You are on page 1of 31

Introduction to Intelligence

In this world, the importance of intelligence has become


increasingly emphasized. It is important that we gain an understanding
of the nature and scope of intelligence and its implications in this
time.
Intelligence and the need for intelligence is far from new.
However, these days of rapid communications, more powerful weapons,
ideological hot, warm and cold war emphasize the need for rapidly
acquired and processed accurate and detailed intelligence, timely, of
life and freedom which is valued so clearly.

History of Intelligence

1. Holy Bible- is here you can find the just recorded intelligence
operations in history.
Moses-One of the first recorded formalized intelligence efforts,
with format, can be found in the
The scripture also named the 12 intelligence agents when the Lord
directed Moses to send into the Land of Canaan and records that “all
those men were heads of the children of Israel”.
a. Rehab- “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered
and concealed the agents of Israel, made a covenant with the agent sand
duped their pursuers. She was not only an impromptu confederate of
immense value to the Jewish leaders of that far-distant day, but also
established a plot- pattern which is still of periodic relief to motion-
picture producers.
b. Delilah- a Palestine agent who used her charm to gain
information from the powerful enemy.

2. Sun Tzu- a Chinese-“Father of Intelligence” philosopher, in his book


“PING FA” (Art/Principles of War) - the earliest known textbook on the
art of general warfare- once said; “If you know your enemy and know
yourself, you need not fear the result of a hundred battles. If you know
yourself but not your enemy, for every victory, you will suffer defeat.
If you know neither yourself nor your enemy, your are a fool who will
meet defeat in every battle.”
Its lessons were applied by Mao- Tse-Tung during the long march and
by the Japanese prior to Pearl Harbor.
Sun Tzu believed that to wage war economically while defending the
state against other, it was necessary to employ a permanent espionage
service spying on neighbors and enemies.
Sun Tzu introduced a rigid hierarchy of spies to include local
spies, internal spies, converted spies and condemned spies.
Captured agents should be treated with benevolence, tempted with
bribes, led away and comfortably housed. He realized that if such mean
could be turned they would be in position to report on their previous
master strengths and weaknesses.
Condemned spies were less fortunate; Unknown to them they were fed
completely false information by Sun Tzu’s agents, sent into enemy
territory and if necessary compromised. When they were captured and
tortured, the information that they were able to divulge was wholly
incorrect, leading the enemy to miscalculate his response. When the
enemy learned of his mistake the spy was put to death, but by then it
was often too late.

3. Alexander “The Great”- Under the tutelage of Aristotle, Alexander the


Great King of Macedonia, became the first ruler to utilize intelligence

1
as a weapon of government. He divided a simple but highly effective
system of covert ciphers.
He introduced a primitive form of “Cabinet Noir” (Internal
Monitoring) when he instigated postal censorship into the army and
investigated letters and malcontents.

4. Belle Boyd-The daughter of Shenandoah Valley. She spied for the


Confederacy.
Belle became a confederated courier running messages and medicines
through the Union lines. She traveled far into the enemy lines and
beyond occasionally bringing back intelligence of the greatest
timeliness and importance. Belle’s greatest failings were her extrovert
nature and her love of publicity. She talked incessantly about her
exploits to reporters and allowed herself to be a celebrity of the
south. Eventually late in the war, Union authorities lost patience with
her and had her deported to Canada. Her biographer described her as the
most famous woman concerned with official secret activities in the Civil
War.

5. Sir Francis Walsingham of England- He was credited with creating the


first viable secret service in England. He protected Queen Elizabeth I
from countless assassins.

6. Lord Baden – Powell- Known as the founder of the Boy scout Movement
and was also active spy. Baden- Powell exploited his powers of tracking
and observation, coupled with his considerable skills as a Thespian, to
the benefit of the British Secret Service.

Subsequently, when ordered to investigate a rumor that a large dry dock


was being constructed in Hambur, he posed as a drunk, saturating his
clothes in brandy to enhance the effect. He was swiftly arrested by the
German military, but believing him to be too drunkard incapable of
finding out any secrets, they released him.

7. Mata Hari (1876-1917) - Ironically, Mata Hari is one of the best


known spies in history, yet she was one of the worst.

When World War I broke out, Mata Hari was in Berlin, where she had
recently befriended the Chief of police, who subsequently enlisted her
into the ranks of the German Secret Service. She carried on her life as
before dancing naked on the stage and dispensing her services liberally
to those who could afford her.

8. Sertorius- When Sertorius was the Roman Commander in Spain he was,


according to Polyaenus, the possessor of a white fawn that he trained to
follow him every where. This little fawn was taught to approach at a
given signal, and Sertorius himself the signal, when about to pronounce
his decision in judicial cases. The fawn appeared to convey information
to the Roman general; and Sertorius allowed it to become widely known
that he derived both secrets and guidance from the fawn. His
intelligence agents meanwhile, were everywhere active and all that they
learned was credited to the supernatural powers of the animal.

9. Frederick “the Great”


The “Father of Organized Military Espionage”.
10. Hannibal- Hannibal’s invasion of Italy, the most brilliant and
futile raid in history, gained him victories and nearly bleed Rome to
death, but the mere slaughter of Romans and a great city’s despair would
not have sustained him for fifteen years if he had not also made

2
powerful allies and developed an excellent intelligence system. He
often dressed as a beggar and went into the streets of Rome.

11. Schulmeister, “Napoleon’s Eyes”- He is Napoleon’s military secret


service.

12. Wilhelm Stieber- He made two major contributions to the sequence of


military intelligence, namely military censorship and organized military
propaganda.

13. Alfred Red- One of the most brilliant intelligence agents, though he
was a homosexual. He rose to become chief of the Austro- Hungarian
Secret Service, or in other terms, director of their military
intelligence system. For more than half of his time as director of
intelligence, Red was acting as an intelligence agent of Russia.

Some Intelligence Units


1. CIA- Central Intelligence Agency- Military intelligence agency of
United States of America and engaged in many undercover activities
throughout the world.
2. KGB- Komitet Gusodarstevenoy Bezopasnosti- Russia
3. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim M-eyudim)-“ Central
Institute for Intelligence and Security”- Israel
4. SIS- Secret Intelligence Service- Great Britains intelligence agency
and also known by its wartime designation, “MI6”, equivalent to US’s
CIA, in charge with gathering information overseas and with other
strategic services ranging from foreign espionage to covert political
intervention.
5. SDECE- (Secret de Documentation Exterieure et Contre- Espionage)-
France
6. SAD- (Social Affairs Department)- China
7. FBI- Federal Bureau of Investigation- its primary role is counter
intelligence limited to internal security within the United States of
America.
8. “MI-5” - Great Britain’s civilian intelligence agency for internal
counter intelligence, equivalent of US’ FBI and equivalent to
Internal Security Section of Russia’s KGB.
9. NICA- National Intelligence Coordinating Agency- Philippines

Col. Rudolph Abel - (Russian) - was probably the highest ranking and
most successful spy whoever infiltrated the United States.

Mathew Cevetic- a famous undercover assignment of FBI infiltrated the


communist party.

Definition of Intelligence:
a. First, Mr. Webster defines intelligence as:
1. Capacity for understanding and for other forms of adaptive
intellect of behavior; the mind in operation.
2. The power of meeting any situation, especially a novel
situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to
guide action toward goal.
3. Knowledge of an event, circumstances etc., received or imparted;
the gather or distribution of information; the staff of persons engaged
in obtaining such information.

b. In Psychology text:
Intelligence is the capacity of a person to adjust to new
situations through the use of what has been previously learned.
3
c. From a government Survey Reorganization Commission Task Force
Investigation Intelligence activity in the Philippines define
Intelligence as:
It means the collection, processing, collation, interpretation,
evaluation and disseminating of information, with reference to national
security.

