Professional Documents
Culture Documents
Sun- Tzu authored the book entitled “PING FA (The art of war)” written about 400
B.C. which the following statements could be found.
“IF YOU KNOW YOUR ENEMY AND YOU KNOW YOURSELF, YOU NEED NOT FEAR
THE RESULTS OF HUNDRED OF BATTLES. IF YOU KNOW YOURSELF BUT NOT THE
ENEMY, FOR EVERY VICTORY YOU WILL SUFFER DEFEAT. IF YOU KNOW NETHEIR
YOURSELF NOR THE ENEMY, YOU ARE FOOL OF WILL SUFFER DEFEAT IN EVERY
BATTLE.”
“what is called fore knowledge cannot be elicited from spirits, or from gods, or from
analogy to the past events nor from calculations. He wrote “it must be obtained from
men who know the enemy situation.
BIBLICAL RECORDS
Moses
One of the first recorded formalized intelligence effort with format can be found on
the Holy Bible (Numbers 13:17). The Scriptures also named the 12 intelligence agents whom
the Lord directed Moses to send into the land of Canaan and also recoded that all those men
were heads of the children of Israel. And Moses sent them to spy out the land of Canaan (Num
13:17-20).
Moses sent the 12 agents and said onto them, get you up this wat southward, and go
up into the mountain; and see the land, what it is; and the people in the dwelt therein, whether
they be strong or weak, few or many, and; what the land dwell in, whether in tenths or
strongholds; and what the lands is, whether it be fat or lean, whether there be wood therein, or
not. And be ye good courage and bring the fruit of the land.
Rehab
The harlot of Jericho (Joshua 2:1-21) who sheltered and concealed the agents of
Israel, she made covenant to the agents duped their pursuers. She was not only an impromptu
confederate of immense value for the Jewish leader of that far distant day, but also established
a plot- pattern which is still of periodic relief to motion picture producers.
Delilah
She was an impromptu intelligence agent of the Philistines. She allowed Philistine
spies to hide in her house (Judges 16:9). Apart from her tonsorial specialty, she seduced
Samson of Israel to reveal the secret of his strength and used herself to gain intelligence from
powerful enemy. She achieved the largest effective force of her employer’s adversaries and
contriving the stroke which put that force out of action (Paquitol, B.S.)
The young conqueror thereupon sought the truth and got it by the simplest
expedient. He announced that he was writing home and recommended to his officers
that they do likewise. Then, when the couriers were ladened and had set out for Greece,
he ordered them quietly recalled and proceeded to investigate all the letters that they
carried. Malcontents were detected, legitimate causes of grievances exposed.
2. Akbar
The “Great Mogul and sagacious master” of Hindustan who employed more than four
thousand agents for the soul purpose of bringing him the truth that his throne might
rest upon him.
Frederick the great was known as the father of military espionage. He established
rules of obtaining and using in every grade of intelligence agents and divided his agents
into four classes as follows:
a. Common spies
Recruited among poor folk, glad to earn small amount of money or to be
accommodated as military officer.
b. Double spies
The low informers and unreliable renegades who are significant in spreading false
information into the enemy.
c. Spies of consequences
Couriers and nobleman, staff, officers, and kindred conspirations, invariably
requiring substantial bribe or bait.
d. Intimidated Spies
Persons who were forced to undertake espionage against their will.
6. Sertorius, Quintos
He was a Roman General and possessor of white fawn that tried to follow Polyneus
everywhere. The fawn was used as intelligence agent. His intelligence agents credited
their information to the supernatural power of animal.
He was a great leader who believes in the principle that “One spy in the right place is
worth 20,000 men in field.” He also organized two bureaus of interest:
a. Bureau of Intelligence
Consolidated all incoming information regarding the enemy for presentation to
the emperor and to obtain the information as desired.
b. Topographic Bureau
Maintained a large map which covers the latest information regarding both
enemy and friendly forces.
9. Karl Schulmeister
He was Napoleon’s military secret service and Napoleon’s eyes. He began his career
in offensive espionage. Under a cover role, he was able to infiltrate the Austrian General
Staff and studied the characters of the Generals. His Royal foes selected to defeat him.
12. Richelieu
One of the most brilliant intelligence agent, even though he was a home sexual.
Chief of the Austro-Hungarian secret service and at the same time, agent of Russia
(convicted of treason in 1913- but he committed suicide). His treason led to the death of
500,000 agents and soldiers combine in his 13 years espionage episode.
In ancient India, he overthrew the Nanda dynasty and established the first Mayuryan
king in the India throne. He recommended to his king that for the ruler to succeed, the
ruler should strike at enemies weak points by means of spies.
He was known as the Father of Military Espionage in France. He was born on May
21, 1759, near Nantes. Trained for priesthood but never took orders, instead he
becomes a teacher. He rose to become the most feared and respected intelligence
director in France history. Created a network of agents with his assistance and founded
the modern system of spying on spies, which was later known as counter espionage.
18. Gen. William Donovan
He was regarded as the Father of today’s CIA. He was the first chief of the OSS
(Office of Strategic Service- Forerunner of CIA) when former president Roosevelt
established it in June 14, 1942.
19. Edward I
In 1925, he organized a systematic police system known as “Watch and War” and by
Royal proclamation; the profession “State Informer” was created in 1734 enjoining all
informers to exposed criminal activities and be compensated.
He was the former head of Italian Squad. Through extensive intelligence network, he
credited to smash the Black Society.
1. Positive Branch
- Its function it to collect, evaluate and disseminate intelligence
Information. Prepare situation, estimate and translate documents.
2. Negative Branch
- Counterintelligence functions: investigate disloyalty and sedition;
investigate graft and fraud in organization.
3. Geographic Branch
- Produces maps, photograph and terrain studies. Sections: administration,
collection by attaches troops, codes and ciphers.
German intelligence started the war with the world’s best organized
service through advance preparation of intelligence accompanied by troop
movements.
2. Japanese Intelligence
3. British Intelligence
Its achievement was the delay in the use of German V bomb. The
operation was conducted with the OSS through the penetration and technical
intelligence; they discovered Peenemunde, the V2 guided missile research
project of Nazi Germany.
5. Chinese Intelligence
6. Soviet Intelligence
1. In 1942, a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Peenemunde. British failed in
the defeat of Gen. Montgomery’s forces at Annenheim.
2. United State Intelligence- in 1942, the Us Strategic Service was established to research
and analyze military, political and economic information as it affected the security of the
country.
3. Battle of Midway- in 1942; the turning point of the US- Naval force in the pacific. The
victory gained by the Americans was due to the disrupted messages from the Imperial
Japanese Navy.
• In April of 1943, the crypto- analyst of the U.S. Navy Communications Intelligence
intercepted a top-secret signal relaying the travel of the admiral. Enroute, he was
intercepted and crushed in the Jungles of Bougainville.
