You are on page 1of 24

POLICE INTELLIGENCE AND SECRET SERVICE)

INTELLIGENCE DEFINED
According to Government - Commission Task Force - It means the collection, processing, collation,
interpretation, evaluation and dissemination of information, with references to national security. In
certain context, it may also mean the network or the system for the collection, collation,
interpretation, evaluation, processing, and dissemination of information. “The term as used here
doesn’t include any police powers or authorities, any investigative function other than those involve
in the collection of information nor any function involved in the enforcement of laws, orders, or
regulation.
According to Military Terminologies - Intelligence is the end product resulting from the collection,
evaluation, analysis, integration and interpretation of all available information which my have
immediate or potential significance to the development and execution of plans, policies and programs
of the users.
According to Police Parlance - The end product resulting from the collection, evaluation, analysis,
integration and interpretation of al available information regarding the activities of criminal and other
law violators for the purpose of affecting criminals and other law violators for the purpose of
affecting their arrest, obtaining evidence, and forestalling plan to commit crime.
Functions of Intelligence in General
Today all counties have their intelligence services. They maybe different in their organization,
efficiency and method but they all have the basic functions such as:
 the collection or procurement of information
 the evaluation of the information which then become intelligence
 the dissemination of intelligence to those who need it.
 counter intelligence or negative intelligence, which is dedicated to the concealment and protection
of one’s own information from the adversary intelligence operation. It is a defensive function of
intelligence.
CRITERIA, DOCTRINES, AND PRINCIPLES OF INTELLIGENCE
Criteria
a. Universality of application - it should apply to as many phases and aspects of intelligence as
possible. It should guide not only the production of intelligence but also the concomitant activities
essential to the process as well as the organization and the thought and actions of the individual
composing it.
b. It must be broad - it should form the basis for a formulation of corollary and subsidiary guides.
c. It must be important, indeed essential, to intelligence- if a guide is truly important and essential,
then its violations should bring its own immediate penalties.
Doctrines
a. There exists an essential unity between knowledge and action; that knowledge enhances the
effectiveness of action – and minimizes the chances of error.
b. “The knowledge requirements of decision-making are complex and beyond the capacities of
anyone necessary to meet there requirements.”
Principles
1. Objectivity - in intelligence, only the well guided succeed. It is a basic intelligence concept that
there must be unity between knowledge and action. It follows therefore that intelligence should
interact and condition the decision. Intelligence must be adapted to the needs of the decision; it is
both giver and taker. Action or decision is planned by knowledge and guided by it at every step.
2. Interdependence - Intelligence is artificially subdivided into component elements to insure
complete coverage, eliminate duplication and to reduce the overall task or manageable sizes.
Nevertheless, each subdivision remains as essential part of unity; contributes proportionately to the
end result; possesses a precise interrelationship; and interacts with each other so as to achieve a
balanced and harmonious whole.
3. Continuity - Intelligence must be continuous. It is necessary that coverage be continuous so that
the shape of what happens today could be studied in the light of what happened before, which in turn
would enable us to predict the shape of things to come.
4. Communication - Intelligence adequate to their needs must be communicated to all the decision
makers in manner that they will understand and form that will permit its most effective use.
5. Usefulness - Intelligence is useless if it remains in the minds, or in the files of its collectors or its
producers. The story must be told and it must be told well. The story must be convincing and to be
convincing it must not only be plausible or factual but its significance must be shown.
6. Selection - Intelligence should be essential and pertinent to the purpose at hand. Intelligence
involves the plowing through a maze of information, considering innumerable number of means or of
picking the most promising of a multitude of leads. The requirement of decision-making covers very
nearly the entire span of human knowledge. Unless there is selection of only the most essential and
the pertinent, intelligence will go off in all directions in one monumental waste of effort.
7. Timeliness - Intelligence must be communicated to the decision maker at the appropriate time to
permit its most effective use. This is one of the most important and most obvious, for Intelligence
that is too soon or too late are equally useless. Timeliness is one principle that complements all the
others.
8. Security - Security is achieved by the measures which intelligence takes to protect and preserve the
integrity of its activities. If intelligence has no security, it might be as well being run like a
newspaper to which it is similar.
General Activities in Police Intelligence
1. Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with
little practical immediate operation value.
2. Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary
for more effective police planning and operation.
3. National Intelligence - it is the integrated product of intelligence developed by all the
governmental branches, departments concerning the broad aspect of national security and policy. It is
concerned to more than one department or agency and it is not produced by single entity. It is used to
coordinate all the activities of the government in developing and executing integrated and national
policies and plans.
4. Counter-Intelligence – phase of intelligence covering the activity devoted in destroying the
effectiveness of hostile foreign activities and to the protection of info against espionage, subversion
and sabotage.
5. Undercover Work – is an investigative process in which disguises and pretext cover and deception
are used to gain the confidence of criminal suspects for the purpose of determining the nature and
extent of any criminal activities that maybe contemplating or perpetuating.
Functional Classification of Police Intelligence
1. Criminal Intelligence – refers to the knowledge essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal offenders.
2. Internal Security Intelligence – refers to the knowledge essential to the maintenance of peace and
order.
3. Public Safety Intelligence – refers to the knowledge essential to ensure the protection of lives and
properties.
Forms of Intelligence
1. Sociological Intelligence – deals with the demographic and psychological aspects of groups of
people. It includes the population and manpower and the characteristics of the people, public opinion
– attitude of the majority of the people towards matter of public policy and education.
2. Biographical Intelligence – deals with individual’s personalities who have actual possession of
power.
3. Armed Force Intelligence – deals with the armed forces of the nation. It includes the position of
the armed forces, the constitutional and legal basis of its creation and actual role, the organizational
structure and territorial disposition, and the military manpower recruitment and Order of Battle
4. Geographical Intelligence – deals with the progress of research and development as it affects the
economic and military potential of a nation.
KINDS OF INTELLIGENCE
A. Strategic Intelligence – as defined earlier, it is an intelligence data that are not of an immediate
value. It is usually descriptive in nature, accumulation of physical description of personalities, modus
operandi. It does not have immediate operational value but rather long range that may become
relevant to future police operations.
B. Line Intelligence – It is the kind of intelligence required by the commander to provide for
planning and conduct tactical and administrative operation in counter insurgency. This pertains to
knowledge of People, Weather, Enemy and Terrain (PWET) used in planning and conducting tactical
and administrative operation in a counter insurgency.
Intelligence information to be determined in Line Intelligence are:
People - living condition of the people, sources of income, education of the people, government
livelihood projects, extent of enemy influence to the people
Weather – visibility, cloudy, temperature, precipitation (rain), wind
Enemy - location of the enemy, strength of the enemy, disposition, tactical capability, enemy
vulnerability
Terrain - relief and drainage system, vegetation, surface material, man made features. There are
military aspects of terrain which includes cover and concealment, obstacle, critical key terrain
features, observation and fields of fire, and avenues of approach.
C. Counter Intelligence (CI) - this kind of intelligence covers the activity devoted in destroying the
effectiveness of hostile foreign activities and to the protection of info against espionage, subversion
and sabotage. Hence, the three activities of CI are: protection of information against espionage;
protection of personnel against subversion; and protection of installations and material against
sabotage.
Counter Intelligence is also known as Negative Intelligence - a generic term meaning three different
things;
Security Intelligence – means that the total sum of efforts to counsel the national policies, diplomatic
decisions, military data, and any other information of a secret nature affecting the security of the
nation form unauthorized persons. It is an effort to deny information to unauthorized persons by
restricting to those who are explicitly authorized to possess it.
