Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 146

POLICE INTELLIGENCE &

SECRET SERVICE
 
 
 
History of Intelligence

Introduction

“The game of espionage as Allen Dulles, then Director for the Central Intelligence
Agency has coined, is not for the archbishops. Intelligence, to use the modern and
polite euphemism for spying, has been called "the world's second oldest
profession," and it has much of the same tawdry reputation as its two historical
contemporaries. According to historians, espionage was one of three primordial
professions that emerged at the beginning of the human experience on this
planet: shaman, harlot, and spy. Shamans ultimately became politicians and lawyers,
while spies and harlots evolved into. . . Well, spies and harlots”.
Early Intelligence Personalities
 
The following are some of the early personalities, in the field
of police intelligence.

1. Moses
 
One of the first recorded formalized intelligence efforts with
format can be found in the Holy Bible (Numbers 13:17). The
scriptures named the twelve intelligence agents whom the Lord
directed Moses to send into the land of Canaan (Numbers 13:3-15)
and records that all those men were “Heads of the Children of
Israel.” When Moses sent them North to spy out the land, he did
not propose a mere topographical expedition or cursory
exploration.
Rehab - “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and concealed the agents
of Israel, made a covenant with the agents and duped their pursuers. She was not only
an impromptu confederate of immense value to the Jewish leaders of that far-distant
day, but also established a plot- pattern which is still of periodic relief to motion- picture
producers.

Delilah - a Palestine agent who used her charm to gain information from the powerful
enemy.

Sun Tzu- a Chinese-“Father of Intelligence” philosopher, in his book “PING FA”


(Art/Principles of War) - the earliest known textbook on the art of general warfare- once
said;

“If you know your enemy and know yourself, you need not fear the result of a hundred
battles. If you know yourself but not your enemy, for every victory, you will suffer
defeat. If you know neither yourself nor your enemy, you are a fool who will meet
defeat in every battle.”
Alexander the Great
 
When Alexander the Great was marching into Asia, it is recorded there came to his
hints, and rumors of disaffection growing among his allies and mercenaries. The young
conqueror thereupon sought the truth and got it by the simplest expedient. He
announced that he was writing home and recommended to his officers that they do
likewise. Then, when the couriers were ladened and had set out for Greece, he ordered
them quietly recalled and proceeded to investigate all the letters that they carried.
Malcontents were detected, legitimate causes of grievances exposed.

He introduced a primitive form of “Cabinet Noir” (Internal Monitoring) when he


instigated postal censorship into the army and investigated letters and malcontents. By
then, he was considered as the Father of Censorship.
Akbar
 
By means of remarkably devised operations of intelligence, the Mongul emperor of
India regulated a vast and populous realm having the utmost social and religious
complexity. Akbar as the “Great Mongul,” with no pressing anxiety about his neighbors
or interest in espionage beyond his own frontiers. This sagacious master of Hindustan
employed more than four thousands agents for the sole purpose of bringing him the
truth that his throne might rest upon it.
Genghis Khan
 
Genghis Khan of Mongol with his weakness for wearing sable boots” was sent a
force of cavalry to fight beside the Cathayans while closely observing the riches of
their land. Soon after the return of this intelligence expedition Genghis Khan began
preparing to invade Cathay. This was his first attempt upon a civilized power of
superior defensive strength, and launched his campaign by dispatching beyond the
great wall of contingent of spies and scouts, who were “to capture and bring back
informers.” Espionage and artifice had a vital part in the Mongol conquest of China.
Frederick the Great
 
Father of organized military espionage, has been quoted as saying that he had, when
in the field, one cook and hundred agents. It was his habit to divide his agents into four
classes. The energetic Prussian did more than classify, he established rules for obtaining
and using every grade of spy of intelligence agent, i.e., common spies, double spies, spies
of consequences, and intimidated spies.
MATA HARI (MARGARETHA ZELLE MACLEOD)
(AUGUST 7, 1876–OCTOBER 15, 1917)

Falsely known as a spy for the Germans in World War I, Mata Hari was born Margaretta
Gertrude Zelle on August 7, 1876, in Leeuwarden, Netherlands. “Mata Hari” (the sun at
dawn) was her stage name.

Belle Boyd-The daughter of Shenandoah Valley. She spied for the Confederacy. Belle
became a confederated courier running messages and medicines through the Union
lines. She traveled far into the enemy lines and beyond occasionally bringing back
intelligence of the greatest timeliness and importance. Belle’s greatest failings were her
extrovert nature and her love of publicity. She talked incessantly about her exploits to
reporters and allowed herself to be a celebrity of the south. Eventually late in the war,
Union authorities lost patience with her and had her deported to Canada. Her
biographer described her as the most famous woman concerned with official secret
activities in the Civil War.
Sir Francis Walsingham of England- He was credited with creating the first viable secret
service in England. He protected Queen Elizabeth I from countless assassins.

Lord Baden – Powell- Known as the founder of the Boy scouts Movement and was also
active spy. Baden- Powell exploited his powers of tracking and observation, coupled
with his considerable skills as a Thespian (theatrical), to the benefit of the British Secret
Service. Subsequently, when ordered to investigate a rumor that a large dry dock was
being constructed in Hambur, he posed as a drunk, saturating his clothes in brandy to
enhance the effect. He was swiftly arrested by the German military, but believing him to
be too drunkard incapable of finding out any secrets, they released him.
Sertorius- When Sertorius was the Roman Commander in Spain he was, according to
Polyaenus, the possessor of a white fawn that he trained to follow him everywhere. This
little fawn was taught to approach at a given signal, and Sertorius himself the signal,
when about to pronounce his decision in judicial cases. The fawn appeared to convey
information to the Roman general; and Sertorius allowed it become widely known that
he derived both secrets and guidance from the fawn. His intelligence agents
meanwhile, were everywhere active and all that they learned was credited to the
supernatural powers of the animal.
7. Many Others
 
World War I and the related period contributed many names
of the roll call of intelligence agents. Those who made major
contributions are only few in number compared to those who
were caught and executed or imprisoned. However, whether they
died or not, a certain few had a considerable impact on the history
of their countries and some cases, upon the future of mankind.
Wassmuss of Persia, Captain Von Rintelen, Mata Hari, Edith Canell,
Alice Dubois, Captain M. Cumming, Colonel Lawrence, and
Elizabeth Schragmiller, were by no means the only great agents.
Space does not permit recapitulation of their exploits, but one
fact emerges, the military leaders of the various nations were
beginning to formalize the intelligence activity and give it a much
more important role in the military and police affairs.
Intelligence in the Local Setting
 
During the Spanish era, the “Cabeza de Barangay” was the
head and leader of a group of settlers. The discipline and
punishment, as well as the conduct of government are made by
the barangay head. As the group increased in number, the
“cabeza” had to appoint certain trustworthy people to keep
watch. These “eyes and ears” made reports to the head, not only
for his protection but for suspicious outsiders infiltrating within
the settlement.
 