5. U.S. Joint Chief of Staffs
• Was organized to act in support of the army and the navy in the collection and analysis
of Strategic Information and to be responsible for the planning and operation of the
Special Service.
6. Amphibious Warfare
• U.S. greatest contribution was its development where coordination of many types of
intelligence activities was required to provide adequate knowledge upon which is the
basis of successful operation of a complex military transported over water with the
objective of establishing itself on an enemy-held shore against opposition.
7. U.S. Success- in WWII was that their personnel were drawn from the civilian populace,
business and professional men and woman.
b. Soviet Counterintelligence
b. M15
- Devoted to counter espionage and security
a. Mossad
- In charged of the National Intelligence. The number one Intelligence
Agency in the whole world.
b. Aman
- Concerned with military Intelligence.
c. Shin bet
- Concerned with Internal Security.
IIC
- Israel intelligence agency- Report to the crime minister.
4. French Intelligence
d. Surete Nationale
- Part of French Intelligence service.
5. German Intelligence
Red Gestapo
Berlin Walls.
E. GREAT BETRAYALS
1. Judith Coplon
CHAPTER II
Intelligence and Intelligence Units
I. DEFINITIONS OF INTELLIGENCE
It is the capacity for understanding and for other forms of adaptive intellect of
behavior, the mind in the operation.
b. Secret Information
Intelligence is the end product resulting from the collection, evaluation, analysis,
integration of all available information which may have immediate or potential
significance to the development and execution of plans, policies and programs.
Intelligence also refers to the product resulting from the collection of information
concerning an actual and potential situation and condition relating to foreign activities
and foreign or enemy held areas.
*** It must also be noted “information” and “intelligence” are different terms: the later is
produced by a process of analysis or evaluation of the former (Odom, 2008, p. 323).
Today all countries have their intelligence services so with all their various
government agencies. They may be different in their organization, efficiency and
method but they all have the basic functions:
1. CRITERIA
a. Universality of Application
b. It must be Broad
c. It must be Important
b. “Coming events cast their shadows before that through a systematic search
for, and by the significant in themselves, it is possible to form meaningful
patterns.”
c. “The knowledge requirements for decision making are complex and are
beyond the capacities of anyone man to fill; and that an organized and
systematic search is necessary to meet these requirements.”
3. PRINCIPLES OF INTELLIGENCE
a. The principles of objectivity (thoroughly and carefully planned)
V. INTELLIGENCE AXIOMS
- The full rage of measures taken a nation to promote its growth and to
protect itself from subversion, lawlessness, and isuergency.
3. Psychological Operations
2. Integrity
- Honestly complete
3. Ingenuity
- Original truth, in accordance with law
4. Intelligence
- Capacity to know from what is right from what is wrong
1. Military
- Offensive and defensive tactics, war plans, strategic concepts and tactical
principles, organizations installations, industrial, lease, armed forces,
command structure, command personnel, material, tactics, morale, etc.
2. General
- Topographical and hydrographic characteristics, historical backgrounds.
3. Diplomatic
- Foreign policies, alliances, diplomatic establishments, foreign service
personnel, technique of conducting foreign relations, etc.
4. Political
- Ideology, traditions, institutions, personalities, area of friction.
5. Economic
- Financial, Commercial, Industrial, Mining and Agriculture.
7. Social
- Nationality structure, classes and caste, historical, factors, census,
personal aspects, characteristics, and the mentality of the people forces,
social, legislation, radio, television, press, motion picture, etc.
8. Intelligence Organization
- Methods and Personnel of Competing Intelligence System.
VIII. CATEGORIES OF INTELLIGENCE
1. National Intelligence
- The total product of intelligence developed by all governmental agencies
that cover the broad aspects of National Security and National Policy.
2. Department Intelligence
- Intelligence used by various departments for the advancement of each
departments/agencies.
3. Military Intelligence
- This is used in the preparation of military policies, plans and programs. It
includes strategic and combat intelligence.
Things to be considered:
P- People
W- Weather
E- Enemy
T- Terrain
4. Counterintelligence
- Covers the activity devoted in destroying the effectiveness of hostile
foreign activities to the protection of information against espionage, and
sabotage.
- It is also known as negative intelligence because it is an activity
dedicated to the concealment and protection of one’s own information
from adversaries’ intelligence operation.
- Negative intelligence is a generic term which incorporates three different
things. This are follows;
Security Intelligence- means that the total sum of efforts to counsel the
national policies, diplomatic, decisions, military data, and any other
information of a secret nature affecting the security of the nation from
unauthorized persons. Its effort is to deny information to unauthorized
persons by restricting to those who are explicitly authorized to possessed
it.
Examples are:
- Secrecy Discipline
- Special Safeguarding of classified info
- Security of troop movement
- Special handling of weather & escapes
- Counter subversion with in the armed forces
- Tactical measures in combat area
2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for CI control at point of entry and departure, borders or
boundaries.
Examples Are:
3. Civil Security – it encompasses active and passive CI measures affecting the nonmilitary
nationals permanently or temporarily residing in an area under military jurisdiction.
Examples Are:
- Systematic registration of civilians and aliens
- Control of Circulation
- Surveillance of suspected political organizations
- Security screening of labor, Issuance of passes and permits
- Control of Internal Commerce
4. Censorship - it is the control and the examination of the civil, national, armed forces,
field press, and POWs.
What is CI Operation?
Counter-intelligence investigation
It is an activity which constitutes the value of work load and includes specific
investigation of individual and incidence which for the most part are conducted in
an overt but discrete manner.
General types of CI
1. Passive Measures
Passive measures are those measures which seek to conceal information from
the enemy.
2. Active Measures
Active measures are those measures which seeks active block to the enemies’
effort to gain information or engage in espionage, subversion or sabotage.
3. Deception Measures
Deception measures are measures which are used to deceive the enemy.
• The chairman of the NIB shall be the Director-General of the National Intelligence
Coordinating Agency (NICA), Office of the President.
• The Board (NIB) shall serve as the advisory body to the director – General of the NICA
for the coordination and integration of all intelligence activities of the Government.
b. Naval Intelligence
- N2 – GHQ; G2 Philippine Marines Intelligence; CG2- Philippine Coast
Guard; and F2- Philippine Fleet
III. NBI
IV. OTHER GEVERNMENT AGENCIES
Note: The CIA (Central intelligence Center) mostly operations outside the
United States to gather intelligence via a network of spies.
2. Great Britain
a. MI-5
b. MI-6
a. MOSSAD
b. SHINBET
c. AMAN
FUNCTIONAL CLASSIFICATIONS
The cardinal principle in Police intelligence at all level is the proper, economical
and most productive use of personnel and equipment employed and/or utilized in
planning the collection of information and dissemination of intelligence.
