Professional Documents
Culture Documents
LEA 4 - Police Intelligence Notes Md. 5
LEA 4 - Police Intelligence Notes Md. 5
SECRET SERVICE
History of Intelligence
Introduction
“The game of espionage as Allen Dulles, then Director for the Central Intelligence
Agency has coined, is not for the archbishops. Intelligence, to use the modern and
polite euphemism for spying, has been called "the world's second oldest
profession," and it has much of the same tawdry reputation as its two historical
contemporaries. According to historians, espionage was one of three primordial
professions that emerged at the beginning of the human experience on this
planet: shaman, harlot, and spy. Shamans ultimately became politicians and lawyers,
while spies and harlots evolved into. . . Well, spies and harlots”.
Early Intelligence Personalities
The following are some of the early personalities, in the field
of police intelligence.
1. Moses
One of the first recorded formalized intelligence efforts with
format can be found in the Holy Bible (Numbers 13:17). The
scriptures named the twelve intelligence agents whom the Lord
directed Moses to send into the land of Canaan (Numbers 13:3-15)
and records that all those men were “Heads of the Children of
Israel.” When Moses sent them North to spy out the land, he did
not propose a mere topographical expedition or cursory
exploration.
Rehab - “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and concealed the agents
of Israel, made a covenant with the agents and duped their pursuers. She was not only
an impromptu confederate of immense value to the Jewish leaders of that far-distant
day, but also established a plot- pattern which is still of periodic relief to motion- picture
producers.
Delilah - a Palestine agent who used her charm to gain information from the powerful
enemy.
“If you know your enemy and know yourself, you need not fear the result of a hundred
battles. If you know yourself but not your enemy, for every victory, you will suffer
defeat. If you know neither yourself nor your enemy, you are a fool who will meet
defeat in every battle.”
Alexander the Great
When Alexander the Great was marching into Asia, it is recorded there came to his
hints, and rumors of disaffection growing among his allies and mercenaries. The young
conqueror thereupon sought the truth and got it by the simplest expedient. He
announced that he was writing home and recommended to his officers that they do
likewise. Then, when the couriers were ladened and had set out for Greece, he ordered
them quietly recalled and proceeded to investigate all the letters that they carried.
Malcontents were detected, legitimate causes of grievances exposed.
Falsely known as a spy for the Germans in World War I, Mata Hari was born Margaretta
Gertrude Zelle on August 7, 1876, in Leeuwarden, Netherlands. “Mata Hari” (the sun at
dawn) was her stage name.
Belle Boyd-The daughter of Shenandoah Valley. She spied for the Confederacy. Belle
became a confederated courier running messages and medicines through the Union
lines. She traveled far into the enemy lines and beyond occasionally bringing back
intelligence of the greatest timeliness and importance. Belle’s greatest failings were her
extrovert nature and her love of publicity. She talked incessantly about her exploits to
reporters and allowed herself to be a celebrity of the south. Eventually late in the war,
Union authorities lost patience with her and had her deported to Canada. Her
biographer described her as the most famous woman concerned with official secret
activities in the Civil War.
Sir Francis Walsingham of England- He was credited with creating the first viable secret
service in England. He protected Queen Elizabeth I from countless assassins.
Lord Baden – Powell- Known as the founder of the Boy scouts Movement and was also
active spy. Baden- Powell exploited his powers of tracking and observation, coupled
with his considerable skills as a Thespian (theatrical), to the benefit of the British Secret
Service. Subsequently, when ordered to investigate a rumor that a large dry dock was
being constructed in Hambur, he posed as a drunk, saturating his clothes in brandy to
enhance the effect. He was swiftly arrested by the German military, but believing him to
be too drunkard incapable of finding out any secrets, they released him.
Sertorius- When Sertorius was the Roman Commander in Spain he was, according to
Polyaenus, the possessor of a white fawn that he trained to follow him everywhere. This
little fawn was taught to approach at a given signal, and Sertorius himself the signal,
when about to pronounce his decision in judicial cases. The fawn appeared to convey
information to the Roman general; and Sertorius allowed it become widely known that
he derived both secrets and guidance from the fawn. His intelligence agents
meanwhile, were everywhere active and all that they learned was credited to the
supernatural powers of the animal.
