You are on page 1of 74

CHAPTER 1

Introduction to Police Intelligence and Secret Service

I. SUN TZU & SOME OF HIS MAXIMS

Sun- Tzu authored the book entitled “PING FA (The art of war)” written about 400
B.C. which the following statements could be found.

“IF YOU KNOW YOUR ENEMY AND YOU KNOW YOURSELF, YOU NEED NOT FEAR
THE RESULTS OF HUNDRED OF BATTLES. IF YOU KNOW YOURSELF BUT NOT THE
ENEMY, FOR EVERY VICTORY YOU WILL SUFFER DEFEAT. IF YOU KNOW NETHEIR
YOURSELF NOR THE ENEMY, YOU ARE FOOL OF WILL SUFFER DEFEAT IN EVERY
BATTLE.”

“what is called fore knowledge cannot be elicited from spirits, or from gods, or from
analogy to the past events nor from calculations. He wrote “it must be obtained from
men who know the enemy situation.

II. HISTORY OF INTELLIGENCE

BIBLICAL RECORDS

Moses
One of the first recorded formalized intelligence effort with format can be found on
the Holy Bible (Numbers 13:17). The Scriptures also named the 12 intelligence agents whom
the Lord directed Moses to send into the land of Canaan and also recoded that all those men
were heads of the children of Israel. And Moses sent them to spy out the land of Canaan (Num
13:17-20).
Moses sent the 12 agents and said onto them, get you up this wat southward, and go
up into the mountain; and see the land, what it is; and the people in the dwelt therein, whether
they be strong or weak, few or many, and; what the land dwell in, whether in tenths or
strongholds; and what the lands is, whether it be fat or lean, whether there be wood therein, or
not. And be ye good courage and bring the fruit of the land.

Rehab

The harlot of Jericho (Joshua 2:1-21) who sheltered and concealed the agents of
Israel, she made covenant to the agents duped their pursuers. She was not only an impromptu
confederate of immense value for the Jewish leader of that far distant day, but also established
a plot- pattern which is still of periodic relief to motion picture producers.

Delilah
She was an impromptu intelligence agent of the Philistines. She allowed Philistine
spies to hide in her house (Judges 16:9). Apart from her tonsorial specialty, she seduced
Samson of Israel to reveal the secret of his strength and used herself to gain intelligence from
powerful enemy. She achieved the largest effective force of her employer’s adversaries and
contriving the stroke which put that force out of action (Paquitol, B.S.)

INTLLIGENCE IN PRE-MODERN ERA


1. Alexander the Great
He devised the “first letter sporting and opening” to obtain information. While
marching into Asia, it is recorded there came to his hints, and rumors of disaffection
growing among his allies and mercenaries.

The young conqueror thereupon sought the truth and got it by the simplest
expedient. He announced that he was writing home and recommended to his officers
that they do likewise. Then, when the couriers were ladened and had set out for Greece,
he ordered them quietly recalled and proceeded to investigate all the letters that they
carried. Malcontents were detected, legitimate causes of grievances exposed.

2. Akbar

The “Great Mogul and sagacious master” of Hindustan who employed more than four
thousand agents for the soul purpose of bringing him the truth that his throne might
rest upon him.

3. He used intelligence to conquer China and invaded. Cathay he instructed his


generals to send spices and used prisoners as sources of information. Genghis khan was
regarded as leader of the so called “Mongol Conquerors” and used effective propaganda
by spreading rumors of Mongol terror. They collected information on weaknesses and
rivalries of Europe and usually disguised as merchants.
4. Hannibal

The Carthaginian General considered as one of the brilliant military strategist. He


developed an effective intelligence system for 15 years in Rome. He roamed around the
city often disguising as a beggar to gather first hand information. Hannibal’s invasion of
Italy, his brilliant and victorious raid in the history, gained him many success and nearly
bled Rome to death.

5. Frederick the Great

Frederick the great was known as the father of military espionage. He established
rules of obtaining and using in every grade of intelligence agents and divided his agents
into four classes as follows:

a. Common spies
Recruited among poor folk, glad to earn small amount of money or to be
accommodated as military officer.

b. Double spies
The low informers and unreliable renegades who are significant in spreading false
information into the enemy.

c. Spies of consequences
Couriers and nobleman, staff, officers, and kindred conspirations, invariably
requiring substantial bribe or bait.

d. Intimidated Spies
Persons who were forced to undertake espionage against their will.

6. Sertorius, Quintos

He was a Roman General and possessor of white fawn that tried to follow Polyneus
everywhere. The fawn was used as intelligence agent. His intelligence agents credited
their information to the supernatural power of animal.

7. Gaius Julius Caesar


During his time, his staff legion includes ten “speculators” who served as
information-collecting agency. Speculators were the first intelligence personnel to
appear definitely in military organization.
8. Napoleon Bonaparte

He was a great leader who believes in the principle that “One spy in the right place is
worth 20,000 men in field.” He also organized two bureaus of interest:

a. Bureau of Intelligence
Consolidated all incoming information regarding the enemy for presentation to
the emperor and to obtain the information as desired.

b. Topographic Bureau
Maintained a large map which covers the latest information regarding both
enemy and friendly forces.

9. Karl Schulmeister

He was Napoleon’s military secret service and Napoleon’s eyes. He began his career
in offensive espionage. Under a cover role, he was able to infiltrate the Austrian General
Staff and studied the characters of the Generals. His Royal foes selected to defeat him.

10. George Washington


Conspirators under oath abound in the history of every nation. He, as grandmaster,
mobilized the free masons of the colonies at the outbreak of American war
independence.

America’s first military intelligence director.


11. Francis Walshingham

Under Queen Elizabeth, he organized the first National Intelligence Service. He


employed spies on the staff of Admiral in Command of the Spanish Army and able to
obtain information regarding Spanish Army as to their ships, equipment, forces and
stores. He protected Queen Elizabeth I from countless assassins.

12. Richelieu

He introduced the “network of covert collectors” who transmitted prompt and


accurate information to Paris regarding the activities of the rebels and dissidents of the
kingdom.

13. Louis XIV (Sun King)

He systematized political policy, continuous surveillance, postal censorship and


military organization.

14. Wilhelm Stieber

He incorporated intelligence in the General Staff Support System. He contributed to


the science of Military Censorship and Organized Military Propaganda. He work as a
census taker and developed an informal format in the gathering of data.

15. Alfred Redi

One of the most brilliant intelligence agent, even though he was a home sexual.
Chief of the Austro-Hungarian secret service and at the same time, agent of Russia
(convicted of treason in 1913- but he committed suicide). His treason led to the death of
500,000 agents and soldiers combine in his 13 years espionage episode.

16. Brahma Kautilya

In ancient India, he overthrew the Nanda dynasty and established the first Mayuryan
king in the India throne. He recommended to his king that for the ruler to succeed, the
ruler should strike at enemies weak points by means of spies.

17. Joseph Fouche

He was known as the Father of Military Espionage in France. He was born on May
21, 1759, near Nantes. Trained for priesthood but never took orders, instead he
becomes a teacher. He rose to become the most feared and respected intelligence
director in France history. Created a network of agents with his assistance and founded
the modern system of spying on spies, which was later known as counter espionage.
18. Gen. William Donovan

He was regarded as the Father of today’s CIA. He was the first chief of the OSS
(Office of Strategic Service- Forerunner of CIA) when former president Roosevelt
established it in June 14, 1942.

19. Edward I

In 1925, he organized a systematic police system known as “Watch and War” and by
Royal proclamation; the profession “State Informer” was created in 1734 enjoining all
informers to exposed criminal activities and be compensated.

20. Joseph Petrosino

He was the former head of Italian Squad. Through extensive intelligence network, he
credited to smash the Black Society.

III. INTELLIGENCE AND THE WORLD WAR


A. World War I.
1. 1900- Europe powers developed modern staff systems and place intelligence
on the same level with personnel, operations and logistics. Intelligence the
functioned in time of peace and war. Intelligence during this period,
concentrated on information about the armed forces of the enemy and their
capabilities.
2. Aircraft- was introduced as a tool of conducting aerial reconnaissance.
3. Wireless Telegraph- was used wherein codes and ciphers were applied.
4. Army Intelligence- rapidly expanded during this period.
5. “agent Provocateur”- was employed by the Russians for the purpose of
internal security and political repression. Spying was always the specialty of
the Russians.
6. German Intelligence- gained a high reputation for offensive effectiveness
throughout Europe but declined at the outset of war.
7. British intelligence- succeed greatly by means of censorship and its Code
Room combined with skillful use of Convert agents.
8. United States- expanded their Naval Intelligence wherein domestic
Counterintelligence became a principal activity.
B. US THREE BRANCHES OF INTELLIGENCE

1. Positive Branch
- Its function it to collect, evaluate and disseminate intelligence
Information. Prepare situation, estimate and translate documents.

2. Negative Branch
- Counterintelligence functions: investigate disloyalty and sedition;
investigate graft and fraud in organization.
3. Geographic Branch
- Produces maps, photograph and terrain studies. Sections: administration,
collection by attaches troops, codes and ciphers.

C. INTELLIGENCE DURING WORLD WAR II


1. German Intelligence

German intelligence started the war with the world’s best organized
service through advance preparation of intelligence accompanied by troop
movements.

2. Japanese Intelligence

Japanese intelligence failed because it was not provided with


sufficient number of trained personnel to assemble and evaluate the mass of
materials which were collected although Japanese Intelligence was involved
in short war and defensive in nature.

3. British Intelligence

Its achievement was the delay in the use of German V bomb. The
operation was conducted with the OSS through the penetration and technical
intelligence; they discovered Peenemunde, the V2 guided missile research
project of Nazi Germany.

4. United States Intelligence


In 1941, the US Office of Strategic Service (OSS) forerunner of today’s
Central Intelligence Agency (CIA) was established to analyze military, political
and economic information as it affected the security of the country. US
JOINED CHIEF OF STAFFS- was organized to act in support of the army and
the navy in the collection and analysis of strategic information and to be
responsible for the planning and operation of special services.

5. Chinese Intelligence

In 1932, TAI LI was organized, the China’s secret police to conduct


espionage and counterespionage against Japanese spies and Chinese
communist.

6. Soviet Intelligence

AMTORG was organized for the purpose of purchasing all kinds of


materials for Soviet Union.
Smersh or “Death to Spies”

Smersh was organized during the war as counterintelligence


concerned with disaffection among Soviet Troops and anti-communism in any
form. There were five divisions: Administration, operation, investigation,
prosecution, and personnel.

OTHER SIGNIFICANT EVENTS IN INTEL DURING WORLD WAR II

1. In 1942, a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Peenemunde. British failed in
the defeat of Gen. Montgomery’s forces at Annenheim.

2. United State Intelligence- in 1942, the Us Strategic Service was established to research
and analyze military, political and economic information as it affected the security of the
country.

3. Battle of Midway- in 1942; the turning point of the US- Naval force in the pacific. The
victory gained by the Americans was due to the disrupted messages from the Imperial
Japanese Navy.

4. Admiral Isoroku Yamamoto

• In April of 1943, the crypto- analyst of the U.S. Navy Communications Intelligence
intercepted a top-secret signal relaying the travel of the admiral. Enroute, he was
intercepted and crushed in the Jungles of Bougainville.
5. U.S. Joint Chief of Staffs

• Was organized to act in support of the army and the navy in the collection and analysis
of Strategic Information and to be responsible for the planning and operation of the
Special Service.

6. Amphibious Warfare

• U.S. greatest contribution was its development where coordination of many types of
intelligence activities was required to provide adequate knowledge upon which is the
basis of successful operation of a complex military transported over water with the
objective of establishing itself on an enemy-held shore against opposition.

7. U.S. Success- in WWII was that their personnel were drawn from the civilian populace,
business and professional men and woman.

D. POST WAR PERIOD: the superpowers


1. Soviet Intelligence
a. Soviet Intelligence System

Described as the “omnipotent and omnipresent” for its vas intricate


organization involves millions of people.

b. Soviet Counterintelligence

Described as the “Iron Curtain” because no one can cross in the


borders of USSR without being detected- all communications are rigidly
controlled. Its contribution to the modern intelligence was the
dissemination of false information designed to mislead and confuse
opponent and prospective victims.

c. Military Intelligence and Ministry of State Security (formerly NKGB)

It is concerned with the political events and economic conditions and


also collects information for intelligence purposes all over the world. It
directs foreign sabotage and maintain network of agents in military and
special agents.

It concerned on political espionage activities of foreign communist


countries.

d. KGB (Komitetor Komissija Goudartsvennoy Bezopasnasti)

It is the official secret police agency of the Soviet Union in charge of


the state security (Commission of the State Security).

2. British Intelligence System

It is composed of several intelligence agencies as follows;

a. British Military Intelligence Division (MID)


- It is divided into 20 different departments

b. M15
- Devoted to counter espionage and security

c. Special Branch of Scotland Yard


- It is charged with guarding the Royal Family and Important British
Officials and visiting foreign dignitaries.

3. Israel Intelligence System

a. Mossad
- In charged of the National Intelligence. The number one Intelligence
Agency in the whole world.

b. Aman
- Concerned with military Intelligence.

c. Shin bet
- Concerned with Internal Security.

IIC
- Israel intelligence agency- Report to the crime minister.

