You are on page 1of 16

POLICE INTELLIGENCE AND SECRET SERVICE

INTELLIGENCE DEFINED

According to Government - Commission Task Force - It means the collection, processing, collation, interpretation,
evaluation and dissemination of information, with references to national security. In certain context, it may also mean the network
or the system for the collection, collation, interpretation, evaluation, processing, and dissemination of information. “The term as
used here doesn’t include any police powers or authorities, any investigative function other than those involve in the collection of
information nor any function involved in the enforcement of laws, orders, or regulation.

According to Military Terminologies - Intelligence is the end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information which my have immediate or potential significance to the development
and execution of plans, policies and programs of the users.

According to Police Parlance - The end product resulting from the collection, evaluation, analysis, integration and
interpretation of al available information regarding the activities of criminal and other law violators for the purpose of affecting
criminals and other law violators for the purpose of affecting their arrest, obtaining evidence, and forestalling plan to commit
crime.

Functions of Intelligence in General

Today all counties have their intelligence services. They maybe different in their organization, efficiency and method
but they all have the basic functions such as:

 the collection or procurement of information


 the evaluation of the information which then become intelligence
 the dissemination of intelligence to those who need it.
 counter intelligence or negative intelligence, which is dedicated to the concealment and protection of one’s own
information from the adversary intelligence operation. It is a defensive function of intelligence.

CRITERIA, DOCTRINES, AND PRINCIPLES OF INTELLIGENCE

Criteria

a. Universality of application - it should apply to as many phases and aspects of intelligence as possible. It should guide
not only the production of intelligence but also the concomitant activities essential to the process as well as the
organization and the thought and actions of the individual composing it.
b. It must be broad - it should form the basis for a formulation of corollary and subsidiary guides.
c. It must be important, indeed essential, to intelligence - if a guide is truly important and essential, then its violations
should bring its own immediate penalties.

Doctrines

a. There exists an essential unity between knowledge and action; that knowledge enhances the effectiveness of action –
and minimizes the chances of error.
b. “The knowledge requirements of decision-making are complex and beyond the capacities of anyone necessary to meet
there requirements.”

Principles

1. Objectivity - in intelligence, only the well guided succeed. It is a basic intelligence concept that there must be unity
between knowledge and action. It follows therefore that intelligence should interact and condition the decision.
Intelligence must be adapted to the needs of the decision; it is both giver and taker. Action or decision is planned by
knowledge and guided by it at every step.
2. Interdependence - Intelligence is artificially subdivided into component elements to insure complete coverage,
eliminate duplication and to reduce the overall task or manageable sizes. Nevertheless, each subdivision remains as
essential part of unity; contributes proportionately to the end result; possesses a precise interrelationship; and interacts
with each other so as to achieve a balanced and harmonious whole.
3. Continuity - Intelligence must be continuous. It is necessary that coverage be continuous so that the shape of what
happens today could be studied in the light of what happened before, which in turn would enable us to predict the
shape of things to come.
4. Communication - Intelligence adequate to their needs must be communicated to all the decision makers in manner that
they will understand and form that will permit its most effective use.
5. Usefulness - Intelligence is useless if it remains in the minds, or in the files of its collectors or its producers. The story
must be told and it must be told well. The story must be convincing and to be convincing it must not only be plausible
or factual but its significance must be shown.
6. Selection - Intelligence should be essential and pertinent to the purpose at hand. Intelligence involves the plowing
through a maze of information, considering innumerable number of means or of picking the most promising of a
multitude of leads. The requirement of decision-making covers very nearly the entire span of human knowledge.
Unless there is selection of only the most essential and the pertinent, intelligence will go off in all directions in one
monumental waste of effort.
7. Timeliness - Intelligence must be communicated to the decision maker at the appropriate time to permit its most
effective use. This is one of the most important and most obvious, for Intelligence that is too soon or too late are
equally useless. Timeliness is one principle that complements all the others.
8. Security - Security is achieved by the measures which intelligence takes to protect and preserve the integrity of its
activities. If intelligence has no security, it might be as well being run like a newspaper to which it is similar.

General Activities in Police Intelligence

1. Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with little practical immediate
operation value.
2. Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary for more effective
police planning and operation.
3. National Intelligence - it is the integrated product of intelligence developed by all the governmental branches,
departments concerning the broad aspect of national security and policy. It is concerned to more than one department
or agency and it is not produced by single entity. It is used to coordinate all the activities of the government in
developing and executing integrated and national policies and plans.
4. Counter-Intelligence – phase of intelligence covering the activity devoted in destroying the effectiveness of hostile
foreign activities and to the protection of info against espionage, subversion and sabotage.
5. Undercover Work – is an investigative process in which disguises and pretext cover and deception are used to gain
the confidence of criminal suspects for the purpose of determining the nature and extent of any criminal activities that
maybe contemplating or perpetuating.