Principles of Intelligence
a. The Principle of Objectivity/Objectiveness
1. Intelligence must be based on the decision-makers own plans and
intentions as much as on consideration of the intelligence targets.
2. In intelligence, only well guided will succeed.

b. The Principle of Interdependence (Mutually dependent)


Operation and intelligence planners work hand and hand to attain a
greater degree of success in their common effort. This goes also to
logistics, personnel, plans/programs, training and budget.

c. Principles of Continuity
It simply means that information, events, and reports must be
continuous and intelligence activities follow a simple continuous
intelligence cycle.
Intelligence coverage must be continues so that the shape of what
happened today could be studied in the light of what happened before,
which in turn would enable to predict the shape of things to come.

d. Principle of Communication
Intelligence adequate to their needs must be communicated to all
the decisions makers in a manner that they will understand and inform
that will permit its most effective use. Intelligence is useless if it
remains in the minds, or in the files of its collectors or its
producers.

e. Principle of Selection
Intelligence should be essential and pertinent to the purpose at
hand.

f. Principle of Timeliness
Intelligence must be communicated or must be available on time to
the decision maker to permit its most effective use.

g. Principle of Usefulness (Use)


Intelligence must be adequate for the purpose for which it will be
utilized.

h. Principle of Flexibility

i. Principle of Security
Security is achieved by measures which the intelligence takes to
protect and preserve the integrity of its organization personnel,
method, sources, information and results of its activities.

j. Principle of imagination and foresight


The operator and the agent must be given the leeway to use his
resourcefulness to obtain more than what is normally required.
Concept and Classification of Intelligence
1. Intelligence as a process- is an activity which treats, processed
information as a basis for departmental policy and decision- making.

4
2. Intelligence as an organization- It is an institution composed of
persons who pursue a social kind of knowledge for the purpose of
planning the collection of information, processing and dissemination of
intelligence relating to the area of interests.

Intelligence Axioms:
1. Intelligence is crucial
2. Intelligence is essential to operations
3. Intelligence is a responsibility of all government operations.
4. Intelligence of the government should be superior to that of the
enemy.

The four (4) I’s of Intelligence


1. Interest
2. Integrity
3. Ingenuity
4. Intelligence

Three Broad Categories of Intelligence

1. National Intelligence- Integrated products of intelligence developed


by all government department concerning national policy and national
security. It is the total product of intelligence division by all
agencies to coordinate the activities of governmental policies.
2. Department Intelligence- It is a type intelligence required by an
agency or department of the government in order to execute its
mission and responsibilities.
3. Military Intelligence- Is a type of intelligence used in the
preparation and execution of military/ police plans, programs and
policies.

Military and Police Intelligence

Police Intelligence- Are evaluated and interpreted information


concerning organized crime and other major police problems. It is an end
product resulting from collection, integration, collation and
interpretation of available information which concerns one or more
aspects of criminal activity significant to police planning and
operations.

Types of Police Intelligence

1. Strategic Intelligence- Intelligence information which is primarily


long- range in nature with little or no immediate practical value.
2. Counter Intelligence- It deals with defending of the organization
against it criminal enemies (Defensive Effort)
3. Line Intelligence(combat)- The type of intelligence which is of an
immediate nature and necessary for more effective planning and
operations.(Offensive Effort)

Forms of Police Intelligence


1. Overt- When the information or documents are procured openly without
regard as to whether the subject of investigation becomes
knowledgeable of the purpose or purposes for which it is being
gathered.
2. Covert- When the information is obtained without the knowledge of the
person against whom the information or documents may be used.
3. Semi Overt/ Covert- When the information is obtained from open
sources but the person against whom the said information will be used
do not have any knowledge about it.
5
Purpose of Police Intelligence
1. Check the condition of the community relating to crime, vice,
juvenile delinquency and indications of subversion and insurgency.
2. Determine through counter intelligence application matters pertaining
to personnel security, physical security and document security of the
police organization.
3. Determine the follow-up leads and helps in the solution of individual
criminal cases.
4. Identify criminal elements and other lawbreakers as well as their
associates.
5. Assist in the arrest of wanted criminals.
6. Check on the quality and effectiveness of the operation of the PNP
force.
7. Check on the security conditions of police personnel, funds,
equipment and materials.
8. Help in crime control and prevention.
9. Serve as tool to management for planning and organizational
improvement purposes.

Military Intelligence- It is evaluated and interpreted information


concerning an actual or possible enemy or treat operations including
Weather and Terrain, together with the conclusions withdrawn there from.

Types of Military Intelligence

1. Strategic Intelligence- is a type of intelligence which pertains to


the capabilities, vulnerabilities, and probable course of action of
foreign nations.
Components of Strategic Intelligence
a. Political Intelligence- deals with the domestic and foreign
relationships of government operation.
b. Economic Intelligence- deals with the extent and utilization of
natural and human resources to the industrial potential nation.
c. Transportation and Communication Intelligence- concerned with
operation and facilities not only the military but also the
civilians.
d. Sociological Intelligence- deals with the demographic and
psychological aspect of groups of people.
e. Biographical Intelligence- deals with the individual
personalities having actual possession of power.(Scientist)
f. Armed force Intelligence- deals with the Armed Forces of the
nation.
g. Geographical Intelligence- deals with the natural as well as man
made features of physical environment of man considered from the
point of view of military operation.
h. Scientific Intelligence- deals with the progress of research and
development as it affects the economic and military potential of a
nation.
2. Combat Intelligence- is a type of intelligence use in planning and
conducting tactical and administrative operations, concerning the
weather, enemy, terrain and logistics. It provides the commander with
information and conclusions concerning the area of operations, enemy
capabilities and vulnerabilities in order to determine their probable
effect on his course of action.
Combat intelligence is required by the commander in order to
determine the best use of his available firepower and maneuver forces,
to accomplish his mission, and to maintain the security of his command.

6
Area of Operations- Those aspects of the operational environment
exclusive of the military forces involved. It concerns weather, terrain,
economics, politics, sociology, hydrography (seas, lakes, rivers) and
characteristics of the environment of an area in which military
operations are taking place or are planned.

Capabilities- Strengths
Vulnerabilities- Weaknesses

What are the intelligence information to be determined?


a. People (living conditions, sources of income, education of the
people, livelihood, extent of enemy influence)
b. Weather( Visibility, Cloudy, temperature, rain, wind)
c. Enemy (location, strength, tactical capability, enemy
vulnerability)
d. Terrain (relief and drainage system, obstacle, critical terrain
features, observation and fields of fire)

Five military aspects of Terrain


1. Cover and concealment
2. Obstacle
3. Critical terrain features
4. Observation and fields of fire
5. Avenues of approach

3. Counter Intelligence- It is an intelligence activity which concerns


principally with the defending the organization against penetration of
individual or various groups who are inimical to the best interest and
general harmony.
They are actions taken to deny information to the enemy or deny
access of information to the enemies.
Counter intelligence is “Security Consciousness” in the handling of
classified and sensitive documents and added to this are the active
physical means.

Who is responsible for counter intelligence measure?


The “station commander” is responsible for C.I measure which
includes safeguarding of information, personnel, equipment and the
installation itself.

Objective of Counter- Intelligence


1. Prevent enemy sabotage and subversion
2. Security of the Command
3. Denies knowledge to the enemy
4. Aids the activities in achieving surprises.
5. Detect possible disaffection, treason, sedition, with the
military or police forces

Two (2) General Types of Counter- Intelligence (Two Measures)


1. Active counter measures-those measures which seek to actively
block the enemy’s effort to gain information or engage in
espionage.
2. Passive Counter measures- those measures which conceals
information from the enemy.

7
Five Categories of Counter- Intelligence
1. Military Security- Encompasses the measures taken by the command to
protect itself from espionage, enemy observation, subversion, sabotage
or surprise.
2. Secrecy Discipline- Special safeguarding of classified military
information and equipment
3. Civil security- encompasses active and passive counter- intelligence
measures affecting the non- military national permanently or temporarily
residing in an area under military jurisdiction.
4. Censorship- control and examination of communication to prevent
information being transmitted to the enemy, collection and dissemination
of the military commander. Surveillance of communications such as
correspondence, telephone, news dispatches, motion pictures, and radio
broadcast to prevent information of military value from reaching the
enemy.
5. Port and Travel security

Counter Intelligence Measures to Protect Information


1. Social Investigation- is an abbreviated and limited form of area
study some in the context of strategic intelligence and focused
primarily on the psychological factor that will influence the
organizational efforts that is a part of strategic campaign plan.