4. French Intelligence

a. Sdece de documentation ExterieureEt Der Contre Espionage


- Foreign intelligence and counterintelligence service. This is under the
Prime Minister.
b. General, Charles de Gaulle
- He set-up Bureau Central Renseignements et d’ action. (BCRA Central
Office for Intelligence action) in London 1940. It is an expansion of the
service renseignements (sr- Intelligence service) which is a part of the old

- Renzieme Bureau (second Bureau) of French General staff.


c. SDECE
- Concerned in Strategic and Counter intelligence.

d. Surete Nationale
- Part of French Intelligence service.

5. German Intelligence

Red Gestapo

The security service organized by the East Germany to combat the


covert activities of the West Germany group when it was still divided by the

Berlin Walls.
E. GREAT BETRAYALS
1. Judith Coplon

She was a political analyst of the department of Justice who was


accused of taking unlawful possession of government documents and spying
for a foreign power. She was a well known communist activist.

2. Dr. Emil Julius Klaus Fuchs


He was accused of releasing American Atomic Secrets to the Soviet in
1945. He detailed knowledge of the construction of the atomic bomb.

3. Ernst Hilding Anderson

In 1951, Royal Navy provided military secrets to a foreign power was


found guilty and sentenced to life imprisonment.

CHAPTER II
Intelligence and Intelligence Units

I. DEFINITIONS OF INTELLIGENCE

1. According to the General Definition (Webster)

It is the capacity for understanding and for other forms of adaptive intellect of
behavior, the mind in the operation.

It is the power of meeting any situation, specially a novel situation, successfully


by proper behavior adjustments; the ability to apprehend the interrelationships of
presented facts in such a ways as to guide actions towards goal.

Or it refers to knowledge of an event, circumstances, etc., received or imparted;


the gathering or distribution of information; or the staff of persons engaged in obtaining
such information.

2. According to Microsoft Encarta Dictionary:

a. Ability to think and learn:


Refers to the ability to learn facts and skills and apply the especially when
this ability is highly developed.

b. Secret Information

Intelligence refers to the information about secret plans or activities,


especially those of foreign governments, the Armed forces, business, enemies,
criminals.

c. Gathering of Secret Information


Intelligence may also refer to the collection of secret military information.
d. People Gathering Secret Information
An organization that gathers information about secret plans or activities of an
adversary or potential adversary and the people involved in gathering such information.

3. According to the psychology

Psychology defines intelligence as the capacity of a person to adjust to new


situations through the use of what has previously learned.

4. According the Government Survey Reorganization Commission Task Force


Intelligence refers to the collection, processing, collation, interpretation,
evaluation, and dissemination of information with reference of National Security.

5. According to the Dictionary of Military Technologies

Intelligence is the end product resulting from the collection, evaluation, analysis,
integration of all available information which may have immediate or potential
significance to the development and execution of plans, policies and programs.

Intelligence also refers to the product resulting from the collection of information
concerning an actual and potential situation and condition relating to foreign activities
and foreign or enemy held areas.

Intelligence also pertains to processed information.

Intelligence refers to the product resulting from the collection, evaluation,


analysis, integration and interpretation of all available information concerning specific
are of interest.

*** It must also be noted “information” and “intelligence” are different terms: the later is
produced by a process of analysis or evaluation of the former (Odom, 2008, p. 323).

II. OBJECTIVE OFN INTELLIGENCE

The fundamental objective of intelligence is to ensure rational and timely


decision-making.

III. FUNCTIONS OF INTELLIGENCE IN GENERAL

Today all countries have their intelligence services so with all their various
government agencies. They may be different in their organization, efficiency and
method but they all have the basic functions:

1. The collection of procurement of information;


2. The evaluation of the information which then become intelligence;
3. The dissemination of the intelligence to those who need it.

IV. PRINCIPLES OF INTELLIGENCE

“Principles” are fundamental guides of action, broad statements of truth from


which others are divided.

1. CRITERIA

a. Universality of Application

It should be applied to as to many phases and aspects of intelligence


as possible. It should guide not only the production of intelligence but also
the contaminant activities essential to the process as well as the organization
and the though and actions.

b. It must be Broad

It should be truly general a general rule. It should from the basis of


formulation of corollary and subsidiary guides.

c. It must be Important

(Indeed essential to intelligence) if a guide is truly important and


essential, then its violations should bring its ow penalties.

d. They must not be mutually exclusive

Instead, each should complement each other.

2. UNDERLYING CONCEPTS JUSTIFYING INTELLIGENCE

a. “There exist an essential unity between knowledge and action; that


knowledge enhances the effectiveness of action and minimizes the chances
of error.”

b. “Coming events cast their shadows before that through a systematic search
for, and by the significant in themselves, it is possible to form meaningful
patterns.”

c. “The knowledge requirements for decision making are complex and are
beyond the capacities of anyone man to fill; and that an organized and
systematic search is necessary to meet these requirements.”

3. PRINCIPLES OF INTELLIGENCE
a. The principles of objectivity (thoroughly and carefully planned)

In intelligence, only the well-guided succeed. It is a basic intelligence


concept that there should be unity between knowledge and action.
b. The Principles of Interdependence

Intelligence is artificially subdivided into component elements to


ensure complete coverage, eliminate duplication and reduce the overall task
or manageable task.

c. The Principles of Continuity

It necessary the coverage be continuous so that the shape of what


happens today could be studied in the light of what happened before, which
in turn would enable us to predict the shape of things to come.

d. The Principle of Communication

Intelligence adequate to their needs must be communicated to all the


decision-makers in the manner that they will permit its most effective used.

e. The Principle of usefulness

Intelligence is useless if it remains in the minds, or files of its


collectors or it procedures. The story must be told and it must be told well.
The story must be convincing and to be convincing, it must not only plausible
of facts but its significance must be shown.

f. The Principle of Flexibility (ability to adapt to a new situation)

Intelligence must have the ability to change or be changed according


to circumstances. Hence, alternatives must be drawn.

g. The Principle of Selection (Fits the need of the commander)

Intelligence should be essential and pertinent to the purpose at hand.


Intelligence involves plowing through maze of information, the considerable
and innumerable number of means or of picking the most promising
multitudes to leads. The requirement of the decision-making covers very
nearly the entire span of human knowledge. Useless the there is selection of
only the most essential and pertinent, intelligence will go off in all the
directions in one monumental waste of effort.

h. The Principle of timeliness


Intelligence must be communicated to the decision maker at the
appropriate time to permit its most effective used.

i. The Principle of Security (Requires Constant Security Measures)


Security is achieved by the measures which intelligence takes to
protect and preserve the integrity of its activities.

- “Whatever I see or hear of a confidential nature that is confided to me in


my official capacity will be kept ever secret unless revelation in necessary
in the performance of my duty” (expert from Law Enforcement Code of
ethics).

V. INTELLIGENCE AXIOMS

a. Axiom No. 1- intelligence is crucial to internal security.

b. Axiom No. 2- intelligence is essential to all types of operations.

1. Internal Defense Operations

- The full rage of measures taken a nation to promote its growth and to
protect itself from subversion, lawlessness, and isuergency.

2. Internal Development Operations

- It focuses on building viable institutions (political, economic, social, and


military) that respond to the needs of society.

3. Psychological Operations

- Planned operations to convey selected information and indicators to


foreign audiences to influence their emotions, motives, objective
reasoning, and ultimately the behavior of foreign governments,
organizations, groups, and individuals. The purpose of psychological
operations is to induce or reinforce foreign attitudes and behavior
favorable to the originator’s objectives. It is called PSYOP.

c. Axiom No. 3- Intelligence is the responsibility of all government agencies.

d. Axiom No. 4- intelligence of the government must be superior to that of the


enemy.

VI. FOUR “IS” OF INTELLIGENCE


1. Interest
- A feeling of attraction

2. Integrity
- Honestly complete

3. Ingenuity
- Original truth, in accordance with law

4. Intelligence
- Capacity to know from what is right from what is wrong

VII. PRINCIPAL AREAS OF INTEREST IN NIFLUENCE

1. Military
- Offensive and defensive tactics, war plans, strategic concepts and tactical
principles, organizations installations, industrial, lease, armed forces,
command structure, command personnel, material, tactics, morale, etc.

2. General
- Topographical and hydrographic characteristics, historical backgrounds.

3. Diplomatic
- Foreign policies, alliances, diplomatic establishments, foreign service
personnel, technique of conducting foreign relations, etc.

4. Political
- Ideology, traditions, institutions, personalities, area of friction.

5. Economic
- Financial, Commercial, Industrial, Mining and Agriculture.

6. Communications and Transportation


- Telephones, telegraphs, wireless, railways, shipping, automobiles and
tucks, highways, aviation, ownership, policies, organization, personnel,
etc.

7. Social
- Nationality structure, classes and caste, historical, factors, census,
personal aspects, characteristics, and the mentality of the people forces,
social, legislation, radio, television, press, motion picture, etc.

8. Intelligence Organization
- Methods and Personnel of Competing Intelligence System.
VIII. CATEGORIES OF INTELLIGENCE

A. GENERAL FORMS OF INTELLIGENCE

1. National Intelligence
- The total product of intelligence developed by all governmental agencies
that cover the broad aspects of National Security and National Policy.

2. Department Intelligence
- Intelligence used by various departments for the advancement of each
departments/agencies.

3. Military Intelligence
- This is used in the preparation of military policies, plans and programs. It
includes strategic and combat intelligence.

Things to be considered:
P- People
W- Weather
E- Enemy
T- Terrain

Order of the Battle Intelligence


- A part of military intelligence is concerned with the manner in which
military forces are organized and disposed.

4. Counterintelligence
- Covers the activity devoted in destroying the effectiveness of hostile
foreign activities to the protection of information against espionage, and
sabotage.
- It is also known as negative intelligence because it is an activity
dedicated to the concealment and protection of one’s own information
from adversaries’ intelligence operation.
- Negative intelligence is a generic term which incorporates three different
things. This are follows;

Security Intelligence- means that the total sum of efforts to counsel the
national policies, diplomatic, decisions, military data, and any other
information of a secret nature affecting the security of the nation from
unauthorized persons. Its effort is to deny information to unauthorized
persons by restricting to those who are explicitly authorized to possessed
it.

Counter Intelligence- is an organized effort to protect specific data that


might be of value to the opponents own intelligence organization.
Some of its are functions are:
- By censorship of the following – Correspondence, Broadcast, Telecast,
Telephone conversations, telegrams and cables, etc.
- It aims to prevent the dissemination of any information that might aid an
opponent.
- Maintenance of file of suspects
- Surveillance of suspects
- Mail reading, Wire tapping and recording
- Infiltration of the enemy intelligence organized to procure information
about its method, personal, specific, operations and interest.

Counter – Espionage – In counter – espionage negative intelligence


becomes a dynamic and active effort. Its purpose is to investigate actual
or theoretical violation of espionage laws, to enforce those laws and to
apprehend any violators. It is a job to catch spies. It is a basically a police
function.

- According to Sir Bassil Thomson- former chief of Scotland Yard Criminal


Investigation Division:

- “A basic requirement of the secret agent is to disguise himself and his


mission. Much of his training basic skill is dedicated to concealment. He is
supposed to be supplied with a fool proof cover story and good
documents. He must be a man of exception ability or else he would not
be chosen of his intricate job. The trapping of the dark intruder is a
formidable talk.”

- The aim of Counter – Espionage is to locate the enemy, to identify the


enemy and to neutralize the enemy.

Five Importance of effective CI


A. Denies information to the enemy
B. Reduces the risk of a command
C. Aids in achieving surprises
D. Increases the security of the command
E. Decreases the enemy ability to create information about our forces.

Five Categories of CI Operation


1. Military Security – it encompasses the measures taken by a command to protect itself
against espionage, enemy operation, sabotage, subversion or surprise.

Examples are:
- Secrecy Discipline
- Special Safeguarding of classified info
- Security of troop movement
- Special handling of weather & escapes
- Counter subversion with in the armed forces
- Tactical measures in combat area

2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for CI control at point of entry and departure, borders or
boundaries.

Examples Are:

Security screening and control of frontier security control of merchants, seaman


and crew of commercial aircraft, security control of frontier crossing point, security
control of seaports.

3. Civil Security – it encompasses active and passive CI measures affecting the nonmilitary
nationals permanently or temporarily residing in an area under military jurisdiction.

Examples Are:
- Systematic registration of civilians and aliens
- Control of Circulation
- Surveillance of suspected political organizations
- Security screening of labor, Issuance of passes and permits
- Control of Internal Commerce

4. Censorship - it is the control and the examination of the civil, national, armed forces,
field press, and POWs.

5. Special Operations – counter subversion, sabotage and espionage

What is CI Operation?

CI operation is so called CI investigation. It is an activity that constitutes the value


of the CI workload, worldwide and includes specific investigation of individual and
incidence which for the most part are conducted in an overt but discreet manner.

Counter-intelligence investigation

It is an activity which constitutes the value of work load and includes specific
investigation of individual and incidence which for the most part are conducted in
an overt but discrete manner.
General types of CI

1. Passive Measures

Passive measures are those measures which seek to conceal information from
the enemy.

Secrecy discipline, document security, camouflage and concealment,


communications, security, military censorship, counter reconnaissance efforts.

2. Active Measures
Active measures are those measures which seeks active block to the enemies’
effort to gain information or engage in espionage, subversion or sabotage.

Examples are PSI, security Tag or Password, Challenge or Password,


reconnaissance.

3. Deception Measures

Deception measures are measures which are used to deceive the enemy.

