You are on page 1of 30

POLICE INTELLIGENCE AND SECRET SERVICE

Compiled by: DELMER ALMOCER MONDIDO, LCRIM


DEFINITION OF TERMS
ACCOMODATION ADDRESS- Is the forwarding address of agent’s mail packages other
communication.
ACTIVE MEASURES - Operations intended to influence or otherwise affect other nation’s
policies. Active measure, both overt and covert, consists of a broad range of
activities including manipulation or control of the media, written or oral
disinformation, clandestine radio broadcasting and other related activities.
AFP- Armed Forces of the Philippines
AFTER MISSION REPORT- Account submitted immediately upon completion of mission by
an undercover agent-
AGENT- A person who engages in spying or in support of those who do, or who seeks to
detect them. And whose primary objective is to obtain information
pertaining to processes, activities, or operations of others.
AGITATOR - A person or group of persons whose mission is to cause discontent among the
population
AGRIPROF - A person or group of persons whose mission is to cause discontent among the
population
ANALYSIS - Shifting and isolating elements which have significance in light of the mission.
ANTHRAX - Single celled bacterial organism capable of forming spores. Used as a biological
weapon producing pneumonia like symptoms.
ANTI- TERRORISM - Defensive measures used to reduce vulnerability to Terrorist acts.
AREA OF OPERATION - Aspect of the operational environment exclusive of the military
forces involved.
ASSIMILATE - To be absorbed into the system of a foreign society.
ASSUMPTIONS – Accepting some things as being factual although not entirely thus proven.
AUDIO SURVEILLANCE – Checking on persons by listening thru wire-tapping or use of
electronic eavesdropping equipment to pick up conversations of persons
and their associates.
BAG MAN – One who collects illicit or illegal money such as ransom in kidnapping,
delivering bribe money thru middleman.
BIGOT LIST – A listing of names of all persons with authorized access to sensitive
information. This ensures that all certified personnel reading sensitive

1
document have a true “need to know: with regard to the information
contained therein.
BIRD – Slang for an information.
BLACK BAG OPERATION – In Black Bag Operations, FBI agents illegally entered offices of
targeted individuals and / or organizations, and photographed information
found in their records. This practice was used by the FBI from 1942 until
1967. Director Hoover in July 1966 ordered the practice discontinued, and
he again restated his position in January 1967.
BSIS – British Secret Intelligence Service.
BUG – A surveillance device which requires a communications channel. A ”bug” usually
involves a radio transmitter, in which the user can pick up the data from
poorly configured wireless computer networks or tune in to the radio
emissions of a computer monitor.
BW – Biological Warfare, involves the use of diseases to debilitate populations food or
livestock.
BWC – Biological Weapons Convention which prohibits developing, producing and
stockpiling bacteriological and toxin weapons.
CBI – ( complete background investigation ) – Detailed check on an individual’s activity
from the town a person was born and life 15 years ago.
(CCTV) – Closed-circuit television wit the picture is viewed or recorded, but not
broadcasted. It was initially deviced as a means of security for banks. Today
it has developed to the point where it is simple and inexpensive enough to
be used in home security systems, and for everyday surveillance.
CIA – Central Intelligence Agency (USA) Federal body responsible for the evaluation and
dissemination of foreign intelligence within government.
CIPHER – A code or secret message which takes the form of an innocent text.
CIS – Commonwealth of Independent States established in 1991 following the
disintegration of the Soviet Union. There are 12 member states namely:
Armenia, Azerbaijan, Belarus, Kazakhstan, Moldova, Russia, Tajikistan,
Turkmenistan, Kyrgyzstan, Ukraine, Uzbekistan and Georgia.
CLANDESTINE ACTIVIES – Activity to accomplish intelligence, counter intelligence, &
other similar activities, sponsored or conducted by government, all
departments in such a way to assure secrecy or concealment, it conceal
operations.
CLANDESTINE OPERATION – An operation conducted in secrecy, but with no effort to
disguise its nature.
CLASSIFIED MATTERS – Information in any form, which in the interest of national
security, must be safeguarded in the manner and to the extent required by
its importance.

2
CLIPPING SERVICE – Publications of local/ foreign news, cut and posted with captions.
CLOSE TAIL – Is one in which extreme pre-cautions are taken against losing the subject.
COINTELPRO – Counter Intelligence Program was a program of the United States Federal
Bureau of Investigation aimed at investigating and disrupting dissident
political organizations within the United States.
COLLATION – Refers to the process of organizing raw data into usable form grouping of
similar items of information.
COLLECTION AGENCY – Is an individual organization or a unit that knows and exploits to
source or information.
COMBAT INTELLIGENCE – Refers to the intelligence utilized in designing plans and
conducting tactical and administrative operations. It includes knowledge of
the enemy characteristics of operations used in the planning and conduct of
tactical operations.
COMINT – Communication intelligence.
COMMUNICATION – The process by which is information is exchange & understood
people, usually with the intent to motive or influence people.
COMMUNICATION SYSTEM – The imparting or exchange o information or data by
electronic or other means.
COMMUNITY RELATION PROGRAM – Program that evaluates public attitudes identifies
the mission of organization with public interest and executes a program o
action to earn public understanding and acceptance.
CONFIDENTIAL – Document information or material wherein the unauthorized disclosure
of which the unauthorized disclosure of which while not endangering
national security would be prejudicial t interest or prestige of the nation.
COUNTER INSURGENCY – Aspect of intelligence devoted to destroy the effectiveness of
inimical enemy intelligence activities to protect information from
espionage, individual against subversion and installation or material
against sabotage. Military, paramilitary, political, economic, psychological
and civic actions taken by the government to defeat subversive insurgency.
COUNTER INTELLIGENCE – Activities concerned with identifying and countering the
threat to security post by hostile intelligence services or organizations or
by individuals engage in espionage, sabotage or subversion.
COUNTER SUBVERSION – Aspect of counter intelligence designed to detect, destroy,
neutralize or prevent subversive activities through identification,
exploitation, penetration, manipulation, deception and depression of
individuals, groups or organizations conducted or suspected of conducting
subversive activities.
COUNTER SURVEILLANCE – Reliant on good information security planning. Protecting
information is the first stage of counter-surveillance.

