Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Historical Backgrounds

Delilah - a biblical personality, she was able to gain information by using her beauty and charm, she was responsible for
the fall of Samson, a known Israelite leader and enemy of the Philistines.
Frederick The Great - Father of organized military espionage. This Prussian master was able to classify his agents into
four classes: common spies, double spies, spies of consequence, and persons which are involuntarily lead to undertake
espionage.
Alexander The Great - A Greek Conqueror, was able to identify those who are disloyal to him by ordering the opening of
communication letter of his men and was successful in uplifting the esprit de corps and morale of his men. He devised the
first letter sorting and opening to obtain information.
Gen. Romano Sertorius- the Roman commander who possessed a white fawn and allowed it to become widely known
that he derived both secrets and guidance from the fawn. His intelligence agents credited their information to the
supernatural power of animals.
Abu'l-Fath Jalal-ud-din Muhammad Akbar- the “Great Mogul” and sagacious master of Hidustan employed more than
4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon it.
Napoleon Bonaparte- according to him “one spy in the right place is equivalent to 20,000 men in the field.” He
maintained military intelligence and secret political police service in all over Europe.
Genghis Khan- a Mongol who used intelligence to conquer China and invade Cathay. He instructed his generals to send
out spies and used prisoners as sources of information. They collected information on the weaknesses of rivals by posting
themselves as disguised merchants.
Hannibal- known as one of the greatest Roman enemy who ruled and conquered Rome for 15 years by obtaining common
street knowledge by posing as a beggar to gather first hand information on the pulse of the people. His famous feat was at
the outbreak of the Second Punic War when he marched an army which included was elephants from Iberia to Northern
Italy. Military historians consider Hannibal as the “father of strategy” because his greatest enemy, Rome, came to adopt the
elements of his military tactics in its own strategic arsenal.
Julius Caesar - in his time, the staff of each legion includes the speculators who served as an information collecting agency.
The Speculators were the first intelligence personnel to appear in a military organization. Military success of the Romans
was aided by the communication system.
Made use of pigeons as carrier which made intelligence transmittal very fast.
Karl Schulmeister - known as Napoleon's Eye, he was credited for establishing counter-intelligence against spies. He is a
master of deceit who used black mail to obtain vital information to identify the enemy's of Napoleon.
Alfred Redl- one of the most brilliant, homosexual intelligence agent. A double spy who while working as
intelligence director of Austria and Hungary, spied for the Russians. In 1913, his treason was discovered and he was
forced to commit suicide. His treason lead to the death of 500,000 agents and soldiers combined in his 13 years espionage
episode.
Sun Tzu - author of the art of war. A Chinese philosopher who takes into account practical view in battle. According to him
foreknowledge cannot be elicited from spirits nor from gods nor from analogy with past events nor from calculations. He
further asserted that if you know thy enemy and know thyself, you need not fear the results of a hundred of battles.
Notable Intelligence Organizations
1. Inter-Service Intelligence, (ISI) Pakistan The Directorate for Inter-Services Intelligence (Inter-Services Intelligence)
is the premier intelligence service of Pakistan, founded in1948. It has responsibilities of collecting information of critical
national security and intelligence assessment for Government of Pakistan.

2. Central Intelligence Agency, (CIA) United States Central Intelligence Agency (CIA) is most prominent and familiar
among other United States National Security Agency (NSA), Defense Intelligence Agency (DIA) and Federal Bureau of
Investigation (FBI). CIA has been founded in 1947, considered as an independent and top agency in the whole world.The
prime functions includes acquiring and analyzing information about foreigners, public relations for required data and
underground operations at the direction of the president of United States. The agency headquarter is located in Langley,
Virginia, a few miles west of Washington.

3. Secret Intelligence Service, (MI6) United Kingdom MI6 formally known as the Secret Intelligence Service was created
just before the World War I for the possible reach the activities of the Imperial German government. MI6 has been closely
involved in various conflicts in 20th and 21st centuries but not officially acknowledged till 1994. The secret front line” of
Britain`s national security has responsibilities to keep close eye on internal and external terror activities, organizations
and countries which could harm national defense and state security.