Functional Classification of Police Intelligence

1. Criminal Intelligence – refers to the knowledge essential to the prevention of crimes and the investigation, arrest, and
prosecution of criminal offenders.
2. Internal Security Intelligence – refers to the knowledge essential to the maintenance of peace and order.
3. Public Safety Intelligence – refers to the knowledge essential to ensure the protection of lives and properties.
Forms of Intelligence

1. Sociological Intelligence – deals with the demographic and psychological aspects of groups of people. It includes the
population and manpower and the characteristics of the people, public opinion – attitude of the majority of the people
towards matter of public policy and education.
2. Biographical Intelligence – deals with individual’s personalities who have actual possession of power.
3. Armed Force Intelligence – deals with the armed forces of the nation. It includes the position of the armed forces, the
constitutional and legal basis of its creation and actual role, the organizational structure and territorial disposition, and
the military manpower recruitment and Order of Battle
4. Geographical Intelligence – deals with the progress of research and development as it affects the economic and
military potential of a nation.

KINDS OF INTELLIGENCE

A. Strategic Intelligence – as defined earlier, it is an intelligence data that are not of an immediate value. It is usually
descriptive in nature, accumulation of physical description of personalities, modus operandi. It does not have immediate
operational value but rather long range that may become relevant to future police operations.

B. Line Intelligence – It is the kind of intelligence required by the commander to provide for planning and conduct
tactical and administrative operation in counter insurgency. This pertains to knowledge of People, Weather, Enemy and Terrain
(PWET) used in planning and conducting tactical and administrative operation in a counter insurgency.

Intelligence information to be determined in Line Intelligence are:

People - living condition of the people, sources of income, education of the people, government livelihood projects,
extent of enemy influence to the people
Weather – visibility, cloudy, temperature, precipitation (rain), wind
Enemy - location of the enemy, strength of the enemy, disposition, tactical capability, enemy vulnerability
Terrain - relief and drainage system, vegetation, surface material, man made features. There are military aspects of
terrain which includes cover and concealment, obstacle, critical key terrain features, observation and fields of fire, and
avenues of approach.

C. Counter Intelligence (CI) - this kind of intelligence covers the activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of info against espionage, subversion and sabotage. Hence, the three activities of
CI are: protection of information against espionage; protection of personnel against subversion; and protection of installations
and material against sabotage.

Counter Intelligence is also known as Negative Intelligence - a generic term meaning three different things;

Security Intelligence – means that the total sum of efforts to counsel the national policies, diplomatic decisions, military
data, and any other information of a secret nature affecting the security of the nation form unauthorized persons. It is an effort to
deny information to unauthorized persons by restricting to those who are explicitly authorized to possess it.

Counter-Intelligence - counter intelligence is the organized effort to protect specific data that might be of value to the
opponent’s own intelligence organization. Some of its functions are: Censorship – of the following: correspondence, broadcast,
telecast, telephone conversations, telegrams and cables, etc., prevention of the dissemination of any information that might aid
an opponent; maintenance of files of suspect; surveillance of suspects; mail reading, wire tapping and recording; infiltration of the
enemy intelligence organized to procure information about its method, personal, specific operations and interest.

Counter-Espionage - In counter-espionage, negative intelligence becomes a dynamic and active effort. Its purpose is
to investigate actual or theoretical violation of espionage laws, to enforce those laws and to apprehend any violators.
Five Categories of CI Operation

1. Military Security – it encompasses the measures taken by a command to protect itself against espionage, enemy
operation, sabotage, subversion or surprise.
2. Port Frontier and Travel Security – has to do with the application of both military and civil security measures for CI
control at point of entry and departure, international borders or boundaries.
3. Civil Security – it encompasses active and passive CI measures affecting the non-military nationals permanently or
temporarily residing in an area under military jurisdiction.
4. Censorship – it is the control and examination of the civil, national, armed forces, field press, and POWs.
5. Special Operations – counter subversion, sabotage and espionage

Counter Intelligence (CI) Operation

1. Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use human sources to collect information or
to conduct sabotage and subversion which includes CI special operations, liaison, counter security, and CI screening.
2. Counter Imagery Intel (IMINT) - includes action taken to determine enemy SIGINT and related enemy weaknesses,
capabilities and activities. These actions include surveillance radar, photo thermal and infrared systems. Successful
counter – IMINT operations rely heavily on pattern and movement analysis and evaluation of the enemy.
3. Counter Signal Intel (SIGINT) – determine enemy SIGINT and related enemy weaknesses, capabilities and activities,
assess friendly operations to identify patterns, profiles and develop, recommend and analyze counter measures.