Counter-Intelligence - counter intelligence is the organized effort to protect specific data that might
be of value to the opponent’s own intelligence organization. Some of its functions are: Censorship –
of the following: correspondence, broadcast, telecast, telephone conversations, telegrams and cables,
etc., prevention of the dissemination of any information that might aid an opponent; maintenance of
files of suspect; surveillance of suspects; mail reading, wire tapping and recording; infiltration of the
enemy intelligence organized to procure information about its method, personal, specific operations
and interest.
Counter-Espionage - In counter-espionage, negative intelligence becomes a dynamic and active
effort. Its purpose is to investigate actual or theoretical violation of espionage laws, to enforce those
laws and to apprehend any violators.
Five Categories of CI Operation
1. Military Security – it encompasses the measures taken by a command to protect itself against
espionage, enemy operation, sabotage, subversion or surprise.
2. Port Frontier and Travel Security – has to do with the application of both military and civil
security measures for CI control at point of entry and departure, international borders or boundaries.
3. Civil Security – it encompasses active and passive CI measures affecting the non-military
nationals permanently or temporarily residing in an area under military jurisdiction.
4. Censorship – it is the control and examination of the civil, national, armed forces, field press, and
POWs.
5. Special Operations – counter subversion, sabotage and espionage
Counter Intelligence (CI) Operation
1. Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use human sources to
collect information or to conduct sabotage and subversion which includes CI special operations,
liaison, counter security, and CI screening.
2. Counter Imagery Intel (IMINT) - includes action taken to determine enemy SIGINT and related
enemy weaknesses, capabilities and activities. These actions include surveillance radar, photo
thermal and infrared systems. Successful counter – IMINT operations rely heavily on pattern and
movement analysis and evaluation of the enemy.
3. Counter Signal Intel (SIGINT) – determine enemy SIGINT and related enemy weaknesses,
capabilities and activities, assess friendly operations to identify patterns, profiles and develop,
recommend and analyze counter measures.
THE INTELLIGENCE CYCLE
The single most important part of intelligence activity is the understanding the intelligence cycle
because MISSION, which is the core of the cycle, serves as the foundation of all intelligence
operations. Every operative must therefore place into mind the following phases of the cycle:
PHASE 1 - Planning the Collection Effort
This phase of the cycle involve the determination of the requirements of intelligence. It is concerned
with identifying the so called Essential Element of Information (EEI) - an item of intelligence or
information of the characteristics of the area of operations and the enemy, which the commander
feels he needs before he needs before he can reasonably arrive at a decision.
With this, the intelligence officer must have a thorough knowledge of the available sources of
information, the collecting agencies and type of info the latter can provide. He must understand the
operations of the command in order to provide the particular Intel required for success. He must have
a thorough knowledge of the tactics, organizations, and characteristics of the enemy and be
especially competent in the fields of acquisition of operations.
Categories of Intelligence Requirements
In relation to use
a. Executive – are those information required by executive, governmental and military commanders;
the executive requirements are the basis for decisions and national policy making.
b. Contributory – information required to complete the staff process – make staff plans and estimates
that contribute to the decision and policy making.
c. Operational – additional intelligence required in planning and carrying out effectively the decision
or policy announced. Decisions and policy require implementation.
d. Collateral – higher or adjacent echelons of the government or military establishment may require
info.
In relation to type
a. Basic – are general reference materials for use in the planning regarding the enemies, area of
operations, capabilities – static comprehensive.
b. Current – are information which are temporary in nature and narrower in scope.
c. Estimative – are those that determine the future courses of action; required by the executives to
plan future military operations and policies.
PHASE 2 - Collection of information
This phase of the cycle is concerned with identification of the collecting agency, the formulation of
procedures on the manner of collecting the information in conjunction with the plans as achieved in
phase one.
Selection of Collecting Agencies
a. List all available sources; exploit the collecting agencies.
b. Collection will be assigned in accordance with capabilities;
c. Collection directives prepared once the proper collecting agency has been selected to exploit a
particular source;
d. Collection directives do not limit the activities of the collecting agency;
e. Criteria for the selection of collecting agency; suitability, capability, confirmation, timeliness and
balance.
Purpose of the Collection Plan
a. To insure logical and orderly analysis of the intelligence requirements.
b. To establish a workable collection scheme based on the analysis of the intelligence requirement.
c. To provide definite and precise directives to collecting agencies.
d. To avoid possibility of omission, conflict or unnecessary duplication of collection effort.
Steps in Developing a Collection Plan
a. List the requirements in the order of priority
b. Break the requirements into indication – any evidence of actual or potential enemy activity or
characteristic of an area of operation enemy activity or characteristic of an area of operation, habitual
activities – need experience.
c. Fit those indications into existing situations – critical clues, security measures, attack, defense, etc.
d. Basis for development for specific collection directive - designed to exploit to the fullest the
collection directive; guide doesn’t limit.
e. Selection of Collecting Agencies – criteria for selection – suitability, capability, confirmation,
timeliness and balance. Designation of particular time and place that the required information is to be
reported.
Factors in choosing Collection Agent
In choosing collection agents, they must be selected according to their capability – agents placements
or access to the target; multiplicity – more agents; and balance ¬– the number of agents needed per
operation.
a. Methods of Collection – collection of information can be done through overt method (open
system) or covert method (secret/clandestine).
b. Collecting Agencies – depending on the type of operation, the collecting agency could be
Government Agencies, Intelligence units, or Organizations
c. Trade Crafts – includes the use of photography, investigations / elicitation / interrogation,
surveillance, sound equipment, surreptitious entry – keys and locks, use of an artist, communication
PHASE 3 - Processing the Collected Information
This phase of the cycle is concerned with the examination and collation of all collected information.
Steps in Processing Raw Information
1. Collection – organization of raw data and information into usable form; grouping similar items of
information so that they will be readily accessible.
2. Recording – is the reduction of info into writing or some other form of graphical representation
and the arranging or this info into writing or some form of graphical representation and the arranging
of this into groups of related items.
 Police log book and Journal
 Intel-work Sheet - Intel Files
 Situation Maps - Rouges Gallery
 Modus Operandi Files
3. Evaluation – examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source and agency, and its credibility or truth of information.
Evaluation is the determination of the pertinence of the info to the operation, reliability of the source
of or agency and the accuracy of the info. Evaluation determines the following:
 Pertinence - does it hold some value to current operation? Is it needed immediately?
 Reliability – judging the source of info of agency
 Credibility – truth of info. Is it possible for the reported fact or event to have taken place? Is the
report consistent within itself? Is the report confirmed or corroborated by info from different sources
or agencies? If the report does not agree with info from other sources which one is more likely to be
true?
The Evaluation Guide
ACCURACY OF INFORMATION
RELIABILITY OF INFORMATION SOURCE OF INFORMATION
1- CONFIRMED by other sources A- COMPLETE RELIABLE T- Direct Observation by
Comdr/Chf of Unit
2- PROBABLY TRUE B- USUALLY RELIABLE U- Report by DPA or Resident Agent
3- POSSIBLY TRUE C- FAIRLY RELIABLE V- Report by PNP/AFP Troops
4- DOUBTFULLY TRUE D- NOT USUALLY RELIABLE W- Interrogation of Captured Enemy
5- IMPROBABLE E- UNRELIABLE X- Observation of gov’t/civilian employee
6- TRUTH can not be judged F- REALIBILITY cannot be judged Y/Z- Documentary
4. Interpretation – it is establishing the meaning and significance of the information. It involves the
following activities:
 Analysis – shifting and isolating those elements that have significance in light of the mission or
national objective.