For money, favors, positions, or other motivations, many did
work for the Spaniards as agents, informants, or undercover. The
clergy had been mentioned by Rizal’s works as part of the
intelligence network. The discovery of the secret of “Katipunan”
was through some Filipino informers of the Filipino armed
movements that had spies in each others camps.
When the Philippines’ was granted its Commonwealth
government by the U.S. in November 15, 1935, the first act of the
legislative body was the National Defense Act. This act among
other provisions, organized the citizens army whereby with a
small professional core, twenty-year old male citizens would
undergo compulsory military training, under the Staff of the Army
Headquarters, which was then the G-2, or the Staff Officer for
Intelligence.

Again, intelligence as a part of the military establishment has


staff units in all the major services, as well as in the Headquarters.
Known as the “two’s,” each service has its staff and field
components involved in military intelligence. Worthy of
mentioning is the Intelligence Service at Headquarters’ level, and
the intelligence unit in the major services, the task forces,
independent military groups, and the area commands.
Police Intelligence in the Present Era
 
By virtue of R.A. 6975, the Philippine National Police (PNP)
which is civilian in character and national in scope was established
under the reorganized Department of the Interior and Local
Government (DILG). One of the directorates among others in the
organizational structure of the PNP is the Directorate for
Intelligence. This directorate is composed of four divisions, as
follows: Intelligence Operations Division; Counter-Intelligence &
Security Division; Foreign Liaison Division; and Intelligence
Research Division.
The mission of the Directorate for Intelligence is to assist the
Chief, PNP in attaining intelligence objectives through staff
direction, planning, coordination, control and supervision of all
intelligence and counter-intelligence activities of the PNP. In
addition, the Police Intelligence Group (PIG) was also activated as
one of the operational support units of the PNP. The PIG is under
the auspices of the Directorate for Intelligence. Its function is to
serve as the intelligence and counter-intelligence operating unit
of the PNP.
Introduction to Intelligence

Intelligence investigate who is committing crimes, how, when,


where and why. They then provide recommendations on how to
stop or curb the offenses. These assessments and profiles are
used to both monitor and predict crime, aiming to move policing
from “reactionary” investigation to “proactive” investigation.
 Definitions of Intelligence:

A. according to the Dictionary- webster defines intelligence as:

1. capacity for understanding and for other forms of adoptive


intellect of behavior; the mind in operation

2. The Power of meeting any situation, especially a novel


situation, successfully by power behavior adjustments; the
ability to apprehend the interrelationship of presented facts in
such a way as to guide action a goal.
B. according to Psychology-

“ Intelligence is the capacity of a person to adjust a new


situation, successfully through the use of what has been
previously learned.”
 According to the dictionary of military term for joint used
by the United States and its allies
 “ The product resulting from the collection, evaluation,
analysis, integration, and interpretation of all available
information which concerns one or more aspects of
foreign nations or areas of operations and which is
immediately or potentially significant to planning.”
Definition of Terms
 Intelligence Agency - is a government agency
responsible for the collection ,analysis or exploitation of
information and intelligence in support of law enforcement,
national security, defense and foreign policy objectives.

Intelligence Officer - is a person employed by an


organization to collect, compile and analyze information
which is used to that organization.
 Counter Intelligence - refers to effort made by
intelligence organizations to prevent hostile or enemy
intelligence organization from successfully gathering and
collecting intelligence against them.
 Dead Drop/Dead Letter Box - is a method used to pass items
between 2 individuals using a secret location and thus not
require to meet directly.

Live Drop - 2 persons meet to exchange items or information.

Dead Drop Spike - is a concealment device used to hide


money, maps, documents, microfilm and other items.
 Cut-Out - is a mutually trusted intermediary, method or
channel of communication, facilitating the exchange
of information between agents.

Espionage/Spying - involves a government or individual


obtaining information that is considered secret of
confidential without the permission of the holder of
the information.
 Agent Handling - is the management of agents, principal agents and
agent networks by intelligence officers typically known as case officers.

Case Officer - is an intelligence officer who is trained specialist in the


management of agents and agent network.

Agent - acts on behalf of another whether individual, organization or


foreign government, works under the direction of a principal agent or
case officer.
 Cryptography - is the practice and study of techniques
for secure communication in the presence of third parties
called adversaries.

Eaves Dropping - Is the act of secretly listening to the


private conversation of others without their consent.
 Propaganda - is a form of communication that is aimed at
influencing the attitude of a community toward some
cause or position.

Flip - apprehended criminals who turn informants.

Snitches - jailhouse informants.


 Detection- finding out or identifying the enemy

 Destruction- destroy the enemy’s effectiveness

 Denial- Prevention of the enemy’s effectiveness


Definition of Police Intelligence
 
It is the product resulting from the collection, evaluation,
analysis, integration, and interpretation of all available
information which concerns on or more aspects of criminal
activity, and which is immediately and potentially significant to
police planning.
 
 
Definition of Information
 
It is an evaluated material of every description including those
derived from observation, reports, rumors, imagery, and other
sources from which intelligence is derived.
Four ‘I”S of Intelligence
 1. Interest
 2. Integrity
 3. Ingenuity
 4. Intelligence
BROAD CATEGORIES OF
INTELLIGENCE
 National Security
 - refers to the knowledge formed with the integration of
the intelligence developed by different government
agencies and considered essential in the formulation of
national intelligence policy and promotion of national
security.
 a) National security- relates the protection and
preservation of military, economic, and productive
strength of the country.
 b) National policy- specific courses of action to achieve
national objective.
 2. Departmental intelligence
 - refers to the knowledge required by the department or
agency of the government in order to execute its mission
and discharge its responsibilities.
 3. Military intelligence
 - refers to the knowledge required by the military
institution essential in the preparation and execution of
military plans, policies, and programs.
 4. Police intelligence
 - refers to the knowledge necessary in the preparation
and execution of police plans, policies and programs.
INTELLIGENCE AXIOM
1. crucial to national security
2. essential to all operations
3. responsible to all government operations
4. Intelligence of the government should be superior to that of the enemy.
Major Categories of Intelligence
 
Enumerated and discussed hereunder are the major
categories of intelligence:
 
1. Strategic Intelligence
 
These are all intelligence data that are not of an immediate
value. The bulk of strategic intelligence is usually descriptive in
nature. The accumulation of physical descriptions of personalities,
their telephone numbers, and known associates are virtually
classic examples of strategic intelligence.
2. Counter-Intelligence
 
Intelligence activity which is concerned principally with the defending of the police
organization against penetration by individual and various groups who are inimical to
the best interest and general harmony. It is concerned principally with the neutralizing
and destroying attempts of individuals or groups that seek to discredit law
enforcement.

3. Line Intelligence
 
(Tactical and Combat) – is the intelligence required by the commander to provide
for planning and conduct of tactical operation. This refers to knowledge of the
People, Weather, Enemy, and Terrain (PWET) used in planning and conducting tactical
and administrative operation in a counter insurgency.

It involves both a process and an immediate product. It can be said that line
intelligence is the end product of gathering and processing of information.
Functional Classification of Police
Intelligence
 1. Criminal Intelligence (CRIMIN)- refers to the knowledge
essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.
 2. Internal Security Intelligence (INSINT) – refers to the
knowledge essential on the maintenance of peace and
order.
 Public Safety Intelligence (PSINT)- refers to the
knowledge essential to ensure the protection of lives and
properties.
Purpose of Intelligence Activity
 
Too often, police executives are required to make major
decisions based upon inadequate information. Intelligence must
fill the void often existing in police decision making.
Fundamentally stated, the purpose of the intelligence unit is to
increase the probability of accuracy, and reduced the probability
of error in operational staff decisions by gathering the
appropriate information. In other words, it can be said that
intelligence is the investigative arm of the police planners.
 
