You are on page 1of 27

UNIT IV: Lesson 4 –

Document & Information


Security (Week 14-18)
This periodic lesson is about Introduction
to Police Intelligence. At the end of this
lesson, you should be able to:

1. Discuss the different terminologies


used in document and information security
2. Determine the different categories of
classified matters.
3. Discuss the different terminologies
used in clandestine activities.
4. Determine the different means of
clandestine communication.
5. Discuss the different terminologies
used in Elicitation.
6. Determine the different elicitation
tricks and techniques.
7. Discuss the different terminologies
used in undercover and surveillance
8. Differentiate the general use and
specific use of undercover technique
9. Discuss the different types of
undercover assignments.
10. Discuss the definition of casing and
surveillance and its types.
11. Determine the objectives of
conducting surveillance.
12. Enumerate the different type of
Source: Vectorstock.com surveillance methods.
DOCUMENT AND INFORMATION SECURITY (Manwong, 2008)

Document Security- aspect of security which involves the application of security


measures for the proper protection and safeguarding of classified information. (in a
document)

Information Security- is the protection of information of value from the enemy


force.

Related Terminologies:

Documents- it is any recorded information without considering its form or


characteristics and includes, without being limited to the following handwritten and
typewritten or printed material; all drawn, painted or engraved material ; all sound
recordings, voices, tapes, or records and all types of photographs and films, in negatives or
processed, fixed or in motion.

Classify- to assign info by one of the four classification categories.

Classified Matters- information that, in any form which in the interest of national
security, must be safeguarded in the manner and to extent requires by its importance.

Compromise- refers to the loss of security which results from an unauthorized person
obtaining knowledge of classified matter.

Custodian- a person in possession or that has the responsibility of protecting and


accounting for classified material.

Certificate of Destruction- it is the certification by a witnessing officer that the


classified matters describe therein has been disposed of in his presence by approved
destruction methods.

Security clearance- this is an administrative or directorial administration that an


individual is eligible from security standpoint for access to a classified matter of specific
category.

Compartmentalization- the grant of access to classified matter is limited only to


properly cleared persons in the performance of their official functions.

Declassify- removal of security classification from classified matter.

Reclassify- act of changing the assigned classification of matter.

Upgrading- act of assigning to matter of higher classification to a classified


document.
Properly Authorized Person- a person who has been authorized to work with
classified information.

CATEGORIES OF CLASSIFIED MATTERS (Manwong, 2008)

TOP SECRET MATTER

Classification is limited to the information and material that require the highest degree
of protection. Refers to information or materials that are extremely important for defense, and
the unauthorized disclosure would cause exceptionally grave damage to the country.
Example/s:
a. Military/Police defense plans- a strategic plan that documents the complete operations
of war.
b. Major government projects such as drastic proposal to adjust the nation’s economy or
political set up (CHA CHA or CON CON)
c. Definite severance of diplomatic relationship that would damage the defense of the
nation.
d. Important political documents dealing with negotiations for major alliances.
e. Information on which would relate capabilities of major successes of our intelligence
service.
f. Strategic plan documenting the overall conduct of activity.

SECRET MATTER

Classification will be limited to defense information and material whose unauthorized


disclosure would endanger national security, cause serious injury to the interest and prestige
of a nation or of any government activity or would be of great advantage to a foreign nation.

Example/s:
a. Intelligence plans and estimates and watch list information
b. Documents showing dispositions of PNP or AFP forces
c. Information and material that would jeopardize international relations
d. Information and material that would compromise defense plans and scientific or
technological development important to national defense
e. Information and material that would reveal important intelligence operations
f. Complete plans for future operation of war not under top secret
g. New design of aircraft, projectiles, tanks, radar and other devices

CONFIDENTIAL MATTER

Information and material whose unauthorized disclosure, while not endangering the
national security, would be prejudicial to the interest or prestige of the nation or government
activity or would cause administrative embarrassment or unwarranted injury to an
individual or would be an advantage to a foreign nation.
Example/s:
a. Personnel record and staff matters
b. Routine intelligence reports
c. Plans of government projects such as roads, buildings or developmental areas
d. Routine service reports such as operations and exercises of foreign power
e. Investigation and documents of personnel which are disciplinary in nature, the
knowledge of which is desirable form of safeguard for administrative reason.

RESTRICTED MATTER

Information and material that requires special protection other than those determined
to be top secret, secret, or confidential.

Example/s:
a. Department books or instruction, training and technical documents intended for
official use only and not intended for release to the public.
b. Routine information relating to supply and procurements
c. Minor modifications and routine tests of equipment
d. Certain compilations of data or items that individually may be unclassified but which
in the aggregate warrants a classification.