 Integration – combining the elements isolated in analysis and known information to form a logical
picture or theory.
 Deduction – the formulation of conclusions from the theory developed, tested and considered valid
– determination of effort and meaning of the information.
PHASE 4 - Dissemination and Use of Information
This phase of the cycle refers to the activities of transferring the processed information to the proper
users, most particularly the authority that requires the activity. Processed information can be
disseminated through annexes, estimates, briefing, message, reports, overlays, and or summaries.
The criteria that must be observed in dissemination are:
1. Timeless – must reach the users on time to be of value. It must be disseminated in accordance with
the urgency and must reach the user in sufficient time to be use.
2. Propriety – the message must be clear, concise and complete, as well as in the proper form for the
receiver to readily understand its contents. It must be disseminated to the correct user, presented in a
form that lends itself to immediate use and distributed by the most effective means appropriate to
both time and security requirements.
Methods of Dissemination
1. Fragmentary orders from top to bottom of the command
2. Memorandum, circulars, special orders
3. Operations order, oral or written
4. Conference – staff members
5. Other report and intelligence documents
6. Personal Contact
Who are the users of intelligence?
1. National leaders and military commanders – formulation of national policies.
2. Advisors and Staff – preparations of plans and estimates
3. Friendly nations or other branches of the armed forces.
4. Processor – basis for evaluation and interpretation.
5. Head / chairman of an organization
6. Any person with authority for purposes of planning.
INFORMATION AND ITS SOURCES
Information
Information refers to all evaluated materials of every description including those derived from
observation, reports, rumors, imagery, and other sources from which intelligence in produced.
Information is a communicated knowledge by others obtaining by personal study, investigation,
research, analysis, observation.
Two General classifications of sources of information:
1. Open Sources – 99% of the information collected are coming from open sources.
2. Close Sources – 1% of information are collected from close sources.
Overt Intelligence – is the gathering of information or documents procured openly without regard as
to whether the subject or target become knowledgeable of the purpose
Open Sources: Includes information taken from
 Enemy activity
 POW and Civilians
 Captured documents
 Map - Weather, forecast, studies, report - Agencies
Covert Intelligence – is the secret procurement of information, which is obtained without the
knowledge of the person or persons safeguarding vital intelligence interest.
Close Sources: Include information which maybe taken through:
 Surveillance
 Casing and
 Elicitation
 Surreptitious entry
 Employment of technical means (Bugging and Tapping device)
 Tactical Interrogation - Observation and Description (ODEX)
PERSONS AS SOURCES OF INFORMATION
Informant Net – It is a controlled group of people who worked through the direction of the agent
handler. The informants, principal or cutouts supply the agent handler directly or indirectly with Intel
information
Informants (Asset) – people selected as sources of information, which could be voluntary, or in
consideration of a price.
 Informant – refers to a person who gives information to the police voluntarily or involuntarily with
out any consideration
 Informer – those who give information to the police for price or reward
Types of Informants
1. Criminal Informant – an informant who give information to the police pertaining to the
underworld about organized criminals with the understanding that his identity will be protected
2. Confidential Informant – is similar to the former but he gives information violate of the law to
includes crimes and criminals
3. Voluntary Informant – a type of informant who give information freely and willfully as a witness
to a certain act
4. Special Informant – those who gives information concerning specialized cases only and it is
regarded a special treatment by the operatives (ex. teachers, businessmen)
5. Anonymous Informant – those who gives information through telephone with the hope that the
informant can not be identified
Sub-type of Informant
1. Incidental Informant – a person who casually imparts information to an officer with no intention of
providing subsequent information
2. Recruited Informant – A person who is selected cultivated and developed into a continuous source
of info
Categories of Recruited Informants:
1. Spontaneous or Automatic Informant – Informants who by the nature of their work or position in
society have a certain legal, moral or ethical responsibilities to report info to the police
2. Ordinary (out-of-their-will) Informants – Informants that are under the compulsion to report info
to the police
3. Special Employee – informants who are of a specific operational nature
Other Classification of Informant
Other terms related to people who gives information are Automatic Informant, Penetrating Agent ,
Infiltrating Agent , Full time Informant , Rival – Elimination Informant, False Informant, Frightened
Informant, Self- aggrandizing Informant, Mercenary Informant , Double Crosser Informant , Woman
Informant , Legitimate Informant.
Common Motives of Informants
People give information to the police due to various reasons. Their motives include reward, revenge,
fear and avoidance of punishment, friendship, patriotism, vanity, civic-mindedness, repentance,
competition, and other motives.
INFROMANT RECRUITMENT
Phases
1. Selection – it is particularly desirable to be able to identity and recruit an informant who has access
to many criminal in-group or subversive organization. Wide access is probably the single most
important feature in the consideration of recruiting the potential informant
2. Investigation – the investigation of the potential informants that has tentatively identified as a
“probable” must be as thorough as possible. It must establish possible existing motives as to this
person might assist the police Intel community. Failure to do so will deny this office who must
perform the approach and persuasion phase with little more that a guess. If necessary, conduct
complete background investigation (CBI)
3. Approach – approach must be done in a setting from which might include pleasant surroundings,
perhaps a confidential apartment, completely free form any probability of compromise, preferably in
an adjacent city or a remote area foreign to the informants living pattern.
4. Testing – the testing program should begin, of course, with the limited assignment, with a gradual
integration into the more important areas. The occasional testing of an informant should continue
through the entire affiliation
INTELLIGENCE OPERATIONS
Intelligence Operations is the result of intelligence planning, planning is always ahead of operation
although an operation can be made without a plan, it is usually due to sudden and inevitable
situations but definitely this is poor intelligence management.
The 14Operational Cycles
1. Mission and Target –
a. Infiltration – the insertion of action agent inside the target organization
b. Penetration – recruitment of action agent inside the target organization
2. Planning
3. Spotting
4. Partial Background Investigation (PBI) or Complete Background Investigation
5. Recruitment - the only qualification of an agent is to have an access to the target
6. Training
7. Briefing
8. Dispatch
9. Communication - technical method like telephone/radio, non-technical method like personal
meeting, live drop or dead drop
10. Debriefing
11. Payments – depends upon the motivation of informant
a. Regulatory - pay no bonuses
b. Supplemental - income that is enough to ease his financial worries
12. Disposition – involve activity on rerouting, retraining, retesting, termination
13. Reporting
14. Operational Testing
COVER AND UNDERCOVER ACTIVITIES
1. Cover - the means by which an individual group of organization conceals the true nature of its acts
and or existence from the observer.
2. Cover story – a biographical data through fictional that will portray the personality of the agent he
assumed, a scenario to cover up the operation
3. Cover Support – an agent assigned in target areas with the primary mission of supporting the cover
story.
Types of Cover
1. Natural Cover – using actual or true background
2. Artificial – using biographical data adopted for the purpose
3. Cover with in a Cover – justification of existence
4. Multiple Cover – any cover you wish.
Organizational Cover – is an account consisting of biographical which when adopted by an
individual will assume the personality he wants to adopt
Undercover Assignment – is an investigative technique in which agent conceal his official identity an
obtain information from that organization
THE UNDECOVER AGENT
Special qualifications include knowledge of the language, area background regarding events,
knowledge about the custom and habits, physical appearance, and must be an artist.