2. Security Survey/ Inspection


Security Survey- is a counter- intelligence service conducted in
order to assist the chief of office in determining the security measures
required to protect key installations from possible sabotage, espionage,
subversion and unauthorized disclosure of or access to classified
defense information or materials.
Security Inspection- is a counter- intelligence service conducted
in order to determine degree of compliance with established security
policies and procedures.

3. Security- is the protection of classified information, materials and


equipments from disclosure to unauthorized person and the protection of
defense installations and equipments from damages or destruction by
sabotage.

Security Measures:
1. Active control measures- to actively block the enemy effort to
gain information.
2. Passive control measures- to conceal information from the enemy.
3. Deception measures- to deceive the enemy.

Three (3) Security Concepts:


a. Personnel is the weakest link in the security chain.
b. Training is important to make security personnel conscious and
realize the value of security.
c. Training is necessary for the practice on “need to know”.

Types of Security Measures:


A. Physical Security- A system of barrier placed between the potential
intruder and the material to be protected.

Physical Security Features


1. Natural Barriers
2. Human Barriers
3. Animal Barriers
4. Energy Barriers Ex: Protective alarms system and Protective
Lighting system.
8
5. Structural Barriers- Ex: wall, fences, or blocks.

B. Personnel Security- Includes all security measures designed to


prevent unsuitable individuals of doubtful loyalty to the Philippine
government from gaining access to classified matter or security
facilities and to prevent the appointment, employment or retention as
employees of such individuals.

Types of Security Clearance:


1. Interim- is a temporary clearance given to an individual while
Partial Background Investigation (PBI) is still going on.
2. Final Clearance- is given to an individual whose PBI is
completed. (Complete Background Investigation “CBI”)

Definition:
1. Character- a trait or sum of traits which serves as an index to the
essential or distinctive nature of a person.
2. Derogatory Information- Information which reflect unfavorable on the
character, integrity or reliability of an individual.
3. Discretion- ability of tendency to act or chooses with prudence; the
habit of wise judgment and sagacity or simply stated judgment.
4. Loyalty- the faithful and true allegiance to the Philippine
Government and its constitution.
5. Moral- principle or standard of conduct of an individual, his ethical
judgment in human relation and respect for superior.
6. Moral Turpitude- acts contrary to justice, honesty or modesty or good
moral.
7. National Security- the state or condition under which the nation can
pursue its national objectives without interference.
8. Security Risk- Any person whose character, activities or
circumstances in life might place him in a position where wittingly or
unwittingly would compromise the security or classified matters.

C. Operational Security
It is the measures taken in conducting operations or activities in a
secure and efficient manner.

D. Communication Security
It is protection resulting from all measures designed to deny
unauthorized persons information of value which might be derived from
the possession and study of telecommunications or to mislead
unauthorized persons in their interpretations of the result of such a
study.

Fundamental of Cryptography Encoding and Decoding

Cryptography- it is the study or science of encoding information in the


form of codes and ciphers.
The art of writing in or deciphering writings or method of
rendering plain text intelligible and recovering intelligence text into
plain text.
Cryptology- Secret writing
Cryptograph- Convert the plain text of message into cryptogram while
Decryptograph is to reconvert cryptogram into its equivalent plain text.
Cryptographer- a person who writes in or deciphers secret writing.
Codes- is a system in which arbitrary group of symbols representing a
unit on a plain text with varying length.
Ciphers- is a system in which an individual letters of a message are
represented by other letters rather than by a complete words, phrases or
sentences.
9
Encrypted Message Ex: “BT”. (Begin transmission)

E. Document Security- Handling and use of classified information and


document.

Document- is any recorded information regardless of its physical form or


characteristics.

Four Classified Matters


1. Top Secret (Green Color code)
Any information and materials, the authorized disclosure of it would
cause exceptionally grave damage to the nation, politically,
economically or militarily.

Authority to Classify Top Secret Matters:


a. Secretary of National Defense
b. Chief of Staff and its equivalent to the PNP.
c. Major services commanders.
d. Area and Unified Commands of the PA, PNP, and its equivalent to
the PAF and PN.

2. Secret (Red Color Code)


Any information and materials, the unauthorized disclosure of which
endanger National Security, causes serious injury to the interest and
prestige of the nation or of any government activity or of great
advantage to foreign nation.

Authority of Classify Secret Materials:


a. Commanders of Infantry Battalion
b. Person enumerated under Top Secret
c. Special and Personnel staff of GHQ
d. General and Special staff of Major Service areas and unit
commanders
e. Superintendent of the PMA and PNPA
f. Commanders of post, depots, station of separate units
g. Chief of Military mission or group
h. Armed Forces Attaches
i. Commandants of service Schools

3. Confidential (Blue Color Code)


Any information and material the unauthorized disclosure of which
would be prejudicial to the interests and prestige to the national or
governmental activity or would cause administrative embarrassment or
unwanted injury to and or would be of advantage to foreign nations.

4. Restricted (White or No Color Code)


Any information and material which requires special protection other
than those determined to be confidential, secret, and top secret. Yet
prior to release require clearance with the records custodian.

Two Kinds of Documents


1. Personal- letters, diary and notebook
2. Official- orders, manual, newspapers, leaflets, overlays, maps and
magazines.

Espionage- refers to the collection of secret information that a


government or organizations does not want any outsider to know.

10
Sabotage- is an action against material, premises or utilities or
production, which ensures, interferes with or obstruct the national
security or ability of a nation to prepare for war.
Subversion- is an action principally clandestine or covert designed
needed to undermine the military, economic, psychological, morale or
political strength of a regime.

Identification of Criminal Subversive elements


Organized/ Syndicated crime groups- it is a group of two or more persons
collaborating, confederating, or mutually helping one another in the
commission of crime.

Organized/Syndicated Crime Groups


1. Kidnap for Ransom
2. Bank Robbery
3. Drug Syndicates
4. Carnappers
5. Terrorists groups
6. Communist movement

Disaffection- is the lack of loyalty or affection for one’s government


or constitution.
Treason- consists of levying for war against a country or the adherence
to aid enemy by any one owing allegiance to that country.
Sedition- is an inflammatory speech or conduct against the public order
in the tranquility of a state with the intent to interfere with the
government operation or success of its mission.
Insurgency- is a protracted political military activity directed towards
completely or partially controlling the resources of a country and the
creation of an alternative government through the use of irregular
military force and illegal political organizations.

Intelligence distinguished from Information

Information-A raw data or unevaluated material of every description


derived from observation, communication, reports, rumors, imagination,
and other sources from which intelligence is derived.
-Any bit of knowledge of every description, including that derived
from observation, reports, rumors, imagery and other sources.
- Any data, news, opinion, or the like transmitted from a person to
another person. In short, it is unprocessed or raw data .This
information upon receipt is not yet usable as it has to be processed.

Intelligence Information- any information gathered or received which is


of intelligence interest or significance.
-It is the end product (knowledge) after collection, processing,
analysis, integration, and interpretation of all available information.

Intelligence process refers to the cyclical steps followed from


intelligence planning, collection, processing, and dissemination.

Collection of Information-It refers to planning of collection effort and


actual collection of information activity.

Collection- gathering of the needed information from all possible


sources and the reporting of the information from all possible sources
and the reporting of the information to intelligence producing agency.

Procurement of information- it is the aggressive effort to acquire


certain specific information which may not be readily available.
11
Two Basic Collection Strategy
1. Resource Integration- one (1) agent
2. Agent Mixed or Redundancy- three or more agents assessing for
the same assignment.