Covers of Classified Material

The cover of classified material is used to call the attention of the personnel handling it, to the
fact that it is a classified document, and to protect it against unauthorized scrutiny. The cover
shall have the stamp identifying the classification of the document.

Handling of Classified Documents

Protection of classified material in the hands of persons that are travelling:


1. A person receiving travel orders, and who is unauthorized to carry classified material,
will protect such material by the following methods:
a. He will contact his commander in order to obtain the corresponding means of
protection, according to the particular classification of the material.
b. Keep the material under his personal control continuously. It is the responsibility of
the carrier of classified material to do his best judgment for his actions, in order to
avoid risky situations that might compromise the classified material.
2. The personnel on travel mission will not carry classified material when crossing
international borders where the classified material might be subject of scrutiny by
“unauthorized” persons. Such material when forwarded previously is by mail.

Destruction in Case of Emergency


Plans. The commander and chief responsible for the protection of classified material
will make formal plans for the destruction or safer transfer of all classified material under its
jurisdiction, in case of civilian disturbance, disaster, or enemy action.

On board aircraft or ships. If the aircraft carrying classified material is forced to land
or a ship captured, the material should be destroyed in a way that it will not be recognized; it
is preferable to burn it.

Security of the typewriter ribbons. The typewriter ribbons, whether made of cotton,
rayon, paper or silk, which are used to write classified information are not safe until they
have been written over twice. Many of the ribbons for typewriter machines can only be used
once, therefore, have in mind that the impressions of the letters remain in the ribbons and
these are significantly valuable to the enemy as is the paper in which the information was
typed. These ribbons should be protected accordingly.

Classified trash. Trash such as drafts, minutes, notes, Dictaphone recordings,


typewriter ribbons, carbon paper, rolls of film, and similar articles, containing information of
national defense shall be protected by a responsible person, according to their classification,
until they can be destroyed in an orderly fashion the same as for the material of similar
classification. It is necessary to have a certificate of destruction.

Classification, Reproduction, Storage and Destruction of Classified Documents

1. Top Secret
Classification. The original classification authority for assignments of top secrets
categories exclusively rest with the head of the department. This may however be
delegated to certain cleared officers in instances when the necessity for such arises.
Officials who are authorized to assign top secret classification are the chief of the PNP;
the regional directors of police regional offices; the secretary of staff of the AFP; and the
major service commanders of AFP.
Reproduction. Top secret documents may be copied, extracted, reproduced only when
all the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for top secret.

2. Secret

Classification. Those persons authorized to classify top secret. The other authorized
officers are: PNP directorates and staff, directorate of separate units; political attaches,
and AFP and civil government agencies.
Reproduction. Secret documents may be copied, extracted, reproduced only when all
the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for secret. Except that there is no need to prepare certificate of
destruction, instead a record of destruction is prepared and the witnessing officer must be
cleared for secret matter.

3. Confidential

Classification. Persons authorized to assigned confidential classification in the


performance of official duties are the commissioned officers in the active PNP service.

Reproduction. The copying, extracting of confidential document is authorized, unless


the higher authority has specifically denied such authority.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for confidential. There is no need to prepare records of destruction,
and is done without any witnessing officer.

4. Restricted

Classification. Persons authorized to assign restricted classification in the


performance of official duties are the commissioned officers in the active PNP service.

Reproduction. The copying, extracting of confidential document is authorized, unless


the higher authority has specifically denied such authority.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for restricted. There is no need to prepare records of destruction,
and is done without any witnessing officer (Manwong, 2008).
ACTIVITY 9:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name: Judy Ann M. Lawaan Subject/ Code: CDI 1 CR 321 Rating: _____
1. What is Collation?

To collate is to bring back or return to the hereditary mass, in fact or fiction,


property which came from the estate of the decedent, during his lifetime,
but which the law considers as an advance from the inheritance. Collation
is applicable to both donations to compulsory heirs and donations to
strangers.

2.

Define evaluation?

"Evaluation is the collection of, analysis and interpretation of information


about any aspect of a programme of education or training as part of a
3. Differentiate document
recognised security
process from information
of judging security its efficiency and any other
its effectiveness,
outcomes
Informationit Security
may have."
is not only about securing information from
unauthorized access. Information Security is basically the practice of
preventing unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of information. Information can be
physical or electronic one, and Document Security effectively securing your
documents provides protection from unauthorised access and the
associated risks. In our ever changing technology based world it is
imperative to have control over all of your documents in order to maintain
control of your organisation and your future.
CLANDESTINE ACTIVITIES

It is an action used to accomplish intelligence, counter-intelligence and other similar


activities, sponsored or concocted by government, all departments in such a way to guarantee
secrecy or concealment.

