Professional Documents
Culture Documents
Related Terminologies:
Classified Matters- information that, in any form which in the interest of national
security, must be safeguarded in the manner and to extent requires by its importance.
Compromise- refers to the loss of security which results from an unauthorized person
obtaining knowledge of classified matter.
Classification is limited to the information and material that require the highest degree
of protection. Refers to information or materials that are extremely important for defense, and
the unauthorized disclosure would cause exceptionally grave damage to the country.
Example/s:
a. Military/Police defense plans- a strategic plan that documents the complete operations
of war.
b. Major government projects such as drastic proposal to adjust the nation’s economy or
political set up (CHA CHA or CON CON)
c. Definite severance of diplomatic relationship that would damage the defense of the
nation.
d. Important political documents dealing with negotiations for major alliances.
e. Information on which would relate capabilities of major successes of our intelligence
service.
f. Strategic plan documenting the overall conduct of activity.
SECRET MATTER
Example/s:
a. Intelligence plans and estimates and watch list information
b. Documents showing dispositions of PNP or AFP forces
c. Information and material that would jeopardize international relations
d. Information and material that would compromise defense plans and scientific or
technological development important to national defense
e. Information and material that would reveal important intelligence operations
f. Complete plans for future operation of war not under top secret
g. New design of aircraft, projectiles, tanks, radar and other devices
CONFIDENTIAL MATTER
Information and material whose unauthorized disclosure, while not endangering the
national security, would be prejudicial to the interest or prestige of the nation or government
activity or would cause administrative embarrassment or unwarranted injury to an
individual or would be an advantage to a foreign nation.
Example/s:
a. Personnel record and staff matters
b. Routine intelligence reports
c. Plans of government projects such as roads, buildings or developmental areas
d. Routine service reports such as operations and exercises of foreign power
e. Investigation and documents of personnel which are disciplinary in nature, the
knowledge of which is desirable form of safeguard for administrative reason.
RESTRICTED MATTER
Information and material that requires special protection other than those determined
to be top secret, secret, or confidential.
Example/s:
a. Department books or instruction, training and technical documents intended for
official use only and not intended for release to the public.
b. Routine information relating to supply and procurements
c. Minor modifications and routine tests of equipment
d. Certain compilations of data or items that individually may be unclassified but which
in the aggregate warrants a classification.
The cover of classified material is used to call the attention of the personnel handling it, to the
fact that it is a classified document, and to protect it against unauthorized scrutiny. The cover
shall have the stamp identifying the classification of the document.
On board aircraft or ships. If the aircraft carrying classified material is forced to land
or a ship captured, the material should be destroyed in a way that it will not be recognized; it
is preferable to burn it.
Security of the typewriter ribbons. The typewriter ribbons, whether made of cotton,
rayon, paper or silk, which are used to write classified information are not safe until they
have been written over twice. Many of the ribbons for typewriter machines can only be used
once, therefore, have in mind that the impressions of the letters remain in the ribbons and
these are significantly valuable to the enemy as is the paper in which the information was
typed. These ribbons should be protected accordingly.
1. Top Secret
Classification. The original classification authority for assignments of top secrets
categories exclusively rest with the head of the department. This may however be
delegated to certain cleared officers in instances when the necessity for such arises.
Officials who are authorized to assign top secret classification are the chief of the PNP;
the regional directors of police regional offices; the secretary of staff of the AFP; and the
major service commanders of AFP.
Reproduction. Top secret documents may be copied, extracted, reproduced only when
all the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
2. Secret
Classification. Those persons authorized to classify top secret. The other authorized
officers are: PNP directorates and staff, directorate of separate units; political attaches,
and AFP and civil government agencies.
Reproduction. Secret documents may be copied, extracted, reproduced only when all
the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
3. Confidential
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
4. Restricted
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
Name: Judy Ann M. Lawaan Subject/ Code: CDI 1 CR 321 Rating: _____
1. What is Collation?
2.
Define evaluation?
Related Terminologies:
Agent
This is a person who engages in spying or in support of those who do, or who seeks to
detect them and whose primary objective is to obtain information pertaining to processes,
activities, movements or operations of others.
Clandestine Communication
It is all means of operational contacts between person within the clandestine
organization as well as the transmission of messages on data, or the transportation of supplies
or equipment.
Casing
This is an inspection of place to determine its suitability for a particular clandestine
operation of organization.