4. Federal Security Services, (FSB) Russia The Federal Security Service of the Russian Federation (FSB) is the principal
security agency of the Russian Federation and the main successor agency to the USSR’s Committee of State Security (KGB).
5. Bundesnachrichtendienst, (BND) Germany The Bundesnachrichtendienst (BND), Federal Intelligence Service was
established prior to World War II to spy the enemies’ strategies and plans, headquartered in Pullach near Munich. The
main objective of Agency is surveillance of sensitive issues referred to domestic and foreign intelligence.

6. Australian Secret Intelligence Service (ASIS), Australia The Australian Secret Intelligent Service (ASIS) agency has
been founded in 1951 by the executive power of the Commonwealth, the mission of ASIS is ‘Protect and promote
Australia’s vital interests through the provision of unique foreign intelligence services as directed by Government’.

7. Ministry of State Security (MSS), China The Ministry of State Security (MSS) is the intelligence-security agency of the
People’s Republic of China, the headquarters located near the Ministry of Public Security of the People’s Republic of China
in Beijing. MSS is working parallel to the public security bureaus but has non-state security matters often collaborate both
for the large extent. The Agency was established in 1937 which has been founded in 1949 by Communist Part of China,
collected antithetical information for civil war in China.

8. The Institute For Intelligence and Special Operation (MOSAD), Israel

MOSSAD is the intelligence agency of Israel, most active organization in the country committed to collect intelligence
involved in counter-terrorism and various covert operations. The director of agency is bound to report activities to the
head of state Prime Minister of Israel.Contrary to others MOSSAD is considered as most powerful agency due to scarce
widened resources, the undercover agents has been present in various countries to collect the valuable information for the
country. Mossad’s most notorious unit is the “Special Operations Division” or Metsada which has involved in many
assassinations and secret operations worldwide.
9. General Directorate For External Security - France external intelligence agency, operating under the direction of the
French Ministry of Defense.

10. National Intelligence Coordinating Agency (NICA) is the primary intelligence gathering and analysis arm of the
Philippine government, in charge of carrying out overt,covert, and clandestine intelligence programs. Its motto is:
Kaalaman ay Kaligtasan (translated: "Intelligence is Security").[Presently, NICA is in close coordination with the CIA,
Mossad, Secret Intelligence Service and intelligence services of ASEANcountries to counter the threat of terrorism.

Types of Police Intelligence/General Activities of Police Intelligence


1. Police Strategic Intelligence- is processed information which is long ranged in nature. It is used to describe and define
criminals and their activities as well as provide insight of their Modus Operandi.
2. Police Line Intelligence- an intelligence that is immediate in nature. Such information must be updated to provide
effective aids in police operations.
3. Police Counter Intelligence- it is an activity which is intended to build an organization against the enemy by ensuring
loyalty of its members through stringent background investigation. It also seeks to deny the enemy of any information
consisting of passive and active intelligence measures. This is also known as Negative Intelligence. - phase of intelligence
covering the activity devoted in destroying the effectiveness of hostile foreign activities and the protection of information
against espionage, subversion and sabotage.
4. National Intelligence- it is the integrated product of intelligence developed by all governmental branches and
departments concerning the broad aspect of national security and policy. It is used to coordinate all the activities of the
government in developing and executing integrated and national policies and plans.
5. Undercover Works- is an investigative process in which disguises and pretext cover and deception are used to gain the
confidence of criminal suspects for the purpose of determining the nature and extent of any criminal activities that maybe
contemplating or perpetuating.