Clandestine Operation – is a secret action undertaken by an intelligence/counter-


intelligence organization in behalf of the government or other friendly forces (Salamanca,
Estoque, & Aclis, 2017).

Related Terminologies:

Agent
This is a person who engages in spying or in support of those who do, or who seeks to
detect them and whose primary objective is to obtain information pertaining to processes,
activities, movements or operations of others.

Clandestine Communication
It is all means of operational contacts between person within the clandestine
organization as well as the transmission of messages on data, or the transportation of supplies
or equipment.

Casing
This is an inspection of place to determine its suitability for a particular clandestine
operation of organization.

Clandestine operation
This is an operation conducted in secrecy, but with no effort to disguise its nature.

Debriefing
An interview with personnel from a mission or captivity to get information of
particular interest.

Safe site
Any secured area or any structure which can provide concealment to a clandestine
meeting. Example: home apartment, office, beach house

Means of Clandestine Communication


1. Personal meeting
It is any face-to-face contact between two or more members of clandestine net. The
meeting may last several hours or may be only long enough for agent to pass a report to
another.

Advantages of Personal Meeting

a. There is an opportunity to pass a maximum amount of oral/written examination.


b. It offers an opportunity for the participants to ask question, answered and clear up
misunderstanding.
c. It allows a chance to make “on the spot” decisions or giving specific instructions.
d. Provide opportunity to bolster the morale of the agent.
e. Opportunity provided to exchange information, money, or equipment.
f. Assessment can be made of the agent’s attitude, truthfulness and physical and mental
condition.
g. More information can be exchanged quickly and with better understanding.

Important Considerations in Planning a Personal Meeting

In planning a contact with an agent, the emphasis is on simplicity, clarity and security.
The seven most important considerations in personal meeting are as follows:
a. Location
b. Time, date, frequency and duration
c. Cover story
d. Cover conversation
e. Signals
f. Detection of Surveillance
g. Escape Planning

2. Impersonal Meeting
It is a means of communication wherein the case officer and the agent do not meet but
continuously communicate with each other through the use of cut-out.

Cut-out
It is a person or device interposed between two persons and groups to provide
communication at the same time.

Cut-out may be:


 Live drop or Dead drop
 Witting or unwitting
 Moving or Stationary
Intermediary
It is an individual who serves as cut-out. Intermediaries may be witting and therefore,
members of the organization or unwitting as to the nature of their activity. In either case,
introduction of another person carries with it security hazards.

Advantages of Impersonal Meeting


a. Hide a relationship from the opposition.
b. Provide compartmentalization within the clandestine organization.
c. Provide security for the rest of the organization in case one part of it is penetrated.

An intermediary may be any of the following:


1. Live Drop (witting/unwitting live drop)
2. Cut-out devices
a. Dead drops- moving dead drops or mail
b. Couriers

ELICITATION

It is the technique of acquiring information of intelligence or of operational value in


conversation with a person who is not aware of your real interest or that you are purposely
collecting this information.
Elicitation is the gaining of information through direct communication and where one
or more of the involved parties is not aware of the specific purpose of the conversation.

It is a system or plan whereby information of intelligence value is obtained through


the process of direct communication where one or more of the parties to the communication
is/are aware of the specific purpose of the conversation (Salamanca, Estoque, & Aclis, 2017).

There are basic assumptions considered:


 Elicitation requires good skills in both verbal and non-verbal communications.
 The elicitor must have a general understanding of individual and cultural
idiosyncrasies. The source is probably operating under motivational forces to conceal
the desired information. Additionally, the source may have his/her own elicitation
skills and attempt to elicit information from the elicitor.

Characteristic of Elicitation

1. The person is not aware


2. There is little or no control over the individual
3. An isolated fragments of information

Conversation Means:

a. Interview – the conversation partner is cooperative, he is aware and he is not under


your control.
b. Debriefing – the conversation partner is cooperative, he is aware and he is under
some degree of your control.
c. Interrogation – the conversation partner is uncooperative or hostile, he is aware and
he is under your control.

Some of Elicitation Tricks


1. Quote a fact
2. Disagree partially
3. Use flattery but sensibly words
4. Share confidence
5. Make fragmentary remarks
6. Use analogous situation
7. Use negative approach
8. Use refreshments

Techniques in Elicitation
1. Talk topics of interest to the subject
2. Be a good listener and be patient
3. Switch topic when there is a logical opening
4. Try not to get too much quickly
5. Talk and act naturally
6. Avoid direct question
7. Pay particular to non-verbal reactions
8. Use approaches and probes when opportunity arises
9. Switch to an innocent subject before departing/terminating the interview.