Ruse – use of escape and evasion, Dummy, Position, Fabricated information


B. INTELLIGENCE COMMUNITY (present)
1. FACTORS CREATING INTELLIGENCE UNIT

a. Size of the community


b. Extent of organized crime in the community
c. Probable frequency and seriousness of activity of civil disturbances
d. Branches of Integrity on the part of any member of the force or unit

2. LOCAL INTELLIGENCE ORGANIZATIONS/UNITS

Intelligence community refers to the agencies or organization of the


government which has intelligence interest and responsibilities.

Under Administrative Order No. 217, s. 1991, the National Intelligence


Board (NIB) shall be recognized and expanded to include the membership of
the twelve civilian agencies and seven military offices as follows:

1. The National Intelligence Coordinating Agency


2. Department of Foreign Affairs;
3. The Department of the National Defense;
4. The Department of Education, Culture and Sports;
5. The Department of Labor and Employment;
6. The National Economic and Development Authority;
7. The Department of Trade and Industry;
8. The Department of Interior and local government;
9. The Philippine National Police;
10. The National Bureau of Investigation, department of Justice;
11. The Bureau of Immigration and Deportation, Department of Justice;
12. The Economic Intelligence and Investigation Bureau, Department of
Finance;
13. The Office of the Deputy Chief of Staff for Intelligence, J2, Armed Forces
of the Philippines;
14. The Office of the Assistance Chief of staff, G2, Philippine army;
15. The Office of the Assistance Chief of Staff, A2, Philippine Air Force;
16. The Office of the Assistance Chief of Staff, N2, Philippine Navy;
17. The Intelligence Service of the Armed Forces of the Philippines;
18. The Counter-intelligence Command, Armed Forces of the Philippines;
19. The Presidential Security Group;

• The chairman of the NIB shall be the Director-General of the National Intelligence
Coordinating Agency (NICA), Office of the President.

• The Board (NIB) shall serve as the advisory body to the director – General of the NICA
for the coordination and integration of all intelligence activities of the Government.

I. PNP INTELLIGENCE UNITS

a. D1- Directorate for Intelligence


b. R2 - Staff officer for Intelligence
c. Regional Intelligence Units
d. Police District Intelligence divisions
e. Philippine Drug Enforcement Agencies former (Anti-Narcotics Units)
f. Off Shore Anti- Crime Group

II. AFP Intelligence System

a. Philippine Army Intelligence


- G2- GHQ; Intel & Scty. Group – Operating Units; Military Intelligence
Companies (MICO’S) – Infantry Division

b. Naval Intelligence
- N2 – GHQ; G2 Philippine Marines Intelligence; CG2- Philippine Coast
Guard; and F2- Philippine Fleet

c. Air Force Intelligence A2- GHQ

III. NBI
IV. OTHER GEVERNMENT AGENCIES

- Anti- smuggling Action Center


- Bangko Central ng Pilipinas
- Bureau of Customs
- Bureau of Immigration – Department of Justice
- Department of Foreign Affairs
- Presidential Task Force

INTELLIGENCE SCHOOL CENTER

1. ISAF – Special Intelligence Training School


2. G2 – Military Intelligence Training School
3. N2 – Naval Intelligence Training school
4. A2 – Air Intelligence Training Center
5. PNP – Intelligence Training Group

INTERNATIONAL INTELLIGENCE ORGANIZATIONS

1. USA – New comer

a. Central Intelligence Agency (CIA)

It is the principal for intelligence activities and covert operations


abroad. It was created under the US National Security act of 1947.

Note: The CIA (Central intelligence Center) mostly operations outside the
United States to gather intelligence via a network of spies.

b. National Security Agency (NSA)

Responsible for collecting signals intelligence from all over the


world and for overseeing the integrity of American secret communication.

c. Defense Intelligence Agency (DIA)

It provides military intelligence to the Department of Defense.

d. Federal Bureau of Investigation (FBI)

First established in 1903 as an investigative arm of the US


Department of Justice.
Note: The FBI (Federal Bureau of Investigation) predominantly operates
within the U.S. to both gather intelligence as well as tackle federal
crimes.

2. Great Britain

Boasts an intelligence tradition dating from Queen Elisabeth I.

a. MI-5

It is the equivalent of the United States FBI. It is responsible for


counterintelligence activities

b. MI-6

A.k.a. the Secret Intelligence Service (SIS)- is an analogous to


CIA, it ran the famous “Ultra” program during WWII in which coded
German Messages, encrypted by the German’s enigma machine, were
interpreted, broken and translated, thereby aiding the allies on their
battlefield.

3. Israel – considered as the most reliant on accurate intelligence.

a. MOSSAD

Central institute for Intel and Scty. Conducts external espionage


and also informs covert operations abroad.

b. SHINBET

General Security Services – Responsible for counterintelligence


and internal security.

c. AMAN

Intelligence Corpse of Defense forces – The largest, which


focuses on military intelligence.

4. Former Soviet Union, Union of Soviet Socialist Republics (USSR)

Committee (Board) for state security/ komitet Gosudartsvennoy


Bezopasnosti (KGB) – doubled as secret police force; controlling the populace
within the country and outside the USSR, conducting espionage, spreading
“disinformation,” and attempting to destabilize foreign governments.
C. POLICE INTELLIGENCE

Police intelligence is defined as the end product resulting from the


collection, evaluation, analysis, integration and interpretation of all available
information regarding the activities of criminal and other law violators for the
purpose of affecting their arrest, obtaining evidence, and forestalling their plans
to commit crime.

Intelligence as herein referred to means Police Intelligence as Distinguished


from Military Intelligence. The deviation is more on to approach rather than
principle. The fundamental intelligence cycle is still the same, be that used in
Police or Military Intelligence.

FUNCTIONAL CLASSIFICATIONS

1. Criminal Intelligence (CRIMINT)


It refers to the production of intelligence essential to prevention of crimes,
investigation, arrest and prosecution of criminal offenders.

2. Internal Security Intelligence (INSINT)

It refers to the knowledge essential to maintenance of peace and order.

3. Public Safety Intelligence (PUNSINT)

It refers to the knowledge essential to ensure the protection of lives and


properties.

CARDINAL PRINCIPLE IN POLICE IN TELLIGENCE

The cardinal principle in Police intelligence at all level is the proper, economical
and most productive use of personnel and equipment employed and/or utilized in
planning the collection of information and dissemination of intelligence.

GENERAL ACTIVITIES IN POLICIES INTELLIGENCE

1. Strategic Intelligence

The intelligence information which is primarily long range in nature with little
practical immediate operation value.

2. Line Intelligence

It is immediate in nature and necessary for more effective police planning and
operation.
3. National Intelligence

It refers to the integrated product of intelligence developed by all the


governmental branches, departments concerning the broad aspect of national security
and policy. It is concerned to more than one department or agency and it is not
produced by single entity and used to coordinate all the activities of the government in
developing and executing integrated and national policies and plans.

4. Counter Intelligence

It is a phase of intel covering the activity devoted in destroying the effectiveness


of hostile foreign activities and protection against espionage, subversion and sabotage.

5. Undercover work

It is an investigate process in which disguises and pretext, cover and deception is


utilized.

CHAPTER III
The Intelligence Cycle

A. INFORMATION

Generally, information are raw data or unevaluated material of every description


derived from the observation, communication, reports, rumors, imagination, and other
sources from which intelligence is produced; Any, knowledge, data, news, opinions, or
the like transmitted from a person to another; and/or any communicated knowledge by
personal study, investigation, research, analysis and observation.

B. INTELLIGENCE INFORMATION

Intelligence information refers to any information gathered or received which is


of intelligence interest.

C. END PRODUCTS (Knowledge)

These are results after evaluation, analysis, interpretation, and integration of raw
materials.

D. KNOWLEDGE (synonymous to intelligence)


1. Information in mind; general awareness or possession of information, facts, ideas,
truth or principles
2. Specific information: clear awareness or explicit information, for example of a
situation or fact.
3. All that can be known: all that information, facts, truths, principles learned
throughout time.

E. ACTIVITY

Activities are the product of that knowledge after collection, processing,


dissemination and use; examples are raid operation, arrest, search and seizure.

F. ORGANIZATION

Organization refers to the intelligence personnel or the intelligence unit (the unit
itself).

G. SOURCES

Sources refers to where/whom/which the information was obtained. This can be


form: an informant; a syndicate; an intelligence broker; double agent; and/or other
police agency that has the needed information on file.

H. GENERAL CLASSIFICATION OF SOURCES OF INFORMATION

1. OPEN SOURCES
The information may be obtained from news files, libraries, magazines,
books, or non- classified files in certain on public or private offices. 99% of the
information collected is coming from open sources. This can be from: Enemy
activity; Prisoners of War (POW); Civilians; captured Documents; Map; Weather
Forecast; Studies; Researches; Reports, etc.; Agencies; Informants and Informers.

2. CLOSE SOURCES

They can be located inside a building, safe or vaults. 1% of all information is


from close sources. This can be from; Casing; Elicitation; Surreptitious; Entry;
Employment of technical means (bugging and trapping); Tactical Interrogation;
Observation and Description.

I. GENERAL CATEGORIES SOURCES of INFORMATION (PPEP)


1. Places
2. People
3. Things

J. OTHER SOURCES OF INFORMATION


Routine Patrol; Criminal Investigation; Use of Informants; Interrogations;
Search and Seizures; Cordon and Scratch; Checkpoints; Police Public Relations Activities;
Coordination with Law Enforcement Agencies; Inmates of Various Jails; Military
Stockades and other Penal Colonies; and Statistics.

K. INTELLIGENCE CYCLE

It is the continuous process which ultimate coordinates and integrates all efforts
of the collecting agencies or units. The intelligence cycle is the process through which
intelligence is obtained, produced, and available to users.

A. MISSION

Mission is the focal point of the intelligence operation; a particular task given
to a person or group to carry out; or one which should be accomplished.

B. PHASES OF INTTELLIGENCE CYCLE

PHASE 1 – DIRECTING COLLECTION EFFORT

In this phase, the Intel Staff Officer or Unit commander determines the
required or important information relevant to mission. Then these requirements will
be distributed to the different collection agencies by direction or by request.

1. Determination of the Intelligence requirements.

Categories of intelligence requirements in relation to use:

a. Executive
- Intelligence is required by executive, governmental and military
commanders. The executive requirements are the basis for decisions and
national policy making.

b. Contributory
- Intelligence is required to complete the staff process: make staff plan and
estimates that contribute to the decision and policy making.

c. Operational

- Additional intelligence required in planning and carrying out effectively


the decision are policy announced. Decisions and policy requires
implementation.

d. Collateral
- Higher or adjacent echelons of the government or military establishment
may require information.

Categories of Intelligence Requirements by type:

a. Basic
- General reference materials to be use in planning regarding the enemies
and potential enemies, are of the operations, capabilities – static
comprehensive.

b. Current
- Temporary in nature and narrower in scope. Information required to
cope-up with the current objectives.

c. Estimate Intelligence
- Determines the future courses of action; required by the executive to
plan future in elements of military operations and policies.

2. Determine of the essential elements of information (EEI)

EEI are items of intelligence or information of the characteristics of the


area of operations and the enemy, which the commander feels needed before he
can reasonably arrive at decision.

These are evaluation based on the existing situations, national


objectives, etc. In here, there is no set formula but judgement and experience
are necessary.

3. Establishment of Priorities (P.I.R’s)

Establishment of priorities and necessary to decide which items of


information are more important – a system of priority is needed; critical
importance and lesser importance; EEI- highest priority intelligence requirements
essential to planning.
PHASE 2 – COLLECTING OF INFORMATION

In this phase, the collecting agency determines what specific information to be


collected, by whom and from after the collecting activity is carried out, the collected
information is then submitted for processing.

• Collection Agency
- Any person, unit, or activity the collects and/or processed information by
research, surveillance or the exploitation of the source of information.

1. Criteria of Collecting Agencies/Units:


a. Capability
An agency must be physically capable of providing the desired
information in a timely manner.

b. Balance
Within the time limits imposed by other consideration, the
collection of work load must be balanced from among the
collecting agencies. Balance is a minor consideration when
compared with the importance of other factors.

c. Municipality
Evaluation of information requires that it must be compared with
the information received other sources and agencies. Subject to
the consideration of suitability more than one agency is used to
obtain each item of required information.

d. Suitability
The collection task assigned to a unit must be compatible with its
primary mission. Only the agencies best suited to furnish the
information are used.

2. Two basic Collection of strategies:


a. Resource Integration – one agent
b. Agent Mixed redundancy – 3 or more agents assessing for the
same assignment

3. Collecting Agencies:
a. Government agencies/offices – variety of information
b. Intelligence units or intelligence agencies
c. Organizations

4. Who is task to collect investigation?


a. Intelligence officers/agents – regular members
b. Civilian agents – informers and informants
c. Assets – establishment of institution which assists in providing
information

5. Methods of Collection
a. Overt – open
b. Covert – secret

6. Trade crafts and some Instruments Used in the Collection


a. Photography
b. Surveillance
c. Elicitation
d. Interview
e. Interrogation
f. Personal Security Investigation
g. Sound equipment – tapping and bugging
h. Used of an artist
i. Surreptitious entry
j. Communication

7. COLLECTION PLANNING
Collection planning refers to the continuous process which
ultimately coordinates and integrates the efforts of all collecting
Agencies/Units.