THE INTELLIGENCE CYCLE

The single most important part of intelligence activity is the understanding the intelligence cycle because MISSION,
which is the core of the cycle, serves as the foundation of all intelligence operations. Every operative must therefore place into
mind the following phases of the cycle:

PHASE 1 - Planning the Collection Effort

This phase of the cycle involve the determination of the requirements of intelligence. It is concerned with identifying the
so called Essential Element of Information (EEI) - an item of intelligence or information of the characteristics of the area of
operations and the enemy, which the commander feels he needs before he needs before he can reasonably arrive at a decision.

With this, the intelligence officer must have a thorough knowledge of the available sources of information, the collecting
agencies and type of info the latter can provide. He must understand the operations of the command in order to provide the
particular Intel required for success. He must have a thorough knowledge of the tactics, organizations, and characteristics of the
enemy and be especially competent in the fields of acquisition of operations.

Categories of Intelligence Requirements

In relation to use

a. Executive – are those information required by executive, governmental and military commanders; the executive
requirements are the basis for decisions and national policy making.
b. Contributory – information required to complete the staff process – make staff plans and estimates that contribute
to the decision and policy making.
c. Operational – additional intelligence required in planning and carrying out effectively the decision or policy
announced. Decisions and policy require implementation.
d. Collateral – higher or adjacent echelons of the government or military establishment may require info.
In relation to type

a. Basic – are general reference materials for use in the planning regarding the enemies, area of operations,
capabilities – static comprehensive.
b. Current – are information which are temporary in nature and narrower in scope.
c. Estimative – are those that determine the future courses of action; required by the executives to plan future
military operations and policies.

PHASE 2 - Collection of information

This phase of the cycle is concerned with identification of the collecting agency, the formulation of procedures on the
manner of collecting the information in conjunction with the plans as achieved in phase one.

Selection of Collecting Agencies

a. List all available sources; exploit the collecting agencies.


b. Collection will be assigned in accordance with capabilities;
c. Collection directives prepared once the proper collecting agency has been selected to exploit a particular source;
d. Collection directives do not limit the activities of the collecting agency;
e. Criteria for the selection of collecting agency; suitability, capability, confirmation, timeliness and balance.

Purpose of the Collection Plan

a. To insure logical and orderly analysis of the intelligence requirements.


b. To establish a workable collection scheme based on the analysis of the intelligence requirement.
c. To provide definite and precise directives to collecting agencies.
d. To avoid possibility of omission, conflict or unnecessary duplication of collection effort.

Steps in Developing a Collection Plan

a. List the requirements in the order of priority


b. Break the requirements into indication – any evidence of actual or potential enemy activity or characteristic of an
area of operation enemy activity or characteristic of an area of operation, habitual activities – need experience.
c. Fit those indications into existing situations – critical clues, security measures, attack, defense, etc.
d. Basis for development for specific collection directive - designed to exploit to the fullest the collection directive;
guide doesn’t limit.
e. Selection of Collecting Agencies – criteria for selection – suitability, capability, confirmation, timeliness and
balance. Designation of particular time and place that the required information is to be reported.

Factors in choosing Collection Agent

In choosing collection agents, they must be selected according to their capability – agents placements or access to the
target; multiplicity – more agents; and balance – the number of agents needed per operation.

a. Methods of Collection – collection of information can be done through overt method (open system) or covert
method (secret/clandestine).
b. Collecting Agencies – depending on the type of operation, the collecting agency could be Government Agencies,
Intelligence units, or Organizations
c. Trade Crafts – includes the use of photography, investigations / elicitation / interrogation, surveillance, sound
equipment, surreptitious entry – keys and locks, use of an artist, communication

PHASE 3 - Processing the Collected Information


This phase of the cycle is concerned with the examination and collation of all collected information.
Steps in Processing Raw Information

1. Collection – organization of raw data and information into usable form; grouping similar items of information so that
they will be readily accessible.

2. Recording – is the reduction of info into writing or some other form of graphical representation and the arranging or this
info into writing or some form of graphical representation and the arranging of this into groups of related items.
 Police log book and Journal
 Intel-work Sheet - Intel Files
 Situation Maps - Rouges Gallery
 Modus Operandi Files

3. Evaluation – examination of raw information to determine intelligence value, pertinence of the information, reliability of
the source and agency, and its credibility or truth of information. Evaluation is the determination of the pertinence of the
info to the operation, reliability of the source of or agency and the accuracy of the info. Evaluation determines the
following:
 Pertinence - does it hold some value to current operation? Is it needed immediately?
 Reliability – judging the source of info of agency
 Credibility – truth of info. Is it possible for the reported fact or event to have taken place? Is the report
consistent within itself? Is the report confirmed or corroborated by info from different sources or agencies? If
the report does not agree with info from other sources which one is more likely to be true?