Principles of Elicitation
Two basic devices:
a. Approach- used to start a conversation or to shift the direction of an existing
conversation.
• Flattery approach- effective because they appeal to the ego, self esteem and
prominence of an individual.
i. Teacher/pupil- make the person express topics about him/herself. Most people like to
talk about themselves.
ii. Kindred Sole-people express a need for recognition, particularly the lonely,
neglected, the vain and those with feelings of inferiority.
iii. Good Samaritan- do good deeds or favors to the source.
iv. Partial disagreement approach- seeks to produce talking by the word “ I’m not sure
if I fully agree.”
• Provocative approach- designed to induce the source to defend a position, state a
creed, or correct a wrong impression.
i. Teaser-bait: make the source believe you know more than him or her about the topic.
ii. Joe blow: purposely disagree with the source to induce anger.
iii. Manhattan and Missouri approach: the elicitor adopts an unbelievable attitude
above anything. He questions all statements and oppositions.
iv. National pride approach: natural propensity of all persons to defend their country
and its policies.

b. Probes- an attempt to obtain more information after the subject gives a vague,
incomplete general response. A probe is used with an approach in order to sustain a
conversation.
i. Completion: By inserting bits of factual information on a particular topic, the
source may be influenced to confirm and further expand on the topic.
ii. Clarity: A request for additional information where the sources response is
unclear. For example: I agree, but what do you mean by…………..?
iii. Hypothetical: Can be associated with a thought or idea expressed by the source.
Many people who might not make a comment concerning an actual event may
express an opinion on hypothetical situation.
iv. High Pressure Probe: It serves to pin down a subject in a specific area or it may be
used to point out contradictions in what the subject said (Salamanca, Estoque, &
Aclis, 2017).

Human weakness that can be exploited in elicitation


1. There is general inability to keep secrets.
2. It is a natural tendency for people to talk about matters that may or may not concern
him directly.
3. The enjoyment of gossip.
4. The need for recognition, particularly the lonely, neglected, vain and those with
feelings of inferiority.
5. There is tendency to underestimate the importance of the information imparted.
6. The habit of advising, contradicting, teaching, correcting and challenging.
7. The tendency to be indiscreet when emotion is involved.
8. The tendency of professionals to share confidence or show off expertise to another of
his/her profession.

Cardinal Rule of Elicitation


You must never arouse suspicion that curiosity is prompted by more than a casual or
personal interest. In other words, you must never appear to be “fishing for information”.

UNDERCOVER AND SURVEILLANCE

Definition of Cover

It is a strategy by which the investigator conceals his identity and his relation with the
investigative agency (Salamanca, Estoque, & Aclis, 2017).
It is also a mean by which individual, group or an organization conceals the true
nature of their activity and existence from the observer or outside elements (Soriano, 2004).

It is used so that intelligence agencies may operate with minimal interference from the
outside elements. By “outside elements”, it means those not having the need to know.
Undercover is a person with cover.

Cover story- a false story or identity used by spies or undercover agent to cover up their
spying activities.
Deep penetration- it is a type of undercover operation in which technique is applied
continuously and not over a limited period of time.

Deep Penetrating Agent- an agent who utilizes deep penetration.

Defector- a person who has decided to work for an opposing country or intelligence
organization; it is a person who turns away or against his allegiance to the government.

Handler- another word for controller or an agent who directs and support spies working
undercover.

Essential Uses of Cover


a. Secrecy of operation against enemy intelligence
b. Secrecy of operation against friendly agencies, who do not have the “need to know”
c. Pursue successful accomplishment of the mission

Functions of Cover
a. Defensive cover-- it serves to prevent detection.
b. Offensive cover—it gives access to the target and facilities for the achievement of the
clandestine activities.

Nature of Cover
a. Witting or unwitting exposure.
b. Any cover that is subjected to close scrutiny for an extended period of time will
probably be compromised.
c. Cover might appear plausible to the user, however, it is not so to the observer.
d. The cover must prove undercover identity with the opportunity to get the work done.

CONCEPTS OF COVER

1. Cover for status


A cover that is general in nature and relatively permanently adopted to explain the
presence in any given area.

2. Cover for action


A cover designed to explain away or allow to perform a given clandestine activity. It
may be an extension of cover for status.
3. Natural cover
A cover which completely fits the true background and capabilities of the agent. It
affords maximum security protection to any clandestine activity and allows greater
operational flexibility.

4. Official cover
A cover sponsored by an overt agency of a government.
5. Non-official cover
A person adopted by a person free of any official connection.

6. Artificial
Cover using biographical data adopted for a fictitious purpose.

7. Living One’s Cover


The agent must make sure that every public action he takes fits his assumed cover and
that a total picture presented to others accurately reflects his cover.