STEPS IN COMPRISING A COLLECTION PLAN


a. Planning and supervision of collection efforts/activities
b. Determination of intelligence priorities
c. Selection of collecting agencies
d. Supervision of the collection activities (a.k.a. directories)

What are the factors tobe considered in collection planning?

a. Personality
- Persons involved suspects, social status, etc.

b. Organization
- Group committing the crime: Kuratong Baleleng, Pentagon, 14k gang,
Bamboo Union Gang, etc.
c. Resources/Equipment
- used in committing the crime i.e., firearms.

d. Activity
- Modus operandi/crime activities, time attack, victims, place of attack, etc.

PHASE 3- PROCESSING THE COLLECTED INFORMATION

It is an phase in the intelligence cycle in which information becomes


intelligence. The processing phase of intelligence activity is the most expensive and time
consuming activity. The conversation of data into a useable product, acceptable to the
vast majority, will still require the greatest expenditure of money. Data processing
involve the following:

1. Recording
Recording is the reduction of information into writing or some other of
graphical representation and the arranging of this information into groups of related
items.

2. Evaluation

Evaluation is the determination of the pertinence of the information to the


operation reliability of the source or of the agency the accuracy of the information;
or examination of raw information to determine intelligence value.

Things to be considered during the evaluation:

a. Pertinence (usefulness)
- Does it hold some value to current operation?
- It is needed immediately?
- Who need it?

b. Reliability (dependable)
- Judging the source of information
- The source of information and the agency from which it was collected or
both evaluated for reliability. The principal basis for judging the source or
an agency is previous experience. Other criteria include knowledge,
training, experience and past performance of troop units for the collector
of information.

c. Accuracy (truth of information)

Accuracy refers to the probable truth of the information. Judgement


of accuracy is based on the answers of the following questions;

1. Is it possible for the reported fact or event to have taken place?


2. Is the report is consistent within itself?
3. Is the report confirmed or corroborated by information from different
sources or agencies?
4. Does the report agree or agree in any way with other available
information?
5. Does the report agree with information from other sources, or agencies
and which one is more likely to be true?

3. Interpretation

Interpretation is the process of establishing the meaning and significance of


information. It involves the following:

a. Analysis
Analysis refers to the determination of significance of information relative
to the information and intelligence already known and drawing deductions about
probable meaning of the evaluated information. It is done by shifting and
isolating those elements that have significance in the light of the mission or
national objective.

b. Integration

Integration is the combination of the elements stated in the assessment


with other known information nor intelligence to form a logical feature or
hypothesis for enemy activities or the information of operational area and
characteristics of mission of the command.

c. Deduction

Deduction refers to the formulation of conclusions from the theory


developed, tested and considered valid; determination of effort and meaning of
the information.

PHASE 4 – DISSEMINATION AND USE

This is the timely conveyance of intelligence information in an


appropriate form and by any suitable means to those who need. The primary
purpose of timely dissemination is to enable the commander to make decisions
to confidence; a secondary purpose is to provide knowledge, in light of which
new information may be processed.

To principles preclude the release of intelligence information:

1. First, there must be the “need to know” on the part of the recipient.
- “Need to know” is not necessarily determined by a person’s position in
the organizational hierarchy. Need to know is usually akin to the task
performed.

2. Secondly, a potential recipient should be “cleared” by responsible authority as


being eligible to receive the intelligence data.

Confidential sources are the lifeline of the intelligence effort. They


must be protected at almost any price. Therefore, it is apparent that the
“need to know” and proper clearance of the receiver are surpassed by the
consideration, “Will the use of data destroy or endanger the source of
information?”
It is the final phase of the cycle. Processed information is
disseminated to the agency, unit or command to affect or implement the
mission.

Dissemination is through:

Methods of dissemination:
1. Fragmentary orders from top to bottom of the command;
2. Memorandum, circulars, special orders, etc;
3. Operations order, oral or written
4. Conference – staff members;
5. Other report and intelligence documents;
6. Personal contact – it can be done by the use of telephone, personal visits, and
debriefings.;
7. Messages – This can be made by use of radio, utilization of messengers or
couriers, or by rapid means of signal communication.

Criteria of dissemination:

1. Timeliness
Timelines states that the information must be dissemination on time.

2. Propriety
The messages must be clear, concise and complete, as well as in the
proper form for the receiver to readily understand its cntents.it must be
disseminated to the correct user, presented in a form that leads itself to
immediate use and distributed by the most effective means appropriate to both
time and security requirements.

Users of intelligence:

1. National leaders and military commanders


- Formulation and implementation of national policies.

2. Advisors and staff


- Preparations of plans and estimates.

3. Friendly nations and other branches of armed forces.

4. Processor

- Basis for evaluation and interpretation

Forms of disseminating information


1. Sport Reports
These are reports used by all echelons to transmit intelligence or information of
immediate value. Since the information or intelligence may have immediate and significant
impact on current planning and operations, speed of transmission of spot report is
essential. The spot report is afforded the most expeditious transmission consistent with
security requisite. No format is prescribed for the spot report; the spot report should be as
much as practicable answer the question, when, where, who, what, why and how (5W’s
and 1 H).

2. Intelligence summary
This is the brief summary of information of intelligence interest covering a period of
time designated by a commander. The length of a period will vary depending on the
desires of the commander.

3. Analysis of the area of operation


Area of operation is the detailed comprehensive study with emphasis on people,
weather, enemy and terrain (PWET).

4. Intelligence estimates
This is the logical and orderly examination of the intelligence factors affecting the
accomplishment of the mission. It provides the commander with an analysis of the area of
operations, enemy capacities that can influence his mission. It provides the commander
with the basis for planning operations and for disseminating intelligence to his staff.

CHAPTER IV
INTELLIGENCE OPERATION

Intelligence Operation
Intelligence operation is the result of intelligence planning. Planning is always ahead of
operation, although an operation can be made without a plan. It is usually due to sudden and
inevitable situations but definitely this is poor intelligence management.

A. TASKS INVOLVED IN POLICE INTELLIGENCE OPERATION

1. Discovery and identification activity


2. Casing – surveillance/reconnaissance
3. Liaison prison program
4. Informant management
5. Clipping services
6. Debriefing
7. Relevant Miscellaneous Activities
8. Utilization of information for planning and organizational employment purposes.
B. 14 CYCLES OF INTELLIGENCE OPERATION
1. Mission and Target
Infiltration
- Infiltration refers to the insertion of action agent inside the target
organization
Penetration
- refers to the recruitment of action agent inside the target organization

2. planning
3. spotting
4. investigation
5. recruitment – the only qualification pf the agent is to have an access to the
target.
6. Training
7. Briefing
8. Dispatch
9. Communication
Technical – telephone, cell/mobile phone, radio, etc.

Non-technical – personal meeting, live drop, dead, drop, etc.


10. Debriefing
11. Payments: buy his life not his job; Regulatory and dependability that counts not
the amount; Pay no bonuses; and supplement the agent income from regular
sources, enough to ease his financial worries but not enough to cause him live in
style.
12. Disposition – any activity on recounting, retraining, retesting and termination.
13. Reporting
14. Operational testing.

C. OVERT OR OPEN METHOD (Overt Intelligence)


In overt intelligence information or document is produced openly without
regards as to whether the subject of the investigation becomes knowledgeable of the
purpose for which it is being gathered.

D. COVERT METHOD (Covert Intelligence)


In covert intelligence, information is obtained without the knowledge of the
person against whom the information or documents may be used, or if the methods of
procurement are done in an open manner.

E. OVERT METHODS OF GATHERING AND COLLECTION OF INFORMATION


1. Interview
2. Interrogation
3. Instrument
4. Research
5. Investigation
6. Debriefing

TASK OF PROCUREMENT AND COLLECTION OF INFORMATION – procurement represents the


collection of information from overt sources such as:
1. News paper
2. Magazines
3. Radio Intercepts
4. Public and Private Libraries
5. Public and Private Establishments
6. General Public
7. Other Sources Similar in Nature

PROCUREMENT ARE USED IN INTELLIGENCE PARLANCE

Procurement refers to the aggressive effort to acquire certain specific information that
may not be readily available. To this end, a number of means may be used as:

1. Classical intelligence
- Utilizes human being to gather information.
2. Modern/Technical Intelligence
- Employs machine and human such as satellites, electronic gadget to
gather information

F. ESSENCE OF PROCUREMENT

The essence of procurement is ACCESS, some of device had to get close


enough to a thing, a place or a person to observe or to discover the desired facts without
arousing the attention of those who protect them. The information must be then be delivered to
the people who want it. It must move quickly or it may get stale, and it must not get lose or
disintegrated route.

G. PROCURING AGENTS

1. Agent in Place
One who has been recruited by an intelligence service within a highly
sensitive target and who is just beginning his career or has been long outsider or
insider.

2. Double Agent
An enemy agent, has been captured, turned around and sent back where he
came from as an agent of his captor.

3. Expendable Agent
An agent through whom false information is leaked to the enemy.

4. Penetration Agent
Refer to an agent who infiltrates and reaches the enemy to get information
and would manage to get back alive.

5. Agent of Influence
Refers to an agent who uses his/her influence to gain information.

6. Agent Provocation
- Provoking of agent

H. CONVERT METHODS OF GAHTERING INFORMATION

H.1. ELICITATION

- It is a system or plan whereby information of intelligence value is obtained through the


process of direct communication where one or more the parties to the communication
is/are unaware of the specific purpose of the conversation.

Devices in the conduct of elicitation:


a. Approach
-The process of setting people to start talking.

b. Probe
-The process to keep the person (subject) talking incessantly.

Types of approach:
A. Flattery
-People susceptible to praise
Variants:
a. Teacher-pupil Approach
-Subject is treated as an authority. Request him/her to enlighten you and solicit his/her
viewpoint and opinion.

b. Kindred Soul Approach


-Subject is placed in a pedestal having some specialized quality and you flatter him/her
by showing enough concern for his/her by showing enough concern for his/her welfare
to pay special attention to his employment.
c. Good Samaritan Approach
-Sincere and valid offers of help assistance are made to the subject.

d. Partial Disagreement Approach


-Seek to produce talking by the world “I’m sure” if I fully agree.

B. Provocative Approach
-Discover a wide range of conversational gambits.

Variants:
a. Teaser bait approach
- Elicitor accumulates the sources of knowledge about a particular subject.

b. Manhattan from Missouri


- Elicitor adapts an unavailable attitude above anything, he questions all
statements and opposition.

c. Joe Blow Approach


- It is “I know the answer to everything” approach. The elicitor adapts the
attitude of being approachable to any field.

d. National Pride Approach


- It is the national propensity of all people to defend their countries and its
policies.

Types of Probe:
a. Competition Probe
- Effective when used in connection with the teacher-pupil approach.

b. Clarity Probe
- Use to elicit additional information in an area which the response is not
clear.

c. Higher Pressure Probe


- It serves to pin down a subject in a specific area or it may be use to point
out contradictions in what the subject has said.

d. Hypothetical Probe
- It presents a hypothetical situation and to get the subject to react to the
hypothetical situations.

H.2. CASING
Casing literarily means putting a thing, or place in a case. As used
intelligence in operation, it pertains to continuous monitoring of place or area at a
given period of time.
It also refers to reconnaissance or surveillance of a building, place or area
to determine its suitability for intelligence use for its vulnerability in operations.

Methods of Casing

1. Personal reconnaissance
- The most effective and will produce the most information since you know
just what are you looking for.

2. Map reconnaissance
- May not be sufficient but it can produce a certain amount of usable
information.

3. Research
- Much information can be obtained or acquired through research.

4. Prior information
- Aside from your unit, other units may have file report that they may
provide you with relevant information.

5. Hearsay
- Information usually gain by the person operating in the area and
performing casing job.

Information

1. Area action and habit


2. Active opposition
3. Disposal plan – disposal of the information (and materials) in case possible
compromise.
4. Escape and evasion

H.3. SURVEILLANCE

Based from etymology of terms surveillance was derived from the French
“surveiller” means to watch over and “veiller” means to keep watch. In Latin,
“vigilar” means vigilant.

Surveillance is the covert (discreet, disguised, secret, clandestine)


observation of persons, places and things for the purpose of obtaining information
concerning the identities and/movement is called tailing or shadowing, surveillance
of place is called casing or reconnaissance, and surveillance of other things, events
and activities is called roping.

Considerations in surveillance planning:


1. Surveillance Plan
- It refers to a plan established as required according to type of personnel,
and the general and specific instructions for surveillance.

2. Area Target Study


- It refers to the of operation of surveillance of activities.

3. Pre-surveillance Conference
- It is a conference held among the team members, police intelligence unit
before a surveillance is conducted.

4. Stake out
- It refers to the conversation of places or areas from a fixed out point.

5. Tailing or shadowing
- It is the observation of a person’s movement.

6. Undercover Man
- A person trained to observe and penetrate certain organization suspected
of illegal activities and the later reports the observation and information
so that proper operational action can be made.

7. Liaison Program
- This is the assignment of trained intelligence personnel to other agencies
to obtain information of police intelligence value.

8. Safe House
- It is the place, building, enclosed mobile, or an apartment, where police
undercover men meet his action agent for debriefing or reporting
purposes.

9. Drop
- It is a convenient, secure, and unsuspecting place where a police,
undercover man, informer, or informant by a pre-arrangement leaves a
note, a small package, an envelope to item for the action agent,
supervisor or another agent.