Functional Classification of Police Intelligence


1. Criminal Intelligence (CRIMINT)- production of intelligence essential to the prevention of crimes and the
investigation, arrests, and prosecution of criminal offenders.
2. Internal Security Intelligence (INSINT)- refers to the knowledge essential to the maintenance of peace and order.
Keeping peace within the borders of a sovereign state or other self-governing territories, generally by upholding the
national law and defending against internal security threats
3. Public Safety Intelligence (PUSINT)- refers to the knowledge essential to ensure the protection of lives and properties.

COUNTER INTELLIGENCE OPERATION


Is also called CI investigation. It is an activity that constitutes the value of the CI workload, and includes specific
investigation of individual and incidence which for the most part are conducted in an overt but discreet manner.
Mission
1. Detection- identify the threat
2. Evaluation- analyzing the data plan
3. Counter action and prevention- recommend counter measures in neutralizing the target

Types of Counter Intelligence


1. Passive CI Measures - protection of classified and sensitive information against unauthorized access through secrecy
communication security and other safeguards.
3. Active CI Measures - are those measures which seek actively to block enemies effort to gain information or engage in
espionage, subversion and sabotage.

Categories of Counter Intelligence Operations


1. Military Security - it encompasses the measures taken by a command to protect itself against espionage, enemy
operation sabotage, subversion, or surprise.
2. Port Boundary and Travel Security - application of both military and civil security measures for counter-intelligence
control at point of entry and departure, international borders and boundaries. 3. Civil Security - active and passive
counter-intelligence measures affecting the non-military nationals permanently or temporarily residing in an area under
military jurisdiction. 4. Special Operations - counter subversion, sabotage and espionage. 5. Combat Intelligence- A kind
of intelligence required by the commander to provide for planning and conduct tactical and administrative operation in
counter insurgency. This pertains to knowledge of People, weather, enemy and Terrain (PWET) used in planning and
conducting tactical and administrative operation in a counter insurgency.
Other Categories of CI Operation
1. Counter Human Intelligence (HUMINT)- seeks to overcome enemy attempts to use human sources to collect
information or to conduct sabotage and subversion which includes CI Special Operations, Liaison, Counter Security, CI
Screening.
2. Counter Imagery Intelligence (IMINT)- includes action taken to determine enemy signal intelligence and related
capabilities and activities. These actions include surveillance radar, photo thermal and infrared systems. This primarily
includes interpretation of photographs from aerial units. Sometimes this is termed as PHOTINT.
3. Counter Signal Intelligence (SIGINT)- determines enemy signal intelligence and related electronic warfare
capabilities. It also assesses friendly operations to identify patterns, profiles, and develop and recommend counter
measures.

THE INTELLIGENCE CYCLE


(PCPAD)
1. Planning and direction
2. Collection
3. Processing
4. Analysis and production
5. Dissemination

PLANNING
The intelligence officer must have a thorough knowledge of the available sources of information, the collecting agencies
and type of information the latter can provide.
Priority Intelligence Requirement- an item of intelligence or information of the characteristics of the area of operations
and the enemy which the commander feels he needs before he can reasonably arrive at a decision. Also known as Essential
Element of Information.
COLLECTION
The intelligence officer must have thorough knowledge of the available sources of information and collecting agencies and
the type of information they can provide.
Methods of Collection (overt and covert intelligence)
1. Overt- open sources. 99% of the information collected are coming from open sources.

Examples: Information taken from enemy activity, civilians, captured documents, etc.
2. Covert- closed/secret sources. Only 1% of information are obtained from covert operation.

Examples: surveillance, elicitation, surreptitious entry, etc.


Persons as Sources of Information
Informants (assets)- people selected as sources of information which could be voluntary or in consideration of a price.
a. Informant- gives information without any consideration.
b. Informer- gives information in exchange of a reward or a price.