Clandestine operation
This is an operation conducted in secrecy, but with no effort to disguise its nature.
Debriefing
An interview with personnel from a mission or captivity to get information of
particular interest.
Safe site
Any secured area or any structure which can provide concealment to a clandestine
meeting. Example: home apartment, office, beach house
In planning a contact with an agent, the emphasis is on simplicity, clarity and security.
The seven most important considerations in personal meeting are as follows:
a. Location
b. Time, date, frequency and duration
c. Cover story
d. Cover conversation
e. Signals
f. Detection of Surveillance
g. Escape Planning
2. Impersonal Meeting
It is a means of communication wherein the case officer and the agent do not meet but
continuously communicate with each other through the use of cut-out.
Cut-out
It is a person or device interposed between two persons and groups to provide
communication at the same time.
ELICITATION
Characteristic of Elicitation
Conversation Means:
Techniques in Elicitation
1. Talk topics of interest to the subject
2. Be a good listener and be patient
3. Switch topic when there is a logical opening
4. Try not to get too much quickly
5. Talk and act naturally
6. Avoid direct question
7. Pay particular to non-verbal reactions
8. Use approaches and probes when opportunity arises
9. Switch to an innocent subject before departing/terminating the interview.
Principles of Elicitation
Two basic devices:
a. Approach- used to start a conversation or to shift the direction of an existing
conversation.
• Flattery approach- effective because they appeal to the ego, self esteem and
prominence of an individual.
i. Teacher/pupil- make the person express topics about him/herself. Most people like to
talk about themselves.
ii. Kindred Sole-people express a need for recognition, particularly the lonely,
neglected, the vain and those with feelings of inferiority.
iii. Good Samaritan- do good deeds or favors to the source.
iv. Partial disagreement approach- seeks to produce talking by the word “ I’m not sure
if I fully agree.”
• Provocative approach- designed to induce the source to defend a position, state a
creed, or correct a wrong impression.
i. Teaser-bait: make the source believe you know more than him or her about the topic.
ii. Joe blow: purposely disagree with the source to induce anger.
iii. Manhattan and Missouri approach: the elicitor adopts an unbelievable attitude
above anything. He questions all statements and oppositions.
iv. National pride approach: natural propensity of all persons to defend their country
and its policies.
b. Probes- an attempt to obtain more information after the subject gives a vague,
incomplete general response. A probe is used with an approach in order to sustain a
conversation.
i. Completion: By inserting bits of factual information on a particular topic, the
source may be influenced to confirm and further expand on the topic.
ii. Clarity: A request for additional information where the sources response is
unclear. For example: I agree, but what do you mean by…………..?
iii. Hypothetical: Can be associated with a thought or idea expressed by the source.
Many people who might not make a comment concerning an actual event may
express an opinion on hypothetical situation.
iv. High Pressure Probe: It serves to pin down a subject in a specific area or it may be
used to point out contradictions in what the subject said (Salamanca, Estoque, &
Aclis, 2017).
Definition of Cover
It is a strategy by which the investigator conceals his identity and his relation with the
investigative agency (Salamanca, Estoque, & Aclis, 2017).
It is also a mean by which individual, group or an organization conceals the true
nature of their activity and existence from the observer or outside elements (Soriano, 2004).
It is used so that intelligence agencies may operate with minimal interference from the
outside elements. By “outside elements”, it means those not having the need to know.
Undercover is a person with cover.
Cover story- a false story or identity used by spies or undercover agent to cover up their
spying activities.
Deep penetration- it is a type of undercover operation in which technique is applied
continuously and not over a limited period of time.
Defector- a person who has decided to work for an opposing country or intelligence
organization; it is a person who turns away or against his allegiance to the government.
Handler- another word for controller or an agent who directs and support spies working
undercover.
Functions of Cover
a. Defensive cover-- it serves to prevent detection.
b. Offensive cover—it gives access to the target and facilities for the achievement of the
clandestine activities.
Nature of Cover
a. Witting or unwitting exposure.
b. Any cover that is subjected to close scrutiny for an extended period of time will
probably be compromised.
c. Cover might appear plausible to the user, however, it is not so to the observer.
d. The cover must prove undercover identity with the opportunity to get the work done.
CONCEPTS OF COVER
4. Official cover
A cover sponsored by an overt agency of a government.
5. Non-official cover
A person adopted by a person free of any official connection.