Definition of Intelligence Cycle
 
It is a repetitive process used to produce intelligence from
information.
Intelligence Cycle
Phases of Intelligence Cycle
 
Thoroughly presented hereunder are the different phases of
intelligence cycle, to wit:
 
Collection of Intelligence Information
 
It is the systematic exploitation of sources of information by
collection agencies, and the delivery of information obtained to
the proper intelligence agency. The collection phase is costly,
time-consuming and many times its rewards or fruits will be
strategic in nature—the long range.
 
It must not be forgotten that information is like any other commodity in the world.
It has a value sometimes more important than gold itself. In the collection effort, a
general axiom that will develop is, “there is a direct relationship between the quality
of information and cost of obtaining it.” On the occasion, this will not hold true,
however, its generic application is fundamental.
 
The collection effort must include the development of sources of information in
all levels of society within the community of police jurisdiction. It is imperative that
the collection effort incorporate sources within area of all organized crimes and
subversive activities.
 
The collection of information also carries with it responsibility for its evaluation
concerning reliability of the source and credibility of information, though usually
considered in conjunction with sources, parallel information that is already known.
Evaluation
It might be well to state a highly reliable source on some occasions will provide
information that is not totally true. Intelligence agencies require an evaluation of the
source of information to be contained within each agent report. Below is a typical
evaluation using letters and numbers.
 
Information Evaluation Rating
Reliability of Source Accuracy of Information
A Highly Reliable 1 Confirmed Information
B Usually Reliable 2 Probably True
C Fairly Reliable 3 Possibly True
D Unreliable 4 Doubtfully True
E Cannot Be Judge 5 Cannot Be Judge
Within the collection phase of intelligence activity, there arises that vital item,
the “pertinence factor.” Police intelligence collection effort must contain a
pertinence consideration. In other words, there must be some method to keep
intelligence personnel from dashing into remote tangent areas which paralyze
their total productivity with respect to overall existing police problems. In another
sense of the words, the pertinence rating is determined by the existing problems
at hand.
 
The examination of information for pertinence, specifically determine whether
or not the information is: pertinent with regard to the criminals and subversives or
the characteristics of the area of operation; needed immediately; and of possible
present or future value, and if so, to whom.
Sources of Information

Are persons, things, or actions from which information about criminals and/or
subversives, weather, and terrain is derived. Examples: maps, air photos, enemy
documents, enemy materials, prisoners of war, and weather forecast.

Sources of Information

Letters Meaning
T Direct Observation
U Penetration or Resident Agent
V AFP Troops and PNP Personnel
W Tactical Interrogation
X Government Civilian Employee
Y Members of the Populace
Z Documentary Analysis
  Most valuable information comes from overt sources. Open sources
probably contribute more than 80 percent of the input to most police
intelligence systems. Foreign and mass media, including press, radio and
television are a standard source, and they require a massive effort in recording,
translating, and storing information.
 
Covert sources of intelligence are dramatic, falling into the three major
classifications as follows: aerial and space reconnaissance, electronic
eavesdropping and code breaking, and intelligence operatives working at the
classic spy trade.

Broadly speaking, the value of each as a source of crucial information is


probably in descending order as listed. This is because a photograph constitutes
hard, i.e., reliable intelligence, whereas the report of an intelligence operatives may
be speculative and difficult to prove, and therefore soft.
Definition of Collection Agency
 
Is any person, unit, or activity that collects and/or
processed information by research, surveillance, or the
exploitation of the source of information.
 
Criteria in the Selection
 
Hereunder are the criteria in the selection of the collection
agency:
 
1) Suitability

The collection task assigned to a unit must be


compatible with its primary mission. Only the agencies best
suited to furnish the information are used.
2) Multiplicity

Evaluation of information requires that it must be


compared with the information received from other sources
and agencies. Subject to the consideration of suitability and
capability more than one agency is used to obtain each item of
required information.
 
3) Balance
 
Within the time limits imposed by other considerations,
the collection workload must be balanced from among the
collection agencies. Balance is a minor consideration when
compared with the importance of other factors.
 
Data Processing Activities
 
The following are the activities in the processing of
information:
 
1) Integration or Recording
 
It is the reduction of information to writing or some other
form of graphical representation and the arranging of
information into groups related items.

2) Evaluation
 
It is the determination of the pertinence or significance
of the information relative to police operations, reliability of the
sources or agency, and the accuracy of the information.
3) Analysis and Interpretation
 
It is the determination of the significance of the
information relative to the information and the intelligence
already known and drawing deductions about the probable
meaning of the evaluated information.
 
3. Dissemination and Use of Information
 
It is the timely conveyance of information and or
intelligence in an appropriate form, and by any suitable means
to those who need it. The primary purpose of timely
dissemination is to enable the police executive to make
decisions 7ith confidence9 a secondary purpose is to provide
knowledge in the light of which new information may be
processed. Access to the intelligence products is one of the
most important issues facing any police executives. Few
questions take precedence over, “who should have this
information?” Lack of careful consideration of this question can
Two principles preclude the release of intelligence information. First, there must
be the “need to know” on the `art of the recipient& “Need to Know” is not
necessarily determined by a person’s position in the organizational hierarchy,
“Need to know” is usually akin to the task performed. Secondly, a potential recipient
should be “cleared” by responsible authority as being eligible to receive the
intelligence data. Line officers, particularly those in patrol and intelligence functions,
after proper security orientation, should be designated by the police executives.
Those designated should know each other.
Confidential sources are the lifeline of the intelligence effort. They must be
protected at almost any price. Therefore, it is apparent that the “need to know”
and proper clearance of the receiver are surpassed by the consideration, “will the
use of dada destroy or endanger the source of information?” One informant in the
right place is worth many divisions of uniformed or plainclothes police officers.
Generally stated, police intelligence data having a medium-to-high probability of
compromising the source should not be released until it has been “sanitized”—
source identifying features be removed.
Means of Disseminating Information
 
Hereunder are the some of the means of disseminating
information:
 
1) Messages
 
This can be made by use ob radio, utilization of
messengers or couriers, or by rapid means of signal
communication.

2) Personal Contact
 
It can be done by the use mf telephone, personal visits,
and de-briefings.
3) Intelligence Documents
 
This is being accomplished through the transmittal of
documents in the form of periodic intelligence reports,
intelligence summaries, watch list, wanted list, operational
orders and intelligence annexes, terrain and weather studies,
and other special intelligence reports.
4. Direction of the Collection Effort

The collection effort should include a systematic


exploitation of all sources of information. This exploitation must
be continuous, methodical, and carefully controlled. The
collection must also include a complete delivery of all the
information obtained to the processing component.

The police executive must make certain that he has what


he needs and when he needs it. He must continually wonder
what criminals and/or subversives are doing, thinking, or
planning for the future operations, and about the nature of the
terrain and/or environment not under his control.
Definition of Priority Intelligence Requirements

PIRs are those intelligence requirements for which the


police executive has an anticipated and stated priority in his
task of planning and decision making. They are the highest
intelligence requirements, and are the basis for intelligence
operations, and are personally approved by the police
executive.

