You are on page 1of 30

REVIEWER IN POLICE INTELLIGENCE

CHAPTER – 0NE : NATURE AND HISTORY OF INTELLIGENCE


COURSE DESCRIPTION :
This course focuses on a comparative study of military and police
intelligence functions and operations, types of police intelligence
Operations, phases of intelligence cycles, modus operandi ( MO ) and
Order of Battle regulations OBR system for the identification of
criminal and other threats to national security.

COURSE OUTCOMES:

At the end of 18 weeks 55 hours of the student should be able


to:
 Gain a working knowledge of human aspiration and
expectations and how are these expose to threat.
 Have working knowledge on the role of intelligence of secret
service and conceptualization and formulation of plans,
programs, and police aimed at the protection and
advancement of national stability.

01- Define and explain the wide definition of the word Intelligence?
Answer :
 It is the product resulting from the collection, analysis, integration,
evaluation and interpretation of all available information which
concerns one or more aspects of area of operation potentially
significant to planning.
 Others simply define as the output or end product resulting from
the processing of information for future action.
 In the study of criminology, Intelligence is an activity which treats
processed information as the basis of departmental policy and
decision making.
 It is the product of a process which starts from collection of
information, its evaluation, analysis, integration and interpretation
in order to arrive at a theory or conclusion and these process called
as the INTELLIGENCE CYCLE or the PRODUCTION CYCLE
02- Explain and discuss the Importance of INTELLIGENCE
Answer :
 It is vital to enable the nation to formulate its policies, strategic
plans and conduct its diplomacy
 Intelligence is needed in order to enable a nation to forestall the
activities of its internal and external enemies
 It is necessary to detect and prosecute the activities of criminals
and subversive elements
 It is vital in providing ample security for the people and the state
 Intelligence plays an important role in the life and survival of a
country by proving advance and exact ( pro-active investigation )
knowledge of the intentions and design of its enemy.

03- Enumerate the Five ( 5 ) types of an Intelligence


Answer :
 Military Intelligence – refers to the use of processed information in
formulating military plans, programs and policies. This would include
strategic and combat intelligence. Strategic Intelligence - gives
attention to the capability, vulnerability and possible course of action
of the enemy. Combat Intelligence - highlights knowledge pertaining
to weather, enemy and terrain
 Police Intelligence – refers to the output or an end product resulting
from the collection, evaluation, analysis, integration, and
interpretation of all available facts which concerns the activities of
criminal elements and its activities significant to police planning and
operation. This covers Line, Strategic and Counter Intelligence.
Line Intelligence – refers to processed information which is
immediate in nature. Strategic Intelligence – refers to long term or
future use of processed information, While Counter Intelligence – it
deals primarily with the building of the organization against internal
enemies.
 Strategic Intelligence – refers to the process of information designed
to disturb and disrupt the enemy’s state of finances and destroy the
stability and foundation of its organization
 Combat Intelligence – refers to that intelligence utilized in designing
plans and conducting tactical and administrative operation
 Counter Intelligence – are measures undertaken to deny the enemy
of any information consisting of passive and an active intelligence
measure. In Passive Counter Intelligence – secrecy discipline,
movement control, camouflage and proper handling of information
is practiced. Active Counter Intelligence - on the other hand covers
reconnaissance, patrolling, sabotage, espionage, interior guard duty
and fortification of vital facilities.

04- In terms of the historical background of Intelligence, explain in full


context why it has Been considered that Moses has done and
contributed as one of the finest intelligence work in the history.
Answer :
 It has been told in the Holy Bible in Chapter 13, verse 17-20, When
Moses sent an advance TWELVE ( 12 ) spies from the tribes of Israel
to determine the exact situation, capability of their enemies in
Canaan and enable them to easily win all the wars against their
enemy and settle there in peace for 40 years

05- In terms of History in Military Intelligence, What are those notable


intelligence being found and recorded in the Holy Bible?
ANSWER :
 Moses, Chapter 13, verse 17-20
 Rahab, Chapter 2, verse 1-21
 Delilah, Chapter 6, verses 1-31

06- During the period of conquest era, Who is the great Prussian leader
and also known better as the Father of organized military Intelligence
and what are his four classification of spies according to his concept?
ANSWER :
 The great Prussian leader is FREDERICK THE GREAT, and his four ( 4 )
classes of spies were the Common Spies; Double Spies; Spies of
Consequence; and The Persons Who were Forced to Undertake
Espionage against their will