Criteria of Collecting Agencies/units


1. Capability- physical ability of the unit
2. Balance/ Suitability- availability of the unit in selecting the
area of interest.
3. Multiplicity- ability to compare two or more prospected
collecting agencies.

Sources of Information
Source- it is where the information is obtained.
Organization- refers to the intelligence personnel or the intelligence
unit.
1. Persons (informant, syndicate, intelligence broker, double
agent)
2. Object
3. Records

Intelligence Community- is the conglomeration of all intelligence units


and agencies in a country composed of civilian, military and quasi
military organization.

Three (3) factors in the recruitment of human sources


1. Placements
2. Access- the most important factor.
3. Motivation

Good sources of information: (These people volunteer for various


reasons/motivations ranging from the Nationalistic, Personal,
Religious, or Materialistic gain)
1. Victim of crimes
2. Ordinary citizens
3. Group leaders in the community
4. Bar workers
5. Religious groups
6. Merchants
7. Other well- meaning observers.

Other important sources


1. Captured documents
2. Government agencies
3. Informers
4. Informants
5. Libraries/files

Informant as Distinguished from Informer


Informant- a person who gives information to the police voluntary or
involuntary, without any consideration, whereas;

Informer- an individual who gives information for a price or reward.(He


may be in the payroll of the law enforcement agency)

General Classification of Source of Information


1. Open Sources- (Most information are obtained in this way, More than
90% of information are gathered in this way.

12
2. Non- Open or Closed Sources- are those that are not obtainable
openly. They can be located inside building’s safe or vault, known
only in the minds of some scientist, or through the employment of
technical means.(Bugging and tapping)

Bugging- it is the placement of a hidden microphone to the target to


collect to telephone conversation.
Wire tapping- a method of collecting information through interception of
telephone conversation.

Methods of Collection of Information


1. Overt-information is procured openly without regard in to whether the
subject of the investigation becomes knowledgeable of the purpose for
which it is being gathered.
a. Interview- the casual questioning of a person who is not under the
control of the interviewer.
b. Interrogation- is the skilful questioning of the subject or person
who is under control.
c. Instrumentation- the application of instruments and methods of
physical sciences to detect or determine the participation of the
subject.
d. Research – investigation to get facts through the files of other
agencies or company records.
e. Investigation – is the collection of facts or knowledge from other
sources, either from regular sources, public spirited citizens,
informants or informer.
f. Debriefing- the subject is cooperative or under some degree of
control and is aware of the intelligence interest.

2. Covert- It is the information obtained without the knowledge of the


person against whom the information or documents may be used.
a. Elicitation- the technique of acquiring information or
intelligence of operational value through conversation with a person who
is not aware or unaware of the specific purpose of the conversation.
b. Casing- is the reconnaissance and surveillance of a place,
building, or area to determine its suitability for intelligence use or
its vulnerability in an intelligence operation.
b.1. Surveillance-means to gather general information over a wide
area and it takes a longer time frame.
b.2. Reconnaissance- means to gather specific or detailed
information at a particular time and place.
c. Cover- It is any device utilized by an individual, organization
or group to ensure that no one who do not have the right to know will
not be aware of the real purpose or intent of the mission.
d. Observation and Description- it is the complete and accurate
awareness by an individual of his surroundings and encompasses the use
of all the major senses to register and recognize its operational or
intelligence significance. Observation- it is the factual reporting of
what was observed.

Process of Information
1. Order of Battle- it is the summary recording of one’s specific
criminal activities with entries covering matters with intelligence and
tactical interest, enumeration of personalities involved in the
organization’s movement and activities.
2. Clandestine Operation- is a secret action undertaken by an
intelligence agent in behalf of an organization, the government and
other friendly forces.
3. Sketching – consist of putting ideas in an accurate pictorial form.
It is a means describing on object or area to satisfy a particular need.
13
4. Photography- is the process of producing image on a sensitized
material by variant form or radiant energy.
5. Provocation-is an action taken in order to incite reaction from a
know adversary or to observe reactions of adversaries.
6. Portrait Parle- a means of using descriptive terms in relation to the
personal features of individual and it can briefly describe as a word
description or spoken pictures.

Processing the Information


It is the means by which the information secured by collecting
agency is converted into intelligence required by the consumer.
In this phase, collected information is transformed into
intelligence. It involves ff. stages:

1. Selection
2. Recording
3. Evaluation
3.1. Pertinence- usefulness of the information.
3.2. Reliability
3.3. Probability- is judged by its consistency within itself, its
circumstantially, its plausibility in view of general knowledge and
experience, and its consistency with other information or
intelligence on the same related subjects.
3.4. Credibility- refers to the probable truth of the information

Code of Evaluation of Reliability and Credibility of Information

Code and Evaluation of Sources of Information


A…………………….Completely Reliable
B ……………………Usually Reliable
C…………………….Fairly Reliable
D ……………………Not Usually Reliable
E ……………………Unreliable
F…………………….Reliability not known

Code and Evaluation of Information


1…………………… Confirmed by other sources
2…………………… Probably true
3…………………… Possibly true
4…………………….Doubtfully true
5…………………….Improbable
6…………………… Truth cannot be judged

4. Analysis- the determination of the significance of the information as


well as the reliability of the source or the agent and the accuracy of
the information. It involves minute examination of related items to
determine the degree to which they confirm, supplement or contradict
each other thereby establishing accepted facts and relationships.

5. Dissimination and Use


Timeliness of dissemination means getting the produced intelligence
into the hands of all potential users in time for them to make use of
it.

Covert Methods of Information Collection

A. Elicitation
It is a system or plan whereby information of intelligence value is
obtained through the process direct intercommunication in which one or

14
more of the parties to the community unaware of the specific purpose of
the conversation.

Two devices in the conduct of Elicitation:


1. Approach- the process of setting people to start talking.
2. Probe- the process to keep the person talking incessantly.

Types of Approach:
1. Flattery- people are susceptible to praise
Variants:
a. Teacher- Pupil approach- the subject is treated as an authority.
We request him/her to enlighten us and we solicit his viewpoint
and opinions. The collector builds the theme that he is an
ignorant student who wants to learn from the all knowing
teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal
having some specialized quality and you flatter him/ her by
showing enough concern for his/ her welfare to pay special
attention to his enjoyment. The collector attempts to build on
professional brotherhood and understanding of what the source of
information is going through and sharing the source’s
frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and
assistance are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration
of he source of information and express curiosity on how one could
achieve such greatness.

2. Provocative approach-discover a wide range of conversational gambits.


Variants:
a. Teaser Bait Approach- the collector will direct the conversation
and to a certain topic and throw out a provocative statement
that may be incorrect, which will in effect force the source to
correct the collector.
b. Man from Missouri Approach- The collector will disbelieve what
the source is saying to a point where the source is force or
prove the accuracy of his words through additional information.
The elicitor adopts unbelievable attitudes above anything. He
questions all statements and oppositions.
c. Joe Blow Approach (Know it all) –The collector will become
arrogant and project a message that he/she knows it all.
Eventually, the source of information starts to show the
intelligence collector, how much he doesn’t know by divulging
additional information, generally prefaced by “Well if you know
everything, did you know……?
d. National Pride Approach- nature propensity of all people to
defend their country and its policies. The collector will tie
the required information to national pride in an attempt to get
the source to confirm, deny or elaborate on information.
e. Partial- Disagreement approach- seek to produce talking by the
word “I’m sure if I fully agree”.

Types of Probe:
1. Competition Probe- this is effective when used in connection with the
teacher- pupil approach.
2. Clarity Probe- used to elicit additional information in an area which
the response is clear.
3. High Pressure Probe- it serves to pin down a subject in a specific
area or it maybe used to point out contradictions in what the subject
has said.
15
4. Hypothetical Probe- present a hypothetical situation and to get the
subject to react to the hypothetical situation.