1. Strategic Intelligence
The intelligence information which is primarily long range in nature with little
practical immediate operation value.
2. Line Intelligence
It is immediate in nature and necessary for more effective police planning and
operation.
3. National Intelligence
4. Counter Intelligence
5. Undercover work
CHAPTER III
The Intelligence Cycle
A. INFORMATION
B. INTELLIGENCE INFORMATION
These are results after evaluation, analysis, interpretation, and integration of raw
materials.
E. ACTIVITY
F. ORGANIZATION
Organization refers to the intelligence personnel or the intelligence unit (the unit
itself).
G. SOURCES
1. OPEN SOURCES
The information may be obtained from news files, libraries, magazines,
books, or non- classified files in certain on public or private offices. 99% of the
information collected is coming from open sources. This can be from: Enemy
activity; Prisoners of War (POW); Civilians; captured Documents; Map; Weather
Forecast; Studies; Researches; Reports, etc.; Agencies; Informants and Informers.
2. CLOSE SOURCES
K. INTELLIGENCE CYCLE
It is the continuous process which ultimate coordinates and integrates all efforts
of the collecting agencies or units. The intelligence cycle is the process through which
intelligence is obtained, produced, and available to users.
A. MISSION
Mission is the focal point of the intelligence operation; a particular task given
to a person or group to carry out; or one which should be accomplished.
In this phase, the Intel Staff Officer or Unit commander determines the
required or important information relevant to mission. Then these requirements will
be distributed to the different collection agencies by direction or by request.
a. Executive
- Intelligence is required by executive, governmental and military
commanders. The executive requirements are the basis for decisions and
national policy making.
b. Contributory
- Intelligence is required to complete the staff process: make staff plan and
estimates that contribute to the decision and policy making.
c. Operational
d. Collateral
- Higher or adjacent echelons of the government or military establishment
may require information.
a. Basic
- General reference materials to be use in planning regarding the enemies
and potential enemies, are of the operations, capabilities – static
comprehensive.
b. Current
- Temporary in nature and narrower in scope. Information required to
cope-up with the current objectives.
c. Estimate Intelligence
- Determines the future courses of action; required by the executive to
plan future in elements of military operations and policies.
• Collection Agency
- Any person, unit, or activity the collects and/or processed information by
research, surveillance or the exploitation of the source of information.
b. Balance
Within the time limits imposed by other consideration, the
collection of work load must be balanced from among the
collecting agencies. Balance is a minor consideration when
compared with the importance of other factors.
c. Municipality
Evaluation of information requires that it must be compared with
the information received other sources and agencies. Subject to
the consideration of suitability more than one agency is used to
obtain each item of required information.
d. Suitability
The collection task assigned to a unit must be compatible with its
primary mission. Only the agencies best suited to furnish the
information are used.
3. Collecting Agencies:
a. Government agencies/offices – variety of information
b. Intelligence units or intelligence agencies
c. Organizations
5. Methods of Collection
a. Overt – open
b. Covert – secret
7. COLLECTION PLANNING
Collection planning refers to the continuous process which
ultimately coordinates and integrates the efforts of all collecting
Agencies/Units.
a. Personality
- Persons involved suspects, social status, etc.
b. Organization
- Group committing the crime: Kuratong Baleleng, Pentagon, 14k gang,
Bamboo Union Gang, etc.
c. Resources/Equipment
- used in committing the crime i.e., firearms.
d. Activity
- Modus operandi/crime activities, time attack, victims, place of attack, etc.
1. Recording
Recording is the reduction of information into writing or some other of
graphical representation and the arranging of this information into groups of related
items.
2. Evaluation
a. Pertinence (usefulness)
- Does it hold some value to current operation?
- It is needed immediately?
- Who need it?
b. Reliability (dependable)
- Judging the source of information
- The source of information and the agency from which it was collected or
both evaluated for reliability. The principal basis for judging the source or
an agency is previous experience. Other criteria include knowledge,
training, experience and past performance of troop units for the collector
of information.
3. Interpretation
a. Analysis
Analysis refers to the determination of significance of information relative
to the information and intelligence already known and drawing deductions about
probable meaning of the evaluated information. It is done by shifting and
isolating those elements that have significance in the light of the mission or
national objective.
b. Integration
c. Deduction
1. First, there must be the “need to know” on the part of the recipient.
- “Need to know” is not necessarily determined by a person’s position in
the organizational hierarchy. Need to know is usually akin to the task
performed.
Dissemination is through:
Methods of dissemination:
1. Fragmentary orders from top to bottom of the command;
2. Memorandum, circulars, special orders, etc;
3. Operations order, oral or written
4. Conference – staff members;
5. Other report and intelligence documents;
6. Personal contact – it can be done by the use of telephone, personal visits, and
debriefings.;
7. Messages – This can be made by use of radio, utilization of messengers or
couriers, or by rapid means of signal communication.
Criteria of dissemination:
1. Timeliness
Timelines states that the information must be dissemination on time.
2. Propriety
The messages must be clear, concise and complete, as well as in the
proper form for the receiver to readily understand its cntents.it must be
disseminated to the correct user, presented in a form that leads itself to
immediate use and distributed by the most effective means appropriate to both
time and security requirements.
Users of intelligence:
4. Processor
2. Intelligence summary
This is the brief summary of information of intelligence interest covering a period of
time designated by a commander. The length of a period will vary depending on the
desires of the commander.
4. Intelligence estimates
This is the logical and orderly examination of the intelligence factors affecting the
accomplishment of the mission. It provides the commander with an analysis of the area of
operations, enemy capacities that can influence his mission. It provides the commander
with the basis for planning operations and for disseminating intelligence to his staff.
CHAPTER IV
INTELLIGENCE OPERATION
Intelligence Operation
Intelligence operation is the result of intelligence planning. Planning is always ahead of
operation, although an operation can be made without a plan. It is usually due to sudden and
inevitable situations but definitely this is poor intelligence management.
2. planning
3. spotting
4. investigation
5. recruitment – the only qualification pf the agent is to have an access to the
target.
6. Training
7. Briefing
8. Dispatch
9. Communication
Technical – telephone, cell/mobile phone, radio, etc.
Procurement refers to the aggressive effort to acquire certain specific information that
may not be readily available. To this end, a number of means may be used as:
1. Classical intelligence
- Utilizes human being to gather information.
2. Modern/Technical Intelligence
- Employs machine and human such as satellites, electronic gadget to
gather information
F. ESSENCE OF PROCUREMENT
G. PROCURING AGENTS
1. Agent in Place
One who has been recruited by an intelligence service within a highly
sensitive target and who is just beginning his career or has been long outsider or
insider.
2. Double Agent
An enemy agent, has been captured, turned around and sent back where he
came from as an agent of his captor.