07- Who is these Chinese military General notably for his finest
intelligence and some of his books were being utilized even in
American business schools, Soviet Political-military hierarchy, and
even Mao Tse-tong used his strategic and tactical doctrine and What
are his five classifications of spies?
ANSWER :
 He is Sun Tzu, a Chinese military general, with his five classes of spies
the Local spies; Inward/Internal spies; Converted spies; Doomed
spies; and Surviving spies

08- Name the six ( 6 ) notable intelligence leader of the Pre-Modern


time and explain in details of their contribution?
ANSWER :
 Walshingham of England – He is the founder of the first National
Secret Service, his best secret agents were English students residing
in Italy to protect Queen Elizabeth from countless assassins.
 Joseph Fouche of France – One of the most feared and respected
intelligent Directors in the history of France. He defeated
Robespierre in the “Battle of Intrigues”
 Karl Schulmeister – a popular smuggler and he was with Napoleon
Bonafarte’s military secret service and began his career in offensive
espionage during napoleon’s campaign against Austria, and Russia in
1805
 George Washington – mobilized the freemasons of the colonies, a
secret society at that time to achieve significant result in winning the
war and he became the first President of the United States of
America
 Wilhelm Stieber – An intelligence agent of Bismark and he was
labeled as the “King of Sleuth-Hounds”
 Alfred Redl – a homosexual, one of the most brilliant agents whose
13 year work as an arch spy had led to death of over a half a million
agents and soldiers in the military establishment. He became the
Chief of Austro-Hungarian Secret service or Director of their military
intelligence system.

09- Enumerate some world most Notable Intelligence Organizations


Answer :
 Central Intelligence Agency – ( CIA ) It was established by virtue of
the US National Security Act of 1947 signed into Law by President
Harry S. Truman. The function of this famous organization is to
ascertain all aspects concerning national security and coordinated
efforts of various agencies that are in the nature of intelligence
gathering.
 Komitet Gosudarstvennoy Bezopasnosti – ( KGB ) – or the
Committee for State Security, during the height of the cold war and
the prominence of the defunct USSR, it was the Russian agency
whose works are comparable to that of its American counter-part the
CIA. KGB was the umbrella organization name for the Soviet’s Union
premier security, Secret service, and Intelligence agency from 1954
to 1991. On December 21, 1995, Russian President Boris Yeltsin
signed the decree that disbanded the KGB, to be instituted by the
Federal Security Service of the Russian Federation ( FSB )
 The British Secret Service – ( M-1-6 ) a parallel ally and intelligence
organization of the western powers. It wa established by the
Committee of Imperial Defense in October 1909. The Secret Service
Bureau was soon abbreviated to secret service, “ SS Bureau “ or even
“ SS “.
 Mossad – the Isaraeli Intelligence Agency – which are renowned by
many as the best due to the fact that Israel despite of having
countless enemies in the Middle East was able to survive and
flourish. Mossad was formerly known as the “ Central Institute for
Corrdination and the Central Institute for Intelligence and Security”.

10- Name at least Five ( 5 ) Law Enforcement Intelligence Organization


Answer :
 Scotland Yard – it is the premier institution in gathering information
regarding the identity, activities of criminals as well as obtaining
evidences and affecting the arrest of the same. Sir Robert Peel, 2 nd
Baronet Prime Menister of England created the modern concept of
the Police Force, based at Scotland Yard in England. Scotland Yard’s
crime database is called ( HOLMES ) Home Office Large Major
Enquiry System- its training program is called “ Elementary “ in honor
of the famous fictional detective Sherlock Holmes.
 The Federal Bureau of Investigation ( FBI ) – The FBI has motu
Propiu Investigative Jurisdiction over violations of more than 200
categories of Federal Crimes, making the FBI the De Facto lead law
enforcement agency of the United States government. It has been
established in 1908 and designated as the investigative arm of the US
Department of Justice, Under the leadership of John Edgar Hoover, it
was vested with the responsibility of handling domestic intelligence
of the United states. It headquarters located in Washington, DC, USA
 National Bureau of Investigation – ( NBI ) – established primarily for
the purpose of handling scientific and modern investigation of
crimes. It was formerly “ Bureau of Investigation : created under RA-
157 – passed into Law last June 19, 1947. It is the equivalent
organization of the FBI in the Philippines
 Federal Security Service – ( FSB ) – it is the leading police secret
police organization of the Russian Federation and main successor of
the Soviet Checka, NKVD and KGB. FSB – is engaged mostly in
domestic affairs and is responsible for internal security of the Russian
state, counter-espionage, and the fight against organized crime,
terrorism, and drug smuggling.
 INTERPOL – ( International Police Organization ) – it serves as the
clearing house of records that provides communicating information
from the Police force of one country to those of another.

