Professional Documents
Culture Documents
History of Intelligence
1. Holy Bible- is here you can find the just recorded intelligence
operations in history.
Moses-One of the first recorded formalized intelligence efforts,
with format, can be found in the
The scripture also named the 12 intelligence agents when the Lord
directed Moses to send into the Land of Canaan and records that “all
those men were heads of the children of Israel”.
a. Rehab- “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered
and concealed the agents of Israel, made a covenant with the agent sand
duped their pursuers. She was not only an impromptu confederate of
immense value to the Jewish leaders of that far-distant day, but also
established a plot- pattern which is still of periodic relief to motion-
picture producers.
b. Delilah- a Palestine agent who used her charm to gain
information from the powerful enemy.
1
as a weapon of government. He divided a simple but highly effective
system of covert ciphers.
He introduced a primitive form of “Cabinet Noir” (Internal
Monitoring) when he instigated postal censorship into the army and
investigated letters and malcontents.
6. Lord Baden – Powell- Known as the founder of the Boy scout Movement
and was also active spy. Baden- Powell exploited his powers of tracking
and observation, coupled with his considerable skills as a Thespian, to
the benefit of the British Secret Service.
When World War I broke out, Mata Hari was in Berlin, where she had
recently befriended the Chief of police, who subsequently enlisted her
into the ranks of the German Secret Service. She carried on her life as
before dancing naked on the stage and dispensing her services liberally
to those who could afford her.
2
powerful allies and developed an excellent intelligence system. He
often dressed as a beggar and went into the streets of Rome.
13. Alfred Red- One of the most brilliant intelligence agents, though he
was a homosexual. He rose to become chief of the Austro- Hungarian
Secret Service, or in other terms, director of their military
intelligence system. For more than half of his time as director of
intelligence, Red was acting as an intelligence agent of Russia.
Col. Rudolph Abel - (Russian) - was probably the highest ranking and
most successful spy whoever infiltrated the United States.
Definition of Intelligence:
a. First, Mr. Webster defines intelligence as:
1. Capacity for understanding and for other forms of adaptive
intellect of behavior; the mind in operation.
2. The power of meeting any situation, especially a novel
situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to
guide action toward goal.
3. Knowledge of an event, circumstances etc., received or imparted;
the gather or distribution of information; the staff of persons engaged
in obtaining such information.
b. In Psychology text:
Intelligence is the capacity of a person to adjust to new
situations through the use of what has been previously learned.
3
c. From a government Survey Reorganization Commission Task Force
Investigation Intelligence activity in the Philippines define
Intelligence as:
It means the collection, processing, collation, interpretation,
evaluation and disseminating of information, with reference to national
security.
Principles of Intelligence
a. The Principle of Objectivity/Objectiveness
1. Intelligence must be based on the decision-makers own plans and
intentions as much as on consideration of the intelligence targets.
2. In intelligence, only well guided will succeed.
c. Principles of Continuity
It simply means that information, events, and reports must be
continuous and intelligence activities follow a simple continuous
intelligence cycle.
Intelligence coverage must be continues so that the shape of what
happened today could be studied in the light of what happened before,
which in turn would enable to predict the shape of things to come.
d. Principle of Communication
Intelligence adequate to their needs must be communicated to all
the decisions makers in a manner that they will understand and inform
that will permit its most effective use. Intelligence is useless if it
remains in the minds, or in the files of its collectors or its
producers.
e. Principle of Selection
Intelligence should be essential and pertinent to the purpose at
hand.
f. Principle of Timeliness
Intelligence must be communicated or must be available on time to
the decision maker to permit its most effective use.
h. Principle of Flexibility
i. Principle of Security
Security is achieved by measures which the intelligence takes to
protect and preserve the integrity of its organization personnel,
method, sources, information and results of its activities.
4
2. Intelligence as an organization- It is an institution composed of
persons who pursue a social kind of knowledge for the purpose of
planning the collection of information, processing and dissemination of
intelligence relating to the area of interests.
Intelligence Axioms:
1. Intelligence is crucial
2. Intelligence is essential to operations
3. Intelligence is a responsibility of all government operations.
4. Intelligence of the government should be superior to that of the
enemy.
6
Area of Operations- Those aspects of the operational environment
exclusive of the military forces involved. It concerns weather, terrain,
economics, politics, sociology, hydrography (seas, lakes, rivers) and
characteristics of the environment of an area in which military
operations are taking place or are planned.
Capabilities- Strengths
Vulnerabilities- Weaknesses
7
Five Categories of Counter- Intelligence
1. Military Security- Encompasses the measures taken by the command to
protect itself from espionage, enemy observation, subversion, sabotage
or surprise.