10. Convoy
- An accomplice or associate of the subject.

11. Decoy
- Any person almost similar to the subject used to avoid or elude
surveillance.

12. Contact
- Any person or subject picks or deals with while he is under surveillance.

13. Made
- When subject under surveillance becomes aware that he is under
observation and identities the observer (burn out).

14. Lost
- When the surveillance do not know the whereabout of their subject had
eluded the surveillance.

15. Rabbit (hare)


- Term referring to the subject of shadowing and tailing.

16. Test for tailing


- The common trick of the subject (rabbit) when he becomes conscious
that he is being tailed. The rabbit usually boards a public conveyance the
jumping off the vehicle then he looks about quickly to determine if any
another person jumps off also.

TYPES OF SURVEILLANCE:

1. According to Intensity and Sensitivity


a. Discreet
- Subject is an unaware that he/she is under observation.

b. Close
- Subject is aware that he/she is under observation varied on each
occasion.
- Continuous observation of the subject must be maintained at all times.

c. Loose
- Applied frequently or infrequently, and period of observation varies on
each occasion.
- Intermittent occasion observation of the subject.
- Observation of the subject is not continuous.

2. According to Methods
a. Stationary
- Observation of place usually a bookie stall, gambling joint, or a residence
where illegal activities are committed (fixed point position).
b. Moving
- Surveillance follow the subject from place to place to maintain continuous
watch/ observation of his/her activities.

c. Technical
- Uses communication and electronic hardware’s, gadgets, systems and
equipments.
Basic preparation:

1. Study the subject (in case of person)


- Name, address, description, family, and relatives, associates, character,
and temperament, vices, hobbies, education, etc.
2. Knowledge of the area or terrain (concerning places)
- Maps, national and religious backgrounds, transportation, public utilities,
etc.

3. Supervise organizations
- History and background, biography of the official (leaders) identity and
backgrounds of the members and former members, method of
identification employed by the members, files and records (nature,
location and accessibility, meeting, etc.

4. Cover story

Shadowing or Tailing
- It is the act of the following a person with following purposes:
1. Detect evidence of criminal activities;
2. To establish the associations of a suspect;
3. To find a wanted person;
4. To protect a witnesses or other person;
5. To discover the associations, amusements and habits of an employee
who is considered for a sensitive position; and
6. To check loyalties of employees.

Techniques of Moving Surveillance by Foot

1. One Man Shadow – Also called as a technique, only one man utilized.
- If a one-man foot surveillance must be used, be cautions when you are
the same side of the street as the aspect. Stay to the rear and vary your
distance from the subject. Set your distance according to physical
conditions like size of crowds and number of exits.
- If the suspect turns a corner, continue across the street, keeping the
subject in view. Then, operating from across the street, you can fall in
behind or move to the front or side of the subject. Decide which position
will give you the best view. When the subjects turns a corner, you may
want to abreast of him to see if he makes a contact or enters a building.

2. Two-man shadow – Also called AB technique, two men used.


- For a two-man foot surveillance, use the “AB” technique. The person right
behind the subject has the A position. The other surveillant has the B
position. When using the AB technique, A follows the subject and B
follows A. B may be on the same side of the street as A. Or he may be on
the opposite side of the street.
- When both A and B are on the same side of the street, and the subjects
turns a corner to the right, A continuous across the street. Then he
signals B what action to take. The subject’s actions may require B to take
A position, and A to take the position B. signals between A and B should
attract as little attention as possible.
- When B is across the street and the subject turns the corner to the
right—away from B—B crosses and takes the A position. This step should
be prearranged so no signal will be needed. If the subject turn the corner
to the left and crosses toward B, B drops back to avoid contact. B then
waits for a signal from A before making the next move.

3. Three-man shadow – Also called as ABC metho – Continual


- For a three-man foot surveillance, the “ABC” technique offers ease. And it
is consistent with reasonable manpower resources. Use this technique for
close foot surveillance unless you the manpower. The main advantages of
the ABC technique is that it lets you cover the subject from two sides. As
in the AB technique, A follows the subject and B follows A. C normally
stays across the street and just to the rear of the subject.
- The ABC technique allows several choices when the subjects turns the
corner. Assume A and B are behind the subject and C is across the street
when the subject turns the corner away from C. A could keep going
straight and B would take the A position. C would move across to the B
position. A would stay across the street, moving as C had done before.
- Another approach would be for C to move into the A position. A would go
across and take up the C position, while B keeps his own. What if the
subject turns left and crosses the street toward C? C drops back and A
continuous in the original directions and becomes C. then B moves into
the A position, and C becomes B.

4. Progressive – Not continual

Counter Surveillance Techniques


1. Window shopping
2. Paper drop
3. Retracing the course
4. Stopping immediately after turning a street corner
5. Watching persons getting on succession of conveyance
6. Convoys
7. Watching the procession
8. Talking to acquaintance

H.4. OBSERVATION AND DESCRIPTION (ODEX)

OBSERVATION
- The complete and accurate awareness by an individual of his
surroundings and encompasses the use of all major senses to register
and recognize its operational or intelligence significance.

DESCRIPTION
- The factual reporting of what was observe. Or, it is the actual and factual
reporting of one’s observation or the reported sensory experience
recounted by another.

Psychologists estimate that approximately:


1. 85% of your knowledge is gathered through sight.
2. 13% of your hearing
3. 2% through the three senses.

Psychological Process of accurate observation:


1. Attention
- Consist of the psychological process involved in becoming aware of an
existence of fact/event.

2. Perception
- Involved and identifying the name and his own mind and some fact which
has been perceived, narrated and identified.

Types of Attention
1. Involuntary
- No control and requires no efforts.

2. Voluntary
- More reliable but not dependable.

3. Habitual
- Little effort with a maximum control.

Factors Governing Reports


1. Voluntary
- Word/s used by an individual to express himself.
2. Time log
- Accurate reporting depends entirely on the timeliness, delay in reporting
results in unconscious omissions of details.

3. Recurrence of similar incidents.

H.5. SKETCHING
- It consists of putting ideas in an accurate pictorial. It is a means of
describing or area to satisfy a particular need.

H.6. PORTAIT PARTLE


- A means of descriptive terms in relation to the personal features of
individual and it can briefly describe as word description or spoken
pictures.

H.7. PHOTOGRAPHY
- Used to have permanent used to have permanent record of the subject or
of the what is being observed. Intelligence, photography is essential
means of vividly recording and presenting the subject of casing,
surveillance and other forms of clandestine operation.

H.8. TACTICAL INTERROGATION


- Method of obtaining information of the highest degree of credibility on
minimum time. The objectives of interrogation vary and depend entirely
on the situation in which the interrogator finds himself. He must therefore
be fully guided by the objectives for each interrogation.
A. DEFINITION OF TERMS:
1. Debriefing
- The interrogation of a friendly interrogee who has information at the
direction of or under the control of friendly intelligence service.
- It is a form of eliciting information, which is generally used when the area
of intellectual capability of the interrogee is known. Maximum used of
narrative technique and try to trap the person being debriefed with
leading questions. The debriefer/interrogator must be familiar with the
subject in which the interrogation is being conducted.

2. Interrogation
- It refers to the systematic questioning to elicit information in questioning
of an interrogee.

3. Interrogation Report
- An oral or written statement of information by the questioning of an
interrogee.
4. Interrogator
- Person who does the questioning.

5. Interrogee
- Any person who is subject to the interrogation process in any of its forms
and phases.

6. Screening
- Initial examination of an interrogee to determine the extent of his
knowledge of persons, places, things or events in which we are
interested.

7. Sources
- Person who for any reason submits information of intelligence interest
usually on a voluntary basis.

8. Suspect
- Any person believed to associated with prohibited activity.

9. Approach (Meeting the Interrogee)


- The first meeting in which it is extremely critical because the outcome
may depend on the initial impression created by the interrogation. The
main objective is to develop rapport with the source in order to gain his
cooperation and induce him to question to obtain the desired information.

10. Questioning
- This is the heart of the interrogation.

11. Termination
- The termination of the interrogation will depend o various factors such as
the physical condition of the subject.

Considerations:
a. The amount of information possessed by the interrogee is so great that it
may take several sessions to complete the interrogation.
b. It should be ended on a friendly manner and leaving in the mind of the
interrogee that he may be further interrogated.

12. Recording
- The interrogator should take notes in cryptic if possible.

H.9. CLANDESTINE OPERATION


- Clandestine operation is a secret action undertaken by n
intelligence/counter – intelligence organization in behalf of the
government or other friendly sources.
CLASSIFICATIO OF CLANDESTINE AGENT
1. PRINCIPAL AGENT
2. ACTION AGENT

a. Espionage – (counter intelligence/intelligence agent) is the primary and most


important human collector (access agent, legal traveler & penetration).

b. Propagandist – this agent undertakes action to mold the attitudes, options of


an individual, group or nation.

c. Saboteur – an agent who undertakes positive actions against unfriendly


power resulting them in the loss of used temporary of an article, material, or
facility.

d. Guerilla – a member of paramilitary group or organized to grass the enemy.

e. Strongman – is an agent available to provide special protection during the


direction dangerous phases of clandestine operation.

f. Provocateur – an agent who induces an opponent to act to his own detriment


by desecrating himself or revealing his true purpose or identity.

g. Cover Action Agent – a fully recruited agent who is in a senior position


usually within the government who can exert influence from foreign
government upon direction of the sponsor.

3. SUPPORT AGENT – Ex: surveillance, Processor of Fund, Safe House Keeper,


Investigator, Procures of Supplies, Manager of Storage House, Communication
Officer, etc.

I. COVER AND UNDERCOVER

COVER
Cover refers to any device by person organization to insure that one who does not
have the right to know must be aware of the real purpose of the mission. It is a means
by which an individual group or organization conceals the true nature of its acts and or
existence from the observer.

It also refers to the means by which an individual or organization conceals the


true nature of its activities and the existence from the observer.

It is a strategy by which an investigator conceals his identity and his relation with
the investigative agency.

COVER STORY
Cover story is a biographical data through fictional, which will portray the
personality of the agent he assumed: any scenario to cover up the operation.

COVER SUPPORT
Cover support refers to an agent assigned in target areas with the primary
mission of supporting the cover story.

Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Successful accomplishment of the mission
3. Secrecy of operation against friendly agencies who do not have the need to
know.

Essential Types of Cover


1. Natural cover
- Using actual or true background.
- A cover which completely fits the true background and capabilities of the
agent, if affords to provide maximum security protection to any
clandestine activity and allows greater flexibility.

2. Artificial
- Using biographical data adopted for the purpose the is fictitious.

3. Cover within a cover


- Justification of existence
- Use if secondary cover in case of comprise which necessitates the
admission of lesser crime.

4. Multiple cover
- Any cover you wish.

Hazards to cover
1. Static or dormant opposition – agencies who do not have the need to know.
2. Unhostile active opposition (police, security agencies)
3. Hostile active opposition (enemy intelligence activities)

J. ORGANIZATIONAL COVER
Organizational cover refers to any account consisting of biographical data which
when adopted by an individual will assume the personality he wants to adopt.

Objectives of Organizational Cover


1. To camouflage and protect operational personnel and their activities.
2. To protect installation in which clandestine activities are based.

K. UNDERCOVER ASSIGNMENT
I is an investigation technique in which an agent conceals his official identity to
obtain information from the target organization.

Types of Undercover Assignment


1. Dwelling
- Undercover investigator establishes a residence in or near the dwelling
house of the subject.

2. Work Assignment
- Places the investigator in a type of an employment where he can observe
the activities of the subject at his place of work.

3. Social Assignment
- It requires the investigator to frequent of entertainment and amusement
known to be habitual visited by the target personalities and their
associates.

4. Jurisdictional Assignment
- Each agent have different place of assignment.

5. Combinational Assignment or Multiple Assignment


- Agent is given two places or more to be observed.
- An undercover agent is given the task of covering two or more of the
above specific assignment simultaneously.

6. Personal Contact Assignment or “Rope job”


- The undercover agent is required to develop friendship and trust with the
target personality for the purposes of obtaining information or evidence.
- Striking up friendship and gaining confidence of the subject.

L. UNDERCOVER (ACTION) AGENT


Broad Categories of Undercover Agents

1. Deep Cover
- It may be someone with extensive experience in undercover work, or a
young person selected from an academy training class. Novices are
actually preferred sometimes because they have not acquired typical
authoritarian habits that might give them away as police officer, and also
because they are less likely to be organized by regular police officer, in
the field might unknowingly reveal their identity in a chance encounter.

2. Light cover
- An undercover police officer working under “light” may have a spurious
document to establish fictitious identification, i.e., ID, driver’s license, etc.
but will most likely go some to his family and “real” life. Sometimes drug
enforcement officers and other specially trained agent will be called for
these assignments.

Factors to consider in the Selection of Action (Undercover) Agents:


1. PLACEMENT
- Location of prospective agent with respect to the target.

2. ACCESS
- The capability or ability to the perspective agent to obtain the desired
information for the intelligence organization or to perform the intelligence
collection mission in the area.

a. PRIMARY ACCESS
- It is the access of the desired information.

b. SECONDARY ACCESS
- The access to the desired information through principal source where the
later has the direct access.

c. OUTSIDE ACCESS
- The agent employed outside the target and merely monitors information
from a third person who is monitoring information in the area.