11- In terms in the military Intelligence history, Why Frederick, the


Prussian General called as the Father of Organized Military
Intelligence?
ANSWER :
 He is the Military General notable and the first classification of Spies
in the early intelligence community and being a realistic, cynic, and
an absolute monarch overlooked his fourth classification without
considering what is known today as the Patriot spy. Threats and
bribes, promises of promotion and gain were the inducement used
by spymaster during Frederick time.

12- State in details the notable and yet simple but effective intelligence
work of Alexander the great that lead him to the discovery from
possible disaffection among his allies and mercenaries?
ANSWER :
 To find out the truth of the rumors from the disaffection among his
allies and mercenary, he announced to his men that was writing
home and was sending couriers to deliver the letters. He encouraged
them to do the same. When the couriers were about to depart from
Greece, He recalled them and secretly read the letters. He discovered
the legitimate causes of their grievances, made some reforms and
thereby improved the morale of his men.

13- Why Marcus Lucinius Crassus of Rome and his Fire Brigade had
been a part of the early military intelligence History?
ANSWER :
 The intelligence service of Crassus was well-organized and skillfully
operated. When they were not on call for fire, they were devoted to
gathering of evidence about cases that Crassus used in the courts of
Law. Crassus thus became a multimillionaire, an underworld power
as well as a plutocrat in an ancient Rome.

14- Discuss briefly the Intelligence worked of Genghis Khan that lead
him to be the founder of Mongolian empire?
ANSWER :
 This great leader achieved his victories in war not only because of the
untamed fury of his hordes, But through careful planning and
organization based on intelligence. Every campaign was based on
intelligence gathered by his vast army of spies. His agents disguised
as horsemen rode along routes provided with rest houses and
replacement horses. Their reports were given to trusted Captains
who were directly under the great Khan.

15- In the Pre-Modern Time of an Intelligence History, Why Joseph


Fouche, became one of the most feared and respected intelligence
directors in the history of France?
ANSWER :
 He created a network of agents that knew almost everything anyone
did or was about to do. His assistant invented the modern system of
spying on spies, which honours its originator with its generally
accepted French title “Contre-espionage” or Counter espionage and
they often employed a disreputable device known as the “Test of
Fedility”.
POLICE INTEL PREP FOR MID-TERM
LEA-4 : POLICE INTELLIGENCE AND SECRET SERVICE

01- What are the immediate areas of interest in Police Intelligence?


Answer :
 Crime prone communities with sufficient infestation of vices,
organize crimes, juvenile delinquency, and indications of insurgent
and subversive element;
 Matters in connection with personnel security, communication
security, document security, VIP security and physical security;
 Pending cases under investigation whether criminal, civil or
administrative in nature;
 Identifies personalities connected with syndicates and organized
crimes;
 Crime prevention and control;
 Aspects of management for planning, funds, equipment for
organization efficiency.

02- Enumerate types of police intelligence


Answer :
 Police Strategic Intelligence – is processed information, which is long
range in nature. It is usually used to define, described the criminals
and their activities as well as provide an insight of their modus
operandi. Although its value is not considered immediate in nature,
such information maybe utilized to develop specific methods to deter
and interrupt criminal trends;
 Police Line Intelligence – An intelligence data that is immediate in
nature. Such information must be updated; factual and concise so as
to provide effective aids in police operations;
 Police Counter Intelligence - It is an activity, which is intended to
build an organization against the enemy by ensuring loyalty of its
members through stringent background investigation. Designed to
thwart attempts and neutralize penetration activities, this endeavor
will ensure integrity among members of the police intelligence
community.
03- Explain further the Purposes of Police Intelligence
Answer :
 Effect the arrest of criminal offenders and provide evidence to assist
the prosecution in their convection;
 Identify criminal and subversive elements as well as their associates;
 Check the conditions of the community relating to crimes, vices and
juvenile delinquency to help in crime prevention and control;
 Check on security condition of PNP personnel, funds, equipment and
materials;
 Check on the effectiveness of the operations of PNP forces; And
 Serves as an indispensable tool for policy making and management
planning of the organization

04- Discuss and explain the Principles of sound Intelligence


Answer :
 Police Intelligence and Operations must go hand in hand and are
always interdependent;
 Police Intelligence must be useful either for present or future needs;
 Intelligence must be readily available when required;
 Intelligence operation must be flexible, innovative, imaginative and
must always have foresight; And
 Intelligence procured must be secured to protect the information,
source, agent and the organization

05- What are the three ( 3 ) major sources of Agents?