3
COUNTER TERRORISM – Offensive measures taken to respond to terrorist acts.
COVER – It is the change forging, and screening of person’s real personality, things, events
and places.
COVER OPERATIVE – Spies who enjoys diplomatic immunity.
COVERT INTELLIGENCE – Information gathering which are clandestine in nature.
COVERT OPERATIONS – Operations which are so planned and executed as it conceal the
identity of or permit plausible denied by the sponsor or concealment of the
identity of sponsor.
CRIMINAL INTELLIGENCE – Information of knowledge about person or organization
engaged in illegal activities.
CRIMINALITY – Relating to crime and the degree thereof.
CRYPT – Something that is concealed or hidden.
CRYPTOGRAPHY – Art and Science of making, devising and protecting codes and ciphers.
CSIS – Canadian Security Intelligence Service, set up in 1984 under Canada Security
Intelligence service Act.
DEAD DROP – A dead drop or dead letter box, is a location used to secretly pass items
between two people, without requiring them to meet. Spies have been
known to use dead drops, using various techniques to hide the items and to
signal that the drop has been made.
DEAD DROP SPIKE – It is concealment device similar to a micro cache which has been
used since the late 1960’s to hide money, maps, documents, microfilm, and
other items. The spike is waterproof mildew proof and can be shoved into
the ground or placed in a shallow stream to be retrieved at a later time.
DEBRIEFING – An interview with personnel from a mission or captivity to get information
of particular interest.
DECEPTION – An attempt to mislead another generally as to its capabilities and intention
to confuse enemy about one’s plan and intension.
DEDUCTION – Formulation of a conclusion from a theory which was tested and considered
valid.
DIRECTOR – A person who turns away or against his allegiance to the government.
DIRECTOR IN PLACE – Person who turn himself against the government but not physically
deserted his country.
DEMENTED – A quirk personality, a bothered information.
DEPARTMENTAL INTELLIGENCE – Intelligence needed by a government in order to
execute its mission or discharge its responsibilities.
DIA – Defense Intelligence Agency – U.S.A.
DIS – Defense Intelligence Staff – BRITAIN.

4
DISSEMINATION – The distribution of information or intelligence products in written, oral
or graphic form to intelligence customers.
DND – Department of National Defense – PHIL.
DOCUMENT INTELLIGENCE – Assembling, analyzing and disseminating information about
those interest is the overthrow o a democratic country.
DROP – Is a convenient secure and unsuspecting place to live a note or small package
where an item can be handed to an agent.
DURESS CODE – A type of coded system used as internal defense which uses certain word
in casual conversation alarming the personnel concern.
ECONOMIC INTELLIGENCE – Deals with the extended utilization of the natural and human
resources and the industrial potential o the nation.
ELINT – Electronic Intelligence.
ESPIONAGE – It is the practice on spying on other countries, places or things in the course
of systematic secret gathering information in secret. The very nature of
data sought is inimical to the survival or interest of a nation, organization
or company.
ETHNIC EXTRIMISM – Small minority groups who falsely use their ethnicity for selfish
political gains.
EVALUATION – Appraisal of information with regards to its accuracy.
EVALUATION RATING – Each item is indicated by standard evaluation system, the
reliability of source and agency is shown by letter and accuracy is
manifested in numbers.
EYE – A slang term for a person conducting surveillance on a specific person.
FAMILY BACKGROUND – It includes the name, background, residences, reputation of the
parents including the siblings.
FARM – Central Intelligence Agency training facility.
FALSE FLAG – False flag operations are covert operations conducted by governments,
corporations, or other organizations which are designed to appear as if
they are being carried out by other entities. The name is derived from the
military concept of flying false colors; that is, flying the flag of a country
other than one’s own.
FINANCIAL CAPABILITIES- Income tax return, professional fee, etc.
FINANCIAL INTELLIGENCE EXPERTS - individuals who by virtue of their official capacity
tracks down hundred of millions of dollars under different name.
FIXED SURVEILLANCE – Residence, place f work, place frequented of visited.
FLOWCHARTING- A technique used in data description, which visualizes event r
commodity flow over a given period.

5
FOREIGN INTERNAL DEFENSE – Participation by civilian and military agencies
government in any f the action programs taken by another government to
free and protect its society of sponsor.
FRONT GROUPS – Movements organize t promote a cause of insurgent group.
FTO – Foreign Terrorist Organization.
GAIN – To obtain privilege inside the cell.
GEOGRAPHICAL INTELLEGENCE – Is the evaluation of geographical factors which in any
way influence the courses of action o a nation.
GENERAL – Principles are fundamental guides to action, broad statement of truth from
which others are derived.
GENEVA and HAUGE CONVENTIONS – Laws governing warfare and the engagement
thereof.
GPS – Global Positioning System.
GRATITUDE – Information is given as an expression of appreciation to a police officer.
GRAY PROPAGANDA – The source is clear but the desire result is indirect.
GUERILLA WARFARE – Irregular combat waged independently by small insurrectionist
bodies.
HACKERS – Person breaking into a computer system.
HUMINT – Human Source Intelligence
IAEA – International Atomic Energy Agency
ICT – International Center for Terrorism
IMINT – Imagery Intelligence
INDUSTRIAL INTELLIGENCE – Is the gathering product manufacturing technique, process
from manufacturing formulas that cannot and can be used of value or
advantage.
INFILTRATION – Is the penetration of an agent to an intelligence target either in the land,
air, or sea, either through mechanical r electronic devices.
INFORMANTS – Is an individual who supplies information of confidential basis with the
understanding that his identify will not be mistaken.
INFORMATION – Is a communicated knowledge, a raw data or unprocessed intelligence. It
is the bloodline of intelligence.
INFORMATION PROCUREMENT DIVISION – A component of the central intelligence
service which is divide into the intelligence proper, secret intelligence and
intelligence operations unit.
INFORMATION TECHNOLOGY – The hardware , software, telecommunications, data base
management and other technologies used to store, process and distribute
information.

6
INFORMATIVE COMMUNICATION - Pertaining to up and down and lateral flow of
communication necessary for administrative effectiveness or the smooth
flow f information.
INSURGENCY – A condition arising a revolt or insurrection against a duly constituted
government, which fall short of a civil war. It is an organized movement
aim at the overthrow f a constituted government through the use of
subversion and armed conflict.
INTEGRATION – Hypothesis developed and considered valid as a result of such activity. It
is the process f combining the information isolated and analysis and
known element to form a logical theory or picture.
INTELLEGENCE COMMUNITY – Conglomeration f all intelligence unit and agencies in
country composed of civilians, military and quasi-military organization.
INTELLIGENCE ESTIMATE – Written study of the situations and conditions of a crime
situation with the recommended courses of actions.
INTELLIGENCE JOURNAL – A chronological log of activities.
INTERPOL – An acronym for the International Criminal Police Organization (ICPO). Where
member countries assist one another in the pursuit of suspected criminals
and terrorist.
INTERPRETATION – Result of critical judgment involving three factors namely analysis,
integration and deduction. It is the determination of the significance of
intelligence data in relation to other data at hand.
INTERNAL DEFFENSE – The full of measures taken by a government to free an protect its
own society from subversion, lawlessness, and insurgency.
IPP – Internationally Protected Persons.
ISAFP – Intellegence Service, Armed Forces of the Philippines.
ISTAR- Intellegence Surveillance Target Acquisition, and Reconnaissance.
LEAP FROG – Variation of tailing which consentrates on the subject and guards the
surviellant and the subject.
LEGISLATIVE RECORD - Recors f law making bodies (House of Congress, Senate City,
Provincial Boards)
LINE INTELLEGENCE – Any process information coming from open and convert sources
that effect police agencies, operations and harmony with the community
and other government agencies.
LINK ANALYSIS – A technique used to show the relationship between the individuals
organizations by means of visual graphic design.
LOOSE SURVEILLANT- On and off close surveillance continuous.
LOSE TAIL- General impression of the subject’s habit an associates is required.