7. Many Others
World War I and the related period contributed many names
of the roll call of intelligence agents. Those who made major
contributions are only few in number compared to those who
were caught and executed or imprisoned. However, whether they
died or not, a certain few had a considerable impact on the history
of their countries and some cases, upon the future of mankind.
Wassmuss of Persia, Captain Von Rintelen, Mata Hari, Edith Canell,
Alice Dubois, Captain M. Cumming, Colonel Lawrence, and
Elizabeth Schragmiller, were by no means the only great agents.
Space does not permit recapitulation of their exploits, but one
fact emerges, the military leaders of the various nations were
beginning to formalize the intelligence activity and give it a much
more important role in the military and police affairs.
Intelligence in the Local Setting
During the Spanish era, the “Cabeza de Barangay” was the
head and leader of a group of settlers. The discipline and
punishment, as well as the conduct of government are made by
the barangay head. As the group increased in number, the
“cabeza” had to appoint certain trustworthy people to keep
watch. These “eyes and ears” made reports to the head, not only
for his protection but for suspicious outsiders infiltrating within
the settlement.
For money, favors, positions, or other motivations, many did
work for the Spaniards as agents, informants, or undercover. The
clergy had been mentioned by Rizal’s works as part of the
intelligence network. The discovery of the secret of “Katipunan”
was through some Filipino informers of the Filipino armed
movements that had spies in each others camps.
When the Philippines’ was granted its Commonwealth
government by the U.S. in November 15, 1935, the first act of the
legislative body was the National Defense Act. This act among
other provisions, organized the citizens army whereby with a
small professional core, twenty-year old male citizens would
undergo compulsory military training, under the Staff of the Army
Headquarters, which was then the G-2, or the Staff Officer for
Intelligence.
3. Line Intelligence
(Tactical and Combat) – is the intelligence required by the commander to provide
for planning and conduct of tactical operation. This refers to knowledge of the
People, Weather, Enemy, and Terrain (PWET) used in planning and conducting tactical
and administrative operation in a counter insurgency.
It involves both a process and an immediate product. It can be said that line
intelligence is the end product of gathering and processing of information.
Functional Classification of Police
Intelligence
1. Criminal Intelligence (CRIMIN)- refers to the knowledge
essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.
2. Internal Security Intelligence (INSINT) – refers to the
knowledge essential on the maintenance of peace and
order.
Public Safety Intelligence (PSINT)- refers to the
knowledge essential to ensure the protection of lives and
properties.
Purpose of Intelligence Activity
Too often, police executives are required to make major
decisions based upon inadequate information. Intelligence must
fill the void often existing in police decision making.
Fundamentally stated, the purpose of the intelligence unit is to
increase the probability of accuracy, and reduced the probability
of error in operational staff decisions by gathering the
appropriate information. In other words, it can be said that
intelligence is the investigative arm of the police planners.
Definition of Intelligence Cycle
It is a repetitive process used to produce intelligence from
information.
Intelligence Cycle
Phases of Intelligence Cycle
Thoroughly presented hereunder are the different phases of
intelligence cycle, to wit:
Collection of Intelligence Information
It is the systematic exploitation of sources of information by
collection agencies, and the delivery of information obtained to
the proper intelligence agency. The collection phase is costly,
time-consuming and many times its rewards or fruits will be
strategic in nature—the long range.
It must not be forgotten that information is like any other commodity in the world.
It has a value sometimes more important than gold itself. In the collection effort, a
general axiom that will develop is, “there is a direct relationship between the quality
of information and cost of obtaining it.” On the occasion, this will not hold true,
however, its generic application is fundamental.
The collection effort must include the development of sources of information in
all levels of society within the community of police jurisdiction. It is imperative that
the collection effort incorporate sources within area of all organized crimes and
subversive activities.
The collection of information also carries with it responsibility for its evaluation
concerning reliability of the source and credibility of information, though usually
considered in conjunction with sources, parallel information that is already known.
Evaluation
It might be well to state a highly reliable source on some occasions will provide
information that is not totally true. Intelligence agencies require an evaluation of the
source of information to be contained within each agent report. Below is a typical
evaluation using letters and numbers.