2. Secrecy Discipline- Special safeguarding of classified military
information and equipment
3. Civil security- encompasses active and passive counter- intelligence
measures affecting the non- military national permanently or temporarily
residing in an area under military jurisdiction.
4. Censorship- control and examination of communication to prevent
information being transmitted to the enemy, collection and dissemination
of the military commander. Surveillance of communications such as
correspondence, telephone, news dispatches, motion pictures, and radio
broadcast to prevent information of military value from reaching the
enemy.
5. Port and Travel security
Security Measures:
1. Active control measures- to actively block the enemy effort to
gain information.
2. Passive control measures- to conceal information from the enemy.
3. Deception measures- to deceive the enemy.
Definition:
1. Character- a trait or sum of traits which serves as an index to the
essential or distinctive nature of a person.
2. Derogatory Information- Information which reflect unfavorable on the
character, integrity or reliability of an individual.
3. Discretion- ability of tendency to act or chooses with prudence; the
habit of wise judgment and sagacity or simply stated judgment.
4. Loyalty- the faithful and true allegiance to the Philippine
Government and its constitution.
5. Moral- principle or standard of conduct of an individual, his ethical
judgment in human relation and respect for superior.
6. Moral Turpitude- acts contrary to justice, honesty or modesty or good
moral.
7. National Security- the state or condition under which the nation can
pursue its national objectives without interference.
8. Security Risk- Any person whose character, activities or
circumstances in life might place him in a position where wittingly or
unwittingly would compromise the security or classified matters.
C. Operational Security
It is the measures taken in conducting operations or activities in a
secure and efficient manner.
D. Communication Security
It is protection resulting from all measures designed to deny
unauthorized persons information of value which might be derived from
the possession and study of telecommunications or to mislead
unauthorized persons in their interpretations of the result of such a
study.
10
Sabotage- is an action against material, premises or utilities or
production, which ensures, interferes with or obstruct the national
security or ability of a nation to prepare for war.
Subversion- is an action principally clandestine or covert designed
needed to undermine the military, economic, psychological, morale or
political strength of a regime.
Sources of Information
Source- it is where the information is obtained.
Organization- refers to the intelligence personnel or the intelligence
unit.
1. Persons (informant, syndicate, intelligence broker, double
agent)
2. Object
3. Records
12
2. Non- Open or Closed Sources- are those that are not obtainable
openly. They can be located inside building’s safe or vault, known
only in the minds of some scientist, or through the employment of
technical means.(Bugging and tapping)
Process of Information
1. Order of Battle- it is the summary recording of one’s specific
criminal activities with entries covering matters with intelligence and
tactical interest, enumeration of personalities involved in the
organization’s movement and activities.
2. Clandestine Operation- is a secret action undertaken by an
intelligence agent in behalf of an organization, the government and
other friendly forces.
3. Sketching – consist of putting ideas in an accurate pictorial form.
It is a means describing on object or area to satisfy a particular need.
13
4. Photography- is the process of producing image on a sensitized
material by variant form or radiant energy.
5. Provocation-is an action taken in order to incite reaction from a
know adversary or to observe reactions of adversaries.
6. Portrait Parle- a means of using descriptive terms in relation to the
personal features of individual and it can briefly describe as a word
description or spoken pictures.
1. Selection
2. Recording
3. Evaluation
3.1. Pertinence- usefulness of the information.
3.2. Reliability
3.3. Probability- is judged by its consistency within itself, its
circumstantially, its plausibility in view of general knowledge and
experience, and its consistency with other information or
intelligence on the same related subjects.
3.4. Credibility- refers to the probable truth of the information
A. Elicitation
It is a system or plan whereby information of intelligence value is
obtained through the process direct intercommunication in which one or
14
more of the parties to the community unaware of the specific purpose of
the conversation.
Types of Approach:
1. Flattery- people are susceptible to praise
Variants:
a. Teacher- Pupil approach- the subject is treated as an authority.
We request him/her to enlighten us and we solicit his viewpoint
and opinions. The collector builds the theme that he is an
ignorant student who wants to learn from the all knowing
teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal
having some specialized quality and you flatter him/ her by
showing enough concern for his/ her welfare to pay special
attention to his enjoyment. The collector attempts to build on
professional brotherhood and understanding of what the source of
information is going through and sharing the source’s
frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and
assistance are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration
of he source of information and express curiosity on how one could
achieve such greatness.
Types of Probe:
1. Competition Probe- this is effective when used in connection with the
teacher- pupil approach.
2. Clarity Probe- used to elicit additional information in an area which
the response is clear.
3. High Pressure Probe- it serves to pin down a subject in a specific
area or it maybe used to point out contradictions in what the subject
has said.