3. Expendable Agent
An agent through whom false information is leaked to the enemy.
4. Penetration Agent
Refer to an agent who infiltrates and reaches the enemy to get information
and would manage to get back alive.
5. Agent of Influence
Refers to an agent who uses his/her influence to gain information.
6. Agent Provocation
- Provoking of agent
H.1. ELICITATION
b. Probe
-The process to keep the person (subject) talking incessantly.
Types of approach:
A. Flattery
-People susceptible to praise
Variants:
a. Teacher-pupil Approach
-Subject is treated as an authority. Request him/her to enlighten you and solicit his/her
viewpoint and opinion.
B. Provocative Approach
-Discover a wide range of conversational gambits.
Variants:
a. Teaser bait approach
- Elicitor accumulates the sources of knowledge about a particular subject.
Types of Probe:
a. Competition Probe
- Effective when used in connection with the teacher-pupil approach.
b. Clarity Probe
- Use to elicit additional information in an area which the response is not
clear.
d. Hypothetical Probe
- It presents a hypothetical situation and to get the subject to react to the
hypothetical situations.
H.2. CASING
Casing literarily means putting a thing, or place in a case. As used
intelligence in operation, it pertains to continuous monitoring of place or area at a
given period of time.
It also refers to reconnaissance or surveillance of a building, place or area
to determine its suitability for intelligence use for its vulnerability in operations.
Methods of Casing
1. Personal reconnaissance
- The most effective and will produce the most information since you know
just what are you looking for.
2. Map reconnaissance
- May not be sufficient but it can produce a certain amount of usable
information.
3. Research
- Much information can be obtained or acquired through research.
4. Prior information
- Aside from your unit, other units may have file report that they may
provide you with relevant information.
5. Hearsay
- Information usually gain by the person operating in the area and
performing casing job.
Information
H.3. SURVEILLANCE
Based from etymology of terms surveillance was derived from the French
“surveiller” means to watch over and “veiller” means to keep watch. In Latin,
“vigilar” means vigilant.
3. Pre-surveillance Conference
- It is a conference held among the team members, police intelligence unit
before a surveillance is conducted.
4. Stake out
- It refers to the conversation of places or areas from a fixed out point.
5. Tailing or shadowing
- It is the observation of a person’s movement.
6. Undercover Man
- A person trained to observe and penetrate certain organization suspected
of illegal activities and the later reports the observation and information
so that proper operational action can be made.
7. Liaison Program
- This is the assignment of trained intelligence personnel to other agencies
to obtain information of police intelligence value.
8. Safe House
- It is the place, building, enclosed mobile, or an apartment, where police
undercover men meet his action agent for debriefing or reporting
purposes.
9. Drop
- It is a convenient, secure, and unsuspecting place where a police,
undercover man, informer, or informant by a pre-arrangement leaves a
note, a small package, an envelope to item for the action agent,
supervisor or another agent.
10. Convoy
- An accomplice or associate of the subject.
11. Decoy
- Any person almost similar to the subject used to avoid or elude
surveillance.
12. Contact
- Any person or subject picks or deals with while he is under surveillance.
13. Made
- When subject under surveillance becomes aware that he is under
observation and identities the observer (burn out).
14. Lost
- When the surveillance do not know the whereabout of their subject had
eluded the surveillance.
TYPES OF SURVEILLANCE:
b. Close
- Subject is aware that he/she is under observation varied on each
occasion.
- Continuous observation of the subject must be maintained at all times.
c. Loose
- Applied frequently or infrequently, and period of observation varies on
each occasion.
- Intermittent occasion observation of the subject.
- Observation of the subject is not continuous.
2. According to Methods
a. Stationary
- Observation of place usually a bookie stall, gambling joint, or a residence
where illegal activities are committed (fixed point position).
b. Moving
- Surveillance follow the subject from place to place to maintain continuous
watch/ observation of his/her activities.
c. Technical
- Uses communication and electronic hardware’s, gadgets, systems and
equipments.
Basic preparation:
3. Supervise organizations
- History and background, biography of the official (leaders) identity and
backgrounds of the members and former members, method of
identification employed by the members, files and records (nature,
location and accessibility, meeting, etc.
4. Cover story
Shadowing or Tailing
- It is the act of the following a person with following purposes:
1. Detect evidence of criminal activities;
2. To establish the associations of a suspect;
3. To find a wanted person;
4. To protect a witnesses or other person;
5. To discover the associations, amusements and habits of an employee
who is considered for a sensitive position; and
6. To check loyalties of employees.
1. One Man Shadow – Also called as a technique, only one man utilized.
- If a one-man foot surveillance must be used, be cautions when you are
the same side of the street as the aspect. Stay to the rear and vary your
distance from the subject. Set your distance according to physical
conditions like size of crowds and number of exits.
- If the suspect turns a corner, continue across the street, keeping the
subject in view. Then, operating from across the street, you can fall in
behind or move to the front or side of the subject. Decide which position
will give you the best view. When the subjects turns a corner, you may
want to abreast of him to see if he makes a contact or enters a building.
OBSERVATION
- The complete and accurate awareness by an individual of his
surroundings and encompasses the use of all major senses to register
and recognize its operational or intelligence significance.
DESCRIPTION
- The factual reporting of what was observe. Or, it is the actual and factual
reporting of one’s observation or the reported sensory experience
recounted by another.
2. Perception
- Involved and identifying the name and his own mind and some fact which
has been perceived, narrated and identified.
Types of Attention
1. Involuntary
- No control and requires no efforts.
2. Voluntary
- More reliable but not dependable.
3. Habitual
- Little effort with a maximum control.
H.5. SKETCHING
- It consists of putting ideas in an accurate pictorial. It is a means of
describing or area to satisfy a particular need.
H.7. PHOTOGRAPHY
- Used to have permanent used to have permanent record of the subject or
of the what is being observed. Intelligence, photography is essential
means of vividly recording and presenting the subject of casing,
surveillance and other forms of clandestine operation.
2. Interrogation
- It refers to the systematic questioning to elicit information in questioning
of an interrogee.
3. Interrogation Report
- An oral or written statement of information by the questioning of an
interrogee.
4. Interrogator
- Person who does the questioning.
5. Interrogee
- Any person who is subject to the interrogation process in any of its forms
and phases.
6. Screening
- Initial examination of an interrogee to determine the extent of his
knowledge of persons, places, things or events in which we are
interested.
7. Sources
- Person who for any reason submits information of intelligence interest
usually on a voluntary basis.
8. Suspect
- Any person believed to associated with prohibited activity.
10. Questioning
- This is the heart of the interrogation.
11. Termination
- The termination of the interrogation will depend o various factors such as
the physical condition of the subject.