The Evaluation Guide

ACCURACY OF INFORMATION RELIABILITY OF INFORMATION SOURCE OF INFORMATION

1- CONFIRMED by other sources A- COMPLETE RELIABLE T- Direct Observation by Comdr/Chf of Unit


2- PROBABLY TRUE B- USUALLY RELIABLE U- Report by DPA or Resident Agent
3- POSSIBLY TRUE C- FAIRLY RELIABLE V- Report by PNP/AFP Troops
4- DOUBTFULLY TRUE D- NOT USUALLY RELIABLE W- Interrogation of Captured Enemy
5- IMPROBABLE E- UNRELIABLE X- Observation of gov’t/civilian employee
6- TRUTH can not be judged F- REALIBILITY cannot be judged Y/Z- Documentary

4. Interpretation – it is establishing the meaning and significance of the information. It involves the following activities:
 Analysis – shifting and isolating those elements that have significance in light of the mission or national objective.
 Integration – combining the elements isolated in analysis and known information to form a logical picture or
theory.
 Deduction – the formulation of conclusions from the theory developed, tested and considered valid –
determination of effort and meaning of the information.

PHASE 4 - Dissemination and Use of Information

This phase of the cycle refers to the activities of transferring the processed information to the proper users, most
particularly the authority that requires the activity. Processed information can be disseminated through annexes, estimates,
briefing, message, reports, overlays, and or summaries.

The criteria that must be observed in dissemination are:

1. Timeless – must reach the users on time to be of value. It must be disseminated in accordance with the urgency and
must reach the user in sufficient time to be use.
2. Propriety – the message must be clear, concise and complete, as well as in the proper form for the receiver to readily
understand its contents. It must be disseminated to the correct user, presented in a form that lends itself to immediate
use and distributed by the most effective means appropriate to both time and security requirements.

Methods of Dissemination

1. Fragmentary orders from top to bottom of the command


2. Memorandum, circulars, special orders
3. Operations order, oral or written
4. Conference – staff members
5. Other report and intelligence documents
6. Personal Contact

Who are the users of intelligence?

1. National leaders and military commanders – formulation of national policies.


2. Advisors and Staff – preparations of plans and estimates
3. Friendly nations or other branches of the armed forces.
4. Processor – basis for evaluation and interpretation.
5. Head / chairman of an organization
6. Any person with authority for purposes of planning.

INFORMATION AND ITS SOURCES

Information

Information refers to all evaluated materials of every description including those derived from observation, reports,
rumors, imagery, and other sources from which intelligence in produced. Information is a communicated knowledge by others
obtaining by personal study, investigation, research, analysis, observation.

Two General classifications of sources of information:

1. Open Sources – 99% of the information collected are coming from open sources.
2. Close Sources – 1% of information are collected from close sources.

Overt Intelligence – is the gathering of information or documents procured openly without regard as to whether the
subject or target become knowledgeable of the purpose

Open Sources: Includes information taken from


 Enemy activity
 POW and Civilians
 Captured documents
 Map - Weather, forecast, studies, report - Agencies

Covert Intelligence – is the secret procurement of information, which is obtained without the knowledge of the person
or persons safeguarding vital intelligence interest.

Close Sources: Include information which maybe taken through:


 Surveillance
 Casing and
 Elicitation
 Surreptitious entry
 Employment of technical means (Bugging and Tapping device)
 Tactical Interrogation - Observation and Description (ODEX)

PERSONS AS SOURCES OF INFORMATION

Informant Net – It is a controlled group of people who worked through the direction of the agent handler. The
informants, principal or cutouts supply the agent handler directly or indirectly with Intel information

Informants (Asset) – people selected as sources of information, which could be voluntary, or in consideration of a price.

 Informant – refers to a person who gives information to the police voluntarily or involuntarily with out any
consideration
 Informer – those who give information to the police for price or reward

Types of Informants

1. Criminal Informant – an informant who give information to the police pertaining to the underworld about organized
criminals with the understanding that his identity will be protected
2. Confidential Informant – is similar to the former but he gives information violate of the law to includes crimes and
criminals
3. Voluntary Informant – a type of informant who give information freely and willfully as a witness to a certain act
4. Special Informant – those who gives information concerning specialized cases only and it is regarded a special
treatment by the operatives (ex. teachers, businessmen)
5. Anonymous Informant – those who gives information through telephone with the hope that the informant can not
be identified

Sub-type of Informant

1. Incidental Informant – a person who casually imparts information to an officer with no intention of providing
subsequent information
2. Recruited Informant – A person who is selected cultivated and developed into a continuous source of info

Categories of Recruited Informants:

1. Spontaneous or Automatic Informant – Informants who by the nature of their work or position in society have a
certain legal, moral or ethical responsibilities to report info to the police
2. Ordinary (out-of-their-will) Informants – Informants that are under the compulsion to report info to the police
3. Special Employee – informants who are of a specific operational nature

Other Classification of Informant

Other terms related to people who gives information are Automatic Informant, Penetrating Agent , Infiltrating Agent ,
Full time Informant , Rival – Elimination Informant, False Informant, Frightened Informant, Self- aggrandizing Informant,
Mercenary Informant , Double Crosser Informant , Woman Informant , Legitimate Informant.