6. Artificial
Cover using biographical data adopted for a fictitious purpose.
1. Natural cover
Using true or actual personal background to fit the purpose.
2. Artificial cover
A cover using biographical data adopted for a fictitious purpose.
4. Multiple cover
Any cover identity wished.
2. Light Cover
Any undercover police officer working under “light” may have a spurious document to
establish a fictitious identification, i.e., ID, driver’s license, etc., but will most likely go
home to his family and “real” life. Sometimes drug enforcement officers and other specially
trained agents will be called for these assignments.
1. To gain confidence of the suspect and to gain unquestioning acceptance to the target
organization.
2. To penetrate a reported crime syndicate or a subversive organization.
3. To verify information submitted by informants or witnesses.
4. To trace security leaks and violations in police or military offices.
5. To support surveillance operations by providing an acceptable and logical basis for
surveillance personnel being in a particular area or location during surveillance.
• Dwelling assignment- is one where the agent establishes residence in or near the
dwelling houses of the subject.
• Work assignment- places the investigator in a type of employment where he can
observe the activities of subject at his place of work.
Cover Story
It is a biographical account, true or fictitious, or a combination of truth or fiction
which portrays the undercover agent’s past history, and current status. This may be a natural
cover story, artificial cover story and a combination of true or false persona data.
3. Complete Background
The cover story must include the material on all aspects of the undercover agent’s
previous background, regardless of whether or not it is anticipated that this information will
be required.
4. Continuous Contact
It includes provisions for sufficient contact between the undercover agent and the target
of interest to produce worthwhile results.
5. Safe Departure
It must consider the removal of the undercover agent from the target area in the event the
operation is compromised, or the conclusion of the investigation or collection of information.
CBI is entirely different from partial background investigation since the latter is
limited only to some of the circumstances of subject’s personal life.
It is also a detailed check on an individual’s activity from the town a person was born
and life 15 years ago.
d. Residence History
e. Educational Background
i. Elementary/High School
ii. Name of School
iii. Year Graduated
iv. College (degree, school or university, year graduated)
v. Post Graduate degree (if any)
f. Employment History
g. Citizenship History
i. Credit Record
j. Foreign Travel
k. Neighborhood Check
l. Organizational Membership
m. Character References
n. Criminal Records
ACTIVITY 10:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
Name: Judy Ann M. Lawaan Subject/ Code: CDI 1 CR 321 Rating: _____
1. What is a cover story?
a plausible but false statement about the purpose of a research study given
to research participants to avoid disclosing to them the true hypothesis
being investigated.
2. Differentiate Deep cover agent from Light cover agent and site an example.
A light cover agent is any undercover police officer working under “light”
may have a spurious document to establish a fictitious identification, i.e.,
ID, driver’s license, etc., but will most likely go home to his family and
“real” life. Sometimes drug enforcement officers and other specially trained
agents will be called for these assignments, and the deep cover agent It
may be someone with extensive experience in undercover work, or a
young person selected from an academy training class. Novices are
actually preferred sometimes because they have not acquired the typical
authoritarian habits that might give them away as police officers, and also
because they are less likely to be recognized by regular police officers in
the field who might unknowingly reveal their identity in a chance
encounter, example In the Lois and Clark episode "Super Mann", a star
quarterback, country singer, and model are revealed to be deep cover agents
from Nazi Germany. Ingrid Bannister in the MacGyver episode "The Enemy
3. Within". She hypnotises her husband into telling her secrets on a frequent basis.
Explain the Cardinal Rule in Elicitation
You must never arouse suspicion that curiosity is prompted by more than a
casual or personal interest. In other words, you must never appear to be
“fishing for information”. It means if you want to gathered information you
should have to make sure if that information is based on fact, and make
sure that information is not just about what you think and what you feel but
of course keep it seriously.
CASING
Casing maybe used to locate and/or provide information on meeting sites, safe
houses, dead drops, air and sea reception sites, catching sites, air fields and radio sites, VIP
security coverage, etc.
Types of Casing
a. Exterior Casing- it is the observation of the whole area, building and installation,
possible exits and approaches, type of vicinity that may be of help to any intelligence
or counter-intelligence operation.
Methods of casing
1. Personal Reconnaissance
This is the most effective method and will produce the most information since you
know the details.
2. Map Reconnaissance
It produces a good picture of the area. Through the map, you can make visual survey
or observation of the target area.