Considerations:
a. The amount of information possessed by the interrogee is so great that it
may take several sessions to complete the interrogation.
b. It should be ended on a friendly manner and leaving in the mind of the
interrogee that he may be further interrogated.
12. Recording
- The interrogator should take notes in cryptic if possible.
COVER
Cover refers to any device by person organization to insure that one who does not
have the right to know must be aware of the real purpose of the mission. It is a means
by which an individual group or organization conceals the true nature of its acts and or
existence from the observer.
It is a strategy by which an investigator conceals his identity and his relation with
the investigative agency.
COVER STORY
Cover story is a biographical data through fictional, which will portray the
personality of the agent he assumed: any scenario to cover up the operation.
COVER SUPPORT
Cover support refers to an agent assigned in target areas with the primary
mission of supporting the cover story.
Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Successful accomplishment of the mission
3. Secrecy of operation against friendly agencies who do not have the need to
know.
2. Artificial
- Using biographical data adopted for the purpose the is fictitious.
4. Multiple cover
- Any cover you wish.
Hazards to cover
1. Static or dormant opposition – agencies who do not have the need to know.
2. Unhostile active opposition (police, security agencies)
3. Hostile active opposition (enemy intelligence activities)
J. ORGANIZATIONAL COVER
Organizational cover refers to any account consisting of biographical data which
when adopted by an individual will assume the personality he wants to adopt.
K. UNDERCOVER ASSIGNMENT
I is an investigation technique in which an agent conceals his official identity to
obtain information from the target organization.
2. Work Assignment
- Places the investigator in a type of an employment where he can observe
the activities of the subject at his place of work.
3. Social Assignment
- It requires the investigator to frequent of entertainment and amusement
known to be habitual visited by the target personalities and their
associates.
4. Jurisdictional Assignment
- Each agent have different place of assignment.
1. Deep Cover
- It may be someone with extensive experience in undercover work, or a
young person selected from an academy training class. Novices are
actually preferred sometimes because they have not acquired typical
authoritarian habits that might give them away as police officer, and also
because they are less likely to be organized by regular police officer, in
the field might unknowingly reveal their identity in a chance encounter.
2. Light cover
- An undercover police officer working under “light” may have a spurious
document to establish fictitious identification, i.e., ID, driver’s license, etc.
but will most likely go some to his family and “real” life. Sometimes drug
enforcement officers and other specially trained agent will be called for
these assignments.
2. ACCESS
- The capability or ability to the perspective agent to obtain the desired
information for the intelligence organization or to perform the intelligence
collection mission in the area.
a. PRIMARY ACCESS
- It is the access of the desired information.
b. SECONDARY ACCESS
- The access to the desired information through principal source where the
later has the direct access.
c. OUTSIDE ACCESS
- The agent employed outside the target and merely monitors information
from a third person who is monitoring information in the area.
M. CONTROL
a. Agent motivation
b. Psychological control
2. NEGATIVE CONTROL
-Characterized by blackmail and threat
a. Disciplinary action
- Includes verbal reprimand for poor performance or insecure action
withholding certain materials, rewards reduction of agent salary or
extreme situation and threat of terminating personal relationship.
b. Escrow account
- Control of an agent by putting his salary in a bank to be withdrawn only
after fulfillment of the condition.
c. Blackmail
A. Informant
- A person who gives information to the police voluntary of voluntary,
without any compensation.
B. Informer
- An individual who gives for a price or reward. (He may be in the payroll
of the law enforcement agency.)
C. Informant net
- Controlled group of person who worked through the direction of the
agent handler. The informants principal or cut-outs supply the agent
handler directly or indirectly of intelligence information.
A. TYPES OF INFORMANTS
1. Criminal informants
2. Confidential informants
3. Voluntary informants
4. Special informants
5. Anonymous informants
SUB-TYPE OF INFORMANTS
2. Recruited Informants
- Individuals that are selected trained and utilized as continuous overt and
covert sources of information concerning specific intelligence targets.
B. MOTIVES OF INFORMANTS
1. Reward/Mercenary Reasons
- The old saying among intelligence operatives, “when the money ceases to
clatter, the tongue stops to chatter”, confirms that they well know;
namely, that offering a reward for information is of fundamental
importance.
2. Revenge and Jealously
- A grudge, based on a perception pf unfair treatment can provoke desire
for revenge. Indeed, any pain of distress induced by another can result to
jealously and the need for revenge and turn a person informing. The
need to get even is deep in the human psyche.
3. Patriotism
- An emotional attachment to a nation which an individual recognizes as
their homeland. This attachment, also known as national feeling or
national pride, can be viewed in terms of different features relating to
one’s own nation, including ethnic, cultural, political, or historical aspects.
5. Friendship/career Development
- The lifelong process of managing learning, work, leisure, and transition in
order to move toward a personally determined and evolving preferred
future.
6. Vanity
- The quality of people who have too much pride in their own appearance,
abilities, achievements, etc.
- Ordinary citizens as well as reformed criminals are motivated vanity to
provide information, believing it will win favorable attention from
authorities.
7. Civic-mindedness
- A significant motivating factor for informing in a sense of good
citizenship. When an eyewitness tells the police of observations made
while a crime was being committed, or of suspicious behavior noted, the
person carries out of a civic duty.
8. Repentance
- Just as those who have “got religion” will be led by a need for forgiveness
and re-establishment in the community to furnish what they would not
have discovered before, so will the outcast make amends by informing on
confederates in past crimes. The approbation of newly acquired peers is
an especially strong stimulus.
9. Competition
C. STEPS OF INFORMANTS RECRUITMENTS (SIAT)
1. SELECTION
- It is particularly to identify and recruit an informant who has access to
many criminal in-groups or subversive organizations. Access the
probability and the single most important feature in the consideration of
recruiting the potential informants.
2. INVESTIGATION
- The investigation of the potential informants who is tentatively identified
as “probable” must be as thorough as possible. It must establish possible
existing motives as to why this person might assist the police intelligence
community. If necessary, conduct background investigation (CBI).
3. APPROACH
- This must be done in a setting with pleasant surroundings like a
confidential apartment which is completely free from any probability of
comprise. The place is preferably in an adjacent city or remote area
foreign to the informants living pattern. In here, it also includes
explanation of contract.
4. Testing
- It should begin with limited assignment, with gradual interrogation into
more important areas. The occasional testing of an important should
continue thru the entire affiliation.
B. TERRORISM
An organized pattern of violence designed for the influence government policy
intimidates the population for the purpose of intimidating government policy.
C. SUBVERSIVE HINDRANCES
Anything that will undermine the political, social, economical and other aspect of
the country.
D. INSURGENCY
A protected political activity directed towards completely or partially controlling
the sources of a country and the creation of an alternative government through the use
of irregular military force and illegal political organization.