Answer :
 The university world, where students are sought and trained for
intelligence careers;
 The Armed services and Police forces, where some degree of
intelligence know-how may already have been attained; And
 The Underground World of espionage, which produces and
assortment of persons, including criminal informers, which applicable
experience.

06- In terms of Intelligence personnel, define AGENT?


Answer :
 An undercover operative that detect, observe, infiltrate and gather
information regarding a particular target

07- In terms of an Intelligence Team, which are the Specialized Agent,


Translator Team, and the Photo Interpreter. What are their specific
functions?
Answer :
 Interrogation of criminals and interview of civilians
 Translation of documents
 Interpretation of documents and photographs

08- Explain the phases of recruitment


 Selection – process of choosing from available personnel the most
qualified operative fitted for police intelligence work
 Investigation – the process of determining the degree of
qualification, personal background of prospective agents
 Testing – a series of actual and theoretical assignment to determine
the intellectual capacity of the prospect
 Appointment – issuance of order as an operative agent in a certain
unit

09- What are the essential qualities of an Intelligence Agent


Answer :
 Unquestioned loyalty to the state and the allegiance to the
constitution
 Integrity and honesty indicating uprightness of character
 Good moral character
 Respect to authority and superiors
 Common sense and wise use of judgment
 Self – discipline
 Good people skills
 Self confidence and inherent fortitude

10- What are the components of the Central Intelligence Service


Answer :
 Information Procurement Division – It is further divided into the
Intelligence proper, Secret Intelligence and Intelligence Operation
Units.
 Evaluation and Distribution Division – This units takes care of the
publication of intelligence reports, determination of reliability and
accuracy of procured information and transcript of investigation and
its evaluation.
 Administrative Division – It is composed of the management service,
training and indoctrination units and communication maintenance
11- What are functions of the Intelligence Proper Unit
Answer :
 Research and Analysis
 Monitoring foreign broadcast
 Study of both local and foreign printed materials
 Liaison with other agencies collecting information
 Interrogation and debriefing

12- And what are the functions of the Secret Service


Answer :
 Acquisition of confidential matters
 Undercover work and surveillance
 Espionage

13- Enumerate the function of the Intelligence Operation


Answer :
 Sabotage
 Counter Intelligence Operation
 Security of VIPs

14- In terms of world’s Intelligence, espionage, and counter intelligence


and covert action program, What are the three ( 3 ) distinct organizational
patterns
Answer :
 The American Intelligence
 The totalitarian ( exemplified by communist regime )
 British System ( Parliamentary )
15- What are the Philippines Intelligence Organization
Answer :
 Bureau of Immigration and Deportation ( Intel Unit )
 DND, Intel Unit
 Intel Scty Group
 ISAFP
 J-2 Coordinating center
 Military Intelligence
 NBI
 NICA
 PNP, Intel Units

16- Define Counter Intelligence


ANSWER :
 This is an aspect of intelligence relating to all security control
measures, both active and passive, designed to measure the
safeguarding of information, personnel, equipment, and installation
against espionage, sabotage, or subversive activities of foreign
powers and disaffected or dissidents groups or individuals which
constitute a threat to National Security

17- Define Security


ANSWER :
 It is the protection of classified information, materials and equipment
for disclosure to unauthorized person against sabotage, espionage,
and subversion

18- Counter Intelligence is otherwise known as the Security aspect of


intelligence, That consist of What kind Security?
ANSWER :
 Physical Security – It is the protection of the organization against
physical intrusion of its facilities, offices, buildings, plants or
installation. EXAMPLEs of this type are : Natural Barriers, Man-made
Barriers, Electronic Barriers, the guarding system, Lighting system etc
 Document or Information Security – It deals with the handling,
processing, and dissemination of classified documents or information
19- What are the scope of the Counter Intelligence?
ANSWER :
 Counter Intel Investigation
 Counter Intel Service
 Counter Intel Service and Inspection

20- Enumerate the Basic Principles of Counter Intelligence


ANSWER :
 Conformance to mission
 Avoidance to publicity
 Objectivity
 Confirmation
 Offensive action
 Flexibility
 Continuity
 Coordination
21- What are the Basic Investigative techniques in Counter Intelligence?
ANSWER :
 Records and Management
 Interview and interrogation
 Surveillance
 Raids and Searches