 
Definition of Other Information Requirements
 
PIRs are those items of information regarding the criminals
and/or subversives, and his environment which needs to be
collected and/or processed in order to meet the intelligence
requirements of the police executives.
Definition of Specific Orders/Request
 
SORs are the product of the requirement analysis that is
required by the collection units and/or agencies in the form of
orders or request.
 
 Definition of Intelligence Indicator
 
Are generalized theoretical actions that criminals and/or
subversives might be expected to take preparation for
aggressive actions, and that are things and/or events that
transpired in the past or things and/or events that are presently
occurring.
Aspects of Intelligence Cycle
 
Enumerated and discussed hereunder are the aspects of
intelligence cycle, as follows:
 
1. Assessment
 
It is the shifting and evaluation of sorted information to
isolate insignificant elements with respect to the mission and
operation of the police organization.
 
2. Integration
 
Is the breakdown assessed intelligence and/or information
and integrate it into its corresponding group.
 
3. Deduction
 
Deduce conclusions from integrated intelligence and/or
information.
What is Police Intelligence Estimates?
 
A police intelligence estimate is a study which describes,
discusses, and interprets the current crimes and/or
subversives situation in order to determine organized crimes
and/or insurgents capabilities, vulnerabilities, and probable
courses of actions. It also describes the effects of the area of
operations upon both police and criminal elements and/or
subversive groups’ courses of actions.
Liaison Activities
 
Probably the main reasons more people do not actively
assist the police lies in the simple fact that the police fail to
personally solicit their help. Liaison is little more than making
friends to those who have access to an intelligence item,
particularly people within organizations and records systems.
A liaison program is one of the principal activities of police
intelligence operations. A limited liaison program will usually
produce a limited intelligence product.
One of the essential ingredients of a successful liaison
program is the specific assignment of personnel to specific
targets. With the full realization that staff requests are usually
in a constant state of change, consistent with the situations,
liaison assignments will also be subject to some change. Any
police organization that fails to remember that the press
always has the last word is slated for trouble. An alert news
media can be one of the most powerful forces in a community
in fighting the activities of organized crime. Liaison with the
press is therefore essential.
News Clipping and De-Briefing Activities
 
Discussed hereunder are the importance of news clipping
and de-briefing in intelligence activities, to wit:
 
1. News Clipping
 
Clipping articles from newspapers in accordance with an
existing format is an important method of gathering intelligence
data. The communications networks of modern newspapers
make this an excellent source of highly valuable material.
2. De-Briefing Activities
 
A de-briefing program can be established by simply setting-
up a tape recorder with speaker where officers going off duty
can have access to it. Simply stated, the intelligence
operatives will be asked about his personal experiences and
observations while conducting intelligence and counter
intelligence operations.
Surveillance and Casing

Conducting surveillance and casing is generally expensive.


Indeed to be successful, considerable resources in the form of
work-hours, equipment, and time must be invested. Given
certain conditions, however, it may be the only means by which
particular information can be obtained.
 
Regardless of the types of surveillance, whether it pertains
to individual or location, certain concepts are fundamental to
all. Yet in the same breath, it must be remembered that
surveillance can produce rapidly changing situations which
require the application of the best of imaginations. Few
mistakes can be permitted as the stakes are many times quite
high.
Definitions of Terms
 
To understand the literature or participate in a surveillance, the intelligence
operatives should be conversant with the terms and jargons of the field.
 
Surveillance. The observation of a person, place or thing, generally—but not
necessarily—in an unobtrusive manner.

Subject. The party under surveillance.


 
Surveillant. The person conducting the surveillance.
 
Tail. To follow and keep under surveillance; a surveillance.
 
Stakeout. Also called a plant or fixed surveillance; here the surveillant remains
essentially in one position or locale.
Undercover. An undercover agent who often gets to know or work along-side
the subject. The term roping describes this situation, and the undercover agent is
said to be planted.
 
Convoy. A countermeasure to detect a surveillance; a convoy, usually a
person, is employed to determine whether or not a subject is under surveillance.

Shadow. To follow secretly; to place a person under surveillance.


 
Be Made. To be detected or suspected of being a surveillant by the subject.
 
Burn the Surveillance. When a surveillant’s behavior cause the subject to
surmise or know that he or she is under surveillance.
Close Surveillance. The subject is kept under constant surveillance. Also
termed tight surveillance, the aim is not to lose the subject even at the risk of being
“made.”
 
Fixed Surveillance. Similar with stakeout.
 
Moving Surveillance. The surveillant moved about in order to follow the subject.
 
Loose Surveillance. A cautious surveillance; also termed discreet surveillance
because the loss of the subject is preferred to possible exposure.
 
Open Surveillance. A surveillance with little or no attempt at concealment; also
termed rough surveillance. The subject is most likely aware of the surveillance, but
must not be lost.
Mustard Plaster. A form of open surveillance; here, the subject is followed so
closely that surveillant and subject are almost in lock step. It is tantamount to
protective custody.
 
Plant. Similar with stakeout and undercover.
 
Tailgaiting. A form of open surveillance in which the subject’s vehicle is closely
followed.
 
Technical Surveillance. Surveillance involving the use of scientific device to
enhance hearing or seeing the subject’s activities.
 
Bugging. Eavesdropping by electronic means, such as hidden microphone or
radio transmitter; bug—a device used for such eavesdropping.
Pen Register. A device that records all numbers dialed on
a telephone company’s central office.
 
Beeper. A battery operated device that emits radio signals
which permit it to be tracked by a directional finder-receiver. It
is also called beacon, transponder, and electronic tracking
device.
Considerations in the Conduct of Surveillance
 
Hereunder is the list of some practical considerations in the conduct of
surveillance:
 
1. Tactics
 
Strategic considerations govern the use of surveillance in particular case. Tactical
concerns determine its execution. A major problem that soon intrudes is how to
weigh the possible loss of contact with a subject against the risk of being detected or
exposed.
 
A quick, believable response is called for when a subject take some action to
determine whether there is indeed surveillance. It is easier to drop surveillance
before being confronted than to respond to a confrontation by convincing the
subjects that he or she is mistaken.
1) Loose Surveillance
 
Loose surveillance is used when the objective is to locate a suspect by tailing his
or her relatives and friends. The surveillant exercises great caution while observing
the subject, preferring to drop the tail rather than risk detection or exposure.
Whether espionage, burglary, or terrorism, this tactic applies when a group’s
activities are under scrutiny to determine their contacts and intentions.

2) Close Surveillance
 
The aim of close surveillance is to avoid losing the subject—even at the risk of
detection or exposure. When the goal is to prevent a crime or learn more about the
subject’s contacts, it is acceptable procedure. A subject who is naïve or lacks of
experience in crime may panic and reveal valuable clues when the fact of the
surveillance is realized.
2. Planning
 
Never to lose a subject or to arouse suspicion is impossible, of course. When
confronted with either decision, any vacillation is an additional hazard. Investigative
momentum will be squandered if plans are not made in anticipation of such
contingencies.
 