COUNTER INTELLIGENCE
A. COUNTERINTELLIGENCE DEFINED
Aspect of intelligence which in peace or in war is concerned with the detection
prevention and neutralization or espionage, sabotaged subversion or other inimical
foreign intelligence activities, by planning and developing suitable counter measures to
what such hostile activities.
1. Passive Measures
- Those measures which seek to conceal information from the enemy.
2. Active Measures
- Those measures which seeks active block to the enemies’ effort to gain
information or engage espionage, subversion or sabotage.
3. Deception Measures
- To deceive the enemy.
C. COUNTER-INTELLIGENCE INVESTIGATION
- It is an activity which constitutes the value of work load and includes
specific investigation of individual and incidence which for the most part
are conducted in an overt but discrete manner.
D. CATEGORIES OF CI MEASURES
1. DENTAL MEASURES
- Secrecy discipline, document security, camouflage and concealment,
communications security, military censorship, counter reconnaissance
efforts.
2. DETECTION MEASURES
- PSI, Security tag or password, challenge or Password, Reconnaissance.
3. DECEPTION MEASURES
- Ruse – use of escape and evasion, dummy position, Fabricated
information.
2. SECURITY INSPECTION
A counterintelligence service conducted in order to determine degree of
compliance with established security policies and procedures.
2. Categories of CI Operations
a. Counter Human Intel (HUMINI)
It seeks to overcome enemy attempts to use human sources to collect
information or to conduct sabotage and subversion such as: Special Operations;
Liaison; Counter Security; and CI screening.
C. DEFINITION OF TERMS
1. Security
- It is the protection of classified information, materials and equipment
from disclosure to unauthorized person.
2. Document Security
- The placements of security classification, handling and use of classified
information.
3. Classified Information
- This includes all information concerning document cryptographic devices,
development project and materials following in the categories of top
Secret Confidential or Restricted.
4. Classified Matter
- Any information in materials in any form or any nature, the safeguarding
of which is necessary in the interest of Natural Security and which is
classified for such purpose by the responsible classification authority.
5. Classify
- This refers to the assigning of information or material, one of the four
security categories after determination has been made that the
information requires the security protection as provided.
6. Declassify
- The act of removing the security classification from classified information
or matter.
7. Reclassifying or Regarding
- Refers to the act of changing the assigned classification of the classified
information or matter.
8. Upgrading
- Refers to the act of assigning the information or matter to the higher
classification than that previously assigned to it.
9. Certification of Destruction
- It is a certification by a witnessing officer that classified matters described
therein has been disposed of in his presence using approved destruction
methods.
13. Unauthorized
- Refers to person not authorized to have access on classified matters.
14. Comprise
- Takes place through loss of security, which results from unauthorized
person, obtained knowledge of classified matters.
1. Classify Authority
a. Original classification of Authority for assignment of Top-secret
classification rest exclusive on the head of the department. This power
may however, be delegated to authorized offices in instances when the
necessity for such arises.
b. Derivative Classification Authority for Top Secret Classification may be
granted to those officers who are required to give comments for
responses to a communication that necessitates Top Secret response.
4. Restricted (white or no color, yet prior to release, clearance with the records custodian)
- Requires special protection other than those determined Confidential,
secret, and Top Secret.
A. DEFINION OF TERMS:
1. Cryptography
- Study/science of encoding information in the terms of codes and ciphers;
the act in writing in cipher or secret character or the particular used.
2. Codes
- A system on which arbitrary group of symbols represented by other letter
rather than by a complete words, phrases or sentences.
3. Cipher
- A system which individual letters of a message are represented by other
letter than by a complete words, phases or sentences; the secret manner
or writing the key to it code.
4. Cryptogram
- Encrypted text/message complete with heading of message written on
unintelligence text or language which implies/convey-hiding meaning.
5. Decoding
- To retranslate a message into ordinary language from cipher or code.
6. Document
- Any recoded information regardless of its physical from or characteristic
and includes but not limited to the following:
7. Encoding
- To convert a message to a code.
8. Translation
- The transformation/conversation of one language to another. There are
three types: full – everything is translated or forwarded; Extract – only
portion of it is translated; and or summary – translate only main part.
National Interest
- Each nation, regardless of creed or form, has their national interest to
protect and to advance. For national interest, people would willingly go to
war to succeed of perish.
- And what are the Philippines national interests? Invariably, our national
interest includes self-preservation, freedom and independence, territorial
integrity, political stability, and socio-economic welfare. This is enshrined
in the preamble of our constitution.
National Strategy
- In furtherance of our national principles and policies, the leaders of our
nation are then able to formulate strategy.
- Generally, almost all will define national strategy as: The art and science
of developing and using the political, economic, and psychological powers
of nation, together with its armed forces, during peace and war, to
secure national objectives. It is the long-range plan through which a
nation applies its strength toward the attainment of its objectives.
National Power
- The elements of national power are numerical strength and character of
population, cultural development, and character of government,
geographical location, resources, economic development and military
potential. The degree to which a nation is strong or deficient in these is
normally a measure of the national power.
2. Economic Strength
- Stems from a combination of factor such as geographic location, climatic
conditions, supply of natural resources, industrial capacity, internal and
external communication systems, international trade, and the size, health
and technical competence of the population.
3. Cultural Strength
- Stems from the national unity, the social and moral fiber of the people
and the thing they believe, in from the nature and vigor of national
institutions-political, social, religious, educational, scientific and cultural.
4. Military strength
- The ability of a nation to exert pressure by armed force in furtherance of
national policy. It consists of the strength of all the armed forces in
combination of other elements of national power, depending heavily on
natural resources, economic strength, a broad base of war industries and
a vigorous population, military strength is influenced by the number and
quality of the nation’s military, economic, and political alliances.
ACRONYMS
AO - Area of operation
CED - Captured Enemy Documents
CI - Counter Intelligence
COMINT - Communication Intelligence
DSS - Defense Security System
ELINT - Electronic Intelligence
EEI -Essential Elements of Information
FISINT - Foreign Instrument Signal Intelligence
GEOINT - Geospatial Intelligence
HUMINT - Human Source Intelligence
INFOSEC - Information Security
INTSUM - Intelligence Summary
IMINT - Imagery Intelligence
LAC - Local Agency Check
MASINT - Measurement and Sign
NAC - National Agency Check
NSA - Other Information Assignment
OIR - Other Information Requirements
OSINT - Open Source Intelligence
PIR - Priority Intelligence Requirements
POLINTELU - Police Intelligence Units
SIGINT - Signal Intelligence
CHAPTER V
High Technology Used in Intelligence
Parabolic Microphone
Developed over a three-year period and constantly updated, this professional quality
“long range” microphone is widely accepted by video film, and recording case with fitted
compartments for the microphone components. It can be assembled and can be ready for
use in less than two minutes. Unit operate on 2-9 Volt batteries. It includes all parts,
carrying case and tape recorder connector cable. It has excellent sensitivity and is capable
of picking up and magnifying signals up to 75 times than that of a normal Omni-directional
microphone while remaining virtually impervious to developed.