INTELLIGENCE CYCLE/POL INTEL OPN/SURVEILLLANCE


PRE – FINAL FOR POLICE INTELLIGENCE

01-How will you explain the word “INFORMATION” in the Intelligence Cycle
Answer :
 It is the bloodline or main source of intelligence that would
include any such as, maps; materials; documents; reports of
possible or actual enemy positions. It may consist of an organized
or unorganized data, which may be positive or negative pieces of
facts. It is communicated knowledge obtained by study,
observation, research and analysis.
02-What are the Four ( 4 ) processes of an Intelligence Cycle
Answer :
 Collection of Information
 Processing of Information
 Dissemination and use of an Intelligence
 Direction of the Collection Effort

03-What are the Police Routine activities which are good sources of
information
Answer :
 Patrol
 Use of informants
 Criminal Investigations
 Community Relation Programs
 Checkpoints
 Search and Seizures
 Surveillance Operations
 Coordination with other government/law enforcement agencies
both local and foreign

04-Methods of Collection of Information


Answer :
 Covert Method – This is clandestine or secret means of obtaining
information this would include the following activities:
a- Infiltration – gradual penetration into enemy domain and
territory
b- Surveillance by utilizing satellite, photo, audio, electronic
gadgets and advance communications systems
c- Elicitation made through interview, interrogation and
instrumentation

 Overt Method – It is the collection of information in the open by


means of Government Records, Census and statistics, residential,
commercial, and business listings, other printed materials
available to the public, internet and interview
05-What are those samples of Covert Equipment used by undercover /
intelligence officer in gathering vital info
Answer :
 Body wire and Voice transmitter
 Tracking device
 Surveillance Vans
 Low light photography equipment
 Covert packages
 Audio electronic devices

06-Enumerate some kinds of informants


Answer :
 Ordinary Informants
 Mercenary Informants
 Rival elimination informants
 Double cross informants
 Voluntary Informants
 Self aggrandizing informants
 Confidential Informants

07-What are the motives of informants in giving information


Answer :
 Vanity – This informant often takes matters into his own hands.
This may result in the compromise of the case and may endanger
the life or safety of the intelligence agent. This informant is
primarily motivated by greed.
 Civic Mindedness – This is altruism, they are motivated by
unselfish regard for or devotion to the welfare of others
 Fear – An informant who anticipate danger to himself or his
family cooperates with law enforcement officers to keep him
away from harm
 Revenge – a strong motive which causes one individual aligning
against his closest and most intimate association. Usually
characterized by hatred.
 Repentance - The desire to repay society for past transgressions
usually occurs with such informants
 Renumeration - mercenary informants engage in giving
information with financial reward or monetary consideration.
They are the most dangerous because they sell information to the
highest bidders and often work as double informants to both
sides.
 Perversity – their purpose is to eliminate competition, set-up
decoys, learn the nature of police intelligence activities and
distract the efforts in intelligence gathering
 Jealousy
 Avoidance of Punishment

08-How will you explain good informant management in general


Answer :
 The primary consideration in the informant management is
establishing good rapport, harmony and trust of the informant. As
a general rule never divulge the identity of the confidential
informant. This is not only an ethical practice but also a sound
principle to safeguard the life of the source and ultimately gain
their trust and confidence

09-Condition to safeguard the identity of the informant


Answer :
 Identity of informants should not be disclosed unless absolutely
necessary and only to proper authorities
 Identity of the confidential informants is kept secret to all persons
except the agent”s commanding officer
 Confidential informants should not be asked to testify in court
 Officer charged with supervision with criminal investigation
activities will take necessary precautions to avoid compromise of
information and sources of information considered confidential

10-Treatment of Informants
Answer :
 Treat them fairly regardless of character education and
occupation
 Run the show, do not allow informants to take over the
investigation
 Be scrupulously exact in all transactions
 Keep your promise to avoid loss of informants
 Avoid using informants in court
 Conceal informants identity
 Accept all information at face value, it should be checked and
included, it may be of use in the future it not for the present

11-What are the Processing of information


Answer :
 It is a processes through which information is managed
 It can increases our knowledge of a particular problem and
situation
 Results in preventive and informed public policy

12-Define Processing
Answer :
 Is a step by which the intelligence is transformed from raw facts
or materials to intelligence data.

13-Three ways in processing Intelligence data


Answer :
 Collation would entail the recording or organization of raw
materials so that they may be readily compared to other items. It
involves the grouping of records so that related items may be
readily compared, studied and reported.
 Evaluation refers to the examination of raw materials in order to
determine its reliability, credibility and relevance to police
operations
 Interpretation is the determination of the significance of the
intelligence data in relation to other data at hand in order to draw
conclusion. This undergoes three procedures

14-Four means which an Intelligence Officer may collate information


Answer :
 Intelligence Journal
 Enemy situation map
 Intelligence Worksheet
 Intelligence File

15-In Terms of evaluation processes what are those some important


considerations to be undertaken
Answer :
 Is the gathered information needed for immediate purposes or in
the future time?
 Is the source reliable?
 Under the given circumstances is it possible to obtain such
information?
 Is it confirmed and collaborated by other sources
 If variance should be observed, which piece of information is
more likely to be correct?