7
LOW INTENSITY CONFLICTS - A limited political- military struggle to achieve political,
social, economic or psychological objectives confined in geographic area.
MILINT or MI – Military Intelligence
MILITARY INTELLEGENCE – Refers to the used of processed information in formulating
military plans, programs and policies.
MISSION ORDER – Duty slip in which all personnel on undercover operations shall carry at
all times it must be duly approved by their immediate supervisor and filled
appropriately with their respected officers
NATIONAL INTELLIGENCE – Covers the broad aspects of national security. It is concern to
more than independent and transcends, exclusives interest of a single
department or agency
NERVE AGENT – A chemical agent that interferes with the central nervous system.
NICA- National Intelligence Coordinating Council
NOC- Non Official Cover is a term used in espionage (particularly by the CIA) for agents or
operatives who assume covert rules in organizations without ties to the
government for which they work. Such agents or operatives are typically
abbreviated in espionage Ingo as a NOC (Pronounced “knock”).
NPT- Nuclear Non- Proliferation Treaty.
NSC- National Security Council
OBJECTIVES- Specific results an expertise seeks to achieve in pursuing its basic mission.
OIR- Other Intellegence Requirements – additional information
OPERATIONS- It performs the line functions, establishments of contracts, recruitment of
informers/ informants, execution of intelligence plans.
ORDER OF BATTLE- Intellegence list containing the main or primary threat to a nation’s
security and peace and order
ORDINARY INFORMER- Usually gives, but expects in return favor or money.
ORGANIZATION- Is the arrangement of person with a common purpose. It is the division
and unification of effort toward the same goal or policy.
ORGANIZED CRIMES- Is a combination of two or more persons for the purpose of
establishing by terror, threat, intimidation or conception in the city or
municipality or any community of either monopoly or criminal activities in
afield that provides continuing financial support.
OSCINT- Open Source Intelligent
OVERT INTELLEGENCE- Processed information produced openly.
PARA MILITARY FORCE-Force that the distinct from the regular armed force of any
country but resemble them in organization, equipment, training or mission.
PBI- Partial background investigation for record and employment check.

8
PEACE TIME CONTENGENCY- Politically sensitive military operations normally
characterized by the short term rapid projections or employment of force
in condition short of conventional war.
PERSONAL CIRCUMTANCES- Determine the following name, birth place of birth, place of
place, age, city and provincial address, civil status.
PHOTINT- Photographic Intelligence.
PLANNING- Is a process of developing a method, procedure or an arrangement of parts to
achieve a defined objective more easily.
PLO- Palistinian Liberation Organization.
PNP- Philippine National Police
POLICE INTELLIGENCE- It is the gathering of information regarding the activities of the
criminal and their law violation for the purpose of affecting their arrest
obtained evidence of their activities and for stalling their plans to commit
crime.
POLICE INTELLIGENCE PROCESS- Refers to the cyclical steps followed from intelligence
planning to the dissemination of processed information.
POLITICAL INTELLIGENCE-Deals with the structure of government, the electorate,
national policies and foreign relations of governmental organizations,
public order and safety, subversion, intelligence and security organization.
PRIVATE SOURCES- Business establishments as spring of information (e.g. telecom,
leading companies, insurance companies, hotels and restaurants).
PRINCIPLE OF COMMUNICATION- Intelligence is adequate to their needs; it must be
communicated to the entire decision maker in manner that they will
understand and in form that will permit the most effective use.
PRINCIPLE OF OBJECTIVES- Intelligence must be based on the decision makers own plans
and intentions as much as on considerations of the intelligence target
themselves.
PROCESSING- A step by which the intelligence is transformed from raw facts or materials
to intelligence data.
PROPAGANDA-Psychological techniques designed to alter control opinions, ideas and
values.
PSYCHOLOGICAL OPERATION-Planned activity in peace and war directed towards
enemy, friendly and neutral audiences in order to create an attitudes
behavior favorable to the achievement of political and military objective.
Psychological warfare which encompasses; Political, Military, Economic,
Ideological, Information activities.
PSYCHOLOGICAL WARFARE – The planned used of propaganda and other psychological
actions having the primary purpose of influencing the opinions, emotions,

9
attitudes and behavior of the hostile groups to support the achievement of
national objectives.
PSYCHOLOGICAL WARFARE CONSOLIDATION – Operations directed towards
populations in the friendly rear areas on the territory occupied by friendly
force. Used to facilitate military operation and promote maximum
cooperation.
PUBLIC RECORDS SOURCE – Spring of information government institution (e.g. hospital,
public libraries, civil service, police stations, NBI, different bureaus, AFP,
intelligence organization and other offices.)
RABBIT – Refers to the subject or person being followed in surveillance.
RADINT – Radar Intelligence
RECORDING – Act of reducing of information to writing
REFORM MOTIVE – Repenting for wrong and wants to set a straight record.
REHABILITATION – Restoration of a normal life by specially training programs, also
restoration to former privileges when training is satisfactory when training
is satisfactory completed.
RESEARCH – Systematic investigation in order to establish facts and research conclusions;
an endeavour to discover new, or a subject, or topic by a course of critical
investigation.
RESTRICTED – Document information or material other than top secret or confidential
which should not be published or communicated to augment except for
official purposes.
REVENGE – Grudge to another person, get exaggerated information to get even.
ROUGH SHADOWING – Criminal is aware that has is being tailed, witness that should be
protected.
SABOTAGE – A willful and malicious destruction of natural processes and functions of a
plant installation or premises.
SABOTEUR – A person or group of person designed to carry out sabotage act.
SAFE HOUSE – Is a place or building enclosed mobile or apartment where police
undercover and operatives meet for purpose of the briefing or plainly to
report.
SARIN – A G- series nerve agent (gas)
SCIENTIFIC INTELLIGENCE – Deals with the progress of scientific research and
development as it affects a nation potential.
SECURITY CLEARANCE – An administrative determination that an individual is eligible
from a security standpoint for access to a classified matter of specific
category.
SIGINT – Signals Intelligence it extracts intelligence from various types of communication.