B. Casing
It is the reconnaissance or surveillance of a building, place or
area to determine its suitability for intelligence operation or its
vulnerability in operations (position of the enemy)

Information desired in Casing


1. Area Condition and Habits
a. Detailed sketch and photograph of the area.
b. Customs, habits, language and dress in order to be able to blend
with the community.
c. Transportation facilities, the fare, station, in order not to ask
questions.
d. Knowledge of establishments determine what are desirable, if are
free from raids anytime to avoid compromise.
e. You must know what kind of people residing in the neighborhood so
that agent will know what appropriate actions he takes.
f. Restrictions
g. Description of the subject

2. Active Opposition ( capabilities, People they employ, intentions,


fear, vulnerabilities)

3. Escape and Evasions- In case of compromise, the agent must get out
entirely from the target.

Stages of Casing:
1. Area familiarization
2. Actual inspection of the area
3. Re-casing

Types/ Forms of Casing


1. Surveillance- means to gather specific or detailed information over a
particular area and it takes a long period of time.
2. Reconnaissance- means to gather general information in a wider area
and it requires short time frame.

Surveillance
It is a process or act of keeping person, premises or vehicles
under observation in order to acquire detailed information concerning
the activities, identities and contact of the subject. It is concerned
primarily with persons. Places and objects can be closely watched by are
generally incident to the primary interest of seeking information about
people.
It involves many varied techniques and skills including
preparation, foot surveillance, automobile surveillance, stationary of
fixed surveillance, and reconnaissance. Also, tailing, shadowing,
trailing or keeping the subject under observation.

An objective of Surveillance is to disclose or divulge the existence of


illegal criminal activities and to reveal the identities of those
engaged in such activities.

Terms used in surveillance:

Surveillant- A person who conducts surveillance.


Subject/Rabbit- The subject is the person or place watched.

16
Pre- Surveillance Conference (Briefing) - a conference held among the
team members, the police intelligence unit before a surveillance is
conducted.
Stake out or Plant-is the observations of places or areas from a fixed
point.
Tailing or Shadowing- it is the observation of a person’s movement.
Undercover man- it refers to a person trained to observe and penetrate
certain organization suspected of illegal activities and later reports
the observations and information so that operational action can be made.
Liaison Program- this is the assignment of trained intelligence
personnel to other agencies in order to obtain information of police
intelligence value. (Agencies like the press, credit agencies, labor
unions, telephone companies)
Safe house- is a place, building, enclosed mobile, or an apartment,
where police undercover men meet his action agent for debriefing or
reporting purposes.
Drop- a drop is a convenient, secure, and unsuspecting place where a
police undercover man, informer or informant by a pre arrangement leaves
a note , a small package, an envelope to item for the action agent,
supervisor or another agent.
Convoy- an accomplice or associate of the subject.
Decoy- any person or subject, almost similar to the subject used to
avoid or elude surveillance.
Finger man- an individual who can positively point the subject.
Put the finger on- to identify the subject by pointing him out in person
or in photograph.
Put to bed- when the subject under surveillance returns to quarter and
apparently retire for the night.
Contact- any person whom the subject picks or deals with while he is
under surveillance.
Made (Burn out)- when the subject under surveillance becomes aware that
he is under observation and identifies the observer.
Lost- when the surveillance do not know the where about of their subject
or the subject had eluded the surveillance.

Classification of Surveillance according to intensity


1. Discreet- one in which every effort is made to insure that the
subject is unaware that he is under observation/surveillance.
2. Close Surveillance- one in which maintaining constant observation of
the subject is the objective regardless of whether or not he becomes
aware of the surveillant.
3. Loose- one in which maybe applied frequently or infrequently with the
period of observation varied of each occasion.

Classification according to method


1. Fixed or Stationary method(Stake out/ Plant)
2. Moving Surveillance
3. Technical and Audio- visual surveillance Ex: taps and bugs

Special Methods of Surveillance


1. Wire tapping
2. Concealed Microphones
3. Tape recorder
4. Television(CCTV)

Kinds of Surveillance
a. Stake Out or Surveillance of Places
b. Tailing or shadowing
c. Undercover investigation or “Roping”

17
A. Surveillance of Places

Two types of place surveillance


1. Using a room in a nearby house or business establishment and
remaining undercover.
2. Remaining outdoors and posing as a person who would normally conduct
his business in such an area, ex. A laborer, carpenter, street vendor,
etc.

Equipment used in the surveillance of a place: Ex: camera w/telephoto


lens etc.

Requirements and Appearance of a surveillant


1. Be of average size, built and general appearance.
2. Have no noticeable peculiarities in appearance or mannerisms.
3. Wear inconspicuous jewelry or clothing.
4. Have nothing about him to attract attention or fix him in the
mind of a person.
5. Have perseverance and be able to wait for hours at a time
without showing any sign of impatience or irritation, since this
attracts attention.
6. Always give the appearances of attending strictly to his own
business and of not being interested in what any one else maybe
doing.
7. Be resourceful, versatile, and quick witted, so that he can
readily conceive reasons or excuses for being in any given
place.
8. Be a good talker, able to talk his way out of embarrassing
situations without arousing suspicion.
9. Have one or two good standard “line” such as canvassing for the
city directory or a trade publication or selling brushes or
other articles.
10. Carry a cap and glasses to effect such changes including wig,
mustache if necessary.

B. Shadowing or Tailing
Don’ts in Shadowing:
1. Don’t make abrupt or unnatural movements.
2. Do not make use of disguise that will attract attention.
3. Don’t meet the eye of the subject. Doing so tends to fix the
shadower in the mind of the subject. If the subject turns and it seems
as if a face to face encounter will result, the shadower must look
anywhere except the subject’s face.
4. Don’t adopt a slinking, sleuthing, creeping, peeking manner. Don’t
slink in and out of doorways, sleuth behind the subject, creep from
around parked cars, peek for around corners, it is unnecessary,
ineffectual and above all attract attention.
5. Don’t wear story- book disguises. False whiskers, artificial noses,
simulated deformities and the like rarely. If ever, are convincing when
worn by an amateur and seldom convincing for any length of time even
when worn by a professional actor or when applied by a professional
make- up artist. These disguises maybe good for the theater by not for
the street.
6. Don’t carry briefcases, notebooks, papers or other noticeable
objects.
7. Don’t greet or never speak to fellow officers or allow them to greet
you. It must be an established policy that other officer in or out of
uniform do not greet each other on the streets if there is any
possibility that one may be on a job.

18
8. Don’t make notations or entries ostensibly. Strangely enough
sometimes, the more experience shadower fails to observe this
precaution. This is so to avoid suspicion of his mission.
9. Beware of bulging concealed weapons.
10. Don’t attempt to appear too innocent if accosted by the subject.
11. Maintain distance
12 Note taking should be done in safe areas.

Don’ts in Surveillance:
1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corners.
4. Getting out immediately on public conveyances.
5. Retracing
6. Entering mobile housing.

Preparation for Surveillance:


Preparation is a must before engaging in actual surveillance work.
It is an absolute requirement. As such, those assigned to do the job
must study all files of information relating to:
a. subject-(name, detailed description including photos, Identifying
characteristics and mannerisms, identity and description of known
or suspected contacts or associates of the subject, and all
background information on subjects)
b. Type, scope and extent of crimes known or suspected to be involved
in the case.
c. Type of neighborhood or locality (type of inhabitants, Dress,
language and dialects, degree of education and culture)
d. Specific locations and places known or suspected to be involved in
the case.( meeting places and hang outs, caches, hideouts,
addresses frequented by the subjects)
e. Vehicles involved in the case (description and plate numbers,
street routes, garage and repair facilities)

Methods of Shadowing
A. Foot Surveillance
1. One- man shadow
2. Two- Man Shadow
3. Three- man Shadow or ABC method

Particular Tactics and Techniques of Shadowing:

1. Turning Corner- If the subject turns a corner, the surveillant should


not hurry. If the subject is lost, the nature of the neighborhood will
determine the subsequent procedure. In most cases, it is preferable to
lose the suspect than to alert him to the tail.
2. Entering a Building- If the building is a store, the surveillant
should wait until the subject comes out. In buildings having a number
of exits, it is necessary to follow him inside. If the subject enters
an elevator, the surveillant should board the same elevator. The
surveillant may tell the elevator boy that his destination is the same
floor as the subject, or he may proceed to the top floor, if there are
more than one surveillant, one should alight at the subject’s floor and
should proceed in a different direction then the latter can return to
the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind
the subject and on the same side. If he misses the bus, he should hire
a taxi and board the bus at a point ahead.
4. Taking a taxi- When the subject takes a cab, the surveillant records
the time, place and name of the taxi’s company and license. He should
19
endeavor to follow in another taxi. If this results in failure, he
should trace the taxi by means of recorded information and ascertain the
destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a
ticket, the surveillant should endeavor to get in line behind him with
one person intervening. If he hears the destination requested by the
subject he may buy a similar ticket. In the event that he is unable to
hear the destination, he should merely request for a timetable.
6. In a restaurant - The surveillant should allow a few minutes to
elapse before following the subject into a restaurant. He should then
take an obscure sect and arrange to finish his meal at the same time as
the subject.
7. In a hotel- An inquiry can be made concerning the room of the
subject. If he registered, the surveillant can take the adjoining room.
8. In a telephone booth- The surveillant should either go into the next
booth or stand near enough to hear. He should note the telephone book
use and the page at which it was left open.
9. In the Theater- The surveillant should sit behind the subject and
take not of the various exits which are available.

Risks constantly incurred by the shadower


1. The risk of being recognized as a shadower of the subject.
2. The risk of being “lost” or eluded by the subject.

a. Test for Tailing- The common trick of the suspect when he


becomes conscious that he is being “tailed” is to board a public
conveyance, such as bus, street car, or subway train, and then
jumping off the vehicle. The subject then looks about quickly
to determine if any other person jumped off. If the shadower
alights too, the suspect will study him closely to facilitate
future recognition. On finding himself in this predicament, the
surveillant’s best tactic is to remain on the vehicle until the
next stop, alight, and board the next car or train.

b. The Convoy- Sometimes the suspect is being guarded against


shadowers. The convoy is usually at the rear of the subject.
It may be therefore necessary for the surveillant to keep a look
out behind him to guard against this. If the subject has a
follower or convoy, the shadower must get behind the convoy and
follow him instead of the subject.

B. Automobile Surveillance
This requires careful preparation, wherein the shadowers must use a
vehicle if the subject uses a vehicle. The vehicle used by the
shadowers must be non-descript, preferably rented vehicles since they
can be changed often. The license plates must be anonymous if the car
used in shadowing is official or government vehicles. The “tail” car
may be changed several times a day to lessen chances of being detected.
It is preferred that there be three men in shadow car. Number one man
is the driver, number two watches for a convoy, number three takes
notes. The notes include and place every act and every contact of the
subject vehicle and its passengers. Complete descriptions are made of
all persons contacted if their identities are unknown.
If number two catches a convoy, then the tail job is switched to
the convoy car. The driver will avoid attracting attention by deriving
at normal speed in reasonable manner. He will avoid unnecessary
turning, twisting, stating, stopping and other maneuvers.
When the subject leaves his vehicle, number two and three leave
the shadow car and take up the surveillance on foot. Number one remains
with the car.
20
In automobile surveillance, the vehicle used should conform to the
same characteristics as the investigation or surveillance. The make and
model of the car should not be spectacular or readily unidentifiable,
and it should not carry any distinctive license plates.

Disguising the Car


The following must be observed in disguising the car:

a. License Plate – a popular type of black color car should be used and
care must be taken that the license plates are not identified. This can
be remedied by the following:
1. Use of security plates
2. Use of “colorum cars” “drive-it- yourself” rented cars
3. Borrowing cars from friends.

b. Appearance- Various devices may be used to change the appearance of a


car. Placing and removing stickers, wind shield adornments, shifting
head lights from dim to bright , re- arranging the seats of occupants,
changing the occupants cloths, changing or removing hats, changing the
number of occupants, etc.

Some Precautions to be observed in tailing:


a. Don’t park in the same spot too long.
b. Don’t sit behind the steering wheel for an extended period.
c. It is preferable to sit in the passengers seat.
d. Don’t seat both surveillants in the front seat for an extended
time.
e. Don’t approach the parking position in a manner that may arouse
suspicion.
f. Don’t park in a prohibited zone if it can be avoided since such
a location attracts attention and frequently lead to police
conferences.
g. Don’t be mysterious about leaving or returning to your car.
h. Don’t use credit cards in the vicinity of the surveillance. If
the car has some identification marks or equipment , cares
should be exercised in the selection of a servicing station.
i. Don’t operated in short wave radio with excessive volume.
j. Don’t hold a general conference or “board meeting” with the
relieving team.
k. Don’t fail to give the relieving team the pertinent data that
have developed.
l. Don’t telephone repeatedly from the same store or filing
station.
m. Don’t be too unconcerned in appearance. In some instances, it
is better to appear to be impatiently waiting.
n. Don’t stand around a lobby reading newspaper.
o. Don’t look away if the subject approaches. Be normal and look at
him briefly.

Undercover Assignments (“Roping”)


It is a form of investigation in which the investigator assumes a
different and unofficial identity in order to obtain information. It
requires the assumption by a police agent of an identity in keeping
with the situation to be explored. The agent must drop his identity
and adopt another. It is an investigative technique in which agent
conceal his official identity and obtain information from that
organization.

Importance of Undercover investigation

21
In law enforcement agencies, members of organized crime, local
gambling operators and prostitutes make it their business to get to know
the faces of as many member of the police department as possible. For
this reason, rookie officers are always in demand for undercover
assignments in the vice and narcotics units.
In business and industry, the vast majority of undercover agents
are found in here, not law enforcement. They are employed directly by
corporations or employed by private agencies for internal investigation.
Their importance in business and industry is the prevention and control
of employee theft.

Type of Undercover according to time frame:


1. Long- range- operations can provide reliable, accurate and
continuing access to information which would not be otherwise
attainable.
2. Short-range- the duration of short undercover activity may vary
considerably, form one- time interview to a series of separate
but related actions over an extended period of time.

Selection of Undercover Worker


The ideal undercover agent is a combination of an actor and a good
investigator. The selection be made in consideration of the following
elements.
a. Background- A good undercover man must be able to fit to the
environment of his assignment. He must be able to suit his speech and
line of thinking to that of his associates. His educational and
technical background must rise to the required level. Is conversation
and knowledge of hobbies, sports and general information should be in
the particular stratum in which he will find himself.
b. Temperament- A calm, affable, enduring personality is required.
He should have the necessary self-confidence to carry him through the
more trying moments and the resourcefulness to adjust to change of plans
or situations.
c. Intellect- The undercover agent must, above all, be intelligent.
He should have a clear view of the objective of the mission and the
over-all strategy that must be employed in its accomplishment. A
retentive memory and a keen imagination will serve him in good stead.
Finally he should be an excellent observer and a person of sound
judgment.

Special Qualification
1. knowledge of the language
2. area background regarding events
3. knowledge about the customs and habits
4. physical appearance

Preparation of Assignments
a. Study of the subject
1. Name 7. Drug
2. Address 8. Hobbies
3. Description 9. Education
4. Family and relatives 10. Occupation and
5. Associates specialty
6. Character and temperament

22
b. Knowledge of the Area
1. Maps
2. National and Religious Background
3. Transportation
4. Public utilities

c. Subversive Organizations
1. History and background of organization. Biography of the
official
2. Identity and background of members and former members.
3. Method of identification employed by members.
4. Files and records- nature , location, accessibility
5. Meeting- schedule and meeting place.

d. Cover - It is a means by which an individual group or organization


conceal the true nature of its acts
and or existence from the observer.

Cover Story – is any scenario made to cover up the operation.