16-What are different Evaluation Code, According to Reliability of Source


Completely Reliable
Usually reliable
Fairly reliable
Not usually reliable
Unreliable
Reliability unknown

1- According to Credibility of Information


Confirmed by other sources
Probably true
Possibly true
Doubtfully true
Improbable report
Truth cannot be judged

2- According to the source of Information


T - Direct observation by the unit Commander
U - Report made by the Intelligence Agents
V - Report rendered by the military or law enforcement personnel
W - result of interrogation
X - Observation of any government civilian employee
Y/Z - Obtained from documents
17-What are the Three ( 3 ) distinct procedure in terms of Intelligence
interpretation processes
Answer :
 Analysis – it is done by shifting and sorting of all available
intelligence materials
 Integration – It is the combination of all analyzed data to form a
logical picture or theory
 Deduction – it is the formulation of conclusion from theories as a
result of integration

18-Methods of Dissemination
Answer :
 Personal Contact
 Special messages / Encrypted or Coded
 Conferences / Staff meetings
 Situation Maps
 Intelligence Documents / Directives / Requests

19-What are the features and important elements of collection effort


Answer :
 The essential elements of information needed
 The collection plan including choosing the personnel
 The implementation process by issuance of necessary orders
 Supervision and follow-up

20-State the Essential Elements of Information


Answer :
 The available lines of actions target, subject or enemy may adopt
which will interfere with or favor the accomplishment of the
mission
 The next major decision which can be foreseen at present and
additional information needed to decide ( Alternate or back-up
plan )
 Information pertaining to the situation confronting the unit
requested by adjacent or higher command
21-Enumerate types of police intelligence
Answer :
 Police Strategic Intelligence – is processed information, which is long
range in nature. It is usually used to define, described the criminals
and their activities as well as provide an insight of their modus
operandi. Although its value is not considered immediate in nature,
such information maybe utilized to develop specific methods to deter
and interrupt criminal trends;
 Police Line Intelligence – An intelligence data that is immediate in
nature. Such information must be updated; factual and concise so as
to provide effective aids in police operations;
 Police Counter Intelligence - It is an activity, which is intended to
build an organization against the enemy by ensuring loyalty of its
members through stringent background investigation. Designed to
thwart attempts and neutralize penetration activities, this endeavor
will ensure integrity among members of POLICE INTELLIGENCE
COMMUNITY.

22-In terms of Counter Intelligence, Define Physical and Document or


Information Security?
ANSWER :
 Physical Security – This is the protection of the organization against
physical intrusion of its facilities, offices, buildings, plants or
installations.
 Document or Information Security- This deals with the handling,
processing, and dissemination of classified documents or information

23-In terms of Police Intelligence Operations, Define the following


ANSWER :
 SURVEILLANCE- It is covert or secret observation of a person, vehicle,
place, building, house, installation, or activities wherein the identity
of the observer is protected against discovery by the subject or from
the public’s eye.. . . .It is also known in the police parlance as “
Shadowing “ or tailing because the most common application is
observation by following the movement of person or vehicles
 CASING – This is the observation upon a place, an area, a building, an
installation, or stationary object in order to gather information on
the subject.

 UNDERCOVER OPERATION – This is a form of surveillance or


investigative technique wherein the investigator discard his true
identity and assumed another one and makes direct contact with the
person, place, or situation under investigative or joins the target
organization.

 DEEP PENETRATION – This is a type of under- cover operation in


which techniques are applied continuously and not over a limited
period of time.

 USE OF PHOTGRAPHIC EQUIPMENT – Night vision cameras, infra-red


films or infra-red photography and used telephoto lenses or other
sophisticated photographic equipment to take or record pictures of
persons or activities or other objects of interest necessary in the
investigation

 SURREPTITIOUS ENTRY – This is a type of intelligence operation


wherein the place is entered secretly by an agent or agents without
the knowledge of the owner or occupants.