Some Motivation of Agents


a. Ideology – believes in the principal of life
b. Patriotism
c. Remuneration
d. Career Development
e. Fear

M. CONTROL

-Authority to direct to carry out task or the requirements in behalf clandestine


organization in acceptable manner and security.

Two Categories of Control


1. POSITIVE CONTROL
-Characterized by professionalism and rapport

a. Agent motivation
b. Psychological control

2. NEGATIVE CONTROL
-Characterized by blackmail and threat
a. Disciplinary action
- Includes verbal reprimand for poor performance or insecure action
withholding certain materials, rewards reduction of agent salary or
extreme situation and threat of terminating personal relationship.

b. Escrow account
- Control of an agent by putting his salary in a bank to be withdrawn only
after fulfillment of the condition.

c. Blackmail

INFORMERS AND INFORMANTS

A. Informant
- A person who gives information to the police voluntary of voluntary,
without any compensation.

B. Informer
- An individual who gives for a price or reward. (He may be in the payroll
of the law enforcement agency.)

C. Informant net
- Controlled group of person who worked through the direction of the
agent handler. The informants principal or cut-outs supply the agent
handler directly or indirectly of intelligence information.

A. TYPES OF INFORMANTS
1. Criminal informants
2. Confidential informants
3. Voluntary informants
4. Special informants
5. Anonymous informants

SUB-TYPE OF INFORMANTS

1. Accidental (INCIDENTAL) Informants


- Individual who furnish information with no intention of repeating his
services of furnishing information on a continuing basis.

Types of Incidental Informants:


a. Interviewees- individuals contacted by the investigation or summoned by
an intelligence unit for questioning, and who are aware that they are in
contact with an official police/military agency.
b. Walk-ins or Volunteers – Individuals who of their own record contact an
intelligence-operatives in order to divulge information that believes to be
of intelligence interest, such as well meaning, patriotic citizens, and with
range of persons motivated by malice, avarice, revenge or jealousy who
may volunteer biased, distorted or completely false information for
personal reasons.

c. Unwitting Informants – Those who provide information of intelligence


interest, and who are aware that they are imparting such information that
may be obtained from such person elicitation techniques or through
technical surveillance.

2. Recruited Informants
- Individuals that are selected trained and utilized as continuous overt and
covert sources of information concerning specific intelligence targets.

Types of Recruited Informants


a. Ordinary Informants – Individuals who obtained the desired information
during their normal daily routine, but whose affiliation with the counter-
intelligence unit is covert and under the control of that unit.

b. Penetration Informants – those assigned with the mission of obtaining


information within a specific target. They may be recruited outside the
target and placed therein or more usually selected and recruited among
the personnel within the target itself.

c. Full-time Informants – those that are available for counter-intelligence


missions at all times, and who may derive the major part of their income
from their work as informants.
A. OTHER CLASSIFICATION OF INFORMANTS:
1. Rival-elimination
2. False informant
3. Frightened informant
4. Self-aggrandizing informant
5. Mercenary informant
6. Double-crosser informant
7. Woman informant
8. Legitimate informant

B. MOTIVES OF INFORMANTS
1. Reward/Mercenary Reasons
- The old saying among intelligence operatives, “when the money ceases to
clatter, the tongue stops to chatter”, confirms that they well know;
namely, that offering a reward for information is of fundamental
importance.
2. Revenge and Jealously
- A grudge, based on a perception pf unfair treatment can provoke desire
for revenge. Indeed, any pain of distress induced by another can result to
jealously and the need for revenge and turn a person informing. The
need to get even is deep in the human psyche.

3. Patriotism
- An emotional attachment to a nation which an individual recognizes as
their homeland. This attachment, also known as national feeling or
national pride, can be viewed in terms of different features relating to
one’s own nation, including ethnic, cultural, political, or historical aspects.

4. Fear and avoidance of punishment


- Fear is powerful inducement to becoming an informer; however,
protection must be negotiated with authorities. It may be for one’s self of
fear for one’s family being killed, tortured, or harmed in some fashion.
Fear of imprisonment will cause some people to seek a trade-off.

5. Friendship/career Development
- The lifelong process of managing learning, work, leisure, and transition in
order to move toward a personally determined and evolving preferred
future.

6. Vanity
- The quality of people who have too much pride in their own appearance,
abilities, achievements, etc.
- Ordinary citizens as well as reformed criminals are motivated vanity to
provide information, believing it will win favorable attention from
authorities.

7. Civic-mindedness
- A significant motivating factor for informing in a sense of good
citizenship. When an eyewitness tells the police of observations made
while a crime was being committed, or of suspicious behavior noted, the
person carries out of a civic duty.

8. Repentance
- Just as those who have “got religion” will be led by a need for forgiveness
and re-establishment in the community to furnish what they would not
have discovered before, so will the outcast make amends by informing on
confederates in past crimes. The approbation of newly acquired peers is
an especially strong stimulus.

9. Competition
C. STEPS OF INFORMANTS RECRUITMENTS (SIAT)
1. SELECTION
- It is particularly to identify and recruit an informant who has access to
many criminal in-groups or subversive organizations. Access the
probability and the single most important feature in the consideration of
recruiting the potential informants.

2. INVESTIGATION
- The investigation of the potential informants who is tentatively identified
as “probable” must be as thorough as possible. It must establish possible
existing motives as to why this person might assist the police intelligence
community. If necessary, conduct background investigation (CBI).

3. APPROACH
- This must be done in a setting with pleasant surroundings like a
confidential apartment which is completely free from any probability of
comprise. The place is preferably in an adjacent city or remote area
foreign to the informants living pattern. In here, it also includes
explanation of contract.

4. Testing
- It should begin with limited assignment, with gradual interrogation into
more important areas. The occasional testing of an important should
continue thru the entire affiliation.

D. FACTORS TO CONSIDER INFORMANT RECRUITMENT


a. Sex
b. Health
c. Ability
d. Age
e. Education
f. Personality

IDENTIFICATION OF CRIMINAL AND SUBVERSIVE ELEMENTS

A. ORGANIZED/SYNDICATE CRIME GROUPS

It refers to two or more persons collaborating, confederating or mutual helping


one another in the commission of crime.

a. Kidnap for Ransom Groups


b. Bank/Robbery Holp-up Group
c. Drug Syndicates
d. Carnappers
e. Terrorist Group: Japanese See Army: Al Qaida; Abu Sayyaf; etc.
f. Secessionist movement: MNLF; MILF; etc.

B. TERRORISM
An organized pattern of violence designed for the influence government policy
intimidates the population for the purpose of intimidating government policy.

It is also a violent criminal behavior designed primarily to generate dear in the


community or a substantial-segments of it for political purposes.

It is also a culturally unacceptable use of threat or violence directed toward


symbolic target to inference political behavior either directly or indirectly by defeating
attitude, emotion or opinion.

C. SUBVERSIVE HINDRANCES
Anything that will undermine the political, social, economical and other aspect of
the country.

D. INSURGENCY
A protected political activity directed towards completely or partially controlling
the sources of a country and the creation of an alternative government through the use
of irregular military force and illegal political organization.

E. ORDER OF BATTLE (ORBAT)


It is the summary recording of one’s specific criminal activities entries covering
matters with intelligence and tactical interest, enumeration of personalities involved in
the organizational movement activities.

Tracing the Fugitive


The approach in tracing fugitive depends upon the character of the subject. In
case the fugitive in exclusive, discreet methods must be employed. With the experienced
criminal, a more direct approach is permissible.

The following are to taken:

COUNTER INTELLIGENCE

A. COUNTERINTELLIGENCE DEFINED
Aspect of intelligence which in peace or in war is concerned with the detection
prevention and neutralization or espionage, sabotaged subversion or other inimical
foreign intelligence activities, by planning and developing suitable counter measures to
what such hostile activities.

Covers the activity denoted in destroying the effectiveness of hostile foreign


activities and to the protection of information against espionage, subversion, and
sabotage.
B. GENERATE TYPES OF CI

1. Passive Measures
- Those measures which seek to conceal information from the enemy.

2. Active Measures
- Those measures which seeks active block to the enemies’ effort to gain
information or engage espionage, subversion or sabotage.

3. Deception Measures
- To deceive the enemy.

C. COUNTER-INTELLIGENCE INVESTIGATION
- It is an activity which constitutes the value of work load and includes
specific investigation of individual and incidence which for the most part
are conducted in an overt but discrete manner.

D. CATEGORIES OF CI MEASURES

1. DENTAL MEASURES
- Secrecy discipline, document security, camouflage and concealment,
communications security, military censorship, counter reconnaissance
efforts.

2. DETECTION MEASURES
- PSI, Security tag or password, challenge or Password, Reconnaissance.

3. DECEPTION MEASURES
- Ruse – use of escape and evasion, dummy position, Fabricated
information.

E. CI MEASURES TO PROTECT INFORMATION


1. Security
- Freedom from danger or risk
2. Security Survey and Inspection (SSI)
3. Social Investigation (CI)

F. SECURITY SURVEY VS INSPECTION


1. SECURITY SURVEY
A counterintelligence service conducted in order to assist the chiefs of office
in determining the security measures required to protect key installations from
possible sabotage, espionage, subversion and authorized disclosure of or access to –
classified defense information or materials.

2. SECURITY INSPECTION
A counterintelligence service conducted in order to determine degree of
compliance with established security policies and procedures.

G. CI BRANCH AND FUNCTIONS


1. CI Mission
a. Detection – identify the threat.
b. Evaluation – analyzing the data plan.
c. Counter Action and Prevention – recommends counter measures in neutralizing
the target.

2. Categories of CI Operations
a. Counter Human Intel (HUMINI)
It seeks to overcome enemy attempts to use human sources to collect
information or to conduct sabotage and subversion such as: Special Operations;
Liaison; Counter Security; and CI screening.

b. Counter-Imagery Intel (IMINI)


It includes action taken to determine enemy SIGINT and related enemy
war capabilities and activities. These actions include: surveillance radar; photo
thermal and infrared systems. Successful counter-IMINT operations rely heavily
on pattern and movements’ analysis and evaluation.

c. Counter-Signal Intel (SIGINT)


It determines enemy SIGINT and elated enemy war capabilities and
activities; assess friendly operations to identify patterns, profiles and
developments; and recommend and analyze counter measures.

COUNTER-INTELLIGENCE SECURITY MEASURES – INTELLIGENCE IN SECURITY OPRATIONS

A. THREE (3) TYPES OF SECURITY MEASURES:


1. Physical Security – is the placement, security barriers.
2. Personal Security – practice of the “need to know”
3. Document security – handling and use of classified matters and information.

B. THREE SECURITY RESPONSIBILITIES:


1. Command Responsibility – by training every individual personnel of the organization
(PNP) in the importance of security.
2. Individual Responsibility – to know the defense security of security measures.
3. Supervising Responsibility – to motivate each individual personnel in security
procedures.

C. DEFINITION OF TERMS
1. Security
- It is the protection of classified information, materials and equipment
from disclosure to unauthorized person.
2. Document Security
- The placements of security classification, handling and use of classified
information.

3. Classified Information
- This includes all information concerning document cryptographic devices,
development project and materials following in the categories of top
Secret Confidential or Restricted.

4. Classified Matter
- Any information in materials in any form or any nature, the safeguarding
of which is necessary in the interest of Natural Security and which is
classified for such purpose by the responsible classification authority.

5. Classify
- This refers to the assigning of information or material, one of the four
security categories after determination has been made that the
information requires the security protection as provided.

6. Declassify
- The act of removing the security classification from classified information
or matter.

7. Reclassifying or Regarding
- Refers to the act of changing the assigned classification of the classified
information or matter.

8. Upgrading
- Refers to the act of assigning the information or matter to the higher
classification than that previously assigned to it.

9. Certification of Destruction
- It is a certification by a witnessing officer that classified matters described
therein has been disposed of in his presence using approved destruction
methods.

10. Compartmenting (compartmentation)


- Refers to the grant of access to classified matters only properly cleared
person why when such classified information is required in the
performance of their official’s duties.
11. Need to know
- It is the dissemination of classified information or matter to be limited
strictly to those person whose duties requires knowledge or possession
thereof; it is the principle whereby access to classified matter may only to
be given to those persons to whom it is necessary for the fulfillment of
their duties.

12. Security Clearance


- it is the certification by a responsible authority that the person described
is cleared for access to classified matter in appropriate level.

13. Unauthorized
- Refers to person not authorized to have access on classified matters.

14. Comprise
- Takes place through loss of security, which results from unauthorized
person, obtained knowledge of classified matters.

15. Damage to National Security


- Refers to the prejudice, embarrassment or jury to the country resulting
from act or omission.

D. FOUR (4) CLASSIFIED MATTERS


1. Top secret (green color code)
- The unauthorized disclosure of it would cause exceptionally grave
damage to the nation, politically and economically.
- This category is reserve for the nation’s closest secrets and is to be used
with great reserve.

1. Classify Authority
a. Original classification of Authority for assignment of Top-secret
classification rest exclusive on the head of the department. This power
may however, be delegated to authorized offices in instances when the
necessity for such arises.
b. Derivative Classification Authority for Top Secret Classification may be
granted to those officers who are required to give comments for
responses to a communication that necessitates Top Secret response.

2. Specific Persons Authorized to Classify Top Secret Matter


a. Secretary of Department of National Defense.
b. Chief of staff and its equivalent to the PNP.
c. Major Services Commander
d. Area of United Commands of the AFP, PNP, and its equivalent to the AFP
and PNP.