1. A biographical data through fictional, which will portray the
personality of the agent, he assumed any scenario to cover up the
operation.
2. A fictitious background and history for the new character of the
investigation should be prepared, including the names, address and
descriptions of the assumed places of education, employment,
associates, neighborhoods, trades and travels. The investigator’s
background story should seldom, of ever, be wholly fictitious. It is
usually advisable for the investigator to maintain his reputation that
he is from a city wherein he ahs lived and which he is will acquainted
of. He can avoid the hometown of the subjects by not selecting it as
the origin of the investigation.

Cover support- an agent assigned in target areas with the primary


mission of supporting the cover story.

Hazard to Cover:
1. Passive opposition- refers to people who are not directly
involved insecurity and CI activities.
2. Friendly or not hostile opposition- refers to friendly
organizations that may hinder the operations.
3. Unfriendly or hostile active opposition- refers to the enemy
intelligence operations that may compromise the undercover.

Precautions or Guidelines in Case of Compromise


1. Move out immediately
2. Start new facilities for operation and develop it.
3. Build entirely new cover.
4. Use circuitous routes and provide counter surveillance
measures.
5. Be specifically careful of former contacts with non
intelligence personnel.
6. Be patient, build slowly and carefully.

e. Physical Details- Personal possessions should be obtained for the


undercover investigator which are appropriate to the character assumed
in quality, price, age, fit, degree of cleanliness; laundry marks, and
manufacturer’s design. Personal possessions may include: clothes, a
pocket book, a watch, a ring, a suitcase, stubs of tickets form
amusement places, and letters, certificates, and amount of money. The
undercover investigator must not possess any article which wills
suggest his true identity. Badges and credential must never be found
on his person and firearm may only be carried when compatible with the
investigator’s background story.

Golden Rules of an undercover agent:


1. Don’t drink while working as under cover. Drink is a great
tongue looser. But, it is well to get the subject.
2. Don’t court women. Usually the less contact the agent has
with women, the greater is the chance of success. The
investigator cannot afford to incur the enmity or jealousy of
a subject who might think that the investigator is “making
time” with his girl friend.
3. Don’t take woman on an undercover assignment. The subject may
become interested in the woman. If this happens, the subject
attention is diverted from those things in which the
investigator’s interests lie. The woman maybe placed in an
embarrassing or impossible situation form which extrication
may disclose the identity of the undercover investigator.
4. Don’t claim to be a “big shot”. It is too easy to identify a
big shot. It will cause more inquiries to be made in the
place. It is better to assume a character of average status or
less.
5. Don’t fail to provide persons in the place who can vouch for
the investigator
6. Don’t spend too much money. Expenditure maybe in keeping with
the part, if not, suspicion is aroused. Many agents have
given themselves away by spending more money than the amount
justified.

Conduct of undercover Work agent and assignment


1. Demeanor- The undercover man must in every respect live the
part which he plays. His appearance, language, attitude,
opinions, interests and recreations must support the assumed
role. He should speak little, but let his actions carry
conviction. Bragging or showing up too much knowledge may
invite unwanted attention.
2. Approach – This is the making of contracts with the subject or
subjects, who normally makes the first talk with the
investigator. In this instance, the undercover man should
create a situation which makes the subject or subjects
interested in approaching him thinking he is what the purpose
to be. Many a subject has become interested in a undercover
man who lived in the same rooming house.
3. Entrapment- It is against public policy for an officer of the
law to incite or participate in the commission of the crime.
The investigator may agree with the plan but he should never
take part or make any suggestions or plan, or render any real
assistance with regards to the perpetration of the crime.
4. Women Associates- Of criminals are frequently emotional and
jealous. It is best therefore to treat them with exceptional
consideration. It maybe necessary to avoid their association.
One of the criminals or woman may become inquisitive.
Means of communications- Technical (radio, secret writings) and Non-
technical (personal meeting, cut-outs, drops)
a. Telephone- Communication between headquarters and the
undercover investigator must be accomplished by secret method.
In calling headquarters by telephone it is best to use a dial
tone in a public booth not connected with the local switch
board operator. To lessen the possibility of wire tapping,
the investigator should use a different telephone for each
call.
b. Written report- The written report maybe addressed to a
fictitious girl –friend at a pre-arranged general delivery
address which is under the control of officials from
headquarters. It is best not to put the undercover
investigator’s return address in the envelope as the post
office department might return it to the investigator’s
dwelling for insufficient postage or other reasons, in which
case, it might fall into improper hands. Since criminals,
usually have few correspondence, the investigators should not
become conspicuous by the posting of numerous letters. To
preclude the possibility of the report falling into improper
hands before mailing, they maybe written in the post office.
c. Meeting- Meetings at secret, pre- arranged.

Three forms of non- technical communications:


1. Personal meetings:
a. Car pick-up
b. Hotel meeting
a. Safe house meeting
b. Restaurant meeting
2. Brief encounter – personal meeting between agent handler and
the agent not more than 60 seconds in order to pass an urgent
message.
3. Brush pass- passing of an object between two persons going in
opposite directions.
4. MBU meeting- is the use visual signals, verbal signals and
danger signals.
5. Cut- outs- is a person or devices interpose between two
persons or groups in order to provide communication.

Reconnaissance
Refers to the gathering specific or detailed information at a
particular time and place.

Methods of Reconnaissance
1. Personal Reconnaissance – this is the most effective casing method
and produces the most information since you know just what you’re
looking for. However, this method does not permit the agent
handler to use it frequently.
2. Map Reconnaissance- this method cannot completely answer all
question, but produces good picture of the general area to include
road and street networks.
3. Research- this normally means a study of unclassified sources such
as atlases, local newspapers, periodicals, public bulletins,
telephone and city directories, radio and television broadcast and
other available references. (Biological Intelligence)
4. Prior Information- this consists of reports on file with the
intelligence unit.
“Clipping Services”- it is the collection of news items of
intelligence value in publications both of local and foreign. These
published items are cut, and pasted with their captions. So much
information on a specific subject can be obtained from publications
like newspapers, magazines, periodicals, reports and other printed
matters.

Drop- is a convenient, secure and unsuspecting place where a police


undercover man, informer or informant by prearrangement, leaves a
note, a small package, an envelope or time for the action agent,
supervisor, or another agent. “Drop” should be changed from time to
time like the accommodation address with or without suspicions of
discovery. A drop can be fixed, semi- permanent, or even moving.
Airlines, trains, buses regularly playing between points have been
used conveniently both by government agents and the law- breakers.

Clandestine Operation
A secret action undertaken by an intelligence /counter
intelligence organization in behalf of the government or other
friendly forces.

Elements of Clandestine operation


1. Sponsor- refers to the organization or government that
authorizes, approves, directs, controls and supports
clandestine operational activities. It maybe represented by
the following:
a. Project officer
b. Case officer
c. Agent handler

2. Target or Rabbit- is a person, place, things or activity


against which the clandestine organization or operational
activity is directed.
3. Agent- is a person who is aware that he/she is engaged in
counter operational activity and willingly accepts control and
direction.

Classification of Clandestine agents:


1. Principal Agent or Agent Handler- is a managerial agent
and inmost cases the leader of the agent network..
2. Action Agent- is the doer of the clandestine task and
further classified according to the task that he was
assigned.
a. Espionage (Counter Intel/Intel agent)- is the primary
and most important human collector agent.

b. Propagandist- an agent that undertakes action to mold


the attitudes, opinions and actions of an individual,
group, organization or nation.
c. Saboteur- is an agent who undertakes positive action
against unfriendly power/ forces resulting in the loss
temporarily or permanently of an article, material or
facilities which are being used.
d. Guerilla- is a member of a paramilitary group organized
to harass the enemy.
e. Strong man/arm- is an agent readily available to
provide special protection during dangerous phases of
the clandestine operation.
f. Provocateur- an agent who induces an opponent to act on
his own detriment by discrediting himself or revealing
his true purpose or identity.
g. Cover action agent- is a fully recruited agent who is
in a senior position usually within the government and
is enable to exert influence from foreign government
upon the direction of the sponsor.