10
SNIPPET – Fragment of information.
SECURITY INTELLIGENCE – Investigation of actual or theoretical violation of espionage
laws with a purpose of apprehending violator.
SECRET – Document information or material wherein the unauthorized disclosure of
which endangers national security case serious injury to the interest or
prestige of the nation or any governmental activity or would be great
advantage to a foreign nation.
SHADOWING OR TAILING – The act of following person (overtly or covertly).
SOCIOLOGICAL INTELLIGENCE – Interest centers with the study of population and
manpower or demography, national characteristics labor, public opinion
and public welfare.
STRATEGIC INTELLIGENCE – Refers to the process of gathering information designed to
disturb and disrupt enemies’ state of finances and destroy the stability and
foundation of its organization. Knowledge pertaining to the capabilities,
vulnerabilities and probable courses of action of foreign nation.
SUBJECT – Is a person or place or object being surveyed or watched.
SUBVERSION – An organized and systematic conspiracy designed to discredit and
overthrow duly constituted authorities.
SUBVERSIVE – Agitators propaganda infiltrators, organizers, front group mobs, paper
organization, activities, terrorists and saboteurs.
SUBVERSIVE ACTIVITIES – Activities designed to disrupt or even overthrow ruling parties
or government.
SUBVERSIVE INTELLIGENCE – Assembling analyzing and disseminating information
about those individual or groups whose interest is the overthrow of a
democratic country.
SUPERVISORY – Overseeing of administrative work and not supervising operating units.
SURVEILANT – Is a person or group who does the surveillance works.
SURVEILLANCE – Is the discreet observation o places, person, and vehicles for the purpose
of information concerning the activities of the target on t subject.
TACTICAL INTELLIGENCE – Targets and their type of activities.
TARGETS – Person, places and organizations, which are criminal activity considered to be
of immediate importance to the law enforcement units. It furnishes the
police about individual, organization objects of police interest due to their
criminal activities.
TARGET SELECTION – First phase in the process of identifying criminals and subversive
elements. It involves utility, probability of success, required resources and
objectives.

11
TECHNICAL INTELLIGENCE – Concerns the foreign technical developments, which have
practical military application and the practical performance, capabilities
and limitations o materials and installation used by foreign military forces.
TELECOMMUNICATION INTELLIGENCE – Is concern with the operations and facilities o
long distances.
TARGETS- Persons, places and organizations, which are objects of police interest due to
their criminal activities.
TARGET SELECTION- First phase in the process of identifying criminals and subversive
elements .It involves utility, probability of success, required resources and
objectives.
TECHNICAL INTELLEGENCE- Concerns the foreign technical development, which have
practical military application and the practical military application and the
practical performance, capabilities and limitations o materials and
instillation used by foreign military forces.
TELLECOMUNICATION INTELLEGENCE- Is concern with the operations and facilities of
long distance communication media including telegraph, telephone, radio,
satellite, television and other electronic communication.
TERRORISM- under the HUMAN SECURITY Act of 2007, it denotes the unlawful acts of
persons punished by the revised penal code particularly: Piracy in general
and mutiny in the High Seas or in the Philippines Water, Rebellion of
Insurrection Coup d’ Etat, Murder, Kidnapping and Serious Illegal
Detention, Crimes Involving Destructions, or a violation of the Law on
Arson, Toxic substances and Hazardous and Nuclear Wastes Act of 1190,
Atomic Energy Regulatory and Liability Act of 1968, Anti Hijacking Law,
Anti Piracy and Robbery Law of 1974, PD 1866, Thereby sowing and
creating condition of widespread am extraordinary fear and panic among
the populace, inorder to coerce the government to give in to an unlawful
demand.
TOP SECRET – Certain document information or material wherein the security and defense
aspects of which are paramount and which unauthorized disclosure would
cause exceptionally great damage to the nation.
TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE – It is concerned with
operations and facilities of transportation system.
UNDERCOVER ASSIGNMENTS – It is strategy wherein a member of police organizations
joins the underworld for the purpose of obtaining evidence or gathering of
information against the criminals and criminal organization.
UTILITY – Refers to the type of criminal activity, amount and frequency of criminal activity
and its impact
WHITE PROPAGANDA – Open activity to clear out government image.
WMD – Weapons of Mass Destruction

12
POLICE INTELLIGENCE
An excerpt from the Law Enforcement Code of Ethics which states, “ WHATEVER I
SEE OR HEAR OF A CONFEDINTIAL NATURE THAT IS CONFIDED TO ME IN MY
OFFICIAL CAPACITY WILL BE KEPT EVER SECRET UNLESS REVELATION IS
NECESSARY IN THE PERFORMANCE OF MY DUTY” is the most appropriate description of
the police organization’s engagement in POLICE INTELLIGENCE.
The Need For Intelligence System
The importance of intelligence and secret service has become increasingly
emphasized. Keen competitions among nations and governments continue to unravel with
increasing sophistication even among individuals or organized crime syndicates. Without
complete, accurate and timely intelligence, people can be lost, governments are
embarrassed and nations fall under the control of powers opposed to the freedom of man
and his activities.
Internal defense is a primary function of police. Intelligence is necessary in the
planning of policy formulations concerning defense and crime prevention programs carried
out through both military and police operations – developed in time of peace and war. It is
necessary to protect the way of life and freedom of people, which is valued so dearly.

HISTORICAL SETTING
From the beginnings of recorded history, we note that such inquiries are made not
solely about situation and prospect of the single individual but about those of the group –
the tribe, the kingdom, the nation.

Biblical Beginnings
The earliest source of intelligence, in the age of belief is super natural interventions
in the affairs of men, were prophets, seers, oracles, soothsayers and astrologers.

MOSES
One of the first recorded formalized intelligence efforts, with format, can also be
found in the Holy Bible Numbers 13:17.
“ And Moses sent them to spy out the land of Canaan and said unto them, get you up
this way southward, and go up into the mountain; and see the lands, what it is; and the
people that dwell therein, whether in tents, or in strongholds; and what land is; whether it
be fat or lean, whether there be wood therein, or not. And be of good courage and bring of
the fruit of the land.” The scriptures also named the twelve intelligence agents whom the
Lord directed Moses to sent into the Land of Canaan and records that “ all those men were
heads of the children of Israel”.

13
RAHAB
The Harlot of Jericho (Joshua 2:1-21) who sheltered and concealed the agents of
Israel, made a covenant with the agents and duped their pursuers. She was not only an
impromptu confederate of immense value for the Jewish leader of that far distant day, but
also established a plot – pattern which is still of periodic relief to motion picture producers.

DELILAH
The Philistine used her when she allowed spies to hide in her house (Judges 16).
Delilah was an impromptu intelligence agent. Apart from her tonsorial specialty, she also
allowed sex to gain intelligence from a powerful enemy. She achieved the largest effective
force of her employer’s adversaries and contriving the stroke which put that force out of
action.

EVENTS AND PERSONALITIES IN THE WORLD OF INTELLIGENCE

SUN – TZU
The East was ahead of the West in the raft of intelligence in 400 BC rejecting the
oracles and seers. Sun – Tzu, a Chinese philosopher takes a more practical view according
to him, what is called foreknowledge cannot be elicited from spirits, nor from gods, nor
from analogy with past events nor from calculations. He wrote, “It must be obtained from
men who knew the enemy situation.” It is no wonder that Sun – Tzu’ book entitled “ The Art
of War ” is the favorite readings of the late Mao Tse Tung and is a required reading material
for the Chinese Communist Tacticians. He further wrote the saying in which most people in
the intelligence service believe became a parlance in the world of intelligence:

“ Know thy enemy and know yourself, you need not fear the results of a hundred battles, If
you know your yourself and not the enemy, for every victory, you are a fool who will meet
defeat in every battle”

ALEXANDER THE GREAT


When Alexander the Great was marching to Asia, were rumors of disaffection
growing among his allies and mercenaries, he sought the truth, and got it by simplest
expedient by devising the first “ letter sorting ” and opening to obtain information.