3. Examples of Top-Secret Documents


a. Very important political documents regarding negotiation for major alliances.
b. Major governmental projects such as proposal to adjust the nation’s
economy.
c. Military and Police Defense class/plans.
d. Capabilities of major success of intelligence services.
e. Compilations of data individually classified secret or lower but which should
collectively to be in higher grade.
f. Strategic plan documenting overall conduct of war.
g. Intelligence documents revealing major intelligence production effort
permitting an evaluation by recipients of the success and capabilities of
intelligence agencies.
h. Major government project like drastic proposals.

2. Secret (red color code)


- The unauthorized disclosure of it would endanger national security,
causes serious injury to the interest and prestige of the any governmental
activity, or would be of great advantage to a foreign country/nation.

a. Authority to classify – same as Top Secrets


b. Justification of Secret Grading

1. It materially influences a major aspect of military tactics.


2. It involves a novel principle applicable existing important projects.
3. It is sufficiently revolutionary to result in major advance in existing
techniques or in the performance of existing secret weapons.
4. It is a liable to compromise some other projects so already
graded.

c. Specific Persons Authorized to Classify Secret Matters


1. Commanders of Infantry Battalions
2. Persons enumerated under Top Secret
3. Special and personnel staff of GHQ.
4. Gen. and Special Staff of Major Service Area and Unit
Commanders.
5. Superintendent of the PMA and PNPA.
6. Commander of post, deport, station of separate units.
7. Chief of military mission of group.
8. Armed Forces Attached
9. Commandants of Service Schools

d. Examples of Secret Documents


1. Those that jeopardize or endanger intelligence relations of a
nation.
2. Those that compromise defense plans, scientific or technological
development
3. Those that reveal important intelligence operations
4. War plans or complete plans for future war operations not
included in Top Secret.
5. Documents showing disposition of forces.
6. New designs aircraft projections, tanks, radar and other devices.
7. Troop movement to operational areas.
8. Hotel and plans estimates.
9. Order of battle information.

3. Confidential (blue color code)


- The unauthorized disclosure of it would be prejudicial to the interest and
prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to an individual or
would be of advantage to foreign countries/nations.

a. Justification for confidential grading


1. It is a more than a routine modification or logical improvement of
existing materials and is sufficiently advanced to result in
substantial improvement in the performance in existing
CONFIDENTIAL weapons,
2. It is sufficiently important potentially to make it desirable to
postpone knowledge of its value reaching a foreign nation.
3. It is liable to compromise some other project already.

b. Specific Authorities to classify confidential Matters


-any commissioned personnel/officer.

c. Examples of Confidential Documents


1. Plans of government projects such as roads, bridges, building etc.
2. Routine service reports such like operations and exercise of
foreign power.
3. Routine intelligence reports.
4. Certain personnel records, staff members, etc.

4. Restricted (white or no color, yet prior to release, clearance with the records custodian)
- Requires special protection other than those determined Confidential,
secret, and Top Secret.

a. Authority for classification – shall be the same as for confidential


matters.
b. Reproduction – is authorized.
c. Transmission – shall be thorough the normal dissemination system.
d. Destruction – shall be the same as for that of confidential matters.

FUNDAMENTAL OF CRYPTOGAPHY, ENCODING AND DECODING

A. DEFINION OF TERMS:
1. Cryptography
- Study/science of encoding information in the terms of codes and ciphers;
the act in writing in cipher or secret character or the particular used.
2. Codes
- A system on which arbitrary group of symbols represented by other letter
rather than by a complete words, phrases or sentences.

3. Cipher
- A system which individual letters of a message are represented by other
letter than by a complete words, phases or sentences; the secret manner
or writing the key to it code.

4. Cryptogram
- Encrypted text/message complete with heading of message written on
unintelligence text or language which implies/convey-hiding meaning.

5. Decoding
- To retranslate a message into ordinary language from cipher or code.

6. Document
- Any recoded information regardless of its physical from or characteristic
and includes but not limited to the following:

a. Written matters whether handwritten, printed or type


b. All painted, drawn, or engrave matter.
c. All sound and voice recording.
d. All printed photographs, exposed or printed film, skill or moving.
e. All reproduction if the foregoing.

7. Encoding
- To convert a message to a code.

8. Translation
- The transformation/conversation of one language to another. There are
three types: full – everything is translated or forwarded; Extract – only
portion of it is translated; and or summary – translate only main part.

B. THREE PRINCIPLES OF THE CODES AND CIPHERS


1. Codes must be pre-arranged.
2. The use of codes is limited to the users imagination or ingenuity.
3. Consultant use of the same for a long period of time increasing its vulnerability to
compromise.

C. RULES IN ENCRYPTED MESSAGE


1. Text must be written in-groups of five (5) letters.
2. Cite number shall follow immediately to alter the text classification.
3. Message always start with the word BT.
4. Message will end also with BT.

NATIONAL SECURITY AND ITS THREATS

A. BASIC TO NATIONAL SECURITY

National Interest
- Each nation, regardless of creed or form, has their national interest to
protect and to advance. For national interest, people would willingly go to
war to succeed of perish.

- Used to refer to the general concept of national security and well-being.


Nationals are what the decision-making body in government determines
which beliefs, matters o dictates of conscience are important to the
maintenance of the nation.

- And what are the Philippines national interests? Invariably, our national
interest includes self-preservation, freedom and independence, territorial
integrity, political stability, and socio-economic welfare. This is enshrined
in the preamble of our constitution.

National Strategy
- In furtherance of our national principles and policies, the leaders of our
nation are then able to formulate strategy.
- Generally, almost all will define national strategy as: The art and science
of developing and using the political, economic, and psychological powers
of nation, together with its armed forces, during peace and war, to
secure national objectives. It is the long-range plan through which a
nation applies its strength toward the attainment of its objectives.

National Power
- The elements of national power are numerical strength and character of
population, cultural development, and character of government,
geographical location, resources, economic development and military
potential. The degree to which a nation is strong or deficient in these is
normally a measure of the national power.

Components of National Power


1. Political Strength
- Stems from the character of the people and from the type and stability
of the government and the sounders of foreign policy.

2. Economic Strength
- Stems from a combination of factor such as geographic location, climatic
conditions, supply of natural resources, industrial capacity, internal and
external communication systems, international trade, and the size, health
and technical competence of the population.

3. Cultural Strength
- Stems from the national unity, the social and moral fiber of the people
and the thing they believe, in from the nature and vigor of national
institutions-political, social, religious, educational, scientific and cultural.

4. Military strength
- The ability of a nation to exert pressure by armed force in furtherance of
national policy. It consists of the strength of all the armed forces in
combination of other elements of national power, depending heavily on
natural resources, economic strength, a broad base of war industries and
a vigorous population, military strength is influenced by the number and
quality of the nation’s military, economic, and political alliances.

ACRONYMS

AO - Area of operation
CED - Captured Enemy Documents
CI - Counter Intelligence
COMINT - Communication Intelligence
DSS - Defense Security System
ELINT - Electronic Intelligence
EEI -Essential Elements of Information
FISINT - Foreign Instrument Signal Intelligence
GEOINT - Geospatial Intelligence
HUMINT - Human Source Intelligence
INFOSEC - Information Security
INTSUM - Intelligence Summary
IMINT - Imagery Intelligence
LAC - Local Agency Check
MASINT - Measurement and Sign
NAC - National Agency Check
NSA - Other Information Assignment
OIR - Other Information Requirements
OSINT - Open Source Intelligence
PIR - Priority Intelligence Requirements
POLINTELU - Police Intelligence Units
SIGINT - Signal Intelligence

THE TEN BIGGEST AMERICAN INTELLIGENCE FAILURE


1. The Iraq War
2. The 9/11 Attacks
3. The Indian Nuclear Test- In May 1998
4. The Soviet Invasion of Afghanistan- near Kabul on May 15, 1998
5. The collapse of the Soviet Union- Gorbachev reads his resignation statement in Moscow
on Dec. 25, 1991, before appearing on television to cede power to Russian President
Boris Yeltsin and effectively dissolve the Soviet Union.
6. Iranian Revolution- on Jan. 1, 1979, during demonstration in Tehran against the Shah.
7. Tet Offensive in 1968.
8. Bay of Pigs in April 1961.
9. Pearl Harbor on Dec. 7, 1941.

TOP TEN BEST INTELLIGENCE IN THE WORLD


1. ISI, Pakistan
2. CIA, United States
3. M16, UK
4. FSB, Russia
5. BND, Germany
6. DGSE, France
7. ASIS, Australia
8. RAW, India
9. MSS, China
10. MOSSAD, Israel

CHAPTER V
High Technology Used in Intelligence

1. Audio Recording Equipment

Parabolic Microphone

Developed over a three-year period and constantly updated, this professional quality
“long range” microphone is widely accepted by video film, and recording case with fitted
compartments for the microphone components. It can be assembled and can be ready for
use in less than two minutes. Unit operate on 2-9 Volt batteries. It includes all parts,
carrying case and tape recorder connector cable. It has excellent sensitivity and is capable
of picking up and magnifying signals up to 75 times than that of a normal Omni-directional
microphone while remaining virtually impervious to developed.
2. Amplified Pen Microphone with Lithium Battery

Custom Lithium Powered, amplified “Pen Microphone”

This unique microphone looks exactly like an ordinary ball point pen. Hidden within,
however, is a Small Omni-directional electric condenser microphone, 300-hour lithium
power cell, and 10x amplification circuit capable of picking up conversations at over 25 feet
away. The unit comes complete with 5 feet cable, carry case, and lithium battery.

Features:
a. Highly sensitive, pre-amplified electric condenser microphone.
b. Voice filtering circuit helps eliminate backgrounds noise.
c. Powered by a long-life lithium battery that will last from 300 to 500 hours.

3. Super Concrete Mic Audio Recorder

It is sometimes called a “concrete” mic because professionals use this in their houses.
The same unit allows you to listen through solid walls with ease and clarity. Simply case
the contact mic in a surface and listen through the hi-fi earplug. This unit also has an
output jack for connection to almost any tape recorder. It is useful for automotive
diagnostics, detection of leaky pipes in walls or floors, detecting cardiac sounds, as well as
for many other applications.

4. Telephone Recording Equipment

“Line Stalker” Telephone Recorder

Features:
a. Simple Modular Jack Connection to phone line
b. Automatically starts when any receiver is lifted and stops upon hang up, records all
extensions of the phone line
c. Zero battery drain while waiting for conversation
d. Fast Speed play back for scanning tape
e. Operations on 2 AA batteries
f. Full Auto stop and shut off at end of tape
g. Excellent long play and sound quality – 4 hours per side of the tape
h. Voltage controlled, activated by phone line voltage
i. Requires the standards D- 140 tape

5. ATR -12, 12-hour Automatic Telephone Recorder

For simplified automatic telephone recording in along play format, the ATR – 12 meets
the challenges. With exclusive modifications, this unit offers excellent durability and long
plays sound quality. Just plug into any standard telephone jack, place unit in “record” mode
and it is ready to go. When any phone on the line is picked up, the unit automatically starts
recording both sides of the conversation. This unit stops recording when the call ends and
starts recording again when the headset is lifted of the hook. When using batteries, there is
zero power drain while recorder is “waiting” for a conversation. A specially designed “audio
enhanced circuit” automatically increases the volume of the recording and is clear even if
calling party is talking low. Dual speed operation allows for “quick view” playback at double
speed for place finding. The ATR – 12 features silent operations and auto stop at the end
of tape. It operates as standard long – play recorder when disconnected from telephone
line.

6. Mc-6000 6-hour Telephone Recorder

Features:
a. Quality modified Panasonic Recorder
b. Simple modular jack connection to telephone line
c. Voice activated – runs only when conversation is present
d. Cannot be detected or activated on telephone line
e. 3 hours of recording on MC – 90 micro tape (1 ½ hours per side)
f. Records all extensions on line (single line telephone)
g. Records all extensions on all lines (multi-line telephone)
h. Includes phone cord, duplex jack adapter, and MC-90 tape

7. The Phantom Telephone Recorder

This is a high-quality play telephone recorder in a sub-compact unit, with eight full
hours of recording on a single D-140 cassette tape. Due to the fully adjustable voice
activated circuit, tape runs only when conversation is present. When used with a single line
(home phone) type system, both sides of all conversations are clearly and automatically
recorded from all extensions. Unit can be connected to any standard modular jack using
the included “duplex” plug. When used in a multi-line phone (office phone), the “phantom”
records all conversations from the extension it is connected to. Since all the electronics are
built into the system, there are no bulky telephone control devices or interface couplers to
hassle with. The system is powered for 22 hours on fully charged batteries or can operate
indefinitely on the included AC adapter. When not connected to a phone line, unit may be
used as a standard long-play recorder for other applications such as recording conferences.

8. Telephone Information Recorder

This sleek unit clearly records both sides of a telephone conversation while capturing
and displaying all dialed telephone numbers. It also identifies the name and number of the
party calling you. Automatic recording enables the unit to start only when the phone is in
use. The built in LCD display all data; caller’s name, incoming and outgoing dialed
telephone numbers, as well as the date and time of the call. This innovative model features
two speed recording. The slow speed permits over 5 ½ hours of recording per tape. There
is also a switchable voice – control mode to eliminate silent periods on the tape to attain
the maximum recording time.
9. Silent Witness Telephone Recorder

Features:
a. Six hour long sound quality (3 hours per tape side)
b. Automatically starts when any receiver is lifted and stops upon hang up.
c. Simple modular jack connection to phone line
d. Dual speed recording and fast playback
e. Zero battery drain while in use for conversation
f. Operates on 2 AA batteries
g. Voltage controlled – activated by phone line voltage
h. Full auto-stop and shut of a the end of tape
i. Requires MC – 90 micro cassette-tape.