Factors considered in Selecting Cover Story
1. Mutual Point of Interest
2. Justification of presents
3. Previous and permanent address
4. Efficiency of role and freedom from the movement
5. Means of communication
6. Social and financial status
7. Optional alternate plan
8. Safe departure
Selecting Action Agents
1. Placement – location of prospective agent with respect to the target
2. Access – it is the capability of a prospective agent to obtain the desired info for the Intel
organization or to perform to Intel collection mission in the area.
 Primary Access – it is the access to the desired info
 Secondary Access – it is the access to the desired info through a principal source where the latter
has the direct access
 Outside Access – the agent is employed outside the target and merely monitor info from a third
person who is monitoring info n the area
AGENT CONTROL
CONTROL – authority to direct the agent to carryout task or requirement on behalf of the
clandestine organization in an acceptable manner and security
Two Categories of Control
1. Positive Control – is characterized by professionalism and rapport like:
a. Agent motivation
b. Psychological control
2. Negative Control – characterized by threat and it include the following:
a. Disciplinary Action – includes verbal reprimand for poor performance or insecure actions
withholding certain material rewards, reduction of agents salary or in extreme situation the threat of
terminating professional relationship
b. Escrow Account – control of an agent by putting hi salary in a bank to be withdrawn only after a
fulfillment of a condition
c. Blackmail
METHODS OF COVERT INTELLIGENCE
SURVEILLANCE
Surveillance is a form of clandestine investigation which consists of keeping persons, place or other
targets under physical observation in order to obtain evidence or information pertinent to an
investigation. Surveillance of persons is called Tailing or Shadowing, Surveillance of place is called
Casing or Reconnaissance, and Surveillance of other things, events, and activities is called Roping.
Considerations in Surveillance Planning
 Pre-Surveillance Conference – a conference held among the team members, the police intelligence
unit before surveillance is conducted.
 Surveillance Plan – a plan established the as required according to type of personnel, and the
general and specific instructions for surveillance.
 Area Target Study – refers to the area of operation of surveillance activities.
 Surveillant – a person who conducts surveillance with includes only observations.
 Stakeout or Plant – is the observation of places or areas from a fixed point.
 Tailing or Shadowing – it is the observation of a person’s movement.
 Undercover Man – it refers to a person trained to observe and penetrate certain organization
suspected of illegal activities and later reports the observation and information’s that proper
operational action can be made
 Liason Program – the assignment of trained intelligence personnel to other agencies in order to
obtain information of police intelligence value. (Agencies like the press, credit agencies, labor
unions, telephone companies)
 Safehouse – is a place, building, enclosed mobile, or an apartment, where police undercover men
meet for debriefing or reporting purposes.
 Drop – any person is a convenient, secure and unsuspecting place where police undercover men
meet his action agent for debriefing or reporting purposes.
 Convoy – an accomplice or associate of the subject used to avoid or elude surveillant.
 Decoy – a cover supporting the surveillant who can become a convoy whenever surveillant is
burned.
 Contact – any persons whom the subject picks or deals with while he is under observation and
identifies the observer.
 Made – when subject under surveillance becomes aware that he is under observation and identifies
the observer.
 Lost – when the surveillant does not know the whereabouts of his subject or the subject had eluded
the surveillance.
TYPES OF SURVEILLANCE
According to Intensity and Sensitivity
1. Discreet –subject person to be watch is unaware that he is under observation
2. Close – subject is aware that he is under observation varied on each occasions
3. Loose – applied frequently or infrequently, period of observation varied on each occasion
According to Methods
1. Stationary – this is observation of place usually a bookie stall, a gambling, joint, a residence where
illegal activities are going on (fixed position)
2. Moving – surveillance follow the subject from the place to place to maintain continuous watch of
his activities
3. Technical – this is a surveillance by the use of communications and electronic hardware’s,
gadgets, system and equipment
Special Equipment (Technical Supports)
1. Camera with telephoto lens
2. Moving Picture camera
3. Binoculars
4. Tape recording apparatus
5. Wire taping device
6. Other instrument – miniaturized one-way radio
Methods available to employ in Surveillance
Ordinarily, the methods are surveillance of place, tailing or shadowing (1-2-3 man shadow),
undercover investigation, special methods includes: wire tapping - concealed microphones - tape
recorder -television - electric gadgets
Essential Requirements and Appearance in Surveillance
In the actual process of operation, the agent is advised to be of general appearance, has no noticeable
peculiarities in appearance. Agent should not wear inconspicuous jewelry or clothing, nothing about
him to attract attention. He must have perseverance and able to wait for hours. Alertness,
resourcefulness, and being versatile and quick-witted are his weapons.
Basic Preparations in Surveillance
1. Study the Subject – name, address, description, family and relatives, associates, character and
temperament, vice, hobbies, education, others
2. Knowledge of the area and terrain – maps, national and religious backgrounds, transportation,
public utilities
3. Subversive Organization - history and background, biography of the official, identity and
background of members and former members, method of identification employed by the members,
files and records, nature, location and accessibility, meeting
4. Cover Story – the scenario must be appropriate to cover up operation and avoidance of
identification of mission.
Counter Surveillance – the conduct of operation is coupled with counter intelligence measures such
as window shopping, use of convoys and decoys, stopping immediately on blind corners, getting out
immediately on public conveyances, retracing, entering mobile housing
CASING OR RECONNAISSANCE
Casing is the term use in the police organization while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building place or area to determine its suitability for
Intel use or its vulnerability in operations. It aids in the planning of an operation by providing needed
information. It assists the agent handler to install confidence in his agent during briefing phase by
being able to speak knowingly about the area of operation. Casing is also considered a security
measure because it offers some degree of protection for those operating in an area unfamiliar to them.
Method of Casing
1. Personal Reconnaissance – the most effective method and will produced the most info since you
know just what you’re looking for.
2. Map Reconnaissance – it may not sufficient but it can produce a certain amount of usable
information
3. Research - much info can be acquired through research
4. Prior Information – your unit and of the unit will have file report that they may provide you with
info
5. Hearsay –info usually gain by the person operating in the area and performing casing job
OBSERVATION AND DECRIPTION, A.K.A (ODEX)
Observation – a complete and accurate observation by an individual of his surroundings an
encompasses the use of all the major sense to register and recognized its operational or Intel
significance
Description – the actual and factual reporting of one’s observation of he reported sensory experience
recounted by another
Psychologist estimate that approximately 85% of our knowledge is gathered through sight, 13% from
sense of hearing and only 2% through the three other senses
Psychological Processes for accurate observation
 Attention – consist of he psychological process involve in becoming aware of an existence of fact
 Perception – involved in the understanding this fact of awareness
 Report – involved in identifying the name in one own mind and some fact which has been
perceive, narrated and identified
ELICITATION
It is a system or plan whereby information of intelligence value is obtained through the process direct
intercommunication in which one or more of he parties to the common is unaware of the specific
purpose of the conservation. The three phases are determination of the mission, selection of the
subject, and accomplishment of the mission.