3. Research
It is the study of unclassified sources like local newspaper, periodical, public bulletin
and radio broadcast and from telecast.
4. Prior information
This is a study of on-file report or activities of the target place or file reports of other
intelligence units.
5. Hearsay
This type of information is not reliable.
Information Desired
a. Active Opposition
It consists of all elements of opposing security system to prevent intelligence activity in
the area. It includes also the security system of friendly forces in the area that does not
have the ‘need to know’.
• Professional services
• Civil service such as the police, fire department, any local government agency or
other intelligence units.
• Observing Public—it includes informers, sympathizers and any other who are
willing to report information of any careless casing activity.
SURVEILLANCE
Definition of Surveillance
It is a secret observation of persons, places, and vehicles for the purpose of obtaining,
information concerning the identities of criminals and their activities (Garcia, 2003).
Related Terminologies:
Objectives of Surveillance
1. Learn the identity of the persons involved in a given activity and obtained detailed
information concerning the scope and nature of its activities.
2. To locate the residence, place of business, dead drops, and other places frequented by
associates and accomplices of persons of interest to the investigation.
3. To locate a subject by watching his haunts or associates.
4. Secure basis for obtaining search warrant and obtain advisable legal evidences for use
in court.
5. To check on the reliability of informants.
6. Prevent the commission of espionage, sabotage or subversion.
7. To obtain information for later use in interrogation.
8. To know at all times the whereabouts of individual.
9. To locate hidden property or contraband.
1. Covert surveillance
This is a type of surveillance conducted to a subject who is unaware that he/she is
under surveillance.
2. Overt surveillance
This occurs if the subject is aware that he/she is under surveillance.
Kinds of Surveillance based on the location of the subject (Negosa, and Gabao, 2019).
1. Moving surveillance- conducted when the person, object or activity being watched
moves from one place to another.
It is performed by foot or by the use of any transportation vehicle in order to observe
the subject.
2. Fixed surveillance- conducted when the person, object or activity being watched is not
expected to move from one area.
Method of Surveillance
1. He/she must be of an average height, built and general appearance of a person who
could easily mingle with the crowd without being conspicuous.
2. Adapt an inconspicuous clothes and jewelry.
3. Grooming and body accessories must blend with the crowd to avoid unnecessary
attraction or attention or to avoid him/her being fixed in the mind of a very observant
person.
4. Avoid noticeable peculiarities in appearance and mannerisms.
5. He/she must be resourceful, alert, quick-witted, and versatile to reason out once accused
by others.
6. A good actor by being able to avoid suspicion in an embarrassing situation.
7. Be prepared for a ‘cover story’. The cover story must be believable regarding his/her
personal appearance. If he acts as a vendor, he/she must look as one without the display
of manicured fingernails or attire at odds with fictitious personality.
2. Dress of surveillant
The surveillant attire should be in harmony with the area or neighborhood in which
surveillance is conducted.
3. Precautions
• Do not make abrupt, unnatural move.
• Do not use theatrical disguises.
• Never stare directly at the subject.
• Never look directly at the subject’s eye.
• Do not attempt to appear innocent.
• When in dangerous neighborhood, walk near the curb to reduce the possibility of
attack from doorways and alleys.
• Exercise extreme caution in dark alleys.
• Never speak to or appear to recognize another surveillant unless absolutely necessary
to accomplish the mission.
• Inexperienced surveillants must conquer the tendency to believe in themselves ‘made’
when the subject glances in their direction several times.
Shadowing by Foot
It employs the use of one or more surveillants where the surveillant and the subject
travel by foot and the surveillant has to shadow him for the rest of the operation.
Shadowing by Vehicle
It may involve the use of one or more vehicle normal to the area.
4. Leapfrog method
Only one member of the team maintains contact with the subject. It is a close tail, with the
other members of the squad keeping contact with those immediately ahead of them. At
stated intervals of five to six minutes or upon signal, the man immediately behind the one
keeping contact will move up and take his place; the one that had been in contact will stop,
look in a show window or wait at a traffic light, then take his place behind the last man of
the group. This procedure is continued in rotation as long as the tail is maintained (Negosa,
H. and Gabao, 2019).
Counter-Surveillance Techniques
Please prepare for Final Examination Covering the entire Learning Packet
Module 3 & 4. Announcement will be posted in the group chats regarding the specific
schedule and collection of examination.