10. Non-Recording Series Portable Voice Charger

Professional Series Portable Voice Changer

Features:
a. Totally portable and can be used on any telephone
b. Fast connection, simply place the acoustic coupler against the microphone portion
of the handset. The wrap couplers strap around the handset and fasten.
c. Variable pitches allow you to sound like a dainty woman or a burly man.
d. It has a 14-pitch selection dial. This will let the user to adjust to 7 different high
pitches and 7 different low pitches.

11. “Tap Trap” Wiretap Detector”

The “Tap Trap” can detect both series and parallel wiretaps that are attached directly to
the on-premises telephone line. It can also be used to detect hook switch that may be
installed inside the telephone.

Features:
a. Check your phone line for on-premise series bugs/taps, parallel bugs and wiretaps.
b. Also checks your phones for the most common types of hook-switch by pass
devices.
c. Detect series devices with a resistance of 61 ohms or more (most series taps have a
resistance of 100 ohms).
d. Detects parallel devices with a resistance of 65 mega-ohms or less (most taps are
under 30 mega-ohms).

12. Telephone Voice Changer II

Features:
a. Direct Connection: Direct connection to the handset provides superior and quality.
This makes this unit compatible with many multi-line office telephone systems as
well as all home phones.
b. Its eight-level pitch selection allows the user to select variety of voices. The user
can select the same voice as previous conversations.
c. The handset amplifier will amplify the sound level in earpiece of the phone handset.
Ideal for use in noisy environments.
d. This unit has pitch on/off control that allows the user to quickly turn the pitch to
change function on and off. This allows for normal use of the phone without the
need to disconnect the unit.

13. Silent Detective

The silent detective guards your property ore effectively than sophisticated systems. It
is so effective, and it is being use by the Department of Defense.

This new revolutionary intruder detector automatically dials your mobile phone, pager,
or telephone immediately when the sensor detects any heat or movement. Once dialed, the
unit allows you to hear the audio at units location, or you can record the audio on your
pager with voice mail features, telephone recorders or answering machines.

Compromising a motion/heat sensor, keypad, modem, speaker and siren inside a


discreet compact body, the “silent detective” can flawlessly detect any movement or heat
change up to 8 meters.

Features:
a. Movement sensor – alerting the owner not the intruder.
b. Enables the owner to immediately contact the local police force of their obligatory
rapid response policy to investigate any crime in progress.
c. Immediate dial-up alert to any two nominated phone devices.
d. No installation (no wiring – simply plug into telephone devices).
e. Easy number change to any two-phone devices.
f. Silent operation mode or to alarm mode option.
g. Portable and can be easily relocated.
h. Battery operated – unaffected by power cuts.

14. Telephone Monitor 2000

The tele-monitor 2000 is a very sophisticated new audio monitoring device. Utilizing
advance logic-chip technology, it enables you to discreetly listen in you premises via regular
phone lines from any telephone in the world.

This audio monitoring device enables you to discreetly listen in your premises via
regular telephone lines from any telephones in the world. It does not affect normal
incoming and outgoing calls, allowing up to 4 units per line to be connected. The unit
sensitive microphone will pick even a whisper up to 35 feet away. To monitor, just dial your
phone number from any telephone. This is completely self-contained unit; no actual
telephone is required. Equipped with modular plugs for instant connection to telephone
jacks. Size 3 ½” X5 ½ “ X1”.

15. Computer Intelligence Blaster

Blaster is the easiest way to monitor internet activity from a remote location.

Key host recorder


The key host represents the ultimate technology in the computer keystroke recording.
This tiny device installs in seconds on any desktop. No software is required to install, no
batteries are required, and there is no need to open the computer’s case or even have the
computer turned on to install it.

Spector

Surveillance camera pointed directly at your computer monitor filming away.

16. Disguised Cameras

a. Backpack/gym bag camera


b. Briefcase camera
c. Cell phone camera
d. Sunglasses camera
e. Wrist watch camera
f. Clock camera
g. Spy camera/security camera
h. Wall clock camera
i. Pinhole/snake camera

17. Voice Pen

This is a piece of technology used daily for important personal and professional
business. To gold plated or silver-plated chip keeps in securely in your shirt pocket to
record without being notice.

18. Night Vision Binoculars

This is the most compact and ergonomic night vision binocular. It is very easy to use
and it is weather and shock resistant. It has rubberized armored body and big fast lenses,
coupled with high quality tubes and wide field of view. A night vision device (nvd) can be a
better tool. What this stands for is what type of light intensifier tube is used for what
particular device. The light intensifier tube is the heart and soul of night vision device the
night owl night hawk night vision binocular is 8.7 by 5.4 by 2.6 inches in size, weighs 2
pounds and magnifies up to 4.0 x. The night owl night hawk night vision binocular features
unit body construction, quick diopter adjustments, instant distance focusing, and 650-foot
viewing range.

Police View System

The investigator police video system has been designed especially for evidence collection
and intelligence gathering normally performed by detectives. It also has applications for
agencies where officers serve as a patrol or traffic officer as well as an investigator. The video is
conveniently used during traffic stops or long period of surveillance. It can quickly be detached
from its mounting bracket to be used at any crime scene investigation day or night.

Fast Attack Vehicle

It is a custom built off road thoroughbred by L&R racing of La Habra, California. The car
is a two-seat tabular frame rear swing axle and tube front with plenty. Powered by an auto craft
racing engine producing 150 Hp, and with the weight of 1500 lbs, it makes for an exiting ride as
participants engage in terrorist targets during their off-road execution.

Satellite Intelligence: An Eye in the Sky

The Impetus for Intelligence

Intrigue, espionage, coded correspondence, meetings behind closed doors, and


clandestine operations described much of the European political scene during the renaissance.
These activities also took center stage occasionally in the 17th and 18th centuries.

Human spy and hi-tech equipment were among the used to achieve national objectives
in early modern Europe. Cardinal Richlieu became perhaps the sophisticated user of
intelligence, wielding nearly complete power in France in the early 17 th century. The presence of
the Atlantic Ocean minimized Europe influences upon many of the colonies in America.
America’s intelligence developed early in the nation’s history out of the necessities of war. It
often gravitated to new developments in technology.

The First Photo Intelligence

Spy satellites have been used since the 1950’s for military purposes. For decades during
the cold-war it was impossible to sign a nuclear arms reduction treaty because the Soviet Union
would not allow inspectors to visit places where the United States suspected nuclear weapons
were being built tested. Orbiting spy satellites helped solve this problem as they fly so far
overhead that they are in international territory, unlike spy planes, which would have had to
enter soviet air space. As result the United State Department of Justice we able to monitor
Soviet Military activity, and his allowed arms reduction treaties to be negotiated.

The First User of Intelligence in America


Few people think of George Washington, the father of his country, as one who employed
spies. Yet, during the revolutionary war he directed a large spy network. Some records
indicated he may have employed as many as several hundred agents. The used of cryptology or
secret writing to communicate with him when he was the commander of the continental Army.

Balloons and Telegraph

The Civil War represented the first major event in America that encouraged openly the
marriage of intelligence the new technology.

Used in Europe as early as 1794 for reconnaissance, it had not been popular in the
United States nevertheless; they captured the interest of several who publicized their potential.
By 1861, leading aeronauts suggested the Union Army should consider the use of balloons.

Satellite Listening

Echelon’s capabilities are awesome. Relying a network of American Satellites, the


systems pick up microwave signals used by mobile phones. At any one time, millions of calls are
recorded and then checked against a powerful search engine designed to a pick out key words
that might represent a security threat. It work has been effective in tracking down terrorists.

Description of Satellites

1. Positioning

Communication satellites are launched using rockets, in the same manner that
space exploration satellites are launched. Launches are designed so that satellites are
positioned 22300 miles above the equator where they can travel in an orbit that is
synchronous with the speed of the rotation of the earth. In this way, satellites appear to
hang motionless in space and can continually receive and send signals to the same
points on earth. When the satellite is in orbit, it is powered by solar energy it gathers
from the sun.

2. Transmission

Signals are sent to satellites by large ground station dishes, which have the
transmitters that electronically place the information to be sent on radio waves at much
higher frequencies than those by conventional broadcasters. The waves travel through
the earth’s atmosphere, where they experience some interference, but once in outer
space they do not encounter any type of interferences.

3. Transponders

Once the signal arrives at the satellite, it is placed on a particular transponder.


Each satellite contains approximately twenty for transponders and theoretically, a
satellite could receive twenty-four different program signals. However, in most cases,
some of the transponders used for internal communication to keep the satellite on
course and to make sure all information is properly placed.

4. Reception

Satellites transmit their signal back to earth, first through outer space and then
through earth’s atmosphere. Ground station pick up these signals. Anyone with a ground
station dish properly positioned to pick up the signal can receive the programming on
call transponders of a particular satellite.

A. Field Surveillance Radar

Radar has been automatically used in air and maritime surveillance. Indeed, radar
operates best in the air and at sea, because successful use of radar requires an
unobstructed line to the target. The use of radar in field surveillance has increased, as
radar make it possible to detect moving objects also in the dark as in particularly all-
weather conditions. Targets that have been detected can be given specific coordinates,
identified and fired at. They can be used flexibility, because all field surveillance radar
use in the world is moveable and most of them are even portable. In Finland the use of
field surveillance radar is limited due to dead zones caused by altitude differences, and
the fact that the terrain is mostly covered by forests. Despite this, experiences have
been good on open fields in Southern Finland, and especially in Lapland, where radar
provides a significant amount of information to supplement other intelligence and
surveillance made by ground forces. The ideal location for field surveillance radar is a
high and as open a place possible in the foreground.

Field Surveillance Radar Use:


a. Special device used by reconnaissance units
b. Surveillance and general reconnaissance
c. Target agent and fire control

B. Locating Radar

Intelligence, target locating, and firing across a wide area will be decisive factors
in future battlefields. It is not enough to detect the enemy; important targets such as
firing positions with heavy guns must be fired at immediately or it will be electronically
jammed. The principle is: find, locate, and paralyze! Intelligence aircraft will have a
central role at least as regards target intelligence on a operative level. Despite the
growing number of drones used, locating radar used by mortal and artillery units will
retain their role at least in artillery systems. Cymbeline radar can be located, for
example, on the trailer of a tracked transport vehicle, which makes it possible to move it
to an ideal location for given operation.

Locating radar uses:


a. Locating of mortars and artillery firing positions using high-angle fire
b. Fire control

C. Field Exchanges and field Telephones

Automatic digital communications systems and other command support systems


based on computer applications will be increasingly important future battlefields, but
they not entirely replace traditional field telephone networks, which are simple, reliable,
and inexpensive. No major advances are expected in the development of field
telephones and exchanges at least in the near future.

D. Field Radio

Communication between units in combat is more and more important in modern


rapid warfare. Commands, messages, and firing commands must reach their destination
reliably. The development of field communication has been very rapid in the last
decades; they have many new functions and are more widely used. Troops move so
quickly today that it would be impossible to command them without a field radio system.
This has led to rapid development of the equipment, which has time been difficult to
manage effectively. New field radio systems must be able to communicate securely and
be protected against enemy interference.

Uses of Field Radio:


a. Command and firing command networks for artillery mortar units.
b. The radio can be carried on one’s back or installed in a vehicle.

E. Message Device

The amount of information and messages that were transferred, especially in


command and reconnaissance has increased. Automated systems and the demand for
quick response to enemy actions require faster data transmission speeds. The increased
use of field radio has also increased the need to encrypt messages at all command
levels. The message device system that has been widely adopted during the last years
offers one solution to the demands above. Digital device capable of encryption and
message device network assembled using these devices have established their position
in communication networks in all levels of the finish defense forces.

Use of Message Device:


a. Terminal equipment used in the communication networks in all defense branches

F. Spy Plane

1. Apache
It is especially designed to operate at night. The basic principle that visions at
night reality is called Forward Looking Infra-Red. All objects have a certain
temperature. By measuring differences in that temperature a video-image can be
produced for both flying and target acquisition/designation. The Apache’s Pilot in
command in the backseat and pilot/gunners in the front seat, is players in real life,
hi-tech video game and is able to operate in any weather.

2. SR-71 Black Bird

It is the fastest, highest plane on the record. It is a mysterious spy plane


developed in secret as reconnaissance aircraft and flown on missions that may never
be made public. It is the world’s fastest and highest-flying aircraft and can fly three
times the speed of sound.

3. U-2 Spy Plane

A well tested eye in the sky operated by United states but bearing markings of
the United Nations were flown over Iraq on February 21, 2003 to hunt for banned
weapons by Saddam Hussein.

G. Underwater Bugging

During the 1970’s, soviet ports were secretly infiltrated by an American “Spy
Submarine” with deep-sea divers on-board who attached listening devices to telephone
cables. After several weeks, the divers returned to the scene and picked the device,
along with many hours of conversations. Likely targets may include those in the Middle
East, Moditerranean, Eastern Asia, and South America.

You might also like