 WIRETAPPING/ELECTRONIC SURVEILLANCE – This is done to listen to


conversation without the knowledge of the subject of investigation
 USE OF RADAR /SONAR - It is used to detect or monitor flying objects
while sonar are used to detect movements underwater
 CRYPT ANALYSIS –This is a method of intelligence operation wherein
coded messages are analyzed by experts. This is discuss in a separate
chapter under cryptography
 CENSORSHIP – This method of intelligence operation is done by
opening secretly letter secretly to and from the subject of
investigation without their knowledge that information was breach.
 DOCUMENT EXPLOITATION – This is a mode of intelligence operation
wherein documents gathered or taken from the subject or target
organization are collated, analyzed, interpreted, and evaluated for
immediate or future use.

FINAL FOR POLICE INTELLEGENCE AND POLICE SECRET SERVICE


01- Define Document
Answer :
 The term document covers any form of recorded information
either printed, written, drawn, painted, sound recording, films,
maps, etc., which are relied upon to prove or support or to be
utilized as reference.

02- In terms of classification of documents and safe keeping, What is


the object of the intelligence organization
Answer :
 The object in any intelligence organization is to secure and
control the sensitive information contained therein from loss,
access to unauthorized persons or disclosure so as not to
prejudice the firm, company or agency

03- What are the Basic Documents in the field of Intelligence


Answer :
 Intelligence Journal – It is simply a day book or log of the
activities of an intelligence officer during a particular period or
specific mission
 Enemy Situation Map – it contains information regarding enemy
disposition, location and terrain information and deployment
 Intelligence work sheet –It is an indexed memorandum pad for
recording of information regarding the enemy, its movement,
location and anticipated actions
 Intelligence Files – it consists of the following
1- Order of Battle file
2- Journal file
3- Enemy document map
4- Map and photo file ( Rouge Gallery )
5- Information file ( MO files )

04- State in details the Document Security Classification


Answer :
 Class 1 : Vital/Top Secret documents. They are considered
irreplaceable official matters the unauthorized disclosure of
which would cause exceptionally grave damage to the interest of
an establishment since it is important to its survival
 Class 11 : Important / Confidential Documents. The loss or
damage of which will pose a threat to operations. The
reproduction of said documents will cause a delay and would
entail a considerable expense on the part of the collecting
agency
 Class 111 : Useful / Secret Documents. Contains operational
procedures guidelines, wherein loss or compromise would
hamper operations but can be readily restored
 Class 1V : Restricted Documents. These refers to duly processed
intelligence reports not made available for public consumption

05- Explain the Requisites of Secret Information


Answer :
 It must be Identifiable
 It must not be available in public / commercial sources
 It must be disclosed by the owner to persons who are under
some duty to protect its secrecy
 The objective of the owner to indicate or manifest an attempt to
prevent its unauthorized disclosure

06- Explain and discuss in details the Information Cycle


Answer :
 This refers to the various stages from which information passes
from the time of its conception until is finally disposed of

07- In terms of Information Cycle, Explain in full context the following


terminology
Answer :
 Creation – Which refers to the action of causing something to
exist, to give rise or bring into being
 Use – it is the consumption for whatever purposes it may be
necessitated
 Storage – the act of putting aside and keeping secure
information for use when needed
 Retrieval – it implies recovery or retrieval or call to mind and use
of information contained either in documents, micro films or
computer memory
 Disposition –it refers to putting into order the documents or its
call to get rid of the contents therein

08- In terms of Handling Classified Security Matters, What are the


Dissemination of classified matters
Answer :
 The “ Need to Know Principle” classified matters should be
passed only to whom it is necessary for the fulfillment of their
duties
 Every organization with such confidential information should
insure that only authorized persons should decide and
determine the distribution of such matters
 Distribution of vital documents should be recorded and track
down
 Secret matters are as general rule not reproduce unless
instructions from higher authorities would be issued
 No classified information should be discussed in public, over the
telephone, radio and other venue or channel susceptible to
being observed and overheard by other persons or unsecured
locations.

09- Explain in details Transmission by “ Safe Hand Method”


Answer :
 it is dispatched to the addressee in the personal care of
authorized persons. It is delivered by utilizing the double
envelop system wherein the outer envelop should bear the
name of the addressee without security classification. A receipt
should be issued upon delivery of said documents. As rule
classified matters are not sent though fax, mail, sms, or e-mail

10- Discuss briefly what is custody of vital/Essential matters


Answer :
 All classified matters shall be covered with its corresponding
security classification and instruction whether Top Secret,
Secret, Confidential or Restricted to facilitate its storage. The
back portion is usually designed to show the record of
transmission of the document covered
 Vital matters contained in documents, micro, films, computer
chips, or other means are kept and secured using a least a
minimum of a three depth barrier system. It is place in a secured
facility, with animal, human and energy guarding system and
stored in vaults, safes file rooms wherein the key or combination
of locks is entrusted only to a small number of authorized
personnel