Requirements for Cover


1. It must provide freedom of movement.
2. It must protect the investigator from compromise.
3. It must be consistent with the social status of the target personalities.
4. It must provide adequate leisure time.
5. It must be sufficiently flexible to meet changes in the situations.
6. It must be consistent with the financial resources available to the investigator.

Types of Cover (Manwong, 2008)

1. Natural cover
Using true or actual personal background to fit the purpose.

2. Artificial cover
A cover using biographical data adopted for a fictitious purpose.

3. Cover within a cover


Use of secondary cover in case of compromise which necessitates the admission of a
lesser crime.

4. Multiple cover
Any cover identity wished.

Definition of Organizational Cover


An account consisting of biographical data which when adopted by an individual will
assume the personality he wants to adopt.
Objectives of Organizational Cover
1. To camouflage and protect operating personnel and their activities.
2. Protect installation in which clandestine activities are based.

Guidelines for Organizational Cover


1. Organizational cover must appear to produce something.
2. Should device that not all personnel will work together at the same time.
3. Cover should be devoted to mission.
4. Start with a small organizational cover and provide room for expansion as it continues
to grow.

Guidelines when Cover and Organizational Cover are Compromised

In case cover is compromised, the following must be observed:


1. Move out immediately.
2. Start new facility for operations and develop it.
3. Build entirely new cover.
4. Use circuitous route and provide careful counter-surveillance.
5. Be patient, build slowly and carefully.

If organizational cover is compromised, following are the things to be considered:


1. Make a physical move or relocate.
2. Start new facility for old operation and let it grow.
3. Use new personnel.
4. Let old personnel remain in place.
5. Build entirely new cover identity.

General Qualifications of an Undercover


1. Emotional stability
2. Willingness
3. High level of intelligence
4. Physical stamina and courage
5. Retentive memory
6. Free from domestic problems

Definition of Undercover Assignment/Operations

A form of surveillance or investigative technique wherein the investigator discards his


true identities, assume another one, and makes a direct contact with the person, place, or
situation under investigation.

Broad Categories of Undercover Agents


1. Deep Cover
It may be someone with extensive experience in undercover work, or a young person
selected from an academy training class. Novices are actually preferred sometimes because
they have not acquired the typical authoritarian habits that might give them away as police
officers, and also because they are less likely to be recognized by regular police officers in
the field who might unknowingly reveal their identity in a chance encounter.

2. Light Cover
Any undercover police officer working under “light” may have a spurious document to
establish a fictitious identification, i.e., ID, driver’s license, etc., but will most likely go
home to his family and “real” life. Sometimes drug enforcement officers and other specially
trained agents will be called for these assignments.

Factors to be Considered in Planning an Undercover Assignment


1. Determine the level of investigation intended.
2. Developing appropriate cover story and cover, and selection of qualified personnel.
3. Consideration of all operation details including documentation, briefing, coaching and
rehearsing.

General Uses of Undercover Technique


1. When information or evidence would not be accessible by overt investigation or
through reliable informants.
2. When overt action might endanger the intelligence operations or investigation.
3. When overt action will arouse suspicion or alarm thus compromising the investigation
or otherwise alerting the subject.
4. When it is desirable to conceal the unit’s interest in a particular case or certain field of
investigation.
5. When all feasible means of overt investigation have been tried and proven unsuccessful.

Specific Uses of Undercover Techniques

1. To gain confidence of the suspect and to gain unquestioning acceptance to the target
organization.
2. To penetrate a reported crime syndicate or a subversive organization.
3. To verify information submitted by informants or witnesses.
4. To trace security leaks and violations in police or military offices.
5. To support surveillance operations by providing an acceptable and logical basis for
surveillance personnel being in a particular area or location during surveillance.

Types of Undercover Assignments

• Dwelling assignment- is one where the agent establishes residence in or near the
dwelling houses of the subject.
• Work assignment- places the investigator in a type of employment where he can
observe the activities of subject at his place of work.

• Social assignment- requires investigator to frequent places of entertainment and


amusement known to be habitually visited by target personalities and their associates.

• Personal contact or Roping (Rope Job) - investigator is required to develop friendship


and trust of target for the purpose of obtaining information and evidence.

Methods of Undercover Operations

1. Direct—employment and utilization of special agents.


2. Indirect—employment and utilization of controlled informants.

Cover Story
It is a biographical account, true or fictitious, or a combination of truth or fiction
which portrays the undercover agent’s past history, and current status. This may be a natural
cover story, artificial cover story and a combination of true or false persona data.

Factors to be Considered in Choosing a Cover Story

1. Justification for Presence and Activities


The story must include a logical explanation for the undercover agent’s presence, and
consistent with the activities in which he must engage during the investigation or collection
of information.