AKBAR ( The Great Mogul)


He was known to be the sagacious master of the Hindustan. He employed more than
4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon
it.

14
GENGHIS KHAN ( The Golden Emperor of Cathay )
He was known “The Great Mongol”, who used intelligence to conquer China and
invade Cathay. He instructed his Generals to send out spies and used prisoners as sources
of information. The leader of the so-called MONGOL CONQUERORS – made use of effective
propaganda machine by spreading rumors of Mongol Terror, they collected information on
weaknesses and rivalries of Europe. The leaders usually disguised as merchants.

FREDERICK THE GREAT


He was known as “The Father of Organized Military Espionage”. He has divided his
agents into four classes:
a. Common Spies – those recruited among poor folk, glad to earn a small sum or
accommodate a military officer.
b. Double Spies – are unreliable renegades, chiefly involved in spreading false
information to the enemy.
c. Spies of Consequences – couriers and noblemen, staff officers, and kindred
conspirators, requiring a substantial bribe or bait.
d. Intimidated Spies – persons who were forced to undertake espionage against their
own will.

Intelligence as herein referred to means Police Intelligence as distinguished


from military intelligence, while some aspects between these two sciences may be
different, the deviation is more of the approach rather than principle. The fundamental
intelligence cycle is still the same, be that used in the police or in military intelligence. The
principle of intelligence like timeliness, flexibility, foresight and security, remain constant
and become the cardinal principle by which major decisions are influence whether in
planning for a broad crime prevention program in the police.

POLICE INTELLIGENCE DEFINED


It is the end product resulting from the collection, evaluation, analysis, integration
and interpretation of all available information regarding the activities of criminal and law
violators for the purpose of affecting their arrest, obtaining evidence, and forestalling plan
to commit crime.

Functions of Intelligence in General


Today all countries have their intelligence services. They maybe different in their
organization, efficiency and method but they all have the basic functions such as:
1. The collection or procurement of information.

15
2. The evaluation of the information which then become intelligence.
3. The dissemination of intelligence to those who need it.
4. The counter intelligence or negative intelligence, which is dedicated to the
concealment and protection of one’s own information from the adversary
intelligence operation. It is a defensive function of intelligence.

INTELLIGENCE refers to an end product (knowledge) resulting from the recording,


evaluation, and analysis, integration and interpretation of the information. It is also an
activity involve in the production of that end product which includes collection, processing,
dissemination and use of the knowledge.
BROAD CATEGORIES OF INTELLIGENCE
a. NATIONAL INTELLIGENCE – Integrated product of intelligence developed by all
government departments concerning the broad aspects of national policy and
national security.
b. DEPARTMENTAL INTELLIGENCE – intelligence required by an agency or department
of the government in order to execute its mission and discharge its responsibilities.
c. MILITARY INTELLIGENCE – intelligence used in the preparation and execution of
military plans, policies and programs. It encompasses three broad fields,
1. Strategic Intelligence – knowledge pertaining to capabilities, vulnerabilities
and probable courses of action of foreign nation.
2. Combat Intelligence – used in planning and conduction tactical and
administrative operations. It is concerned with information about tire weather,
enemy people and terrain.
3. Counter Intelligence – denies information to the enemy, increases the security
of the command and aids in achieving surprise.

POLICE INTELLIGENCE DEFINED


“IT IS A RECORDED INTELLIGENCE OF POLICE UNITS REGARDING VIOLATIONS OF
THE PENAL AND SPECIAL LAWS OF THE LAND, NOT NECESSARILY RESTRICTED TO THE
CRIMINAL ASPECT. IT CAN ALSO INCLUDE THE OTHER BROAD CATEGORIES OF
INTELLIGENCE IN THE INTEREST OF PUBLIC SAFETY.”

Other Used to Defined it as:


Evaluated and interpreted information concerning original crime and other major
problems. In a sense the principle in intelligence likes timeliness, flexibility, foresight and
security remain constant and become the cardinal principles by which major decisions are
influenced whether in planning for broad crime prevention program in the police.

OTHER DEFINITION OF TERMS RELATED TO POLICE INTELLIGENCE

16
 Intelligence – is an end product or knowledge resulting from the evaluation,
analysis, integration and interpretation of information.
 Information –is the material of every description, which is used in the production
of intelligence it includes facts, observations, reports, documents, etc.
 National Interest – is the general and continuing interest and for which a nation
acts. It is the totality of goods and aspirations, which nations pursue.
 National Security – relates to the protection and preservation of the police,
military, economic and productive strength of the country.
 Military Intelligence – is an intelligence used in the preparation and execution of
military plans, policies and programs.
 Tactical Intelligence – military intelligence used in planning and conducting of
tactical and administrative operation.
 Strategic Intelligence – the knowledge pertaining to capabilities, vulnerabilities,
and probable course of actions of foreign nation for use of national leaders in the
planning and execution of national security.
 Intelligence Community – refers to the agencies and organizations of the
government, which have intelligence interest or responsibilities.
 Production of intelligence – the process by which information is transformed
into finish intelligence data.
 Selection of Information – method by which information is wide available to
appropriate researcher for examination.
 Recording of Information – handling all reports, documents, or other materials
and reducing them into some form of journal, situation map, worksheet and/or
workhorse.
 Organized Crime – this is the combination of two or more persons for the
purpose of establishing by terror or corruption in the city/community or section
of, either a monopoly or virtual monopoly of criminal activity in a field that
provides a continuing financial profit.
 Criminal World – the social organization of the criminals is termed as the
underworld. The underworld is a world in itself part, having its own social classes
from the hobo to the moneyed gangsters and racketeers.
 Criminal Syndicate – it is a stable business with violence applied and directed at
unwelcome competitors. It is a merger of capitalists or financiers, entered in,
especially one having the objectives of obtaining control in the market of a
particular commodity. A criminal syndicate therefore, is engaged in any illegal and
unlawful activity.

TWO GENERAL FORMS OF POLICE INTELLIGENCE


1. UNDERCOVER INTELLIGENCE – this concerns the various types of confidential
information that filter info the possession of the police, and the techniques
employed in developing these lines of information. Frequently, these types of
intelligence in the hands of the detective and patrolman plays an important part in
the solution of individual criminal cases and the apprehension of wanted persons,
but with it, this study is concerned directly.

17
2. DEPARTMENTAL INTELLIGENCE – of far greater import in the project of control
and prevention is department intelligence upon which administration must rely as
of the most indispensable tools of management. It is derived from organized
information available in the police records division, which is concerned with the
nature, size, and distribution of the police to, which the police records are properly
maintained and processed is directly related to administrative performance and it is
a principal determining factor in the quality of police service delivered to the
community.
FORMS OF INTELLIGENCE
The two methods of collection of information for the production of intelligence are
overt and covert. These forms are descriptive of the manner by which raw information is
gathered. It is Overt if the information or documents procured openly without regards as to
whether the subject of the investigation become knowledgeable of the purpose or purposes
for which it is being gathered. It is Covert if the information obtained without the
knowledge of the person against whom the information or document may be used, or if the
method of procurement is done not in open manner.
1. Overt – involves those openly conducted by intelligence personnel such as research
and liasoning;
2. Covert – Intel activities undertaken clandestinely in order to get the necessary
information not available to open source.