Types of Informants
1. Anonymous – those who gives information through telephone with the hope that the informant cannot be identified.
2. False Informant - reveals information of no consequences or value.
3. Self-Aggrandizing - moves around the center of criminals delight in surprising the police about bits of information.
4. Double Crosser - wants to get more information from the police more than what he gives.
5. Special/legitimate informant- those who gives information concerning specialized cases. Usually they are regarded
with a special treatment by the operatives.
6. Voluntary informant- gives information freely and willfully as a witness to a certain act.
7. Recruited informant- a person who is selected, cultivated, and developed into a continuous source of information.
8. Rival elimination informant- an informant who gives information to eliminated rivalry.

Mercenary informant – informant who gives information for remuneration or compensation.


Types of Agents Used in Collecting Information
1. Agent of Influence - agent who uses authority to gain information.
2. Agent in Place - agent who has been recruited within a highly sensitive target who is just beginning a career or has
been long insider.
3. Penetration Agent - agent who have reached the enemy, gather information and able to get back without being caught.
4. Expendable Agent - agent who leaks false information to the enemy.
5. Double Agent - an enemy agent who has been taken into custody turned around and sent back where he came from as
an agent of his captors.
Mole - also known as sleeper agent. Tasked with monitoring an organization or individual. A mole can spend years in the
same place only responding to missions when assigned. They are trained to be visible but to keep their motives unknown.
The spies themselves are mostly considered as traitors, and traitors come in amazing variety of forms:
1. Inadvertent spies- people with loose lips, careless security attitudes.
2. Defectors- people fleeing the rule of their own country.
3. Walk-ins- people who look for an extra income.
4. Undercovers- people who have made the plea bargain with law enforcement.
5. Recruits- people tricked, bribed, or blackmailed.
6. Double agents- people caught spying against you.

False Flag- a pretension on the part of the case officer where he holds a nationality whom the target expects to be friendly
to the targets own interest.
Example: a Chinese businessman thinks he is working for the Republic of China when he is really spying for Taiwan
Dead Drop- a place usually a dumpster or public garbage can where materials are discarded and later picked up.
PROCESSING/ANALYSIS is the stage in which the collected information is subjected to review in order to satisfy
significant facts and derive conclusions there from.
Accuracy of Information (CODE: CPPDIT) 1 - Confirmed By Other Sources
2 - Probably True 3 - Possibly True 4 - Doubtfully True 5 - Improbable 6 - Truth Can Not Be Judged
Reliability of Information (CODE: CUFNUR)
A - Completely reliable
B - Usually Reliable
C - Fairly Reliable
D - Not Usually Reliable
E - Unreliable
F - Reliability Cannot be Judged
Evaluation of Source of Information
T- Direct observation by Commander/Chief of Unit
U- Report by resident agent
V- Report by PNP/AFP Troops
W- Interrogation of captured enemy
X- Observation of government/civilian employee
Y- Member of the populace
Z- Documentary
Example: SPO3 Juan Cruz evaluated the information gathered as “completely reliable, source probably true”. What is the
information`s evaluation rating?
Answer: A-2
PO1 Juan Cruz submitted an intelligence report evaluated as B-5. What is the interpretation of this evaluated intelligence
report?
Answer: Information is usually from a reliable source and is impropable.
DISSEMINATION
Processed information or intelligence data are disseminated to end users, common methods of disseminating intel data are
conferences, briefing and person to person exchanges.In this process, consider the factors of timeliness, correctness and
security. KINDS OF COVERT OPERATIONS
1. SURVEILLANCE - is the covert, discreet observation of people and places for the purpose of obtaining information
concerning the identities or activities of subjects.
Surveillant - is the plainclothes investigator assigned to make the observation. Subject - can be a person, place, property
and vehicle, group of people, organization, or object.
Safe house - refers to place where agents meet each other for purposes of debriefing and reporting. Decoy - a person or
object used by the subject in an attempt to elude the surveillant. Convoy - an associate of the subject who follows him to
detect surveillance. Log - chronological records of activities that took place in the establishment under surveillance.
Made- when the subject under surveillance becomes aware that he is under observation.
Burn out- identity of the undercover has been know by the subject.