15
4. Hypothetical Probe- present a hypothetical situation and to get the
subject to react to the hypothetical situation.
B. Casing
It is the reconnaissance or surveillance of a building, place or
area to determine its suitability for intelligence operation or its
vulnerability in operations (position of the enemy)
3. Escape and Evasions- In case of compromise, the agent must get out
entirely from the target.
Stages of Casing:
1. Area familiarization
2. Actual inspection of the area
3. Re-casing
Surveillance
It is a process or act of keeping person, premises or vehicles
under observation in order to acquire detailed information concerning
the activities, identities and contact of the subject. It is concerned
primarily with persons. Places and objects can be closely watched by are
generally incident to the primary interest of seeking information about
people.
It involves many varied techniques and skills including
preparation, foot surveillance, automobile surveillance, stationary of
fixed surveillance, and reconnaissance. Also, tailing, shadowing,
trailing or keeping the subject under observation.
16
Pre- Surveillance Conference (Briefing) - a conference held among the
team members, the police intelligence unit before a surveillance is
conducted.
Stake out or Plant-is the observations of places or areas from a fixed
point.
Tailing or Shadowing- it is the observation of a person’s movement.
Undercover man- it refers to a person trained to observe and penetrate
certain organization suspected of illegal activities and later reports
the observations and information so that operational action can be made.
Liaison Program- this is the assignment of trained intelligence
personnel to other agencies in order to obtain information of police
intelligence value. (Agencies like the press, credit agencies, labor
unions, telephone companies)
Safe house- is a place, building, enclosed mobile, or an apartment,
where police undercover men meet his action agent for debriefing or
reporting purposes.
Drop- a drop is a convenient, secure, and unsuspecting place where a
police undercover man, informer or informant by a pre arrangement leaves
a note , a small package, an envelope to item for the action agent,
supervisor or another agent.
Convoy- an accomplice or associate of the subject.
Decoy- any person or subject, almost similar to the subject used to
avoid or elude surveillance.
Finger man- an individual who can positively point the subject.
Put the finger on- to identify the subject by pointing him out in person
or in photograph.
Put to bed- when the subject under surveillance returns to quarter and
apparently retire for the night.
Contact- any person whom the subject picks or deals with while he is
under surveillance.
Made (Burn out)- when the subject under surveillance becomes aware that
he is under observation and identifies the observer.
Lost- when the surveillance do not know the where about of their subject
or the subject had eluded the surveillance.
Kinds of Surveillance
a. Stake Out or Surveillance of Places
b. Tailing or shadowing
c. Undercover investigation or “Roping”
17
A. Surveillance of Places
B. Shadowing or Tailing
Don’ts in Shadowing:
1. Don’t make abrupt or unnatural movements.
2. Do not make use of disguise that will attract attention.
3. Don’t meet the eye of the subject. Doing so tends to fix the
shadower in the mind of the subject. If the subject turns and it seems
as if a face to face encounter will result, the shadower must look
anywhere except the subject’s face.
4. Don’t adopt a slinking, sleuthing, creeping, peeking manner. Don’t
slink in and out of doorways, sleuth behind the subject, creep from
around parked cars, peek for around corners, it is unnecessary,
ineffectual and above all attract attention.
5. Don’t wear story- book disguises. False whiskers, artificial noses,
simulated deformities and the like rarely. If ever, are convincing when
worn by an amateur and seldom convincing for any length of time even
when worn by a professional actor or when applied by a professional
make- up artist. These disguises maybe good for the theater by not for
the street.
6. Don’t carry briefcases, notebooks, papers or other noticeable
objects.
7. Don’t greet or never speak to fellow officers or allow them to greet
you. It must be an established policy that other officer in or out of
uniform do not greet each other on the streets if there is any
possibility that one may be on a job.
18
8. Don’t make notations or entries ostensibly. Strangely enough
sometimes, the more experience shadower fails to observe this
precaution. This is so to avoid suspicion of his mission.
9. Beware of bulging concealed weapons.
10. Don’t attempt to appear too innocent if accosted by the subject.
11. Maintain distance
12 Note taking should be done in safe areas.
Don’ts in Surveillance:
1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corners.
4. Getting out immediately on public conveyances.
5. Retracing
6. Entering mobile housing.
Methods of Shadowing
A. Foot Surveillance
1. One- man shadow
2. Two- Man Shadow
3. Three- man Shadow or ABC method
B. Automobile Surveillance
This requires careful preparation, wherein the shadowers must use a
vehicle if the subject uses a vehicle. The vehicle used by the
shadowers must be non-descript, preferably rented vehicles since they
can be changed often. The license plates must be anonymous if the car
used in shadowing is official or government vehicles. The “tail” car
may be changed several times a day to lessen chances of being detected.