2. Mutual Point of Interest


The story must provide point of mutual interest between the target personalities,
undercover agents, undercover operations and cover story.

3. Complete Background
The cover story must include the material on all aspects of the undercover agent’s
previous background, regardless of whether or not it is anticipated that this information will
be required.

4. Continuous Contact
It includes provisions for sufficient contact between the undercover agent and the target
of interest to produce worthwhile results.

5. Safe Departure
It must consider the removal of the undercover agent from the target area in the event the
operation is compromised, or the conclusion of the investigation or collection of information.

Complete Background Investigation


It is a type of personnel security investigation as form of counter-intelligence of an
organization. Background investigation is an inquiry or to check the specific phase and all
aspects of a person’s life history.

CBI is entirely different from partial background investigation since the latter is
limited only to some of the circumstances of subject’s personal life.
It is also a detailed check on an individual’s activity from the town a person was born
and life 15 years ago.

Requisites of a Complete Background Investigation

a. National Agency Check


This is an investigation of an individual made upon the basis of written information
supplied by him in an official inquiry.
Examples are inquiry on the records or clearances from NBI, PNP, ISAFP and other
related agencies of the government.

b. Local Agency Check


This is a type of investigation which consists of written inquiries sent to appropriate
local government agencies.
This includes check with local police, Municipal Trial Court and Regional Trial
Court.
c. Personal History (see personal backgorund)

d. Residence History

e. Educational Background
i. Elementary/High School
ii. Name of School
iii. Year Graduated
iv. College (degree, school or university, year graduated)
v. Post Graduate degree (if any)
f. Employment History

g. Citizenship History

h. Family Background and Associates


i. Father’s name/Mother’s name
ii. Address/Occupation
iii. College/Degree, year graduated
iv. Brothers/sisters
v. Name of Associates

i. Credit Record
j. Foreign Travel

k. Neighborhood Check

l. Organizational Membership

m. Character References

n. Criminal Records
ACTIVITY 10:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name: Judy Ann M. Lawaan Subject/ Code: CDI 1 CR 321 Rating: _____
1. What is a cover story?

a plausible but false statement about the purpose of a research study given
to research participants to avoid disclosing to them the true hypothesis
being investigated.

2. Differentiate Deep cover agent from Light cover agent and site an example.

A light cover agent is any undercover police officer working under “light”
may have a spurious document to establish a fictitious identification, i.e.,
ID, driver’s license, etc., but will most likely go home to his family and
“real” life. Sometimes drug enforcement officers and other specially trained
agents will be called for these assignments, and the deep cover agent It
may be someone with extensive experience in undercover work, or a
young person selected from an academy training class. Novices are
actually preferred sometimes because they have not acquired the typical
authoritarian habits that might give them away as police officers, and also
because they are less likely to be recognized by regular police officers in
the field who might unknowingly reveal their identity in a chance
encounter, example In the Lois and Clark episode "Super Mann", a star
quarterback, country singer, and model are revealed to be deep cover agents
from Nazi Germany. Ingrid Bannister in the MacGyver episode "The Enemy
3. Within". She hypnotises her husband into telling her secrets on a frequent basis.
Explain the Cardinal Rule in Elicitation
You must never arouse suspicion that curiosity is prompted by more than a
casual or personal interest. In other words, you must never appear to be
“fishing for information”. It means if you want to gathered information you
should have to make sure if that information is based on fact, and make
sure that information is not just about what you think and what you feel but
of course keep it seriously.

CASING

It is a reconnaissance or surveillance of buildings, places or areas to determine its


suitability for intelligence use or its vulnerability to an intelligence operation.

The purpose of casing is to draw up a report with sufficient detailed information to


enable the reader to use the installation or area in the most secured and successful manner.

Casing maybe used to locate and/or provide information on meeting sites, safe
houses, dead drops, air and sea reception sites, catching sites, air fields and radio sites, VIP
security coverage, etc.

Types of Casing

a. Exterior Casing- it is the observation of the whole area, building and installation,
possible exits and approaches, type of vicinity that may be of help to any intelligence
or counter-intelligence operation.

b. Interior Casing- it is the close observation of the layout of the building.

Methods of casing

1. Personal Reconnaissance
This is the most effective method and will produce the most information since you
know the details.

2. Map Reconnaissance
It produces a good picture of the area. Through the map, you can make visual survey
or observation of the target area.
3. Research
It is the study of unclassified sources like local newspaper, periodical, public bulletin
and radio broadcast and from telecast.

4. Prior information
This is a study of on-file report or activities of the target place or file reports of other
intelligence units.