PRINCIPLES OF INTELLIGENCE
1. Timeliness – intelligence must reach the user in time to serve, as basis for
appropriate action.
2. Commander’s Need – intelligence must fit the need of the commander,
3. Principle of Planning – principle of intelligence which requires careful and thorough
setting of ideas.
4. An Integral Part of Military Operation – intelligence activities are made part of any
military operations.
5. Flexibility – intelligence activities are based on reason and judgment, and not on
fixed procedures.
6. Imagination and Resourcefulness – are essential for a successful intelligence
operation.
7. Principle of Security – anything placed between, thing protected and potential
intruder;
8. Principle of Continuity – intelligence activities follow a single continuous cycle.
9. Need To Know – knowledge for those who have an area of interest/ influence and
according to the needs of an authorized individual.
10. Compartmentalization – intelligence is not disseminated to an individual or unit due
to some restriction as required by the commander.

INFORMATION PROCESSING AND DISSEMINATION OF INTELLIGENCE

18
A. As a rule, initial recording, evaluation and processing of information will be made at
the lowest collecting intelligence agencies at the station levels. Line Intelligence
produced at this level may be disseminated to lower and adjacent agencies/ units on
the need to know basis only. Dissemination to higher headquarters, provincial,
regional and major service level will be accompanied by other information, data and
documents gathered that normally would be processed at higher headquarters.
B. The following standard prescribed codes of evaluation as to source and as to
information shall be indicated on all information forwarded or disseminated.
SOURCE
Completely Reliable - - - - - - - A
Usually Reliable - - - - - - - B
Fairly Reliable - - - - - - - C
Not Usually Reliable - - - - - - D
Unreliable - - - - - - - - E
Reliability Unknown - - - - - - F
INFORMATIONS CODES FRO SOURCES OF INFORMATIONS
Confirmed by other Sources - - - - - - - - - - - 1 Direct Observation of the Commander - - - T
Probably True - - - - - - - - - - - - - - - - - - - - - 2 Report of Agent - - - - - - - - - - - - - - - - - - - - U
Possibly True - - - - - - - - - - - - - - - - - - - - - - 3 Own Troop / Element - - - - - - - - - - - - - - - V
Doubtfully True - - - - - - - - - - - - - - - - - - - 4 Tactical Interrogation - - - - - - - - - - - - - - - W
Improbable - - - - - -- - - - - - - - - - -- - - - - - 5 Government Personnel - - - - - - - - - - - - - - - X
Truth cannot be Judge - - - - - - - - - - - - - - - 6 Document - - - - - - - - - - - - - - - - - - - - - - - - Z

Definition:
INTELLIGENCE is a processed set of information. The product resulting from a collection,
evaluation and interpretation of information which concerns one or more aspects of
foreign nations or of functional or geographic areas and which is immediately or
potentially significant to the development and execution of PLANS, POLICIES and
OPERATIONS.

INTELLIGENCE may refer to any of the following:


 Processed Information (the end product)
 Organization (institutional structure of the government tasked to collect
information)
 Activity (the task of collecting information to become intelligence)

19
WHAT IS INFORMATION?
This is an unevaluated material of every description including those derived from
observation, communications, reports, rumors, imagery, and other sources from which
INTELLIGENCE is produced.

TYPES/KINDS OF SOURCES OF INFORMATION


1. Human Intelligence (HUMINT)
a. Troops
b. Civil Government Offices and Agencies
c. Specialized Staff
d. Informers and agents
2. Signal Intelligence (SIGINT)
a. Communication Intelligence (COMINT)
b. Electronic Intelligence (ELINT)
3. Imagery Intelligence (EMINT)
4. Insurgent Propaganda

TWO GENERAL CLASSIFICATIONS OF SOURCES OF INFORMATION


OPEN SOURCES – 90% CLOSE SOURCES – 10%
Includes info taken from: Includes info taken from:
a. Enemy Activity a. Surveillance
b. POW b. Casing
c. Civilians c. Elicitation
d. Captured Documents d. Surreptitious entry
e. Map e. Employment of technical means
f. Weather Forecast, Study, Researches f. Tactical Interrogation
& Report g. Observation and Description
g. Agencies Concerned

Other Sources of Information : (both overt and covert)


 Routine Patrol  Police – Public Relation Activities
 Criminal Investigation  Cordon and Scratch
 Use of Information  Coordination with law enforcement
 Interrogations agencies
 Search and Seizures  Inmates of various city jails,
 Statistics national penitentiary, military
 Checkpoints stockade.

PERSONS AS SOURCES OF INFORMATION

20
 INFORMATION NET – it is a controlled group of people who work through the
direction of the agent handler. The informants, principal or cut-outs supply the
agents handler directly with intel information.
 INFORMANTS – people selected as sources of information, which could be
voluntary or in consideration of a price.
 INFORMANT – refers to person who gives information to the police voluntary or
involuntary without any consideration of a price.
 INFORMER – those who gives information to the police for price or rewards.

TYPES OF INFORMANTS
1. CRIMINAL INFORMANTS – an informant who gives information to the police
pertaining to the underworld about organized criminals with the understanding
that his identity will be protected.
2. CONFIDENTIAL INFORMANTS – is similar to the former but he gives information
about violations of law to include crimes and criminals.
3. VOLUNTARY INFORMANT – a type of informant who gives information freely and
wilfully as a witness to a certain act.
4. SPECIAL INFORMANT – those who gives information concerning specialized cases
only and it is regarded a special treatment by the operatives (ex. Teachers,
Businessmen, etc.)
5. ANONYMOUS INFORMANT – those who gives information through telephone with
the hope that the informant cannot be identified.

SUB – TYPE OF INFORMANT :


1. Incident Informant – a person who casually imparts information to a officer with
no intention of providing subsequent information.
2. Recruited Informant – a person who is selected, cultivated and developed into a
continuous source of information.

CATEGORIES OF RECRUITED INFORMANTS


1. SPONTANEOUS or AUTOMATIC INFORMANTS – an informant who by nature of
their work or position in society have a certain legal, moral or ethical
responsibilities to report information to the police.
2. ORDINARY RUN INFORMANT – informants that are under the compulsion to
report information to the police.
3. SPECIAL EMPLOYEE – informant who are of a specific operational nature.