Common Motives of Informants

People give information to the police due to various reasons. Their motives include reward, revenge, fear and
avoidance of punishment, friendship, patriotism, vanity, civic-mindedness, repentance, competition, and other motives.
INFORMANT RECRUITMENT

Phases

1. Selection – it is particularly desirable to be able to identity and recruit an informant who has access to many
criminal in-group or subversive organization. Wide access is probably the single most important feature in the
consideration of recruiting the potential informant
2. Investigation – the investigation of the potential informants that has tentatively identified as a “probable” must be
as thorough as possible. It must establish possible existing motives as to this person might assist the police Intel
community. Failure to do so will deny this office who must perform the approach and persuasion phase with little
more that a guess. If necessary, conduct complete background investigation (CBI)
3. Approach – approach must be done in a setting from which might include pleasant surroundings, perhaps a
confidential apartment, completely free form any probability of compromise, preferably in an adjacent city or a
remote area foreign to the informants living pattern.
4. Testing – the testing program should begin, of course, with the limited assignment, with a gradual integration into
the more important areas. The occasional testing of an informant should continue through the entire affiliation

INTELLIGENCE OPERATIONS

Intelligence Operations is the result of intelligence planning, planning is always ahead of operation although an
operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence
management.

The 14Operational Cycles

1. Mission and Target –


a. Infiltration – the insertion of action agent inside the target organization
b. Penetration – recruitment of action agent inside the target organization
2. Planning
3. Spotting
4. Partial Background Investigation (PBI) or Complete Background Investigation
5. Recruitment - the only qualification of an agent is to have an access to the target
6. Training
7. Briefing
8. Dispatch
9. Communication - technical method like telephone/radio, non-technical method like personal meeting, live drop or dead
drop
10. Debriefing
11. Payments – depends upon the motivation of informant
a. Regulatory - pay no bonuses
b. Supplemental - income that is enough to ease his financial worries
12. Disposition – involve activity on rerouting, retraining, retesting, termination
13. Reporting
14. Operational Testing

COVER AND UNDERCOVER ACTIVITIES

1. Cover - the means by which an individual group of organization conceals the true nature of its acts and or existence
from the observer.
2. Cover story – a biographical data through fictional that will portray the personality of the agent he assumed, a scenario
to cover up the operation
3. Cover Support – an agent assigned in target areas with the primary mission of supporting the cover story.

Types of Cover

1. Natural Cover – using actual or true background


2. Artificial – using biographical data adopted for the purpose
3. Cover with in a Cover – justification of existence
4. Multiple Cover – any cover you wish.

Organizational Cover – is an account consisting of biographical which when adopted by an individual will assume the
personality he wants to adopt

Undercover Assignment – is an investigative technique in which agent conceal his official identity an obtain information
from that organization

THE UNDECOVER AGENT

Special qualifications include knowledge of the language, area background regarding events, knowledge about the
custom and habits, physical appearance, and must be an artist.

Factors considered in Selecting Cover Story

1. Mutual Point of Interest


2. Justification of presents
3. Previous and permanent address
4. Efficiency of role and freedom from the movement
5. Means of communication
6. Social and financial status
7. Optional alternate plan
8. Safe departure

Selecting Action Agents

1. Placement – location of prospective agent with respect to the target


2. Access – it is the capability of a prospective agent to obtain the desired info for the Intel organization or to perform to
Intel collection mission in the area.
 Primary Access – it is the access to the desired info
 Secondary Access – it is the access to the desired info through a principal source where the latter has the direct
access
 Outside Access – the agent is employed outside the target and merely monitor info from a third person who is
monitoring info n the area

AGENT CONTROL

CONTROL – authority to direct the agent to carryout task or requirement on behalf of the clandestine organization in
an acceptable manner and security

Two Categories of Control

1. Positive Control – is characterized by professionalism and rapport like:


a. Agent motivation
b. Psychological control

2. Negative Control – characterized by threat and it include the following:


a. Disciplinary Action – includes verbal reprimand for poor performance or insecure actions withholding certain
material rewards, reduction of agents salary or in extreme situation the threat of terminating professional
relationship
b. Escrow Account – control of an agent by putting hi salary in a bank to be withdrawn only after a fulfillment of
a condition
c. Blackmail

METHODS OF COVERT INTELLIGENCE

SURVEILLANCE

Surveillance is a form of clandestine investigation which consists of keeping persons, place or other targets under
physical observation in order to obtain evidence or information pertinent to an investigation. Surveillance of persons is called
Tailing or Shadowing, Surveillance of place is called Casing or Reconnaissance, and Surveillance of other things, events, and
activities is called Roping.