5. Hearsay
This type of information is not reliable.

Steps or Guide in the Conduct of Casing

1. Preparation of a general location map.


2. Sketch of the adjoining establishments and prominent features
3. Specific sketch or floor plan of main target
4. Detailed features of inner portion of target and its description
5. Photograph of the casing target

Guidelines in the Conduct of Casing

1. To gain contact as soon as possible and maintain continuously


2. Maneuver freely in conformity with operations (dry run)
3. To fight only when necessary
4. To report all items of information
5. To develop the situation

Information Desired

a. Active Opposition
It consists of all elements of opposing security system to prevent intelligence activity in
the area. It includes also the security system of friendly forces in the area that does not
have the ‘need to know’.

• Professional services
• Civil service such as the police, fire department, any local government agency or
other intelligence units.
• Observing Public—it includes informers, sympathizers and any other who are
willing to report information of any careless casing activity.

b. Area conditions and Habits


This is the description of the place as to rural or urban area, its transportation facilities,
the custom and tradition, habits of the people including operational data. (Time where the
area is useful-closing time)
c. Disposal Plan
It is the disposal of information in case of possible compromise.

d. Escape and Evasion Plan


This is the exit planning in case of emergencies, the knowledge of the escape route and
means of travel is very important.

SURVEILLANCE

Definition of Surveillance

It is a secret observation of persons, places, and vehicles for the purpose of obtaining,
information concerning the identities of criminals and their activities (Garcia, 2003).

Related Terminologies:

• Surveillant- the person who conduct surveillance.


• Subject- is the person, place or thing under surveillance.
• Convoy- an associate of the subject who follows him in an attempt to detect
surveillance.
• Decoy- a person or object used by the subject to elude surveillance.
• Contact- is any person with whom the subject speaks, to whom he passes articles or
from which he receives articles.
• Shadow- to follow secretly; to place a person under surveillance.
• Lost- when the surveillant does not know the whereabouts of his subject or the
subject has eluded the surveillance.
• Eyeball- the channel which has direct observation of the subject.
• Made- to be detected or suspected of being surveillant of the subject.
• Rabbit- refers to the subject or person being followed in a surveillance operation.
• Stakeout- a process wherein a part of the surveillant group clandestinely position
himself in an advantageous and fixed position to clearly monitor and observe the
subject and his activities.
• Technical surveillance- surveillance involving the use of scientific devices to
enhance hearing or seeing the subject’s activities.
• Pre-surveillance conference- a conference held among the team members before
surveillance is conducted.
• After Mission Report-account submitted immediately upon completion of mission
by an undercover agent.
• Burn the surveillance- when the surveillant behavior causes the subject to surmise or
know that s/he is under surveillance.
• Mustard plaster- the subject is followed so closely that the surveillant and subject
are almost in lock step.
• Tailgaiting- a form of open surveillance in which the subject’s vehicle is closely
followed.

Objectives of Surveillance

1. Learn the identity of the persons involved in a given activity and obtained detailed
information concerning the scope and nature of its activities.
2. To locate the residence, place of business, dead drops, and other places frequented by
associates and accomplices of persons of interest to the investigation.
3. To locate a subject by watching his haunts or associates.
4. Secure basis for obtaining search warrant and obtain advisable legal evidences for use
in court.
5. To check on the reliability of informants.
6. Prevent the commission of espionage, sabotage or subversion.
7. To obtain information for later use in interrogation.
8. To know at all times the whereabouts of individual.
9. To locate hidden property or contraband.

Types of surveillance based on the knowledge of the subject:

1. Covert surveillance
This is a type of surveillance conducted to a subject who is unaware that he/she is
under surveillance.

2. Overt surveillance
This occurs if the subject is aware that he/she is under surveillance.

Kinds of Surveillance based on the location of the subject (Negosa, and Gabao, 2019).

1. Moving surveillance- conducted when the person, object or activity being watched
moves from one place to another.
It is performed by foot or by the use of any transportation vehicle in order to observe
the subject.

2. Fixed surveillance- conducted when the person, object or activity being watched is not
expected to move from one area.

Method of Surveillance

1. Loose surveillance-also known as “discreet surveillance”. Observation of the subject


is not continuous and the objective is not to be “made”. It may be called off when the
subject becomes suspicious.
2.
3. Close surveillance- it also termed as “tight surveillance”. Continuous observation of
the subject is maintained at all times, even if it appears to become suspicious and the
objective is not to get “lost”.

4. Combination of loose and close surveillance- circumstances which usually depend


on a specific act of the subject may necessitate a change from a loose surveillance to a
close surveillance.