It is preferred that there be three men in shadow car. Number one man
is the driver, number two watches for a convoy, number three takes
notes. The notes include and place every act and every contact of the
subject vehicle and its passengers. Complete descriptions are made of
all persons contacted if their identities are unknown.
If number two catches a convoy, then the tail job is switched to
the convoy car. The driver will avoid attracting attention by deriving
at normal speed in reasonable manner. He will avoid unnecessary
turning, twisting, stating, stopping and other maneuvers.
When the subject leaves his vehicle, number two and three leave
the shadow car and take up the surveillance on foot. Number one remains
with the car.
20
In automobile surveillance, the vehicle used should conform to the
same characteristics as the investigation or surveillance. The make and
model of the car should not be spectacular or readily unidentifiable,
and it should not carry any distinctive license plates.
a. License Plate – a popular type of black color car should be used and
care must be taken that the license plates are not identified. This can
be remedied by the following:
1. Use of security plates
2. Use of “colorum cars” “drive-it- yourself” rented cars
3. Borrowing cars from friends.
21
In law enforcement agencies, members of organized crime, local
gambling operators and prostitutes make it their business to get to know
the faces of as many member of the police department as possible. For
this reason, rookie officers are always in demand for undercover
assignments in the vice and narcotics units.
In business and industry, the vast majority of undercover agents
are found in here, not law enforcement. They are employed directly by
corporations or employed by private agencies for internal investigation.
Their importance in business and industry is the prevention and control
of employee theft.
Special Qualification
1. knowledge of the language
2. area background regarding events
3. knowledge about the customs and habits
4. physical appearance
Preparation of Assignments
a. Study of the subject
1. Name 7. Drug
2. Address 8. Hobbies
3. Description 9. Education
4. Family and relatives 10. Occupation and
5. Associates specialty
6. Character and temperament
22
b. Knowledge of the Area
1. Maps
2. National and Religious Background
3. Transportation
4. Public utilities
c. Subversive Organizations
1. History and background of organization. Biography of the
official
2. Identity and background of members and former members.
3. Method of identification employed by members.
4. Files and records- nature , location, accessibility
5. Meeting- schedule and meeting place.
Hazard to Cover:
1. Passive opposition- refers to people who are not directly
involved insecurity and CI activities.
2. Friendly or not hostile opposition- refers to friendly
organizations that may hinder the operations.
3. Unfriendly or hostile active opposition- refers to the enemy
intelligence operations that may compromise the undercover.
Reconnaissance
Refers to the gathering specific or detailed information at a
particular time and place.
Methods of Reconnaissance
1. Personal Reconnaissance – this is the most effective casing method
and produces the most information since you know just what you’re
looking for. However, this method does not permit the agent
handler to use it frequently.
2. Map Reconnaissance- this method cannot completely answer all
question, but produces good picture of the general area to include
road and street networks.
3. Research- this normally means a study of unclassified sources such
as atlases, local newspapers, periodicals, public bulletins,
telephone and city directories, radio and television broadcast and
other available references. (Biological Intelligence)
4. Prior Information- this consists of reports on file with the
intelligence unit.
“Clipping Services”- it is the collection of news items of
intelligence value in publications both of local and foreign. These
published items are cut, and pasted with their captions. So much
information on a specific subject can be obtained from publications
like newspapers, magazines, periodicals, reports and other printed
matters.
Clandestine Operation
A secret action undertaken by an intelligence /counter
intelligence organization in behalf of the government or other
friendly forces.
Motivation of an Agent
1. Ideology- believe in the principles of life
2. Patriotism
3. Remuneration- mercenary-the primary motive
4. Career development
5. Fear
“N e v e r, n e v e r l o v e y o u r a g e n t”
Termination problems:
1. Amount of knowledge the agent has in the operation and
personnel.
2. His inclination to use knowledge to the disadvantage of the
intelligence service.
Moral obligation to the agent.
INFORMANT MANAGEMENT
-Informant is a person who gives information to the investigator.
He may give the information openly and even offer to be a witness, or
he may inform the investigator surreptitiously and request to remain
anonymous.
- The word “ informant” today has many meanings and connotations.
To the public the informant is an obnoxious, money- motivated person
selling another. To the underworld, he is a “Stool Pidgion” exposing
their activities and identities. To police intelligence, he is a
“Savior” for without his valuable reports and revelations, many of the
criminal cases would end up as unsolved. To police intelligence, an
informant is “anyone who can furnish information”; in other words he
is one of the sources of police intelligence information.
J.P.E
The End!