2. Amplified Pen Microphone with Lithium Battery
This unique microphone looks exactly like an ordinary ball point pen. Hidden within,
however, is a Small Omni-directional electric condenser microphone, 300-hour lithium
power cell, and 10x amplification circuit capable of picking up conversations at over 25 feet
away. The unit comes complete with 5 feet cable, carry case, and lithium battery.
Features:
a. Highly sensitive, pre-amplified electric condenser microphone.
b. Voice filtering circuit helps eliminate backgrounds noise.
c. Powered by a long-life lithium battery that will last from 300 to 500 hours.
It is sometimes called a “concrete” mic because professionals use this in their houses.
The same unit allows you to listen through solid walls with ease and clarity. Simply case
the contact mic in a surface and listen through the hi-fi earplug. This unit also has an
output jack for connection to almost any tape recorder. It is useful for automotive
diagnostics, detection of leaky pipes in walls or floors, detecting cardiac sounds, as well as
for many other applications.
Features:
a. Simple Modular Jack Connection to phone line
b. Automatically starts when any receiver is lifted and stops upon hang up, records all
extensions of the phone line
c. Zero battery drain while waiting for conversation
d. Fast Speed play back for scanning tape
e. Operations on 2 AA batteries
f. Full Auto stop and shut off at end of tape
g. Excellent long play and sound quality – 4 hours per side of the tape
h. Voltage controlled, activated by phone line voltage
i. Requires the standards D- 140 tape
For simplified automatic telephone recording in along play format, the ATR – 12 meets
the challenges. With exclusive modifications, this unit offers excellent durability and long
plays sound quality. Just plug into any standard telephone jack, place unit in “record” mode
and it is ready to go. When any phone on the line is picked up, the unit automatically starts
recording both sides of the conversation. This unit stops recording when the call ends and
starts recording again when the headset is lifted of the hook. When using batteries, there is
zero power drain while recorder is “waiting” for a conversation. A specially designed “audio
enhanced circuit” automatically increases the volume of the recording and is clear even if
calling party is talking low. Dual speed operation allows for “quick view” playback at double
speed for place finding. The ATR – 12 features silent operations and auto stop at the end
of tape. It operates as standard long – play recorder when disconnected from telephone
line.
Features:
a. Quality modified Panasonic Recorder
b. Simple modular jack connection to telephone line
c. Voice activated – runs only when conversation is present
d. Cannot be detected or activated on telephone line
e. 3 hours of recording on MC – 90 micro tape (1 ½ hours per side)
f. Records all extensions on line (single line telephone)
g. Records all extensions on all lines (multi-line telephone)
h. Includes phone cord, duplex jack adapter, and MC-90 tape
This is a high-quality play telephone recorder in a sub-compact unit, with eight full
hours of recording on a single D-140 cassette tape. Due to the fully adjustable voice
activated circuit, tape runs only when conversation is present. When used with a single line
(home phone) type system, both sides of all conversations are clearly and automatically
recorded from all extensions. Unit can be connected to any standard modular jack using
the included “duplex” plug. When used in a multi-line phone (office phone), the “phantom”
records all conversations from the extension it is connected to. Since all the electronics are
built into the system, there are no bulky telephone control devices or interface couplers to
hassle with. The system is powered for 22 hours on fully charged batteries or can operate
indefinitely on the included AC adapter. When not connected to a phone line, unit may be
used as a standard long-play recorder for other applications such as recording conferences.
This sleek unit clearly records both sides of a telephone conversation while capturing
and displaying all dialed telephone numbers. It also identifies the name and number of the
party calling you. Automatic recording enables the unit to start only when the phone is in
use. The built in LCD display all data; caller’s name, incoming and outgoing dialed
telephone numbers, as well as the date and time of the call. This innovative model features
two speed recording. The slow speed permits over 5 ½ hours of recording per tape. There
is also a switchable voice – control mode to eliminate silent periods on the tape to attain
the maximum recording time.
9. Silent Witness Telephone Recorder
Features:
a. Six hour long sound quality (3 hours per tape side)
b. Automatically starts when any receiver is lifted and stops upon hang up.
c. Simple modular jack connection to phone line
d. Dual speed recording and fast playback
e. Zero battery drain while in use for conversation
f. Operates on 2 AA batteries
g. Voltage controlled – activated by phone line voltage
h. Full auto-stop and shut of a the end of tape
i. Requires MC – 90 micro cassette-tape.
Features:
a. Totally portable and can be used on any telephone
b. Fast connection, simply place the acoustic coupler against the microphone portion
of the handset. The wrap couplers strap around the handset and fasten.
c. Variable pitches allow you to sound like a dainty woman or a burly man.
d. It has a 14-pitch selection dial. This will let the user to adjust to 7 different high
pitches and 7 different low pitches.
The “Tap Trap” can detect both series and parallel wiretaps that are attached directly to
the on-premises telephone line. It can also be used to detect hook switch that may be
installed inside the telephone.
Features:
a. Check your phone line for on-premise series bugs/taps, parallel bugs and wiretaps.
b. Also checks your phones for the most common types of hook-switch by pass
devices.
c. Detect series devices with a resistance of 61 ohms or more (most series taps have a
resistance of 100 ohms).
d. Detects parallel devices with a resistance of 65 mega-ohms or less (most taps are
under 30 mega-ohms).
Features:
a. Direct Connection: Direct connection to the handset provides superior and quality.
This makes this unit compatible with many multi-line office telephone systems as
well as all home phones.
b. Its eight-level pitch selection allows the user to select variety of voices. The user
can select the same voice as previous conversations.
c. The handset amplifier will amplify the sound level in earpiece of the phone handset.
Ideal for use in noisy environments.
d. This unit has pitch on/off control that allows the user to quickly turn the pitch to
change function on and off. This allows for normal use of the phone without the
need to disconnect the unit.
The silent detective guards your property ore effectively than sophisticated systems. It
is so effective, and it is being use by the Department of Defense.
This new revolutionary intruder detector automatically dials your mobile phone, pager,
or telephone immediately when the sensor detects any heat or movement. Once dialed, the
unit allows you to hear the audio at units location, or you can record the audio on your
pager with voice mail features, telephone recorders or answering machines.
Features:
a. Movement sensor – alerting the owner not the intruder.
b. Enables the owner to immediately contact the local police force of their obligatory
rapid response policy to investigate any crime in progress.
c. Immediate dial-up alert to any two nominated phone devices.
d. No installation (no wiring – simply plug into telephone devices).
e. Easy number change to any two-phone devices.
f. Silent operation mode or to alarm mode option.
g. Portable and can be easily relocated.
h. Battery operated – unaffected by power cuts.