Should a subject be lost, a viable method of locating him or her is often by
educated guess—people being creatures of habit, doing the same things at about
the same time each day. Prior surveillance reports on the case can also furnish
insight.
3. Preparation
 
The success of surveillance depends on the degree of forethought and
thoroughness given to the preliminary preparations. It is important to develop a
plan of action for handling contingencies and to understand its objectives. Without
such a plan, obvious, everyday matters—such as having a supply of coins and
tokens available for transportation and telephone calls—can be overlooked.
1) Familiarization
 

It is crucial that the surveillant be certain of the identity


of the subject, who should, if possible, be pointed out by one
who knows him or her by sight. Though less satisfactory than
direct “fingering,” recent photographs are also acceptable. The
surveillant must be familiar with details of the case, trough
discussion with others working on it and reading the previous
surveillance reports.
 

It is helpful to be familiar with the probable area of


operations; for those working in unknown territory, preliminary
inspections are worthwhile. Since many surveillances are
conducted in cities it is important to know about the type of
people, the transportation facilities, street layout, public
buildings, and other physical features. The intelligence
operatives should be able to operate any technical equipment
used. When teams of operatives are to work together a
briefing session is appropriate.
2) Equipment
 
It is hardly need to be said that all technical equipment be serviced,
checked, and ready to operate. This applies to vehicles in which unmistakable
police paraphernalia must be disguised or concealed. Some thought should be
given to converting and enclosed, moderate-sized truck or van to suit the needs of
lengthy fixed surveillance. Disguises for an automobile requires an extra sets of
license plate numbers, window and bumper stickers, a set of props in the car’s
trunks, such a briefcase, and few changes of outer clothing and headgear. The
area of operation will suggest the props.
3) Blending-In
 
A surveillant must blend with the neighborhood of the operation. The aim is to
play the role locals will accept without question or suspicion. Practical matters must
be planned, providing relief for the surveillant’s personal necessities and time-off,
and securing a supply of public transit tokens.

5. Discontinuing the Surveillance


 
Usually, a surveillance can be discontinued without repercussions, but should the
subject directly or indirectly indicated that its existence is suspected, breaking off
contact requires caution. It must be made certain that the intelligence operative has
not been placed under counter-surveillance by the subject or an associate.
Accordingly, the intelligence operatives should not return directly to the safe house
until sure that no convoy was used.
In the event of a direct challenge, it is important to be prepared with a
response that has been thought through. Rehearsed, and is almost instinctive for
the surveillant. An improvised response would not ring true; it would only confirm
the subject’s suspicions. Neither, should intelligence operatives immediately deny
being a police officer. It might be feasible not to react with some irritation,
impatient comments such as “you’re bothering me” or “this is new approach”
might work. These suggestions are offered as practical responses in a given
situation.
Different Types of Tailing Methods

Enumerated and discussed hereunder are the different


types of tailing methods:
 
1. One-Man Method
 
A “one-man” tail is a difficult one, in all cases it must be a
close one or the person being followed will be lost. It is readily
noted by anyone just by turning a corner, stopping, then
watching for the investigator to come around the corner.
Unless a loose tail is sufficient in the coverage, a one-man tail
is almost useless. However, when observation has disclosed a
regular routine on the part of the subject, then it is sufficient.
The intelligence operatives can then readily relocate the subject in the event
he does lose contact. A variation of one-man tail is to have several intelligence
operatives rotate on the assignment, either by days or by the time of the day.
Perhaps one-man would work on Monday, another on the following days, etc.,
or one would take the mornings, and the others the evenings and the night time.
This is the “relay” technique and prevents the subject from readily identifying the
intelligence operatives or his assistant, and not thereby becoming aware of the
tail.
2. Leaf-Frog Method
 
Only one member of the team maintains contact with the
subject. It is a close tail, with the other members of the squad
keeping contact with those immediately ahead of them. At
stated intervals of five to six minutes or upon signal, the man
immediately behind the one keeping contact will move-up and
take his place, the one that had been in contact will stop, look
in a show window or wait at a traffic light, then take his place
behind the last man of the group.
 
This procedure is continued in rotation as long as the tail is
maintained. Such method is particularly desirable when it is
believed that subject may use a motor vehicle. The last man of
the team drives an automobile, and at pre-arranged signal the
car moves-up and passed through the group. The members of
the group jump in the car if time permits; otherwise the driver
continues the tail.
3. Group Method
 
When several men are assigned to a “group” tail, each man
maintains contact with the subject. One may be abreast of the
subject at the opposite side of the street, another behind the
subject, and others in similar position. In order to prevent
discovery, such positions can be exchanged between
members of the group, but they do not leap-frog—each tries to
maintain contact. This is close tail and is necessary only when
discovery is preferable to losing the subject.
No matter how many men are assigned to a tail job, the
problem of not losing contact with the subject is always
present. It is for this reason that many intelligence operatives
never work with less than one co-workers’, and they operate
an automobile. If the subject boards a public transportation, it
is much safer to maintain contact by following such public
transportation by automobile. This is a better procedure than
having intelligence operatives board the same conveyance.
Definition of Casing
 
It is the visual inspection of an area, installation or building
to determine its suitability for operational activities, e.g., safe-
house, meeting place for agents and their contacts,
establishment of communications net, training ground for
agents, intended raids and/or seizures of evidence, or simply
keeping track with the activities of certain area.
Types of Casing
 
Enumerated and discussed hereunder are the different
types of casing:
 
1. Exterior Casing
 
It is the observation of the whole picture of the area,
building and/or installation giving close observation as to its
location, possible exits and approaches, types of physical
vicinity that may possibly of help to any intelligence or counter-
intelligence operation that may be launched.

2. Interior Casing
 
It is the close observation of the lay-out of the building.
Include herein all items that can be observed in building which
are of intelligence and counter-intelligence value.
Cover and Undercover Operations

Cover and undercover operations represents another


means by which intelligence and information is collected; these
techniques should be viewed in most cases as a feasible way
to reach as high into the criminal enterprise as possible. It
involves a degree of specialization and training. However, it is
important to recognize that these are perhaps the most
dangerous in police work today.
Definition of Cover
 
It is a means by which individual, group or organization
conceals the true nature of its activities, and existence from
the observer. It is also a device or stratagem by which the
intelligence agents conceal his identity, and his relationship
with the intelligence collection agencies. It is used so that
intelligence agencies may operate with minimal interference
from the outside elements. By “outside elements,” it is means
those not having the “Need-to-Know.” Undercover is a person
with cover.
Functions of Cover
 
Hereunder are the different functions of cover:
 
1. Offensive
 
Gives access to the target and facilitates the achievement
of the clandestine objectives.
 
2. Defensive
 
Serve to prevent detection.
Broad Concepts of Cover
 
Hereunder are the different broad concepts of cover:
 
1. Cover for Status
 
A cover that is general in nature and relatively permanently
adopted to explain the work presence in any given area and
general status in society.
 
2. Cover for Action
 
A cover designed to explain away or allow to perform given
clandestine activity. It may be an extension of cover for status.
3. Natural Cover
 
A cover which completely fits the true background and
capabilities of the agent, it affords to provide maximum security
protection to any clandestine activity and allows greater
operational flexibility.
 