Information Evaluation Rating
Reliability of Source Accuracy of Information
A Highly Reliable 1 Confirmed Information
B Usually Reliable 2 Probably True
C Fairly Reliable 3 Possibly True
D Unreliable 4 Doubtfully True
E Cannot Be Judge 5 Cannot Be Judge
Within the collection phase of intelligence activity, there arises that vital item,
the “pertinence factor.” Police intelligence collection effort must contain a
pertinence consideration. In other words, there must be some method to keep
intelligence personnel from dashing into remote tangent areas which paralyze
their total productivity with respect to overall existing police problems. In another
sense of the words, the pertinence rating is determined by the existing problems
at hand.
The examination of information for pertinence, specifically determine whether
or not the information is: pertinent with regard to the criminals and subversives or
the characteristics of the area of operation; needed immediately; and of possible
present or future value, and if so, to whom.
Sources of Information
Are persons, things, or actions from which information about criminals and/or
subversives, weather, and terrain is derived. Examples: maps, air photos, enemy
documents, enemy materials, prisoners of war, and weather forecast.
Sources of Information
Letters Meaning
T Direct Observation
U Penetration or Resident Agent
V AFP Troops and PNP Personnel
W Tactical Interrogation
X Government Civilian Employee
Y Members of the Populace
Z Documentary Analysis
Most valuable information comes from overt sources. Open sources
probably contribute more than 80 percent of the input to most police
intelligence systems. Foreign and mass media, including press, radio and
television are a standard source, and they require a massive effort in recording,
translating, and storing information.
Covert sources of intelligence are dramatic, falling into the three major
classifications as follows: aerial and space reconnaissance, electronic
eavesdropping and code breaking, and intelligence operatives working at the
classic spy trade.
2) Evaluation
It is the determination of the pertinence or significance
of the information relative to police operations, reliability of the
sources or agency, and the accuracy of the information.
3) Analysis and Interpretation
It is the determination of the significance of the
information relative to the information and the intelligence
already known and drawing deductions about the probable
meaning of the evaluated information.
3. Dissemination and Use of Information
It is the timely conveyance of information and or
intelligence in an appropriate form, and by any suitable means
to those who need it. The primary purpose of timely
dissemination is to enable the police executive to make
decisions 7ith confidence9 a secondary purpose is to provide
knowledge in the light of which new information may be
processed. Access to the intelligence products is one of the
most important issues facing any police executives. Few
questions take precedence over, “who should have this
information?” Lack of careful consideration of this question can
Two principles preclude the release of intelligence information. First, there must
be the “need to know” on the `art of the recipient& “Need to Know” is not
necessarily determined by a person’s position in the organizational hierarchy,
“Need to know” is usually akin to the task performed. Secondly, a potential recipient
should be “cleared” by responsible authority as being eligible to receive the
intelligence data. Line officers, particularly those in patrol and intelligence functions,
after proper security orientation, should be designated by the police executives.
Those designated should know each other.
Confidential sources are the lifeline of the intelligence effort. They must be
protected at almost any price. Therefore, it is apparent that the “need to know”
and proper clearance of the receiver are surpassed by the consideration, “will the
use of dada destroy or endanger the source of information?” One informant in the
right place is worth many divisions of uniformed or plainclothes police officers.
Generally stated, police intelligence data having a medium-to-high probability of
compromising the source should not be released until it has been “sanitized”—
source identifying features be removed.
Means of Disseminating Information
Hereunder are the some of the means of disseminating
information:
1) Messages
This can be made by use ob radio, utilization of
messengers or couriers, or by rapid means of signal
communication.
2) Personal Contact
It can be done by the use mf telephone, personal visits,
and de-briefings.
3) Intelligence Documents
This is being accomplished through the transmittal of
documents in the form of periodic intelligence reports,
intelligence summaries, watch list, wanted list, operational
orders and intelligence annexes, terrain and weather studies,
and other special intelligence reports.
4. Direction of the Collection Effort
Definition of Other Information Requirements
PIRs are those items of information regarding the criminals
and/or subversives, and his environment which needs to be
collected and/or processed in order to meet the intelligence
requirements of the police executives.
Definition of Specific Orders/Request
SORs are the product of the requirement analysis that is
required by the collection units and/or agencies in the form of
orders or request.