Considerations in Surveillance Planning

 Pre-Surveillance Conference – a conference held among the team members, the police intelligence unit before
surveillance is conducted.
 Surveillance Plan – a plan established the as required according to type of personnel, and the general and specific
instructions for surveillance.
 Area Target Study – refers to the area of operation of surveillance activities.
 Surveillant – a person who conducts surveillance with includes only observations.
 Stakeout or Plant – is the observation of places or areas from a fixed point.
 Tailing or Shadowing – it is the observation of a person’s movement.
 Undercover Man – it refers to a person trained to observe and penetrate certain organization suspected of illegal
activities and later reports the observation and information’s that proper operational action can be made
 Liason Program – the assignment of trained intelligence personnel to other agencies in order to obtain information of
police intelligence value. (Agencies like the press, credit agencies, labor unions, telephone companies)
 Safehouse – is a place, building, enclosed mobile, or an apartment, where police undercover men meet for debriefing
or reporting purposes.
 Drop – any person is a convenient, secure and unsuspecting place where police undercover men meet his action
agent for debriefing or reporting purposes.
 Convoy – an accomplice or associate of the subject used to avoid or elude surveillant.
 Decoy – a cover supporting the surveillant who can become a convoy whenever surveillant is burned.
 Contact – any persons whom the subject picks or deals with while he is under observation and identifies the observer.
 Made – when subject under surveillance becomes aware that he is under observation and identifies the observer.
 Lost – when the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.

TYPES OF SURVEILLANCE

According to Intensity and Sensitivity


1. Discreet –subject person to be watch is unaware that he is under observation
2. Close – subject is aware that he is under observation varied on each occasions
3. Loose – applied frequently or infrequently, period of observation varied on each occasion

According to Methods
1. Stationary – this is observation of place usually a bookie stall, a gambling, joint, a residence where illegal activities are
going on (fixed position)
2. Moving – surveillance follow the subject from the place to place to maintain continuous watch of his activities
3. Technical – this is a surveillance by the use of communications and electronic hardware’s, gadgets, system and
equipment

Special Equipment (Technical Supports)


1. Camera with telephoto lens
2. Moving Picture camera
3. Binoculars
4. Tape recording apparatus
5. Wire taping device
6. Other instrument – miniaturized one-way radio

Methods available to employ in Surveillance

Ordinarily, the methods are surveillance of place, tailing or shadowing (1-2-3 man shadow), undercover investigation,
special methods includes: wire tapping - concealed microphones - tape recorder -television - electric gadgets

Essential Requirements and Appearance in Surveillance

In the actual process of operation, the agent is advised to be of general appearance, has no noticeable peculiarities in
appearance. Agent should not wear inconspicuous jewelry or clothing, nothing about him to attract attention. He must have
perseverance and able to wait for hours. Alertness, resourcefulness, and being versatile and quick-witted are his weapons.

Basic Preparations in Surveillance

1. Study the Subject – name, address, description, family and relatives, associates, character and temperament, vice,
hobbies, education, others
2. Knowledge of the area and terrain – maps, national and religious backgrounds, transportation, public utilities
3. Subversive Organization - history and background, biography of the official, identity and background of members and
former members, method of identification employed by the members, files and records, nature, location and
accessibility, meeting
4. Cover Story – the scenario must be appropriate to cover up operation and avoidance of identification of mission.

Counter Surveillance – the conduct of operation is coupled with counter intelligence measures such as window
shopping, use of convoys and decoys, stopping immediately on blind corners, getting out immediately on public conveyances,
retracing, entering mobile housing

CASING OR RECONNAISSANCE

Casing is the term use in the police organization while reconnaissance is used in military terms. Casing or
reconnaissance is the surveillance of a building place or area to determine its suitability for Intel use or its vulnerability in
operations. It aids in the planning of an operation by providing needed information. It assists the agent handler to install
confidence in his agent during briefing phase by being able to speak knowingly about the area of operation. Casing is also
considered a security measure because it offers some degree of protection for those operating in an area unfamiliar to them.