4. Living One’s Cover
 
Agent must make sure that every public action he takes fits
his assumed cover, and that a total picture presented to others
accurately reflects his cover.
 
5. Official Cover
 
A cover sponsored by an overt agency of a government.
6. Non-Official Cover
 
Cover adopted by a person free of any official connection.
 
7. Artificial Cover
 
Cover using biographical data adopted for the purpose that
is fictitious.
Types of Cover
 
Enumerated and discussed hereunder are the different
types of cover:
 
1. Natural Cover
 
Using true or actual personal background to fit for the
purpose.
 
2. Artificial Cover
 
A cover using biographical data adopted for the purpose
that is fictitious.
3. Cover within a Cover
 
Use of secondary cover in case of compromise which
necessitates the admission of lesser crime.
 
4. Multiple Cover
 
Any cover identity wished.

Definition of Organizational Cover


 
An account consisting of biographical data which when
adopted by individual will assume the personality he want to
adopt.
Objectives of Organizational Cover
 
Enumerated hereunder are the different objectives of
organizational cover, as follows:
 
1. To camouflage and protect operational personnel and
their activities.
 
2. Protect installation in which clandestine activities are
based.
Guidelines to Organizational Cover
 
Enumerated hereunder are the different guidelines to
organizational cover, to wit:
 
1. Organizational cover must appear to produce
something; and should device that not all personnel will work
together at the same time; and
 
2. Cover should be devoted to mission; and start with
small organizational cover and provide room for expansion as
it continue to grow.
Guidelines When Compromised
 
In case cover is compromised, the following must be
observed:
 
1. Move-out immediately, start new facility for operations and
develop it; and build entirely new cover; and
 
2. Use circuitous route and provide careful counter-
surveillance; and be patient, build slowly and carefully.
 
And if organizational cover is compromised, hereunder are
the things to be considered, i.e.:
 
1. Make a physical move or re-location, start new facility for
old operation and let it grow; and
 
2. Use new personnel, let old personnel remain in place, and
build entirely new cover identity.
Undercover Operations
 
Undercover operations have become a standard feature of
the contemporary police activities. This can take in many
forms, from an inconspicuous stranger who turns up to help a
demonstration, to a trained “deep cover” agent who may spend
many years working inside a target organizations. These
operations can be launched locally by the police, or law
enforcement agencies, or by any intelligence collection unit
and/or offices.
Another major source of inside information for intelligence
is the “CI” or “confidential informant.” These can be a private
citizens recruited to infiltrate group, or fearful members who
turn on their friends. Without the existence of the CI, or
“snitch,” there would in fact be very few arrests made for major
crimes. However, CIs do have major shortcomings from a
police perspective, including their general unreliability, and
questionable status in testifying as witnesses, and frequent
refusal to testify in open court.
  
Definition of Undercover Assignment
 
It is an investigative technique in which agent conceal his
official identity in order to obtain information from the target
organization.
Broad Categories of Undercover Agents
 
Enumerated and discussed hereunder are the broad
categories of undercover agents, to wit:
 
1. Deep Cover

It may be someone with extensive experience in


undercover work, or a young person selected from an
academy training class. Novices are actually preferred
sometimes because they have not acquired the typical
authoritarian habits that might give them away as police officer,
and also because they are less likely to be recognized by
regular police officer in the field who might unknowingly reveal
their identity in a chance encounter.
2. Light Cover
 
An undercover police officer working under “light” may have
a spurious document to establish fictitious identification, i.e.,
ID, driver’s license, etc., but will most likely go home to his
family and “real” life. Sometimes drug enforcement officers’
and other specially trained agents will be called for these
assignments.
Considerations in Undercover Assignment
 
Enumerated hereunder are the considerations in
undercover assignment:
 
1. Determine the level of which investigation is intended.
 
2. Developing appropriate cover story and cover, and
selection of qualified personnel.
 
3. Considerations of all undercover operations details to
include documentation, briefing, coaching, and rehearsing.
Types of Undercover Assignment
 
Enumerated and discussed hereunder are the different
types of undercover assignment, as follows:
 
1. Dwelling
 
Is one where the undercover agent established residence
in or near the dwelling which houses the subject.
 
2. Work Assignment
 
Places the undercover agent in a type of employment
where he can observe the activities of the subject at his place
of work.
4. Multiple Assignments

An undercover agent is given the task of covering two or


more of the above specific assignments simultaneously.
 
5. Personal Contact Assignment or “Rope Job”
 
The undercover agent is required to develop friendship and
trust with the target personality for the purposes of obtaining
information or evidence.
 
 Cover Story
 
It is a biographical account, true or fictitious, or a
combination of truth or fiction which portrays the undercover
agent’s past history, and current status. This may be a natural
cover story, artificial cover story, and combination of true or
false personal data.
Considerations in Choosing a Cover Story
 
Hereunder are the considerations in choosing a cover
story:
 
1. Justification for Presence and Activities
 
The story must include a logical explanation for the
undercover agent’s presence, and consistent with the activities
in which he must engage during the conduct of investigation
and/or collection of information.
 
2. Mutual Point of Interest
 
The story must provide point of mutual interests between
the target personalities, undercover agents, undercover
operations, and cover story.
3. Complete Background
 
The cover story must include the material on all aspects of
the undercover agent’s previous background, regardless of
whether or not it is anticipated that this information will be
required.
 
4. Continuous Contact
 
It includes provisions for sufficient contact between the
undercover agent, and the target of interest to produce
worthwhile results.
 
5. Safe Departure
 
It must consider the removal of the undercover agent from
the target area in the event of compromise, or the conclusion
of the investigation and/or collection of information.
Modes of Employment of Undercover Assignment
 
Discussed hereunder are the different modes of
employment of undercover assignment:
 
1. Long Range
 
Provides reliable, accurate, and continuing access to
information that would not be attainable, and which requires
considerable time and effort, painstaking analysis of the
mission, and thorough study of all the details relating to the
selection, training, and actual performance of undercover
personnel.
 
2. Short Range
 
It provides for the immediate objective solution to the
following: 1) background investigation; 2) preparation for raid
Informants Cultivation & Motivation

Anyone who discloses investigative information can be


considered as an informant. This is why unsavory names like
stool pigeon, squealer, rat, fink, snitch, informer, and agent
provocateur have been coined to describe those perceived as
betrayers.
Definition of Informant
 
It is an individual who openly or secretly obtain or assists in
obtaining information for intelligence and counter-intelligence
purposes in exchange for some recompense, monetary or
otherwise.
 
Purposes of Informants
 
Hereunder are some of the important purposes of
informants in intelligence operations:

1. Gain access to areas and targets inaccessible to


intelligence.
 
2. Provide anonymity to investigation and operation, and
increase the scope of area and target coverage.
Usefulness of Informants
 
The reasons individuals furnish information to intelligence
operatives can be laudable as well as nefarious. Whatever the
reason, an informant is one who furnishes intelligence that
may:

1. Prevent a crime which is planned but not yet committed,


and uncover a crime which has been committed, but has not
been discovered.
 
