- process of setting people to start talking or to shift the direction of an existing
conversation
Types of Approach
1. Flattery approaches are effective because they appeal to the ego, self-esteem and
prominence of an individual to guide him / her into conversation of the subject of
interest. A technique in flattery is insinuating that the source is an authority on a
particular topic.
2. Teacher-Pupil Approach- the subject is treated as an authority then solicit his view
point and opinion on a subject matter
3. Kindred Soul Approach- the subject is placed in a pedestal having some specialized
quality then falter him/her by showing enough concern for his/her welfare to pay special
attention to his enjoyment.
4. Good Samaritan Approach- is the sincere and valid offers of help and assistance are
made to the subject
5. Partial- disagreement approach- seeks to produce talking by the world “I’m sure if I
fully agree.”
Provocative Approach- discover a wide range of conventional gambits
Variants:
a. Teaser Bait Approach- accumulates the sources of knowledge about a particular
subject to attempt the subject to give his/her views
b. Manhattan from Missouri Approach- the elicitor adopts an unbelievable attitude above
anything. He questions all statements and oppositions.
c. Joe Blow Approach- is “I” know the answer to everything” approach. The elicitor
adopts the attitude of being approachable of any field.
d. National Pride Approach- nature propensity of all persons to defend their country and
its policies.
SURVEILLANCE ON FOOT
Shadowing or Tailing – It is the act of shadowing, tailing or following a person or
persons.
Purpose of Foot Surveillance
a. To detect pieces of evidence of criminal activities.
b. To establish the associates of the subject.
c. To establish places frequented by the subject and his place of operation or temporary
residence.
d. To locate a wanted person, or a missing person.
e. To protect witnesses or complainants.
f. As part of background investigation of a certain person for a lawful cause in
promotion, appointment or award.
g. As a form of loyalty check for suspected employees in cahoots with criminals or
shady characters.
Don’ts in Foot Surveillance
1. Never meet the eyes of the subject to avoid suspicion. If the subject makes an abrupt
turn, avoid a face-to-face confrontation by looking elsewhere away from the face of the
subject.
2. Avoid lurking, sleuthing and creeping manner. Don’t lurk in doorways, stalking behind
the subject, crouch and sneak around corners. All of those will attract attention.
3. Don’t wear fiction story disguises, such as whiskers, artificial noses or scars and
faked deformities such as limping, or artificial mannerism. To the amateur, these
disguises could easily be discovered by the ordinary street people. To the professional,
although effective for a short time, will not last long.
4. Never carry noticeable notebooks, brief case or other objects.
5. Don’t greet fellow officers or allow them to greet you by way of signals like blocking
the lips with a finger.
6. Don’t make entries or notes in your notebook ostensibly or displayed publicly.
Methods of foot Surveillance
One man shadow – It is conducted by one man alone in shadowing a subject. The
surveillant must establish the contacts of the subject, place visited, girlfriends and
confidants. In case the subject will use the telephone booth, the shadower must feign a
call at the available booth. If the subject rents a hotel room, the shadower also rents a
room, possibly adjacent or opposite the subject’s room. In case the subject gets into a
theater line, the shadower must be immediately behind the subject..
b. Two-man shadow – This is easier for the surveillants to fully cover the subject. The
method allows the exchange of the positions of the shadowers in order to avoid
discovery. One shadower will follow behind the subject and the other may either be
abreast or on the opposite side of the street, or following the first shadower.
c. Three-man shadower or ABC technique of shadowing
Three shadowers are represented as AB and C. A is close to the subject and follows
him at a distance depending on the pedestrian traffic. B follows A at the same distance
of A to subject. If vehicular traffic is moderate, it maybe opposite him on the other side
of the street, B and C turn in occupying the position of A to prevent A from becoming
familiar and noticeable figure to the subject. Pre-arranged signals are encouraged
Advantages of the ABC method
When the subject becomes suspicious of any of the operatives, said operative could
quickly drop out of the shadowing.
If subject suddenly turns a corner, A may continue straight ahead, instead of rushing to
the corner and anxiously looking for the subject. C then crosses the street and follows
the subject, to take the position of A, C, is in a position to view any sudden
disappearance of subject towards a door or building.
A. UNDERCOVER OPERATION
Undercover Operation defined – It is a police operation wherein the investigator
assumes a fictitious identity in order to infiltrate the ranks of the criminals for the
purpose of obtaining information. This is only resorted to as a final option if no other
effective means of obtaining information is available. It is a last resort because of the
risk involved which may cause the loss of life or limb of the investigator. This is called
“roping.”