Method of Casing

1. Personal Reconnaissance – the most effective method and will produced the most info since you know just what you’re
looking for.
2. Map Reconnaissance – it may not sufficient but it can produce a certain amount of usable information
3. Research - much info can be acquired through research
4. Prior Information – your unit and of the unit will have file report that they may provide you with info
5. Hearsay –info usually gain by the person operating in the area and performing casing job
OBSERVATION AND DECRIPTION, A.K.A (ODEX)

Observation – a complete and accurate observation by an individual of his surroundings an encompasses the use of all
the major sense to register and recognized its operational or Intel significance

Description – the actual and factual reporting of one’s observation of he reported sensory experience recounted by
another

Psychologist estimate that approximately 85% of our knowledge is gathered through sight, 13% from sense of hearing
and only 2% through the three other senses

Psychological Processes for accurate observation

 Attention – consist of he psychological process involve in becoming aware of an existence of fact


 Perception – involved in the understanding this fact of awareness
 Report – involved in identifying the name in one own mind and some fact which has been perceive, narrated and
identified

ELICITATION

It is a system or plan whereby information of intelligence value is obtained through the process direct
intercommunication in which one or more of he parties to the common is unaware of the specific purpose of the conservation.
The three phases are determination of the mission, selection of the subject, and accomplishment of the mission.

Two Devices in the conduct of Elicitation

 Approach – process of setting people to start talking


 Probe – to keep the people taking incessantly

Types of Approach

1. Flattery – people are susceptible to praise so use this weakness as a way of approaching the subject for elicitation.

a. Teacher – Pupil Approach – the subject is treated as an authority then solicit his view point and opinion on a
subject matter.
b. Kindred Soul Approach – the subject is placed in a pedestal having some specialized quality then flatter him/her
by showing enough concern for his/her welfare to pay special attention to his enjoyment
c. Good Samaritan Approach – is the sincere and valid offers of help and assistance are made to the subject
d. Partial – disagreement Approach – seek to produce talking by the word “I’m sure if I fully agree”.

2. Provocative Approach – discover a wide range of conventional gambits

a. Teaser Bait Approach – the elicitor accumulates the sources of knowledge about a particular subject to tempt the
subject to give his/her views.
b. Manhattan from Missouri Approach – the elicitor adopts an unbelievable attitude above anything. He questions all
statements and oppositions.
c. Joe Blow Approach – is “I” know the answer to everything” approach. The elicitor adopts the attitude of being
approachable of any field.
d. National Pride Approach – nature propensity of al persons to defend their country and its policies.
Types to Probe

1. Competition Probe – this is effective when used in connection with the teacher pupil approach
2. Clarity Probe – used to elicit additional information in an area which the response is clear
3. High Pressure Probe – it serves to point out contradictions in what the subject has said
4. Hypothetical Probe – presents a hypothetical situation and to get he subject to react to the hypothetical situations

Purposes of Elicitation

1. To acquire info which is unbelievable through other channel


2. To obtain info which although unclassified in not publicity known
3. To provide source of info
4. To assist various individuals

PORTRAIT PARLE (P/P)

It is a means of using descriptive terms in relation to the personal features of an individual and it can be briefly
described as a world description or a spoken picture. (Anthropometry - no two human beings has the same body measurement)

Identification Methods

1. Branding and mutilation


2. Parade system with portrait parle
3. Fingerprint method

Several method of acquiring descriptive ability

1. Learns the meaning of the numerous words used in describing the various features of the persons.
2. Study and practice the description of the features, such as the eyes, hair or the nose as hey appear on several
different persons.
3. Learning a definite order of proceeding from one picture to another

Methods of obtaining descriptive information

1. Close observation of the person and accurate recording of the terms describing the features
2. Information describing through interviews of witnesses
3. Examination of observation of photographs and sketches
4. Examination of records

BACKGROUND CHECKS AND INVESTIGATION

Information needed: Domestic Background, Personal Habit, Business History, Social or Business Associates, Medical
History, Educational Background, Family History

TACTICAL INTERROGATION

The need for obtaining information of the highest degree of credibility taken on the minimum of time can be through
interrogation which varies and dependent entirely on the situation. In tactical interrogation, familiarization of the following is
necessary:

 Interrogation – the systematic asking of questions to elicit information in the minimum of time.
 Interrogator - person who does the questioning.
 Interrogee – any person who is subjected to the interrogation process in any of its forms and phases.
 Suspect – any person believed to be associated with prohibited activity
 Source – a person who for any reason submits information of intelligence interest usually on a voluntary basis
 Provocateur – an individual from enemy forces who is deliberately introduce in our custody with a specific mission of
causing some unfavorable action or reaction on our part.
 Screening – initial examination of an interrogee to determine the extent of his knowledge of persons, places, things or
events in which we are interested.
 Formal Interrogation - the systematic attempt to exploit to an appropriate depth those are of he interrogee’s knowledge
which have been identified in the screening process
 Debriefing – the interrogation of a friendly interrogee who has information at the direction of or under the control of the
friendly intelligence service.
 Interview – Similar to a debriefing although it is less formal and the interrogee is not necessarily under the control or
employment of he respective intelligence service
 Interrogation Report – an oral or written statement of information by the questioning f an interrogee

INTERROGATION TECHNIQUES:

Techniques of Approach – the purpose is to gain the cooperation of the source and induce him to answer questions
which will follows.