2. Identify the perpetrator of a crime, locate the perpetrator
of a crime or help to locate stolen property; and exonerate a
suspect, and lower morale among criminals through
apprehension.
Categories of Informants
 
Enumerated and discussed hereunder are the different
categories of informants:
 
1. Incidental Informants

Individuals who furnish information with no intention of


repeating his services of furnishing information on a continuing
basis.
Types of Incidental Informants
 
Hereunder are the different types of incidental informants:
 
1) Interviewees
 
Individuals contacted by investigation or summoned by
an intelligence unit for questioning, and who are aware that
they are in contact with an official police/military agency.
 
2) Walk-ins or Volunteers

Individuals who of their own accord contact intelligence


operatives in order to divulge information that believes to be of
intelligence interest.
3) Unwitting Informants
 
Those who provide information of intelligence interests,
and who are aware that they are imparting such information
that may be obtained from such person by subtle elicitation
techniques or through technical surveillance.
 
2. Casual Informant
 
Individuals who by social or professional position, posses
or has access to information of continuing interest and who
willingly provides information on the intelligence unit, either in
response to a specific request or on his own initiatives.
3. Automatic Informants

Those by virtue of their official positions are expected or


obligated to furnish information openly to intelligence unit in
normal course of their duties, e.g., government officials, AFP
and PNP members, and technical experts.
 
4. Recruited Informants
 
Individuals that are selected, trained and utilized as
continuous overt and covert sources of information concerning
specific intelligence targets.
Types of Recruited Informants
 
Hereunder are the different types of recruited informants:
 
1) Ordinary Informants
 
Individuals who obtained the desired information during
their normal daily routine, but whose affiliation with the
counter-intelligence unit is covert and under the control of that
unit. It is use primarily to achieve counter-intelligence area
coverage.
 
The factors of control and covert affiliation distinguished
ordinary informants from casual informants, e.g., the manager
or headwaiter in a hotel habitually frequented by members of
criminal syndicates and/or suspected subversives would be an
ordinary informant if recruited, trained and put into the
operational control of counter-intelligence unit.
2) Penetration Informants
 
Those assigned with the mission of obtaining
information within a specific target. They may be recruited
outside the target and placed therein or more usually selected
and recruited from among the personnel within the target itself.
 
3) Full-time Informants
 
Those that is available for counter-intelligence missions
at all times, and who may derive the major part of their income
from their work as informants. They must have cover
employment which will permit irregular hours, frequent
absences, extensive travel, and will provide an explanation for
income and contacts with persons of many social levels. They
are normally trained in investigative procedures.
5. Others
 
Hereunder are the some other types of informants:
 
1) Double Agents
 
Individuals who are simultaneously employed by two
opposing intelligence agencies with one of the agencies are
aware of his dual role. Double agents controlled intelligence
unit may produce very valuable information, particularly in
long-range counter-espionage operations, but their control and
exploitation complex difficult, and requires extremely stringent
security operations and control measures.
2) Dual Agents
 
Individuals who are simultaneously and independently
employed by two or more friendly intelligence units, and who
do not show preference for either, and normally motivated by
material gain. When an informant is determined to be dual
agent, his services will normally be terminated.
Motives for Informing
Enumerated and discussed hereunder are the different
motives of informing:
 

1. Self-Serving Reasons
 

Three kinds of self-serving motives are: cutting a deal,


elimination of competition, and building a line of credit.
 

1) Cutting a Deal
 

A deal is cut when a defendant agrees to impart what he


or she knows about criminal activities in exchange for a
promise that a recommendation for consideration will be made
to a judge in pending prosecution. By this means, informants
may reduce or avoid altogether the punishment that would
otherwise be expected in conviction. As a quid pro quo
arrangement, cutting a deal is in one sense a form of plea
bargaining.
2) Elimination of Competition
 
In specialized crimes, particularly dangerous drugs and
illegal gambling, one law breaker may, most often
anonymously, betray a rival to eliminate competition. This can
occur when a new robber invades the area and the rash of
break-ins increases community pressure and police activity. By
taking competitor out of circulation, community anxiety will be
kept at a level that does not provoke undue police response.
3) Building a Line of Credit
 
Uneasy pawnbrokers and secondhand dealers worry
that police may one day discover stolen goods in their shops
and accuse them of being a fence. Some will attempt to
establish that they are not fence by identifying those in the
community who are fencing stolen goods, using this as a way
to ingratiate themselves with authorities. For others on the
fringe of the underworld, the ploy is to earn favors which could
stay an arrest should they be apprehended for some law
violation.
2. Mercenary Reasons
 
The old saying among intelligence operatives, “when the
money ceases to clatter, the tongue stops the chatter,”
confirms that they well know; namely, that offering a reward for
information is of fundamental importance. Merchants and
farmers have long resorted to a bounty system; they will pay to
find those responsible for stealing their merchandize or rustling
their cattle. Police organizations budget ready monies to buy
information. The national government is more lavish in this
regard.
3. Self-Aggrandizement
 
Ordinary citizens as well as reformed criminals are
motivated by vanity to provide information, believing it will win
favorable attention from authorities. Employers, friends, and
even the media in important cases may put them in the
spotlight, making them instant celebrities. Since anonymity
offers the best protection against retaliation, it is prudent that
police safeguard such informants until public attention is
directed elsewhere.
4. Emotions
 
Fear, revenge, jealousy, and repentance are among the
emotions that often induce people to divulge what otherwise
would remain unrevealed. When the information concerns
criminal activity, it usually constitutes a major break through in
an investigation.
1) Fear
 
Fear is a powerful inducement to becoming an informer;
however, protection must be negotiated with authorities. It may
be for one’s self of fear for one’s family being killed, tortured, or
harmed in some fashion. Fear of imprisonment will cause
some people to seek a trade-off: information for nol-prossing
an indictment. When a gang member takes to heavy drinking,
becomes sexually involved, and rashly starts to tell a new
partner everything—or displays conduct that otherwise seems
to threaten the security of the group—he or she will be told in
no certain terms to change, “or else.” For more than few, the
reaction would be to inform on the gang’s activities.
2) Revenge and Jealousy
 
A grudge based on a perception of unfair treatment can
provoke a desire for revenge. However hackneyed the
expression, “hell hath no fury like a woman scorned,” is still
seems to speak for the pain of rejection. Indeed, any pain of
distress induced by another can result in jealousy and the
need for revenge, and turn a person to informing. The need to
get even is deep in the human psyche.
 
3) Repentance
 
Just as those who have “got religion” will be led by a
need for forgiveness and re-establishment in the community to
furnish what they would not have discovered before, so will the
outcast make amends by informing on confederates in past
crimes. The approbation of newly-acquired peers is an
especially strong stimulus.
5. Gratitude
 
Gratitude is not usually a major factor in prompting an
individual to furnish information, but it can be potent at times.
 
6. Civic Duty
 
A significant motivating factor for informing is a sense of
good citizenship. When an eyewitness tells the police of
observations made while a crime was being committed, or of
suspicious behavior noted, the persons carries out a civic duty.
Counter-Intelligence Operations, Personnel
& Document Setting

This part of this manuscript briefly discussed the following


topics, i.e., counter-intelligence operations, and personnel, and
documents security.
Definition of Counter-Intelligence
 
That aspect of police intelligence activities relating to all
security measures, both offensive-active and defensive-
passive, designed to insure the safeguarding of information,
personnel, material, and installation against espionage,
sabotage, and subversive activities of foreign power, and
disaffected or dissident groups or individuals that constitute
threats to national security, and other inimical foreign
intelligence activities.
 