11- How information is lost


Answer :
 Information is seldom compromised through electronic bugging,
use of sophisticated equipment by industrial spies
 It can also be lost through negligence and inadvertent disclosure
by the owner of the establishment or person in authorized
possession
 It can also deliberately stolen by an insider or person trusted to
have access to it

12- How will you measures to fortify vulnerability of sensitive data


Answer :
 Documents generated with the organization must be scrutinized
and duly classified whether vital, important, useful or non-
essential
 The use storage receptacles should be practice particularly in
keeping classified matters
 Responsibility for information security must be defined,
assigned and disseminated
 Employees should be informed of company’s security policies
and corrective action should be immediately taken in cases of
noted deficiencies
 Precautions in safe guarding items used in printing of
confidential matters should be undertaken
 The used of codes in new items and products should be
practiced
 When discussing classified materials through telephones be
aware of the identity of the person whom you are talking. The
installation of anti-bugging equipment in sensitive or key office
should be considered
 A clean desk policy should be observed
 All statements, article, speechless pertaining to the identity of
the company should be properly screened before publication or
delivery

13- Explain what is Trade Secret


Answer :
 It may consist of any formula, device, pattern or compilation of
information which is used in one’s business and gives the user
advantage over competitors who do not utilized or know it.
Proprietary information and intellectual property are similar to
Trade Secrets

14- Define VIP Protection or Security


Answer :
 It also referred to as personal security, it utilized in the
protection of personnel especially high ranking officials, foreign
dignitaries, and prominent private individuals from harm,
kidnapping and other similar threats

15- What are the Goals of Security for VIP


Answer :
 To ensure the safety of the VIP and the personnel
 To prevent unauthorized access to installations, equipment,
documents and materials
 To protect facilities and documents from sabotage, espionage,
damage, theft or robbery
 To avoid humiliation or internal impediment and or compromise
16- What are the motives of assassination
Answer :
 Political
 Extortion
 Kidnapping
 Economic
 Hatred
 Revenge
 Greed
17- What consist of an Intelligence Files
Answer :
 Order of Battle file
 Journal file
 Enemy document map
 Map and phot file ( Rouge Gallery )
 Information file ( MO files )

18- What are the duties of VIP security in emergency situation


Answer :
 The primary duty is to attempt to cover the VIP as closely as
possible so as to effectively shield the VIP by placing themselves
between the VIP and the direction or source of threat or danger
 Second duty is to remove the VIP as quickly as possible from the
established attack or kill zone
 Neutralization is undertaken when the VIP is out of harm’s way
by tracing to locate, identity and capture alive if possible the
attackers

19- Kinds of Security Unit for VIP Protection


Answer :
 Person or Close-in Security
 Route Security
 Destination Security
 Residence Security
 Installation Security

20- What are the components of Ideal Convoy for VIP travel
Answer :
 Escort
 Counter attack/Recon Vehicle
 Decoy Vehicle
 Principal Vehicle
 Shield Vehicle
21- What are those measures adopted in securing VIP
Answer :
 Avoid establishing a pattern in route and frequency of your
movements to and from work/home and around town
 A thorough route plan should be established with details of all
adjacent and paralleled alternate routes
 Always travel in convoy, particularly when traveling long
distances. There is always safety in numbers
 Stay away from busy and heavily traveled thoroughfares
wherein a possible attack is easy to stage due to limited
movement of vehicles
 On multiple lane highways, it is wise to drive toward the center
to make it difficult to force the vehicle to the curb
 Avoid the use of vehicles to give the indication that the subject
riding it is a VIP
 Be sensitive to the possibility of surveillance before leaving the
principal’s home and office, check the streets for any suspicious
vehicles roaming around
 Do not discuss detailed travel plan within hearing of servants,
employees, staff and personnel not part of the security detail

22- What are the objective of the police undercover work


Answer :
 Obtain and gather evidences
 Procurement of Information
 Checking the identity of the informants
 Conduct of fixed surveillance activities on person
 Identification of an Organized Criminal activities
 Identification of subversive elements
 Penetration to insurgent networks or terrorist cells

23- State the qualifications of the Undercover agents


Answer :
 His skills and abilities acquired through training and experience
 Mental alertness
 Self-confidence
 Good discretion and judgment
 Photographic memory
 Resourcefulness
 Wit and tact
 Will power
 Patience
 Special qualifications, ( Loyalty, Integrity, Morals, Character,
Reputation )

You might also like