Two Devices in the conduct of Elicitation
 Approach – process of setting people to start talking
 Probe – to keep the people taking incessantly
Types of Approach
1. Flattery – people are susceptible to praise so use this weakness as a way of approaching the subject
for elicitation.
a. Teacher – Pupil Approach – the subject is treated as an authority then solicit his view point and
opinion on a subject matter.
b. Kindred Soul Approach – the subject is placed in a pedestal having some specialized quality then
flatter him/her by showing enough concern for his/her welfare to pay special attention to his
enjoyment
c. Good Samaritan Approach – is the sincere and valid offers of help and assistance are made to the
subject
d. Partial – disagreement Approach – seek to produce talking by the word “I’m sure if I fully agree”.
2. Provocative Approach – discover a wide range of conventional gambits
a. Teaser Bait Approach – the elicitor accumulates the sources of knowledge about a particular
subject to tempt the subject to give his/her views.
b. Manhattan from Missouri Approach – the elicitor adopts an unbelievable attitude above anything.
He questions all statements and oppositions.
c. Joe Blow Approach – is “I” know the answer to everything” approach. The elicitor adopts the
attitude of being approachable of any field.
d. National Pride Approach – nature propensity of al persons to defend their country and its policies.
Types to Probe
1. Competition Probe – this is effective when used in connection with the teacher pupil approach
2. Clarity Probe – used to elicit additional information in an area which the response is clear
3. High Pressure Probe – it serves to point out contradictions in what the subject has said
4. Hypothetical Probe – presents a hypothetical situation and to get he subject to react to the
hypothetical situations
Purposes of Elicitation
1. To acquire info which is unbelievable through other channel
2. To obtain info which although unclassified in not publicity known
3. To provide source of info
4. To assist various individuals
PORTRAIT PARLE (P/P)
It is a means of using descriptive terms in relation to the personal features of an individual and it can
be briefly described as a world description or a spoken picture. (Anthropometry - no two human
beings has the same body measurement)
Identification Methods
1. Branding and mutilation
2. Parade system with portrait parle
3. Fingerprint method
Several method of acquiring descriptive ability
1. Learns the meaning of the numerous words used in describing the various features of the persons.
2. Study and practice the description of the features, such as the eyes, hair or the nose as hey appear
on several different persons.
3. Learning a definite order of proceeding from one picture to another
Methods of obtaining descriptive information
1. Close observation of the person and accurate recording of the terms describing the features
2. Information describing through interviews of witnesses
3. Examination of observation of photographs and sketches
4. Examination of records
BACKGROUND CHECKS AND INVESTIGATION
Information needed: Domestic Background, Personal Habit, Business History, Social or Business
Associates, Medical History, Educational Background, Family History
TACTICAL INTERROGATION
The need for obtaining information of the highest degree of credibility taken on the minimum of time
can be through interrogation which varies and dependent entirely on the situation. In tactical
interrogation, familiarization of the following is necessary:
 Interrogation – the systematic asking of questions to elicit information in the minimum of time.
 Interrogator - person who does the questioning.
 Interrogee – any person who is subjected to the interrogation process in any of its forms and
phases.
 Suspect – any person believed to be associated with prohibited activity
 Source – a person who for any reason submits information of intelligence interest usually on a
voluntary basis
 Provocateur – an individual from enemy forces who is deliberately introduce in our custody with a
specific mission of causing some unfavorable action or reaction on our part.
 Screening – initial examination of an interrogee to determine the extent of his knowledge of
persons, places, things or events in which we are interested.
 Formal Interrogation - the systematic attempt to exploit to an appropriate depth those are of he
interrogee’s knowledge which have been identified in the screening process
 Debriefing – the interrogation of a friendly interrogee who has information at the direction of or
under the control of the friendly intelligence service.
 Interview – Similar to a debriefing although it is less formal and the interrogee is not necessarily
under the control or employment of he respective intelligence service
 Interrogation Report – an oral or written statement of information by the questioning f an
interrogee
INTERROGATION TECHNIQUES:
Techniques of Approach – the purpose is to gain the cooperation of the source and induce him to
answer questions which will follows.
1. The “Open Techniques” – the interrogator is open and direct in his approach and makes no
attempts to conceal the purpose of the interrogator. It is best employed when the interrogee is
cooperative. It is frequently used at the tactical level where time is a major interrogator.
2. The “Common Interest” Technique – the interrogator must exert effort to impress the interrogee of
their common interest. The interrogator must look for he point out the real advantages the interrogee
will receive if he cooperates
3. Record File (we know all technique) – the interrogator prepare a file on the source listing all
known information (record should be padded to make it appear to be very extensive). The
information must contain the life history of he interrogee to include his activities and known
associates (Party- bio-data of the interrogee is important). The “we know all” s used in conjunction
with the record file. During the approach, the interrogator may ask the interrogee about a subject, if
he refuses to cooperate, the interrogator may provide the answer in order to impress him that the
interrogator knows him very well (all is known).
4. Exasperation – Techniques (Harassment) – effectively employed against hostile type interrogee.
The interrogator must be alert because the interrogee may fabricate information to gain relief from
irritation (monotype). Subject Interrogee is placed in a longer period of interrogation without rest or
sleep. The interrogator permits the source to go to sleep and subsequently awaken for another series
of questioning (this is done repeatedly). After many repetitions, the interrogee will be exasperated
and will finally cooperate hoping that he can be allowed to rest or sleep. Ask a question, listen to a
reply and then ask the same question repeatedly (use a tape recorder if possible). The purpose is to
bore the interrogee thoroughly until he begins to answer questions freely to end the harassment.
5. Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”, “Bud Guy
– God Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of two (2)
interrogators playing opposite roles.
6. Egotist Techniques (Pride and Ego) – usually successful when employed against an interrogee who
has displayed a weakness or a feeling of insecurity. You may reverse the technique by
complimenting the interrogee in hopes of getting him to admit certain information to gain credit.
Described him as the best person, superior or comrade.
7. “Silent” Technique – employed against nervous or the confident type of interrogee. Look out the
interrogee squarely in the eye with sarcastic smile (force him to break eye contact first). He may ask
questions but the interrogator must not answer. Patience is needed until the interrogator is ready to
break silence.
8. “Question Barrage” Technique (Rapid Fire Questioning) – intended to confuse the interrogee and
put him into a defensive position. The interrogee become frustrated and confused, he will likely
reveal more than he intended, thus creating opening for further questioning.
INTELLIGENCE IN NATIONAL SECURITY
Understanding National Security
National Interest - Each nation, regardless of creed or form, has their national interest to protect and
to advance. For national interests, people would willingly go to war to succeed of perish. What then
is national interest? National interest has been defined in many ways. But for our purposes, we take
the context of national interest to mean the general and continuing end for which a nation acts. The
term “national interest” is used to refer to the general concept of national security and well-being.
National are what the decision-making body in government determines which beliefs, matters or
dictates of conscience are important to the maintenance of the nation. To secure or support national
interest, certain objectives may be set by a nation.
And what are the Philippines national interests? Invariably, our national interest includes self-
preservation, freedom and independence, territorial integrity, political stability, and socio-economic
welfare. National Principles and Polices - From our national interests, national principles and polices
are derived. These are:
a. That our country shall be a Republican State
b. That the defense of the state shall be the concern of all citizens.
c. That we, as a people, renounce war to further our national interests.
d. That our government shall promote social justice.
e. That as a matter of concept, civilian authority is supreme at all times over the military. This
concept is actualized when the President assumes at the same time the position of the Commander-in-
Chief of the AFP.
National Strategy - In furtherance of our national principles and polices, the leaders of our nation are
then able to formulate our strategy.
National Power - How may a nation measures ones power? The elements of national power are
numerical strengths and character of population, cultural development and character of government,
geographical location, resources, economic development and military potential. The degree to which
a nation is strong or deficient in these elements is normally a measure of its national power.