1. The “Open Techniques” – the interrogator is open and direct in his approach and makes no attempts to conceal the
purpose of the interrogator. It is best employed when the interrogee is cooperative. It is frequently used at the tactical
level where time is a major interrogator.
2. The “Common Interest” Technique – the interrogator must exert effort to impress the interrogee of their common
interest. The interrogator must look for he point out the real advantages the interrogee will receive if he cooperates
3. Record File (we know all technique) – the interrogator prepare a file on the source listing all known information (record
should be padded to make it appear to be very extensive). The information must contain the life history of he interrogee
to include his activities and known associates (Party- bio-data of the interrogee is important). The “we know all” s used
in conjunction with the record file. During the approach, the interrogator may ask the interrogee about a subject, if he
refuses to cooperate, the interrogator may provide the answer in order to impress him that the interrogator knows him
very well (all is known).
4. Exasperation – Techniques (Harassment) – effectively employed against hostile type interrogee. The interrogator must
be alert because the interrogee may fabricate information to gain relief from irritation (monotype). Subject Interrogee is
placed in a longer period of interrogation without rest or sleep. The interrogator permits the source to go to sleep and
subsequently awaken for another series of questioning (this is done repeatedly). After many repetitions, the interrogee
will be exasperated and will finally cooperate hoping that he can be allowed to rest or sleep. Ask a question, listen to a
reply and then ask the same question repeatedly (use a tape recorder if possible). The purpose is to bore the
interrogee thoroughly until he begins to answer questions freely to end the harassment.
5. Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”, “Bud Guy – God Guy’, “Sweet
and Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of two (2) interrogators playing opposite roles.
6. Egotist Techniques (Pride and Ego) – usually successful when employed against an interrogee who has displayed a
weakness or a feeling of insecurity. You may reverse the technique by complimenting the interrogee in hopes of getting
him to admit certain information to gain credit. Described him as the best person, superior or comrade.
7. “Silent” Technique – employed against nervous or the confident type of interrogee. Look out the interrogee squarely in
the eye with sarcastic smile (force him to break eye contact first). He may ask questions but the interrogator must not
answer. Patience is needed until the interrogator is ready to break silence.
8. “Question Barrage” Technique (Rapid Fire Questioning) – intended to confuse the interrogee and put him into a
defensive position. The interrogee become frustrated and confused, he will likely reveal more than he intended, thus
creating opening for further questioning.
INTELLIGENCE IN NATIONAL SECURITY

Understanding National Security

National Interest - Each nation, regardless of creed or form, has their national interest to protect and to advance. For
national interests, people would willingly go to war to succeed of perish. What then is national interest? National interest has
been defined in many ways. But for our purposes, we take the context of national interest to mean the general and continuing
end for which a nation acts. The term “national interest” is used to refer to the general concept of national security and well-
being. National are what the decision-making body in government determines which beliefs, matters or dictates of conscience
are important to the maintenance of the nation. To secure or support national interest, certain objectives may be set by a nation.

And what are the Philippines national interests? Invariably, our national interest includes self-preservation, freedom
and independence, territorial integrity, political stability, and socio-economic welfare. National Principles and Polices - From our
national interests, national principles and polices are derived. These are:
a. That our country shall be a Republican State
b. That the defense of the state shall be the concern of all citizens.
c. That we, as a people, renounce war to further our national interests.
d. That our government shall promote social justice.
e. That as a matter of concept, civilian authority is supreme at all times over the military. This concept is actualized
when the President assumes at the same time the position of the Commander-in-Chief of the AFP.

National Strategy - In furtherance of our national principles and polices, the leaders of our nation are then able to
formulate our strategy.

National Power - How may a nation measures ones power? The elements of national power are numerical strengths
and character of population, cultural development and character of government, geographical location, resources, economic
development and military potential. The degree to which a nation is strong or deficient in these elements is normally a measure
of its national power.

The components of National Power are: Political Strength, Economic Strength, Cultural Strength, and Military Strength.
Political strength stems from the character of the people and from the type and stability of the government and the soundness of
its foreign policy. Economic strength stems from a combination of factor such as geographic location, climatic conditions, supply
of natural resources, industrial capacity, internal and external communication systems, international trade, and the size, health
and technical competence of the population. Cultural strength stems from the national unity, the social and moral fiber of the
people and the things they believe in, and from the nature and vigor of national institutions-political, social, religious, educational,
scientific and cultural. Military strength is the ability of a nation to exert pressure by armed force in furtherance of national policy.
It consists of the strength of all the armed forces in combination with other elements of national power, depending heavily on
natural resources, economic strength, a broad base of war industries and a vigorous population, military strength is influenced by
the number and quality of the nation’s military, economic, and political alliances.

You might also like