OTHER CLASSIFICATION OF INFORMANT :


1. Automatic
2. Penetration

21
3. Full Time
4. Rival – Elimination
5. False Informant
6. Frightened Informant
7. Self – aggrandizing Informant
8. Mercenary Informant
9. Double – crosser Informant
10. Woman Informant
11. Legitimate Informant

COMMON MOTIVES OF INFORMANTS


1. Reward –
2. Revenge –
3. Fear & Avoidance of Punishment –
4. Friendship –
5. Vanity –
6. Patriotism –
7. Civic Mindedness –
8. Repentance –
9. Competition –
10. Other motives like jealousy, spite, etc.

INFORMANTS RECRUITMENT
1. Selection
2. Investigation
3. Approach
4. Testing

FACTORS CONSIDERED IN INFORMANT RECRUITMENT


1. Sex
2. Health
3. Age
4. Built
5. Education
6. Ability
7. Personality

GENERAL TYPES OF INTELLIGENCE


1. Tactical or Combat Intelligence – this is the knowledge of the enemy, weather, and
terrain required in the planning in the conduct of tactical and combat operations.

22
2. Strategic Intelligence – the knowledge required for the formulation of policies &
plans at national and international levels. It is oriented on national objectives and
has the following components.: (Known as PESTBAGS)
 Political Intelligence
 Economic Intelligence
 Sociological Intelligence
 Transportation & Communication Intelligence
 Biographic Intelligence
 Armed Forces Intelligence
 Geographic Intelligence
 Scientific Intelligence
3. Counter – Intelligence – is that aspect of intelligence devoted to offensive effort to
destroy or neutralize the effectiveness of adverse enemy intelligence activities, and
defensive actions to protect information against espionage, subversion or sabotage.

THE INTELLIGENCE CYCLE


The nucleus of the Intelligence Cycle is the MISSION. It is a clear and concise
statement of the task to be accomplished by a unit. It may be in the form of a mission
statement that emanates from higher headquarters; developed by the command; or
deduced by to answer the 5 “W’s” and 1 “H”. Know what is required, where the info will be
obtained; collection techniques and the time allowable.

PHASE 1 – PLANNING THE COLLECTION EFFORT


This phase of the cycle involve the determination of the requirements of
intelligence. It is concerned with identifying the so called ESSENTIAL ELEMENT OF
INFORMATION (EEI) – an item of intelligence or information of the characteristics of the
area of operations and the enemy, which the commander feels he needs before he can
reasonably arrive at a decision.

PHASE 2 – COLLECTION OF INFORMATION


This phase of the cycle is concerned with the identification of the collecting agency,
the formulation of procedures on the manner of collecting the information in conjuction of
the phase one.
PHASE 3 – PROCESSING THE COLLECTED INFORMATION
This phase of the cycle is concerned with the examination and collation of all
collected information

PHASE 4 – DISSEMINATION AND USE OF INFORMATION

23
This phase of the cycle refers to the activities of transferring the processed
information to the proper users, most particularly the authority that requires the activity.

STEPS IN PLANNING THE COLLECTION EFFORTS;


1. Determine the intelligence requirement
2. Determine the intelligence priorities :
a. Priority intelligence requirement b. Information requirement
3. Determine the indicators
4. Determine the specific order or request
5. Determine the collection agencies and the time and date the information is to be
reported.
Note: Information are obtained 90% from Open Sources and only 10% from
Clandestine / Special Operations.

DIRECTING
In Directing the collection effort, the selection of assets and agents to be tapped is
an important things to be considered: Directing stops upon formulation of the SOR (Specific
Order or Request).

COLLECTING
This can be achieved OVERTLY (Collected from OPEN Sources) and COVERTLY
(collected clandestinely or secretly).
 Collection Planning – this is a continuous process which ultimately coordinates
and integrates the efforts of all collection units and agencies.
 Collection Agency – any individual or organization which exploits a source to
collect and/ or process information.
Factors to be considered in Selecting Collection Agencies:
1. Capability
2. Suitability
3. Multiplicity
4. Balance

PROCESSING
This is the very phase in the Intel Cycle in which the information becomes

INTELLIGENCE.
Steps in Processing Information (R, E, A)

24
 Recording – this is the reduction of information to writing or some form of
graphical representation and the arranging of this information into groups of
related items.
 Evaluation – the examination of raw information to determine its intelligence
value, pertinence of the information, reliability of the source/ agency and its
credibility or truthfulness of the information.
COLLATION – is the organization and grouping of raw data to be reduced into
a useable form.
DATA EVALUATION – after information were obtained in relation to the
inquiry, the analyst will evaluate the information
according to its reliability and validity, and the
relationship of the sources to the information.

In Evaluation, Admiralty Scale must be used.

Note : When grading any information, separate the source from the information. Do not
grade them together, because what may have been a reliable source in the past may not be
true for the present or future situation.

DATA COLLATION – after evaluating, information’s acquired should be


stored and be retrieved at a later stage. These can be integrated or
cross referenced with other held information. Storing information
can be manually or electronically.

Factors to be considered in evaluating information:


1. Pertinence or importance of the information
2. Reliability
3. Credibility

 Analysis (Data Interpretation) – when information is received, processed and


integrated with available holdings, bits and pieces of info’s should be organized
into forms which facilitates understanding and highlights further as information
requirements.

Steps in Analysis
1. Interpretation or Assessment 2. Integration

Pitfalls to Avoid:
1. Garbage Information b. Disinformation c. Intelligence Noise
INTELLIGENCE OPERATIONS
Intelligence Operations is the result of intelligence planning, planning is always
ahead of operation although an operation can be made without a plan, it is usually due to
sudden and inevitable situations but definitely this is poor intelligence management.

25
Different Task Involve in Police Intelligence Operation
 Discovery and identification activity
 Surveillance and Liaison Program
 Informant Management
 Clipping Services and Debriefing
 Casing and other relevant miscellaneous activities
 Utilization of informant for planning and organizational employment
BASIC PRINCIPLES OF INTEL OPERATIONS
 Intelligence operations and tactical operations are interdependent;
 Intel must be useful;
 Intel must be timely;
 Intel operations must permit flexibility in procedures;
 The nature of Intel requires employment of continuous security measures.
THE 14 OPERATIONAL CYCLES
1. Mission and Target
 Infiltration – The insertion of action agent inside the target organization
 Penetration – recruitment of action agent inside the target organization
2. Planning
3. Spotting
4. Partial Background Investigation (PBI) or Complete Background Investigation
5. Recruitment – the only qualification of an agent is to have an access to the target
6. Training
7. Briefing
8. Dispatch
9. Communication – technical method like telephone/ radio, non-technical method like
personal meeting, live drop or dead drop
10. Debriefing
11. Payments – depends upon the motivation of the informant
 Regulatory – pay no bonuses
 Supplemental – income that is enough to ease his financial worries
12. Disposition – involve activity on rerouting, retraining, retesting, termination
13. Reporting
14. Operational Testing

COVER AND UNDERCOVER ACTIVITIES


 COVER – the means by which an individual group of organization conceals the
true nature of its acts and or existence from the observer.
 COVER STORY – a biographical data through fictional that will portray the
personality of the agent he assumed, a scenario to cover up the operation.