The components of National Power are: Political Strength, Economic Strength, Cultural Strength,
and Military Strength. Political strength stems from the character of the people and from the type and
stability of the government and the soundness of its foreign policy. Economic strength stems from a
combination of factor such as geographic location, climatic conditions, supply of natural resources,
industrial capacity, internal and external communication systems, international trade, and the size,
health and technical competence of the population. Cultural strength stems from the national unity,
the social and moral fiber of the people and the things they believe in, and from the nature and vigor
of national institutions-political, social, religious, educational, scientific and cultural. Military
strength is the ability of a nation to exert pressure by armed force in furtherance of national policy. It
consists of the strength of all the armed forces in combination with other elements of national power,
depending heavily on natural resources, economic strength, a broad base of war industries and a
vigorous population, military strength is influenced by the number and quality of the nation’s
military, economic, and political alliances.

POLICE INTELLIGENCE
AND SECRET SERVICE
“If you know the enemy and know yourself, you need not fear the
result of a hundred battles.”
“If you know yourself and not the enemy, for every victory, you are a fool who will meet defeat
in every battle” - SUN TZU
“Against organized crime, internal affairs
in my defensive arm; Intelligence is my offensive arm.” – W. Parker
Definition of Terms
National Intelligence – the total product of intelligence developed by all governmental agencies
that cover the broad aspects of national
policy and security.
Military Intelligence – it is used in the preparation of military policies, plans and programs. It
includes the strategic and combat intelligence.
Strategic Intelligence – that knowledge pertaining to the capabilities and probable courses of
action of foreign nations.
Combat Intelligence – is required by the commander in order to determine the best use of his
available firepower and maneuver forces, to accomplish his mission, and to maintain the security
of his command.
Counter Intelligence – an integral part of all intelligence operations and as such can’t be
separated from combat and strategic intelligence. Its objective is to safeguard information against
espionage, material and installations against sabotage, and personnel against subversive
Technical Intelligence – concerns foreign technical developments, which have a practical
military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.
Area of Operation – those aspects of the operational environment exclusive of
the military/police forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment of an area in
which military/police operations are taking place or planned.
Capabilities – form a police/military standpoint, enemy capabilities are courses of action which
the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader national
standpoint, capabilities of a nation are the available, workable, courses of action to accomplish
national objectives.
Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it susceptible to any
action, which reduces its war, potential, and or its will to fight.
HISTORICAL FEATURES
MOSES
One of the first recorded formalized intelligence efforts, with format, can also be found in the
Holy Bible Numbers 13:17
“And Moses sent them to spy out the land of Canaan and said unto them, get you up this way
southward, and go up into the mountain; and see the lands, what it is; and the people that dwell
therein, whether they are strong or weak, few or many; and what the land they dwelt in, whether
in tents, or in strongholds; and what land is; whether it be fat or lean, whether there be wood
therein, or not. And be of good courage and bring of the fruit of the land.” The scriptures also
named the twelve intelligence agents whom the Lord directed Moses to sent into the land of
Canaan and records that “all those men were heads of the children of Israel.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN
SHAMMUA THE SON OF ZACCUR – Tribe of Reuben
SHAPAT THE SON OF HORI – Tribe of Simeon
CALEB THE SON OF JEPHUNNEH – Tribe of Judah
IGAL THE SON OF JOSEPH – Tribe of Issachar
HOSHEA THE SON OF NUN – Tribe of Ephraim
PALTI THE SON OF RAPHU – Tribe of Benjamin
GADDIEL THE SON OF SODI – Tribe of Zebulun
GADDI THE SON OF SUSI – Tribe of Joseph, that is from the Tribe of Manasseh
AMMIEL THE SON OF GEMALLI – Tribe of Dan
SETHUR THE SON OF MICHAEL – Tribe of Asher
NAHBI THE SON OF VOPSHI – Tribe of Napthali
GEUEL THE SON OF MACHI – Tribe of Gad
RAHAB
The Harlot of Jericho (Joshua 2:1-21)” who sheltered and concealed the agents of Israel, made a
covenant with the agents and duped their pursuers. She was not only an impromptu confederate
of immense value for the Jewish leader of that far distant day, but also established a plot-pattern
which is still of periodic relief to motion picture producers.
DELILAH
The Philistine used her when she allowed Philistine spies to hide in her house (Judges 16).
Delilah was an impromptu intelligence agent. Apart from her tonsorial specialty, she also
allowed sex to gain intelligence from a powerful enemy. She achieved the largest effective force
of her employer’s adversaries and contriving the stroke which put that force out of action”.
IMPORTANT EVENTS AND PERSONALITIES
IN THE WORLD OF INTELLIGENCE
Sun –Tzu
A Chinese philosopher, creator of the “The Art of War”
“Information must be obtained from men who knew the enemy situation.”
“Know thy enemy and know yourself, you need not fear the results of a hundred battles”
“If you know yourself and not the enemy, for every victory, you are a fool who will meet defeat
in every battle.”
Alexander the Great
When Alexander the Great was marching to Asia, were rumors of disaffection growing among
his allies and mercenaries, he sought the truth, and got it by simplest expedient by devising the
first “letter sorting” and opening to obtain information.
Sertorius
He was the Roman Commander in Spain who possessed a White Fawn and allowed it to become
widely known - that he derived secrets and guidance from the fawn. His intelligence agents
credited their information to the supernatural power of animals.
Akbar
He was known to be the sagacious master of the Hindustan. He employed more than 4,000
agents for the sole purpose of bringing him the truth that his throne might rest upon it.
Genghis Khan
He was known “The Great Mongol”, who used intelligence to conquer China and invade Cathay.
He instructed his Generals to send out spies and used prisoners as sources of information. The
leader of the so-called MONGOL CONQUERORS - made use of effective propaganda machine
by spreading rumors of Mongol Terror, they collected information on weaknesses and rivalries
of Europe. The leaders usually disguised as merchants.
RENAISSANCE PERIOD
With the rise of Nationalism and development of modern armies, intelligence became apparent to
large states. In England, Sir Francis Walsingham, under Queen Elizabeth, organized the first
National Intelligence Service. He employed spies on the staff of the Admiral in Command of the
Spanish Army and able to obtain information regarding Spanish Army as to their ships,
equipment, forces and stores. He protected Queen Elizabeth I from countless assassins.
In France, Richlieu – introduced the network of covert collectors who transmitted prompt and
accurate information to Paris regarding the activities of the rebels and dissidents of the kingdom.
Louis XIV – systematized political policy, continuous surveillance, postal censorship and
military intelligence organization were his contributions.
The French Intelligence System continued since 15th Century.
Napoleon Bonaparte once said, “One Spy in the right place is worth 20,000 men in the field”. He
organized two Bureaus of Interest: Bureau of Intelligence – which consolidate all incoming
information regarding the enemy for presentation to the emperor and to obtain information as
desired, and Topographic Bureau – which maintains a large map which covers the latest
information regarding both enemy and friendly forces. He maintained Military Intelligence and
Secret Political Police Service all over Europe. His main arm was “Spy against spy” concept.
Frederick the Great
He was known as the “Father of Organized Military Espionage”
He has divided his agents into four classes:
Common spies – those recruited among poor folk, glad to earn a small sum or to accommodate
as military officer.
Double spies – are unreliable renegades, chiefly involved in spreading false information to the
enemy.