Definition of Intelligence Indicator
Are generalized theoretical actions that criminals and/or
subversives might be expected to take preparation for
aggressive actions, and that are things and/or events that
transpired in the past or things and/or events that are presently
occurring.
Aspects of Intelligence Cycle
Enumerated and discussed hereunder are the aspects of
intelligence cycle, as follows:
1. Assessment
It is the shifting and evaluation of sorted information to
isolate insignificant elements with respect to the mission and
operation of the police organization.
2. Integration
Is the breakdown assessed intelligence and/or information
and integrate it into its corresponding group.
3. Deduction
Deduce conclusions from integrated intelligence and/or
information.
What is Police Intelligence Estimates?
A police intelligence estimate is a study which describes,
discusses, and interprets the current crimes and/or
subversives situation in order to determine organized crimes
and/or insurgents capabilities, vulnerabilities, and probable
courses of actions. It also describes the effects of the area of
operations upon both police and criminal elements and/or
subversive groups’ courses of actions.
Liaison Activities
Probably the main reasons more people do not actively
assist the police lies in the simple fact that the police fail to
personally solicit their help. Liaison is little more than making
friends to those who have access to an intelligence item,
particularly people within organizations and records systems.
A liaison program is one of the principal activities of police
intelligence operations. A limited liaison program will usually
produce a limited intelligence product.
One of the essential ingredients of a successful liaison
program is the specific assignment of personnel to specific
targets. With the full realization that staff requests are usually
in a constant state of change, consistent with the situations,
liaison assignments will also be subject to some change. Any
police organization that fails to remember that the press
always has the last word is slated for trouble. An alert news
media can be one of the most powerful forces in a community
in fighting the activities of organized crime. Liaison with the
press is therefore essential.
News Clipping and De-Briefing Activities
Discussed hereunder are the importance of news clipping
and de-briefing in intelligence activities, to wit:
1. News Clipping
Clipping articles from newspapers in accordance with an
existing format is an important method of gathering intelligence
data. The communications networks of modern newspapers
make this an excellent source of highly valuable material.
2. De-Briefing Activities
A de-briefing program can be established by simply setting-
up a tape recorder with speaker where officers going off duty
can have access to it. Simply stated, the intelligence
operatives will be asked about his personal experiences and
observations while conducting intelligence and counter
intelligence operations.
Surveillance and Casing
2) Close Surveillance
The aim of close surveillance is to avoid losing the subject—even at the risk of
detection or exposure. When the goal is to prevent a crime or learn more about the
subject’s contacts, it is acceptable procedure. A subject who is naïve or lacks of
experience in crime may panic and reveal valuable clues when the fact of the
surveillance is realized.
2. Planning
Never to lose a subject or to arouse suspicion is impossible, of course. When
confronted with either decision, any vacillation is an additional hazard. Investigative
momentum will be squandered if plans are not made in anticipation of such
contingencies.
Should a subject be lost, a viable method of locating him or her is often by
educated guess—people being creatures of habit, doing the same things at about
the same time each day. Prior surveillance reports on the case can also furnish
insight.
3. Preparation
The success of surveillance depends on the degree of forethought and
thoroughness given to the preliminary preparations. It is important to develop a
plan of action for handling contingencies and to understand its objectives. Without
such a plan, obvious, everyday matters—such as having a supply of coins and
tokens available for transportation and telephone calls—can be overlooked.
1) Familiarization
2. Interior Casing
It is the close observation of the lay-out of the building.
Include herein all items that can be observed in building which
are of intelligence and counter-intelligence value.
Cover and Undercover Operations
1. Self-Serving Reasons
1) Cutting a Deal
4. Security Promotion
This is another phase of security education program which
is a positive effort to sell security. This may take various forms
such as a personal recognition on a personnel who has done
an effective security job.
5. Security Seminars
Attending lectures on instructions and discussions on
security will widen the personnel’s horizon, security wise, and
probably make him more security conscious and disciplined.
Definition of Document
Any recorded information regardless of its physical form or
characteristics, including but not limited to the following: 1)
written matters whether handwritten, printed or typed; 2) all
painted, drawn or engraved matters; 3) all sound and voice
recordings; 4) all printed photographs and exposed or printed
films, still or moving; and 5) all productions of the foregoing for
whatever purpose.