26
 COVER SUPPORT – an agent assigned in target areas with the primary mission of
supporting the cover story.
 ORGANIZATIONAL COVER – is an account consisting of biographical which when
adopted by an individual will assume the personality he wants to adopt.
Types of Cover
1. Natural Cover – using actual or true background
2. Artificial – using biographical data adopted for the purpose
3. Cover within a Cover – justification of existence
4. Multiple Cover – any cover you wish

The Task of Procuring and Collecting of Information


Procurement as use in intelligence parlance is the aggressive effort of the agent to
acquire certain scientific information that may not be readily available. To this end a
number of means may be used, these are:
1. The Classical Intelligence Type such as and which utilize human being to gather
information.
2. The Modern or Technical Intelligence Type which employs machine human such
as satellites, electronic gadgets to gather information.
Procuring Different Type of Agents
1. Agent in Place – an agent who has been recruited by an intelligence service within a
highly sensitive target, who is just beginning a career or have been long or (outside)
insider.
2. Double Agent – an enemy agent, who has been captured, turned around and sent
back where he came from as an agent of his captors.
3. Expandable Agent – an agent whom false information is leaked to the enemy.
4. Penetration Agent – an agent who has such reached the enemy gets information and
would manage to get back alive.
5. Agent of Influence – an agent who uses influence to gain information.
6. Agent of Provocation – one who provoke the enemy to give information.

METHODS OF COVERT INTELLIGENCE


SURVEILLANCE
Surveillance is a form of clandestine investigation which consists of keeping
persons, place or other targets under physical observation in order to obtain evidence or
information pertinent to an investigation. Surveillance of persons is called Tailing or
Shadowing, Surveillance of place is called Casing or Reconnaissance, and Surveillance of
other things, events, and activities is called Roping.

TYPES OF SURVEILLANCE

27
According to Intensity and sensitivity
1. Discreet – subject person to be watch is unaware that he is under observation.
2. Close – subject is aware that he is under observation varied on each occasions.
3. Loose – applied frequently or infrequently, period of observation varied on each
occasion.
According to Methods
1. Stationary – this is observation of place usually a bookie stall, a gambling, joint, a
residence where illegal activities are going on (Fixed Position).
2. Moving – surveillant follow the subject from the place to place to maintain
continuous watch on his activities.
3. Technical – this is surveillance by the use of communications and electronic
hardware’s, gadgets, system and equipment.
CASING OR RECONNAISSANCE
Casing is the term use in the police organization while reconnaissance is used in
military term. Casing or reconnaissance is the surveillance of a building place or area to
determine its suitability for intel use or its vulnerability in operations. It aids in the
planning and operation by providing needed information. It assists the agents handler to
install confidence in his agent during briefing phase by being able to speak knowingly
about the area of operation. Casing is also considered a security measure because it offers
some degree of protection for those operating in an area unfamiliar to them.

OBSERVATION AND DESCRIPTION a.k.a (ODEX)


 Observation – a complete and accurate observation by an individual of his
surroundings and encompasses the use of all the major sense to register and
recognized its operational or intel significance.
 Description – the actual and factual reporting of one’s observation of the reported
sensory experience recounted by another.
Psychologist estimates that approximately 85% of our knowledge is gathered
through sight, 13% from sense of hearing and only 2% through the three other senses.

ELICITATION
It is a system or plan whereby information of intelligence value is obtained through
the process direct intercommunication in which one or more of the parties to the common
is unaware of the specific purpose of the conversation. The three phases are determination
of the mission, selection of the subject, and accomplishment of the mission.
PORTRAIT PARLE (P/P)
It is a means of using descriptive terms in relation to the personal features of an
individual and it can be briefly described as a word description or a spoken picture.
TACTICAL INTERROGATION

28
The need for obtaining information of the highest degree of credibility taken on the
minimum of time can be through interrogation which varies and dependent entirely on the
situation. In tactical interrogation, familiarization of the following is necessary:
 Interrogation – the systematic asking of questions to elicit information in the
minimum time.
 Interrogator – person who does the questioning.
 Interrogee – any person who is subjected to the to the interrogation process in any of
its forms and phases.
 Suspect – any person believed to be associated with prohibited activity.
 Source – a person who for any reason submits information of intelligence interest
usually on a voluntary basis.
 Provocateur – an individual from enemy forces who is deliberately introduce in our
custody with a specific mission of causing some unfavourable action or reaction on
our part.
 Screening – initial examination of an interrogee to determine the extent of his
knowledge of persons, places, things or events in which we are interested.
 Formal Interrogation – the systematic attempt to exploit to an appropriate depth
those are of the interrogee’s knowledge which have been identified in the screening
process.
 Debriefing – the interrogation of a friendly interrogee who has information at the
direction of or under the control of the friendly intelligence service.
 Interview – similar to a debriefing although it is less formal and the interrogee is not
necessarily under the control or employment of the respective intelligence service.
 Interrogation Report – an oral or written statement of information by the
questioning of an interrogee.

Form of Interrogation
1. Direct – the subject is aware of the fact that he is being interrogated, but he may not
learn the true objectives of the interrogation. This is being used extensively at the
tactical lever.
2. Indirect – the subject is not aware that he is being interrogated. This is used when
time is not so important.
Types of Interrogation
1. Screening – usually accomplished as soon as after capture, apprehension or arrest
of an interrogee. The objective is to obtain background information about the
interrogee and determine his area of knowledge and ability.
2. Formal Interrogation (Detailed) – the systematic attempt to exploit to an
appropriate depth those areas of the interrogee’s knowledge, which have been
identified in the screening process.
3. Debriefing – a form of eliciting information, which is generally used when the area
of intellectual capability of the interrogee is known.
4. Interview – the interviewer must be fully aware of the actual type of information
desired and alert on the interviewee’s moods and expressions.

29
5. Interrogation of Lay Personnel (Specific Type) – the techniques used are the
same as in the interrogations, however, especial effort must be made to established
a common frame of reference between the interrogator and the ineterrogee.
6. Technical Interrogation – the level of interrogation where the source has specific
and such detailed information that requires a trained expert in the subject matter to
be explored.
INTTEROGATION TECHNIQUES:
Techniques of Approach – the purpose is to gain the cooperation of the source and induce
him to answer questions which will follows:
1. The “Open Techniques” – the interrogator is open and direct in his approach and
makes no attempts to conceal the purpose of the interrogator.
2. The “Common Interest” Technique – the interrogator must exert effort to impress the
interrogee of their common interest.
3. Record File (We Know All Technique) – the interrogator prepare a file on the source
listing all known information (record should be padded to make it appear to be very
extensive).
4. Exasperation Techniques (Harassment) – effectively employed against hostile type
interrogee.
5. Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”,
“Bad Guy – Good Guy”, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of
two interrogators playing opposite roles.
6. Egotist Techniques (Pride and Ego) – usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity.
7. “Silent” Technique – employed against nervous or the confident type of interrogee.
8. “Question Barrage” Technique (Rapid Fire Questioning) – intended to confuse the
interrogee and put him into a defensive position.

_goodluck_

30

You might also like