The tele-monitor 2000 is a very sophisticated new audio monitoring device. Utilizing
advance logic-chip technology, it enables you to discreetly listen in you premises via regular
phone lines from any telephone in the world.
This audio monitoring device enables you to discreetly listen in your premises via
regular telephone lines from any telephones in the world. It does not affect normal
incoming and outgoing calls, allowing up to 4 units per line to be connected. The unit
sensitive microphone will pick even a whisper up to 35 feet away. To monitor, just dial your
phone number from any telephone. This is completely self-contained unit; no actual
telephone is required. Equipped with modular plugs for instant connection to telephone
jacks. Size 3 ½” X5 ½ “ X1”.
Blaster is the easiest way to monitor internet activity from a remote location.
Spector
This is a piece of technology used daily for important personal and professional
business. To gold plated or silver-plated chip keeps in securely in your shirt pocket to
record without being notice.
This is the most compact and ergonomic night vision binocular. It is very easy to use
and it is weather and shock resistant. It has rubberized armored body and big fast lenses,
coupled with high quality tubes and wide field of view. A night vision device (nvd) can be a
better tool. What this stands for is what type of light intensifier tube is used for what
particular device. The light intensifier tube is the heart and soul of night vision device the
night owl night hawk night vision binocular is 8.7 by 5.4 by 2.6 inches in size, weighs 2
pounds and magnifies up to 4.0 x. The night owl night hawk night vision binocular features
unit body construction, quick diopter adjustments, instant distance focusing, and 650-foot
viewing range.
The investigator police video system has been designed especially for evidence collection
and intelligence gathering normally performed by detectives. It also has applications for
agencies where officers serve as a patrol or traffic officer as well as an investigator. The video is
conveniently used during traffic stops or long period of surveillance. It can quickly be detached
from its mounting bracket to be used at any crime scene investigation day or night.
It is a custom built off road thoroughbred by L&R racing of La Habra, California. The car
is a two-seat tabular frame rear swing axle and tube front with plenty. Powered by an auto craft
racing engine producing 150 Hp, and with the weight of 1500 lbs, it makes for an exiting ride as
participants engage in terrorist targets during their off-road execution.
Human spy and hi-tech equipment were among the used to achieve national objectives
in early modern Europe. Cardinal Richlieu became perhaps the sophisticated user of
intelligence, wielding nearly complete power in France in the early 17 th century. The presence of
the Atlantic Ocean minimized Europe influences upon many of the colonies in America.
America’s intelligence developed early in the nation’s history out of the necessities of war. It
often gravitated to new developments in technology.
Spy satellites have been used since the 1950’s for military purposes. For decades during
the cold-war it was impossible to sign a nuclear arms reduction treaty because the Soviet Union
would not allow inspectors to visit places where the United States suspected nuclear weapons
were being built tested. Orbiting spy satellites helped solve this problem as they fly so far
overhead that they are in international territory, unlike spy planes, which would have had to
enter soviet air space. As result the United State Department of Justice we able to monitor
Soviet Military activity, and his allowed arms reduction treaties to be negotiated.
The Civil War represented the first major event in America that encouraged openly the
marriage of intelligence the new technology.
Used in Europe as early as 1794 for reconnaissance, it had not been popular in the
United States nevertheless; they captured the interest of several who publicized their potential.
By 1861, leading aeronauts suggested the Union Army should consider the use of balloons.
Satellite Listening
Description of Satellites
1. Positioning
Communication satellites are launched using rockets, in the same manner that
space exploration satellites are launched. Launches are designed so that satellites are
positioned 22300 miles above the equator where they can travel in an orbit that is
synchronous with the speed of the rotation of the earth. In this way, satellites appear to
hang motionless in space and can continually receive and send signals to the same
points on earth. When the satellite is in orbit, it is powered by solar energy it gathers
from the sun.
2. Transmission
Signals are sent to satellites by large ground station dishes, which have the
transmitters that electronically place the information to be sent on radio waves at much
higher frequencies than those by conventional broadcasters. The waves travel through
the earth’s atmosphere, where they experience some interference, but once in outer
space they do not encounter any type of interferences.
3. Transponders
4. Reception
Satellites transmit their signal back to earth, first through outer space and then
through earth’s atmosphere. Ground station pick up these signals. Anyone with a ground
station dish properly positioned to pick up the signal can receive the programming on
call transponders of a particular satellite.
Radar has been automatically used in air and maritime surveillance. Indeed, radar
operates best in the air and at sea, because successful use of radar requires an
unobstructed line to the target. The use of radar in field surveillance has increased, as
radar make it possible to detect moving objects also in the dark as in particularly all-
weather conditions. Targets that have been detected can be given specific coordinates,
identified and fired at. They can be used flexibility, because all field surveillance radar
use in the world is moveable and most of them are even portable. In Finland the use of
field surveillance radar is limited due to dead zones caused by altitude differences, and
the fact that the terrain is mostly covered by forests. Despite this, experiences have
been good on open fields in Southern Finland, and especially in Lapland, where radar
provides a significant amount of information to supplement other intelligence and
surveillance made by ground forces. The ideal location for field surveillance radar is a
high and as open a place possible in the foreground.
B. Locating Radar
Intelligence, target locating, and firing across a wide area will be decisive factors
in future battlefields. It is not enough to detect the enemy; important targets such as
firing positions with heavy guns must be fired at immediately or it will be electronically
jammed. The principle is: find, locate, and paralyze! Intelligence aircraft will have a
central role at least as regards target intelligence on a operative level. Despite the
growing number of drones used, locating radar used by mortal and artillery units will
retain their role at least in artillery systems. Cymbeline radar can be located, for
example, on the trailer of a tracked transport vehicle, which makes it possible to move it
to an ideal location for given operation.
D. Field Radio
E. Message Device
F. Spy Plane
1. Apache
It is especially designed to operate at night. The basic principle that visions at
night reality is called Forward Looking Infra-Red. All objects have a certain
temperature. By measuring differences in that temperature a video-image can be
produced for both flying and target acquisition/designation. The Apache’s Pilot in
command in the backseat and pilot/gunners in the front seat, is players in real life,
hi-tech video game and is able to operate in any weather.
A well tested eye in the sky operated by United states but bearing markings of
the United Nations were flown over Iraq on February 21, 2003 to hunt for banned
weapons by Saddam Hussein.
G. Underwater Bugging
During the 1970’s, soviet ports were secretly infiltrated by an American “Spy
Submarine” with deep-sea divers on-board who attached listening devices to telephone
cables. After several weeks, the divers returned to the scene and picked the device,
along with many hours of conversations. Likely targets may include those in the Middle
East, Moditerranean, Eastern Asia, and South America.