Spies of Consequences – couriers and noblemen, staff officers, and kindred conspirators,
requiring a substantial bribe or bait,
Persons who were forced to undertake espionage against their own will.
Hannibal
He was considered one of the brilliant military strategists in the history of military intelligence.
He had developed an effective intelligence system for 15 years in Rome. He usually roam around
the city often disguise himself as a beggar to gather first hand information.
Julius Caesar
During his time, the staff of each Roman Legion includes ten “speculators” who served as an
information-collecting agency. The “speculators” were the first intelligence personnel to appear
definitely in a military organization. Military success of the Romans was aided by
communication system. Made use of carrier pigeons, which made possible the amazing speed
with which intelligence of Imperial Rome was transmitted. They also employed ciphers to ensure
secrecy of communications.
George Washington
Conspirator under oath abounds in the history of every nation. George Washington was grand
master in intelligence. He mobilized the Free Masons of the colonies at the outbreak of the
American war of Independence.
Karl Schulmeister
He was Napoleon’s eye, Napoleon’s military secret, born on August 5, 1770. He began his career
in offensive espionage under a cover role. He was able to infiltrate the Austrian General Staff.
Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further device military
censorship and organized military propaganda. He introduced military censorship and organized
military propaganda. He works as a census taker and developed informal gathering of data.
Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he became Chief of
the Austro – Hungarian Secret Service. He became a double agent of Russia.
Brahma Kautilya
In Ancient India, he overthrew the Nanda Dynasty and established the first MAYURYAN king
in the Indian throne. He recommended to his king that for the ruler to succeed, the ruler should
strike at his enemy’s weak points by means of spies. He proposed the following means to
conquer enemy’s stronghold: Intrigues and spies - Winning over enemy’s people - Siege and
assault - Before beginning military operation, a conqueror should know the comparative strength
and weaknesses of himself and his enemy. No war should be undertaken without careful
examination of all factors reported by the kings’ spies.
Maj. General Donovan
He was the organizer of the OSS, builder of a central intelligence system - OSS whose exploits
become legendary in World War II.
V2 – Rackets - OSS agents working in conjunction with the British Intelligence, through
penetration and technical intelligence discovered Punemundo which was the V2 guide missile
research project of Nazi Germany. It resulted to its destruction and heavy bombing.
Battle of Midway
In June 1442, the turning point of the Naval in the Pacific, the victory gained by the Americans
was due to the disrupted messages from the Imperial Japanese Navy.
Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of the U.S. Navy Communications Intelligence intercepted
a top-secret signal relaying the travel of the Admiral. En route, he was intercepted and crashed in
the Jungles of Baungainville.
State Informer
Edward I, King of England in 1725 organized a systematic police system so called Witch and
Ward. By Royal proclamation, the profession “State Informer “was created in 1734 enjoining all
informers to expose criminal activities and be compensated.
Joseph Fouche
“Father of Police Intelligence Operations”. A Frenchman born in 1759, rose to become the most
feared and respected intelligence director in French history. He created a network of agent. His
assistance founded the modern system of spying on spies, which later was known as counter
espionage.
Joseph Petrosino
He was member of the New York Police Department in early 1900, he was the head of the Italian
Squad. Through extensive intelligence network, he was credited to smash and neutralization of
the Black Society.
Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of Justice and became
what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On September 6,
1939 by a presidential directive, it came to its responsibility the task of a domestic intelligence.
Central Intelligence Agency - The agency was created under the US National Security Act of
1947. It was the Central Intelligence group established during the time of President Truman in
January 1946. The CIA was under the National Security Council.
Committee for State Security - Russia - The Intelligence agency known as the KGB - Komitet
Gosudarstvennoy Bezopasnosti (KGB)
British Secret Service – Great Britain
Mossad – Israel
Britain: Scotland Yard, London Metropolitan Police Force
It was established by Sir Robert Peel in 1829 which signaled the beginning of a colorful
legendary police force and considered one of the most efficient in the world today.
WORLD WAR 1
1900 – Europe powers developed modern staff systems and place intelligence on the same level
with personnel, operations and logistics. Intelligence then functioned in time of peace and war.
Intelligence during this period, concentrated on information about the armed forces of the enemy
and their capabilities. AIRCRAFT was introduced as a method of conducting aerial
reconnaissance. WIRELESS TELEGRAPH was used wherein CODES AND CIPHERS were
applied. ARMY INTELLIGENCE rapidly expanded during this period.
GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness throughout
Europe but declined at the outset of the war.
BRITISH INTELLIGENCE – succeeded greatly by means of censorship and its CODE ROOM
combined with skillful use of COVERT agents.
US expanded their NAVAL INTELLIGENCE wherein DOMESTIC
COUNTERINTELLIGENCE became a principal activity. At this time US created three branches
of its Intelligence System: POSITIVE BRANCH – function of collecting evaluating and
disseminating intelligence. Prepare situation estimate and translate documents; NEGATIVE
BRANCH – it is the counterintelligence functions which involve in investigating disloyalty and
sedition, investigate enemy activities, investigate graft and fraud in organization;
GEOGRAPHIC BRANCH – Produces maps, photographs, and terrain studies. SECTIONS -
Administration, Collection by attaches and troops, Codes and ciphers
WORLD WAR II
GERMAN INTELLIGENCE – started the war with the world’s best organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer Group wherein they
subordinated intelligence to operation and did not regard intelligence assignment worthy of a
soldier.
JAPANESE INTELLIGENCE – failed because it was not provided with sufficient number of
trained personnel to assemble and evaluate the mass of materials which were collected although
Japanese Intelligence was involved in short war and defensive in nature.
BRITISH INTELLIGENCE – the delay in the use of German V-BOMB against them was their
main achievement during this time.
In 1942 – a female special agent was able to transmit vital information concerning the activities
and installations of the main research station at Penemuenda. Its intelligence failed in the defeat
of GENERAL MONTGOMERY’S forces at ANNHEIM.
US INTELLIGENCE – In 1941, The US Strategic Service was established to research and
analyze military, political and economic information as it affected the security of the country. US
JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the navy in the
collection and analysis of strategic information and to be responsible for the planning and
operation of special services. US greatest contribution to intelligence was the development of the
AMPHIBIOUS WARFARE where coordination of many types of intelligence activities was
required to provide adequate knowledge of the successful operation of a complex military force
transported over water with the objective of establishing itself on an enemy – held shore against
opposition. US successes in WW II were based on personnel drawn from CIVILIAN
POPULACE, BUSINESS AND PROFESSIONAL MEN AND WOMEN.
CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police to conduct
espionage and counterespionage against Japanese Spies and Chinese communist.
SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union.
SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence
concerned with disaffection among Soviet troops and anti-communism in any form. Its five
major divisions are: Administration, Operation, Investigation, Prosecution, and Personnel.
POST WAR PERIOD: The superpowers
Soviet Intelligence System
SOVIET COUNTERINTELLIGENCE known as “IRON CURTAIN” signified that no one may
cross the borders of the USSR without being detected. This means that all communications are
rigidly controlled. Its contribution to modern intelligence was the dissemination of false
information designed to mislead and confuse opponents and prospective victims. The MGB –
MILITARY INTELLIGENCE AND THE MINISTRY OF STATE SECURITY formerly NKGB
was concerned on political espionage and propaganda abroad and for the control of espionage
activities of foreign communist countries. The KGB resumed the former function of the old
MGB. It is now the official secret police agency of the Soviet Union, in charge of the state
security KGB means (Commission of State Security) K- Omissija G- Osudarstyennoj B –
Ezopasnosti or Komitet Gosudarstvennoy Bezopasnosti
British Intelligence System
It is composed of several intelligence agencies such as the BRITISH MILITARY
INTELLIGENCE DIVISION (MID) which is divided into 20 different departments. The M15 –
devoted to counterespionage and security. It is the special branch of the SCOTLAND YARD
charged with guarding the Royal Family and important British officials and Visiting Foreign
Dignitaries.