Difference between surveillance and reconnaissance


1. Surveillance is continues while reconnaissance is intermittent (mission or operation)
2. Reconnaissance has specific objectives while surveillance has general objectives.

Methods of Surveillance
1. Stationary Surveillance - also referred to as Fixed or Stakeout Surveillance - is used when you know or suspect that a
person is at or will come to a known location, when you suspect that stolen goods are to be dropped or when informants
have told you that a crime is going to be committed.
2. Technical- surveillance by the use of communications and electronic hardware, gadgets, etc.
3. Moving Surveillance/Shadowing/Tailing - simply the act of following a person.

Forms of Shadowing/Tailing
1. Loose Tail - employed where a general impression of the subject's habits and associates is required. It can be applied
frequently or infrequently, or in varied occasions. 2. Rough Shadowing - employed without special precautions, subject
maybe aware of the surveillance. Employed also when the subject is a material witness and must be protected from harm
or other undesirable influences. 3. Close Tail - extreme precautions are taken against losing the subject is employed
where constant surveillance is necessary.
Methods of shadowing
1. One man- Extremely difficult and should be avoided, if unavoidable keep subject in view at all times.
2. Two man- two agents are employed to follow the subject.
3. ABC method- reduces the risk of losing the subject, affords greater security agents detection
4. Progressive/ Leap frog method- poor chances of obtaining good results, agents are stations at a fixed point assuming
that subject followed the same general route each day.
5. Combined foot- auto surveillance- employment of surveillant on foot and agents in an automobile.

2. CASING - it is the careful inspection of a place to determine its suitability for a particular operational purpose.
3. ELICITATION - the process of extracting information from a person believe to be in possession of vital information
without his knowledge or suspicion. It is a system whereby information of intelligence value is obtained through the
process of direct intercommunication with one or more parties who are unaware of the purpose of the conversation.
Two basic Devices
1. Approach – used to start a conversation or to shift the direction of an existing conversation.
a. Flattery
 Teacher/Pupil- make the person express topics about him. Most people like to talk about themselves.
 Kindred Sole- “misery loves company”. People express a need for recognition, particularly the lonely, the
 neglected, the vain and those with feelings of inferiority.
 Good Samaritan- do good deeds or favors for the source.
 Partial- Disagreement Approach- seeks to produce talking by the word “I am not sure if I fully agree”

b. Provocation (ex. Convince me why you hate he current government administration)


 Teaser-bait – make the source believe you know more than he knows on the topic.
 Joe blow- purposely disagree with the source to induce anger.
 Manhattan from Missouri Approach- the elicitor adopts an unbelievable attitude above anything. He questions all
statements and oppositions.
 National Pride Approach- natural propensity of all persons to defend their country and its policies.

2. Probes- an attempt to obtain more information after the subject gives a vague, incomplete general response. It is used
to sustain the conversation.
 Completion- by inserting bits of factual information on a particular topic, the source may be influenced to confirm and
further expand on the topic.
 Clarity- a request for additional information where the source`s response is unclear. Like “whay do you mean by….”
 Hypothetical- can be associated with a thought or idea expressed by the source. Many people who might not make a
comment concerning an actual event may express an opinion on a hypothetical situation.
 High Pressure Probe- it serves to pin down a subject in a specific area or it may be used to point out contradictions in
what the subject has said.

4. EMPLOYMENT OF TECHNICAL MEANS Bugging - the use of an equipment or tool to listen and record discreetly
conversation of other people. Wiretapping - a method of collecting information through interception of telephone
conversation.