3. Support Agent- an agent who engages in activities which


support the clandestine operation. This agent performs
all types of auxiliary services at the direction of the
case or project officer.

Categories of Support agent


a. Surveillant- is a support agent who observes persons
and paces of operational interests.
b. Investigator- an agent who provides informations about
persons or things of operational interests.
c. Procurer of Funds- an agent who obtains special
currency when needed for operational use.
d. Procurer of supplies- an agent who supplies or procures
ordinary as will as critical operational materials.
e. Safe house keeper- an agent that manages and maintain
the safe house for operational use, such as for
briefings, meetings, debriefings and safehaven and
training.

*Safe house- is a place, building, enclosed mobile, or an


apartment where police undercover men meet his action
agent for de-briefing or reporting purposes.
f. Manager of Storage area- an agent who arranges the
storage, distribution or transportation of operational
supplies.
g. Communication agent (Commo Agent) - an agent that
facilitates communications.

Motivation of an Agent
1. Ideology- believe in the principles of life
2. Patriotism
3. Remuneration- mercenary-the primary motive
4. Career development
5. Fear

Basic Agent Management Principle


1. Agent handler must be in charge of the operation
2. The act ensure the agent adherence
3. Good rapport must be established between the agent
handler and the agent.
4. The agent handler must constantly reinforce the agents

Control- It refers to the authority to direct the agent to carryout


task or requirement on behalf of the clandestine organization in an
acceptable manner and security.

Two categories of Control


1. Positive control- is characterized by professionalism and
rapport.
Types of positive control
a. agents motivation
b. psychological control

2. Negative control- blackmail and threat.

Types of negative control


1. Disciplinary action- includes verbal reprimand for poor
performance or insecure actions withholding of salary or in
extreme situation the threat of terminating professional
relationship.
2. Escrow account- control of an agent by putting his salary in
a bank to be with drawn only after a fulfillment of a
condition.
3. Blackmail

Factors to Consider in the Selection of Action Agents


1. Placement- location or prospective agent with respect to the
target.
2. Access- the capability or ability of the prospective agent to
obtain the desired information for the intelligence
organization or to perform the intelligence collection mission
in the area.
a. Primary Access- it has direct access to the desired
information.
b. Secondary Access- the access to the desired information
through principal source where the latter has the direct
access.
c. Outside Access- the agent is employed outside the target and
merely monitors information from a third person who is
monitoring information in the area.

How can a handler test the thrust worthiness of an agent?


1. The handler initially sends the agent out on a “test mission”
to perform a minor task, “If he/ she delivers, then it’s a
plus.
2. Another basic step is a thorough background check on the
individual to determine his or her connections. When the agent
is employed in an “oplan”, he or she signs a “contract”
specifying his or her mission and the corresponding payment
for services.
3. A handler may employ the a secondary or third agent to conduct
a parallel operation to cross-
check the primary agent’s information. The first, second and
third agent s do not know each
other nor are they aware of each other’s missions. The second
or third agent may even report to the handler that your
primary agent in an enemy,”

How is informant Counter checked if he is a broker or a risk to the


job?
The supervisor at times tests him on his reports, have the
informant tailed secretly, get into from other informants who know him
and /or an analysis later of the reports submitted. It is an unwritten
precept not to trust a crook trying to sell other crooks but the check
must be dome very discreetly or the informant can clam up, submit
fabricated reports, or just quit.
In case a control or project officer is reassigned or retired, what
happens to his Informant?
The departing officer introduces his replacement to the informant
in a secured place. If the informant is unwilling to work for the new
boss, he has to go.

Factors to Consider in Informant Recruitment


1. Access to criminal organization- the most important factor to
consider in informant recruitment. This can be due to his
position, location or position, confidence with the “bosses”
or just his ability to deliver the goods.
2. Sex
3. Health
4. Built
5. Mental and physical ability
6. Age
7. Education
8. Personality

Code Name- an alias or symbolic designations used by intelligence


officer/ informants and even criminals for security.

Important Rule that a Handler or Civilian agent or informant must


follow

“N e v e r, n e v e r l o v e y o u r a g e n t”

An agent handler must be able to determine when to “terminate” the


agent that is to cut off the agent from a project when it has reached
a particular stage. “That is why when you fall in love with an agent,
it becomes difficult to “terminate” him or her,”. In extreme cases,
like when agents commit serious acts of betrayal, to terminate means
physical elimination.

Termination problems:
1. Amount of knowledge the agent has in the operation and
personnel.
2. His inclination to use knowledge to the disadvantage of the
intelligence service.
Moral obligation to the agent.

INFORMANT MANAGEMENT
-Informant is a person who gives information to the investigator.
He may give the information openly and even offer to be a witness, or
he may inform the investigator surreptitiously and request to remain
anonymous.
- The word “ informant” today has many meanings and connotations.
To the public the informant is an obnoxious, money- motivated person
selling another. To the underworld, he is a “Stool Pidgion” exposing
their activities and identities. To police intelligence, he is a
“Savior” for without his valuable reports and revelations, many of the
criminal cases would end up as unsolved. To police intelligence, an
informant is “anyone who can furnish information”; in other words he
is one of the sources of police intelligence information.

Different types of informants:


1. Anonymous Informant- one who gives information through telephone or
letters with the hope that the informant can not be identified.
2. Confidential Informant- is a person who provides investigator with
confidential information concerning a past or projected crime ad odes
not wish to be known as the source of the information. The
investigator should take a special precaution to protect the identity
of such an informant because of his value as a source on the
disclosure of crimes and gives information violative of the law to
include crimes and the criminal.
3. Criminal Informant- A criminal informant is a type of informant who
gives information to the police pertaining to et underworld, about
organized crimes with the understanding that his identity will be
protected and for a certain consideration.
4. Voluntary Informant- one who gives information freely as a
witness to a certain act.
5. Special Informant- one who gives information concerning
specialized cases only and is regarded special treatment by the
operatives.
6. Accidental Informants- a person who casually imparts information
to an officer with no intention of providing subsequent information.
7. Rival- Elimination Informant- is usually anonymous. His purpose in
informing is to eliminate rival or competition.
8. False informant- Reveals information usually of no consequence or
stuff concocted of thin air. He may do so out of the desire to appear
to be on the side to law and order and for the purpose of throwing
suspicion from himself or his gang or associates.
9. Frightened informant- maybe prodded by fear or self- interest. He
maybe one of the “little men” who runs to the police when he sees that
his confederates are about to be involved in a dangerous situation and
gives information as a protective device and as a means of sustaining
his own feeling of self- importance. This type is the “ Weakest link “
in the criminal chain.
10. Self- aggrandizing informant- Hangs about the fringes of the
underworld and delights in surprising the police with choice bit of
information. From time to time, his information maybe of value.
11. Mercenary Informants- has something to sell. He maybe a valuable
source. Sometimes there is a revenge motive present. He may have
thought himself to have bee double-crossed or given a “dirty deal” and
seeks revenge as well as profit in the telling.
12. Double Crosser informant- Use his seeming desire to give
information as an excuse to talk to the police in order to get more
information from them that he gives. It is will to feed this
informant false information to catch him.

Different Categories of Recruited Informants

1. Spontaneous or Automatic informants- the nature of their work


or position is society and have certain legal, moral and
ethical responsibilities to report information to law
enforcement agencies.
2. Ordinary Run- of- the – Mill Informants- Informants that are
not under the compulsion to report information to the police.
3. Special Employee- Informants who are of specific operational
nature.

Phases of Informant Recruitment


1. Selection- it is particularly desirable to be able to identify
and recruit an informant who has access to many criminals in
groups or subversive organizations wide access is probably the
single most informant feature in the consideration of
recruiting the potential informant.
2. Investigation- the investigation of the potential informants
that has tentatively identified as “probable” must establish
possible existing motives as to why this might assist the
police intelligence community.
3. Approach- explanation of contract
4. Persuasion
5. Testing- to determine whether to qualify or not the probable
informant.

J.P.E
The End!

Happy Summer Vacation!

You might also like