Procedures in Fixed Surveillance

1. Use a room nearby house or building.


2. Use camera with telephoto lens and powerful binoculars in order to get pictures of
subject, visitors and activities.
3. Use listening devices, if situation allows.
4. Some surveillants may remain outside, posing as carpenters, plumbers, etc.

Tools Used in Fixed Surveillance


1. Binocular
2. Telescope
3. Cameras with telephoto lens
4. Wiretapping devices
5. Listening devices
6. In case there is difficulty in wire tapping device, an expert in lip reading must be
employed.

Personal Appearance of Surveillant

1. He/she must be of an average height, built and general appearance of a person who
could easily mingle with the crowd without being conspicuous.
2. Adapt an inconspicuous clothes and jewelry.
3. Grooming and body accessories must blend with the crowd to avoid unnecessary
attraction or attention or to avoid him/her being fixed in the mind of a very observant
person.
4. Avoid noticeable peculiarities in appearance and mannerisms.
5. He/she must be resourceful, alert, quick-witted, and versatile to reason out once accused
by others.
6. A good actor by being able to avoid suspicion in an embarrassing situation.
7. Be prepared for a ‘cover story’. The cover story must be believable regarding his/her
personal appearance. If he acts as a vendor, he/she must look as one without the display
of manicured fingernails or attire at odds with fictitious personality.

General Procedures of Surveillance


1. Identify the subject
A positive identification of the subject is important. It should be obtained before any
surveillance is conducted.

2. Dress of surveillant
The surveillant attire should be in harmony with the area or neighborhood in which
surveillance is conducted.

3. Precautions
• Do not make abrupt, unnatural move.
• Do not use theatrical disguises.
• Never stare directly at the subject.
• Never look directly at the subject’s eye.
• Do not attempt to appear innocent.
• When in dangerous neighborhood, walk near the curb to reduce the possibility of
attack from doorways and alleys.
• Exercise extreme caution in dark alleys.
• Never speak to or appear to recognize another surveillant unless absolutely necessary
to accomplish the mission.
• Inexperienced surveillants must conquer the tendency to believe in themselves ‘made’
when the subject glances in their direction several times.

4. Techniques of Surveillance (shadowing/tailing)

Shadowing by Foot

It employs the use of one or more surveillants where the surveillant and the subject
travel by foot and the surveillant has to shadow him for the rest of the operation.

Shadowing by Vehicle

It may involve the use of one or more vehicle normal to the area.

Techniques in Shadowing by Foot

1. One-man surveillance (A method)


One investigator is used to conduct the surveillance. It is best employed in stakeout. It
should be avoided in moving surveillance because it provides the least amount of flexibility
in surveillance.

2. Two-man surveillance (AB method)


In this technique, the surveillant behind the subject is always known as the A
surveillant. A follows the subject and and B either follows on the same side of the street or
from across the street. When both A and B operate on the same side of the street with the
subject, and the subject turns a corner, B turns the corner behind the subject and assumes
the position of A. A now becomes B and operates across the street from the subject and to
the rear of A.

3. Three-man surveillance (ABC method)


It employs three surveillants, and is intended to keep two sides of the subject is covered.
A follows the subject. The normal position for B is behind A. C normally operates across
the street.

4. Leapfrog method
Only one member of the team maintains contact with the subject. It is a close tail, with the
other members of the squad keeping contact with those immediately ahead of them. At
stated intervals of five to six minutes or upon signal, the man immediately behind the one
keeping contact will move up and take his place; the one that had been in contact will stop,
look in a show window or wait at a traffic light, then take his place behind the last man of
the group. This procedure is continued in rotation as long as the tail is maintained (Negosa,
H. and Gabao, 2019).

Counter-Surveillance Techniques

Testing for Surveillance


a. Window shopping
b. Paper Drop
c. Retracing the course
d. Stopping immediately after turning a street/corner
e. Watching persons getting on a succession of conveyances
f. Suddenly leaving a public conveyance
g. Convoys
h. Watching the procession
i. Talking to acquaintance
j. In urban area
k. Theaters
l. Use of law enforcement agencies
m. Changes of traffic lights
n. Decoys
o. Changing appearance

Vehicle (Automobile) Surveillance

1. One vehicle technique


One vehicle follows the subject alone to observe the movements and to stay far
enough to avoid ready detection.
2. Two vehicle technique
One vehicle follows the subject at a varying distance and another on a parallel street.
The two vehicles can exchange place from time to time.

3. Four vehicle technique


Provide greater flexibility than the two vehicle technique. The eyeball keeps track of
the subject while another vehicle follows the eyeball.

Please prepare for Final Examination Covering the entire Learning Packet
Module 3 & 4. Announcement will be posted in the group chats regarding the specific
schedule and collection of examination.

You might also like