5. TACTICAL INTERROGATION - it is the process or method of obtaining information from a captured enemy who is
reluctant to divulge information.
Interrogator- person who does the questioning
Interrogee- a person subjected for interrogation.
6. OBSERVATION AND DESCRIPTION - it is a method of collecting information by just merely using the different senses.
85% of our knowledge is gathered through sight
13% of your hearing
2% through the other senses
7. POTRAIT/PARLE- it is a means of using descriptive terms in relation to the personal features of an individual and it can
be briefly described as a word description or a spoken picture.
8. UNDERCOVER OPERATION - also called Roping - is disguising one's own identity or using an assumed identity for the
purpose of gaining the trust of an individual or organization to learn secret information or to gain the trust of targeted
individuals in order to gain information or evidence. Cover - it refers to the changing, forging, or falsifying agent' real
personality including but not limited to things, location, job and others that will be used in undercover assignments.
Types of Cover 1. Artificial -altering the background that will correspond to the operation. 2. Multiple - includes
different cover 3. Natural - actual or true background
Coding - the changing of message from plain clear text to unintelligible form, also known as encrypting. Decoding -
transforming of coded message into plain text, also known as decrypting. Cryptography - arts and science of codes and
ciphers.
Crypto Analyst - refers to those persons who break intercepted codes. Cryptographer - refers to a person who is highly
skilled in converting message from clear to unintelligible forms by use of codes and ciphers.
SECURITY CLEARANCE - is a certification by a responsible authority that the person described is clear to access and
classify matters at appropriate levels. Interim Clearance - effective for 2 years. Final Clearance - effective for 5 years.
Classified- to assign information by one of the four security classifications.
Compromise-means lose of security.
Compartmentation- the grant of access to classified matter only to properly cleaved persons in the performance of their
official duties.
Declassify- removal of security classification.
Reclassify- act of changing the assigned classification number.
Upgrading- act of assigning to a matter of higher classification to a classified document.
Classifications of Documents 1. Top Secret - calls for the utmost degree of protection, Unauthorized revelation of this
materials and information will cause extremely severe damage to the nation, politically, economically, or militarily.
Examples: political negotiations, military defense, war strategic plans, etc.
2. Secret - unauthorized disclosure of this documents or things may put at risk the national security, cause serious injury
to the reputation of the nation.
Examples: info about intelligence operations, troop movements, order of battle, etc.
3. Confidential - Unauthorized revelation of which may be injurious to the reputation of the nation or governmental
activity or will cause administrative humiliation or unnecessary injury.
Examples: plans of government projects, routine intelligence reports, personnel records, etc.
4. Restricted - this are information which should not be published or communicated to anyone except for official
purposes. These records are daily files, routine in nature even if lost or destroyed will not affect operation or
administration.
Examples: blotters, daily logbook file, etc. Security Measures and Operations in Relation To Intelligence 1. Physical
Security - the broadest type of security that is concerned with the physical measures designed to safeguard personnel and
prevent unauthorized access to equipment, facilities, materials, documents and to protect them from espionage, sabotage,
damage, or theft.
2. Communication Security - the protection resulting from the application of various measures which prevent or delay
the enemy or unauthorized person in gaining information through communication. This includes transmission,
cryptographic and physical security.
3. Documentary Security - protection of documents, classified matters and vital records from loss, access to unauthorized
persons, damage, theft and compromise through proper storage and procedure.
4. Personnel security - the sum total procedures followed, inquiries conducted and criteria applied to determine the
work suitable to a particular applicant or the retention or transfer of a particular employee
Personnel Security Investigation - is an inquiry into the character, reputation, discretion, integrity, morals and loyalty of
an individual in order to determine a person's suitability for appointment and access to classified matters.
Types of PSI 1. Local Agency Check - refers to the investigation of the records and files of agency in the area of principal
residence of the individual being investigated: Mayor, Police, Fiscal where the individual is a resident.
2. National Agency Check - it consist of LAC supplemented by investigation of the records and files of the following
agencies: PNP. ISAFP, NBI, CSC, Bureau of Immigration and other agencies. 3. Background Investigation - a check made
on an individual usually seeking employment through subject's records in the police files, educational institutions, place of
residence and former employers. Complete Background Investigation - a type of BI which is more comprehensive, it
consist of detailed information regarding the subject.
Partial Background Investigation - investigation of the background of an individual but limited only to some of the
circumstances.

You might also like