The following are the different activities in counter-
intelligence, i.e., detection - knowing the clandestine operation
of the enemy; prevention - application of counter-intelligence
operations to avoid enemy activities; and neutralization -
containment of enemy activities.
Measures for Counter-Intelligence Operations
 
Discussed hereunder the different measures for effective
counter-intelligence operations:
 
1. Passive-Defensive
 
Counter-intelligence measures that seek to conceal
information from the enemy. Examples: secrecy discipline,
communication security, concealment and camouflage.
Passive counter-intelligence measures can be readily put into
SOPs for implementation regardless of the specific nature of
the offices or units’ mission.
2. Active-Offensive
 
Counter-intelligence measures that seek to actively block
the enemy’s attempt to gain information, or to actively block
the enemy’s effort to engage in espionage, sabotage, or
subversion. This includes measures such as detection,
prevention, and neutralization.
Definition of Personnel Security
 
It includes all the security measures designed to prevent
unsuitable individuals or persons of doubtful loyalty to the
Philippine Government, from gaining access to classified
matter or to any security facility, and to prevent the
appointment, employment, or retention as employees of such
individuals.
 
 Definition of Personnel Security Investigation
 
It is an inquiry into the character, reputation, discretion and
loyalty of an individual in order to determine a person’s
suitability or access to classified matter prior to the granting of
security clearance. Put it in another way, it is the process of
inquiring into person’s suitability to be given security clearance.
Types of Personnel Security Investigation
 
Hereunder are the different types:
 
1. National Agency Check (NAC)
 
This is an investigation of an individual made upon the
basis of written information supplied by him in response to
official inquiry, and can be used as a reference to appropriate
national agencies. It is simply a check on the files and records
of national agencies.
 
2. Local Agency Check (LAC)
 
This type of investigation consists of written inquiries sent
to appropriate local government agencies, former employer,
character references, and schools listed by the person under
investigation.
3. Background Investigation (BI)

This is a much more comprehensive investigation than the


National Agency Check or the Local Agency Check. A thorough
and complete investigation of all or some of the circumstances
or aspects of a person’s life is conducted.
Types of Background Investigation
 
This type of personnel security investigation may either of
the following:

1) Complete Background Investigation (CBI)

Consist of the investigation of the background of


individual, particularly all the circumstances of his personal life.

2) Partial Background Investigation (PBI)


 
Consist of the investigation of the background of an
individual but limited only to some of the circumstances of his
personal life which are deemed pertinent to the investigation.
Definition of Security Clearance Certificate
 
The certification by a responsible authority that the person
described is cleared for access to classified matter at the
appropriate level.
 
Types of Security Clearance
 
Hereunder are the different types:
 
1. Final
 
It is valid for five years unless sooner revoked by the
issuing authority.
 
2. Interim
 
It is valid for two years unless sooner revoked by the
issuing authority.
Definition of Personal History Statement
 
This is a form required to an individual who is being
processed for a security clearance. The form calls for pertinent
data and information on the various aspects of a subject’s
personal life.
  
What is Security Education?
 
It is primarily designed to enable the office or unit to
achieve and maintain a sound and effective security. To this
end, it provides the means or ways by which all personnel are
trained to acquire the necessary knowledge and principles as
will develop in them such desirable security habits and
attitudes and make them ever security conscious and
disciplined.
Different Activities in Security Education
 
Hereunder are the different activities:
 
1. Security Orientation

This consists of initial briefings made upon the new


personnel and employees on security and its various aspects,
and its importance. They are familiarized and made to acquaint
themselves with the security rules and regulations of the office
or unit and the importance of observing them.
 
2. Security Indoctrination
 
This is a continuous and systematic program designed to
meet the security needs of the office or unit. It aims to train all
personnel so that each shall possess the skills and vigilance in
the performance of their security responsibilities.
3. Security Reminders
 
This is a phase of security education program which makes
use of security poster, slogans, signs and stickers. This is an
indirect approach to inculcating security on the personnel and
employees, but it does serve its purpose.

4. Security Promotion
 
This is another phase of security education program which
is a positive effort to sell security. This may take various forms
such as a personal recognition on a personnel who has done
an effective security job.

5. Security Seminars
 
Attending lectures on instructions and discussions on
security will widen the personnel’s horizon, security wise, and
probably make him more security conscious and disciplined.
Definition of Document
 
Any recorded information regardless of its physical form or
characteristics, including but not limited to the following: 1)
written matters whether handwritten, printed or typed; 2) all
painted, drawn or engraved matters; 3) all sound and voice
recordings; 4) all printed photographs and exposed or printed
films, still or moving; and 5) all productions of the foregoing for
whatever purpose.

Definition of Classified Matter


 
Information or material in any form or of any nature, the
safeguarding of which is necessary in the interest of national
security. The term “classified military information” or “classified
police information” includes all information concerning
documents, cryptographic devices, developments, projects,
and materials.
Four Categories of Classified Matter

Hereunder are the different categories:


 
1. Top Secret
 
Information and materials the unauthorized disclosure of
which would cause exceptionally grave damage to the nation,
politically, economically, or from a security aspect. This
category is reserved for the nation’s closest secrets and is to
be used with great reserve. It is covered with legal size bond
paper lined with ½ inch green border.
2. Secret
 
Information and material the unauthorized disclosure of
which would endanger national security, cause serious injury to
the interest or prestige of the nation or of any governmental
activity or would be of great advantage to a foreign land. It is
covered with legal size bond paper lined with ½ inch red
border.
 
3. Confidential
 
Information and material the unauthorized disclosure of
which, while not endangering the national security would be
prejudicial to the interest or prestige of the nation or any
government activity, or would cause administrative
embarrassment or unwarranted injury to an individual or would
be of advantage to a foreign nation. It is covered with legal size
bond paper lined with ½ inch blue border.
4. Restricted
 
Information and material which requires special protection
other than that determined to be TOP SECRET, SECRET, or
CONFIDENTIAL. Cover sheet is not necessary, what is
important is a bold “RESTRICTED” word at the top and at the
bottom of the bond paper.
 
 
Definition of Need-to-Know and
Compartmentation
 
Need-to-know is the term given to those persons whose
official duty requires knowledge or possession thereof, while
compartmentation is the granting of access to classified
document or information only to properly cleared persons.
Definition of Security Officers
 
Is a properly trained and cleared individual who assists the
head of the department in discharging the responsibilities of
safeguarding classified documents and materials.

 Definition of Re-grading or Declassify


 
The act of changing the assigned classification of a
document or material, and as part of the process, it involves
notification of cognizant authority.
 Definition of Upgrading or Classify
 
Classify is the assigning of an information or material to
one of the four security classifications after determining that
such information or material requires security protection, while
upgrading is the changing of the classification of classified
matter to a category higher than that previously assigned to it.
 Definition of Upgrading or Classify
 
Classify is the assigning of an information or material to
one of the four security classifications after determining that
such information or material requires security protection, while
upgrading is the changing of the classification of classified
matter to a category higher than that previously assigned to it.
-END-

You might also like