2. Purposes of Undercover Operation
a. Gathering Evidence – The undercover agent can observe criminal activities, hear
conversations, photograph documents and performs other activities for collating and
gathering evidence.
b. Gathering Information – The agent will be among the criminals and as such, the
details of a past crime or an impending one are available.
c. Counter Intelligence – Counter Intelligence operation as a means to identify the
double-crossers. The undercover agent could validate the truthfulness of the information
given by informants.
d. Installation of Surveillance Equipment – The agent is in a position to install secretly
surveillance equipments such as hearing devices or wire tapping facilities.
e. Loyalty Check – On private and government employees who are security risk
personnel, especially those involved in intelligence work.
f. Penetrating Subversive Organization – By the nature of the operations of these
organizations, which is clandestine, the only effective method of obtaining information is
by undercover operations.
g. Basis for a Successful Raid – The information obtained by the undercover agents are
direct, hence they are important basis in the planning and execution of future raids. The
agent is in a position to know the armaments of the targeted criminals.
1. Qualities of a good Undercover Agent
a. A good actor and a psychologist.
b. He must be able to adapt himself in the field of his assignment. If his assignment will
be a farmer, he must know how to plant or use the plow or machines of agriculture.
c. Knowledge that is above the ordinary in terms of general information and the varied
ways of life, profession and occupation.
d. Temperament – a calm, enduring and affable personality. Self-control and self-
confidence are a few of his qualities.
e. Photographic memory – he must have a photographic memory because most often,
he could not use written notes about his activities and observations. He must also
possess keen power of observation and sound judgment.
Tactical Interrogation. The need for obtaining information of the highest degree of
credibility taken on the minimum of time can be through interrogation which varies and
dependent entirely on the situation. In tactical interrogation, familiarization of the
following is necessary:
Provocateur – an individual from enemy forces who is deliberately introduce in our
custody with a specific mission of causing some unfavourable action or reaction on our
part.
Form of Interrogation
1. Direct- the subject is aware of the fact that he is being interrogated, but he may not
learn the true objectives of the interrogation. This is being used extensively at the
tactical lever.
2. Indirect- the subject is not aware that he is being interrogated. This is used when time
is not so important.
Types of Interrogation
Screening- usually accomplished as soon as after capture, apprehension or arrest of an
interrogee. The objective is to obtain background information about the interrogee and
determine his area of knowledge and ability.
Formal Interrogation (Detailed)- the systematic attempt to exploit to an appropriate
depth those areas of the interrogee’s knowledge, which have been identified in the
screening process.
3. Debriefing- a form of eliciting information, which is generally used when the area of
intellectual capability of the interrogee is known. Maximum use of the narrative and not
try to trap the person being debriefed with leading question.
4. Interview- the interviewer must be fully aware of the actual type of the information
desired and alert on the interviewee’s moods and expressions. It must be tactual
especially if the source (interviewee) is to remain unaware of the type of information
desired by the interviewer
5. Interrogation of Lay Personnel (Specific Type)- the techniques used are the same as
in the interrogations, however, especial effort must be made to establish a common
frame of reference between the interrogator and the interrogee.
6. Technical Interrogation- the level of interrogation where the source has specific and
such detailed information that requires a trained expert in the subject matter to be
explored. It usually covers the specific subject and time is not as limited as during
interrogation.
Interrogation Techniques:
Techniques of Approach- the purpose is to gain the cooperation of the source and
induce him to answer questions which will follow:
The “Open Techniques”- the interrogator is open and direct in his approach and makes
no attempts to conceal the purpose of the interrogator. It is best employed when the
interrogee is cooperative. It is frequently used at the tactical level where time is a
paramount.
The “Common Interest” Technique - the interrogator must exert effort to impress the
interrogee of their common interest. The interrogator must look for he point out the real
advantages the interrogee will receive if he cooperates.
3. Record File (we know all) Technique- the interrogator prepares a file on the source
listing all known information (record should be padded to make it appear to be very
extensive). The information must contain the life of the interrogee to include his
activities and known associates (Party bio-data of the interrogee is important).
4. Exasperation- Techniques (Harassment)- effectively employed against hostile type
interrogee. The interrogator must be alert because the interrogee may fabricate
information to gain relief from irritation (monotype). Subject interrogee is placed in a
longer period of interrogation without rest or sleep. The interrogator permits the source
to go to sleep and subsequently awaken for another series of questioning (this is done
repeatedly).
5. Opposite Personality Technique- also known as “Mutt and Jeff”, “Threat and Rescue”,
“Bad Guy- Good Guy”, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use
of two (2) interrogators playing different roles.
6. Egotist Techniques (Pride and Ego)- usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity. You may reverse
the technique by complementing the interrogee in hopes of getting him to admit certain
information to gain credit. Described him as the best person, superior or comrade.
7. “Silent” Technique- employed against nervous or the confident type of interrogee
squarely in the eye with sarcastic smile (for him break eye contact first). He may ask
questions but the interrogator must not answer. Patience is needed until the interrogator
is ready to break silence.
8. Question Barrage- Technique (Rapid Fire Questioning)- intended to confuse the
interrogee and put him into a defensive position. The interrogee become frustrated and
confused, he will likely reveal more than he intended, thus creating opening for further
questioning.
-------End----BAVJr.2023…………………………………………………………………………

You might also like