French Intelligence System
The SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE ESPIONAGE
(SDECE-FOREIGN Intelligence and counterintelligence Service) was under the office of the
Prime Minister. GENERAL CHARLES DE GAULLE set up the Bureau Central de
Renseignements et d’ Action (BCRA Central Office for Intelligence and Action in London in
1940. It is an expansion of the Service De Reassignments (SR-Intelligence Service which is a
part of the Old Renzieme Bureau (Second Bureau) of the French General Staff. SDECE
concerned on Strategic and Counterintelligence while SURETE NATIONALE became part of
French Intelligence Service.
German Intelligence System
The RED GESTAPO which serves as security service organized by East Germany to combat the
covert activities of West Germany Group when Germany was still divided by the Berlin Walls.
United States Intelligence System
The CIA and the FBI – the CIA is one among the biggest in the world in terms of intelligence
networking. CIA and the FBI and the other state/ federal units of intelligence services were US
main intelligence agencies.
Agents of Betrayal
Intelligence is sometimes described as a “world of deceit and betrayal”. Some of the high
personalities which evidence this description are:
JUDITH COPLON, a political analyst of a Department of Justice, was accused of taking
unlawful possession of government documents and spying for a foreign power.
DR. EMIL JULIUS KLAUS FUCHS was accused of releasing American Atomic Secrets to the
Soviet in 1945 and to the British in 1947. He detailed knowledge of the construction of atomic
bombs.
ERNST HILDING ANDERSON was a Royal Swedish Navy who provided military secrets to a
foreign power and was found guilty and sentences to life imprisonment in 1951.
ESSENTIAL INTERESTS IN INTELLIGENCE
Intelligence Defined
Webster defines intelligence as the capacity for understanding and for other forms of adaptive
intellect of behavior; the mind in operation; the power of meeting any situation, especially a
novel situation, successfully by proper behavior adjustments; the ability to apprehend the
interrelationships of presented facts in such a way as to guide action towards goal; knowledge of
an event, circumstances, etc., received or imparted; the gathering or distribution of information;
the staff of persons engaged in obtaining such information.
Base on Psychology- Intelligence is the capacity of a person to adjust to new situations through
the use of what has been previously learned.
According to Government - Commission Task Force - It means the collection, processing,
collation, interpretation, evaluation and dissemination of information, with references to national
security. In certain context, it may also mean the network or the system for the collection,
collation, interpretation, evaluation, processing, and dissemination of information. “The term as
used here doesn’t include any police powers or authorities, any investigative function other than
those involve in the collection of information nor any function involved in the enforcement of
laws, orders, or regulation.
According to Military Terminologies - Intelligence is the end product resulting from the
collection, evaluation, analysis, integration and interpretation of all available information which
my have immediate or potential significance to the development and execution of plans, policies
and programs of the users.
According to Police Parlance - The end product resulting from the collection, evaluation,
analysis, integration and interpretation of al available information regarding the activities of
criminal and other law violators for the purpose of affecting criminals and other law violators for
the purpose of affecting their arrest, obtaining evidence, and forestalling plan to commit crime.

The Principal Areas of Interest


Military – offensive and defensive tactics, war plans, strategic concepts and tactical principles,
organizations, installations, industrial lease, armed forces, command structure, command
personnel, material, tactics, morale,
General – topographical and hydrographic characteristics, historical backgrounds
Diplomatic – foreign policies, alliances, diplomatic establishment, foreign service personnel,
technique of conducting foreign relations
Political – ideology, traditions, institutions, personalities, area of friction
Communications and Transportation – telephones, telegraphs, wireless, railways, shipping,
automobiles and trucks, highways, aviation, ownership, policies, organization, personnel
Social – nationality structure, classes and caste, historical factors, census, personal aspects,
characteristics and mentality of people forces, social legislation, radio, television, press, motion
picture
Intelligence – organizations, methods and personnel of competing intelligence system
Economic - On economics, the areas are on:
Financial – Monetary policies, Currency structure, Transactions, Institutions, Personalities
Commercial – trade policies, markets, trading methods, price policies, personalities
Industrial – structure of Capacity, manufacturing plants and processes, raw material, energy
rotations, labor relations, personalities
Mining – Mineral Resources, Production method, Output
Agriculture – policies, crop structure, cultivation method, mechanization, financing, specific
characteristics of rural population
Principles of Intelligence
Objectivity - in intelligence, only the well guided succeed. It is a basic intelligence concept that
there must be unity between knowledge and action. It follows therefore that intelligence should
interact and condition the decision. Intelligence must be adapted to the needs of the decision; it is
both giver and taker. Action or decision is planned by knowledge and guided by it at every step.
Interdependence - Intelligence is artificially subdivided into component elements to insure
complete coverage, eliminate duplication and to reduce the overall task or manageable sizes.
Nevertheless, each subdivision remains as essential part of unity; contributes proportionately to
the end result; possesses a precise interrelationship; and interacts with each other so as to achieve
a balanced and harmonious whole.
Continuity - Intelligence must be continuous. It is necessary that coverage be continuous so that
the shape of what happens today could be studied in the light of what happened before, which in
turn would enable us to predict the shape of things to come.
Communication - Intelligence adequate to their needs must be communicated to all the decision
makers in manner that they will understand and form that will permit its most effective use.
Usefulness - Intelligence is useless if it remains in the minds, or in the files of its collectors or its
producers. The story must be told and it must be told well. The story must be convincing and to
be convincing it must not only be plausible or factual but its significance must be shown.
Selection - Intelligence should be essential and pertinent to the purpose at hand. Intelligence
involves the plowing through a maze of information, considering innumerable number of means
or of picking the most promising of a multitude of leads. The requirement of decision-making
covers very nearly the entire span of human knowledge. Unless there is selection of only the
most essential and the pertinent, intelligence will go off in all directions in one monumental
waste of effort.
Timeliness - Intelligence must be communicated to the decision maker at the appropriate time to
permit its most effective use. This is one of the most important and most obvious, for
Intelligence that is too soon or too late are equally useless. Timeliness is one principle that
complements all the others.
Security - Security is achieved by the measures which intelligence takes to protect and preserve
the integrity of its activities. If intelligence has no security, it might be as well being run like a
newspaper to which it is similar.
General Activities
Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with
little practical immediate operation value.
Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary
for more effective police planning and operation.
National Intelligence - it is the integrated product of intelligence developed by all the
governmental branches, departments concerning the broad aspect of national security and policy.
It is concerned to more than one department or agency and it is not produced by single entity. It
is used to coordinate all the activities of the government in developing and executing integrated
and national policies and plans.
Counter-Intelligence – phase of intelligence covering the activity devoted in destroying the
effectiveness of hostile foreign activities and to the protection of info against espionage,
subversion and sabotage.
Undercover Work – is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of determining the
nature and extent of any criminal activities that maybe contemplating or perpetuating.

4444
12 Comments
40 Shares
Like
Comment
Share

You might also like