You are on page 1of 16

LEA 4: POLICE INTELLIGENCE whether in tents, or in strongholds; and what land is;

whether it be fat or lean, whether there be wood therein,


I. BASIC CONCEPTS or not. And be of good courage and bring of the fruit of
INTELLIGENCE the land.” The scriptures also named the twelve
intelligence agents whom the Lord directed Moses to sent
 The word INTELLIGENCE was derived from the
into the land of Canaan and records that “all those men
Latin word INTELLIGERE which means to "pick were heads of the children of Israel.”
out" or “discern”.
 A very general mental capability that, among other THE 12 MEN SENT BY MOSES TO SPY CANAAN
things, involves the ability to reason, plan, solve  Shammua the son of zaccur – tribe of reuben
problems, think abstractly, comprehend complex  Shapat the son of hori – tribe of simeon
ideas, learn quickly and learn from experience. -  Caleb the son of jephunneh – tribe of Judah
"MAINSTREAM SCIENCE ON INTELLIGENCE"  Igal the son of joseph – tribe of Issachar
(1994)  Hoshea the son of nun – tribe of Ephraim
 The capacity to meet situations, especially if new or  Palti the son of raphu – tribe of Benjamin
unforeseen, by a rapid and effective adjustment of  Gaddiel the son of sodi – tribe of zebulun
behavior; also, the native ability to grasp the  Gaddi the son of susi – tribe of joseph, that is from
significant factors of a complex problem or the tribe of Manasseh
situation.- WEBSTER COMPREHENSIVE  Ammiel the son of gemalli – tribe of dan
DICTIONARY  Sethur the son of michael – tribe of asher
 End product of information that has been subject to  Nahbi the son of vopshi – tribe of napthali
the intelligence process, which involves planning,  Geuel the son of machi – tribe of gad
direction, collection, evaluation, collation, analysis,
reporting, and dissemination - Royal Canadian B. Sun Tzu
Mounted Police (RCMP)
 He is traditionally believed to be the author of The
In Police Parlance, Intelligence is defined as: Art of War, an extremely influential ancient Chinese
 Organization- An institution composes of persons book on military strategy.
who pursue of preparing plans or formulating  “Know yourself and your enemy, if you know
policies. yourself and not the enemy for every battle you will
 Activity- The organized effort to collect be a foul who will meet defeats, but if you know
information, to assess it little by little, and piece it yourself and the enemy, you need not fear the
together until it forms larger and clear patterns. result of a hundred battles “. In his book "Art of
 Product- The end product resulting from the War.”
collection, evaluation, analysis, integration, and
interpretation of all available information which may C. Delilah
have immediate or potential significance to the  A biblical personality who was able to gain
development and execution of plan, policies and information by using her beauty and charm.
programs of the user.  She was responsible for the fall of Samson a
known Israelite leader who terrorized the
NATURE OF INTELLIGENCE FUNCTION Philistines.
 Intelligence is responsible in procuring and
obtaining political, economic, psychological, D. Sir Arthur Wellesly
sociological, military and other information which  One of the leading military and political figures of
may bear upon, national interest and which had the 19th century.
been collected by the different government and  He is often referred to as the "Duke of Wellington",
agencies. even after his death, even though there have been
 Intelligence is knowledge and powerful it can subsequent Dukes of Wellington.
prevent war and cause one it can help in crime  He is regarded as the "Greatest Military Spymaster
control and crime prevention. at All Time".
 He live by the motto; "All the business of war is to
II. HISTORICAL DEVELOPMENTS OF INTELLIGENCE find out what you don’t know by what you do."
The first intelligence operation recorded in history is  He always studied the enemy in depth, finding out
found in the Holy Bible. not only where the opposing army was and how
A. Number 13:17-32,Old Testament (Holy Bible) – strong it was, but the character of its commander,
Moses sent twelve (12) scouts to the land of Canaan the spirit and training of its troops, their battle
where he detected directed them to spy the land, the experience, and how they were supplied with arms
people and their location and the nature of their cities. and rations.
“And Moses sent them to spy out the land of Canaan and  He also studied and mapped the roads, rivers and
said unto them, get you up this way southward, and go up topography of the war theatre.
into the mountain; and see the lands, what it is; and the
people that dwell therein, whether they are strong or
weak, few or many; and what the land they dwelt in,
Page 1 of 16
E. Frederick the Great career are still practiced by various agencies in the
 "Father of Organized Military Espionage". He fight against crime.
divided his agents into four classes.  Member, New York Police Department in early
 Common Spies- recruited among poor folk, glad to 1900, he was the head of the Italian Squad.
earn a small sum or to accommodate a military  Through extensive intelligence network, he is
officer; credited to smash the Black Society.
 Double Spies- the low informers and unreliable
renegades of value chiefly in spreading false J. Joseph Fouche
information to the enemy;  The French statesman Joseph Fouche (1759 -
 Spies of Consequences - courtier and noblemen, 1820) served as minister of police under Napoleon
staff officers and kindred conspirators always and was influential in the return of Louis XVIII to the
requiring a considerable bribe or bat throne in 1815.
 Intimidated Spies - Persons who are forced to
undertake espionage against their will. K. Admiral Yamamoto
 He was a Japanese Marshal Admiral and the
F. Alexander the Great commander-in-chief of the Combined Fleet during
 A renowned Greek conqueror had his share of World War II, a graduate of the Imperial Japanese
advance information when rumors of discontent Naval Academy.
circulated from among the ranks of his men.  He was the commander-in-chief during the decisive
 He was able to identify those disloyal ones by early years of the Pacific War and so was
ordering the communication letters opened and responsible for major battles such as Pearl Harbor
was successful in curtailing the decline of esprit de and Midway.
corps and morale of his men.  April 1943, the Cryptanalysts of the U.S. Navy
Communications Intelligence interpreted a top
G. Sir Francis Walsingham of England secret signal relaying the travel of the Admiral En
 Protector of Queen Elizabeth I who organized the route ha was intercepted and crashed in the
secret police and established a spy network to Jungles of Baungainville.
detect fleet movement of enemies of the British  He died during an inspection tour of forward
Empire particularly the Portuguese. positions in the Solomon Islands when his aircraft
 He is regarded as the "First Great Spymaster", a (a Mitsubishi G4M "Betty" bomber) was shot down
ruthless in the cause, he was responsible for the during an ambush by American P-38 Lightning
assassination, murdering and execution of people fighter planes.
who covertly betrayed the queen.
 He oversaw operations that penetrated Spanish L. Herbert Yardley
military preparation, gathered intelligence from  He was an American cryptologist best known for
across Europe, disrupted a range of plots against his book The American Black Chamber.
Elizabeth, and secured the execution of Mary,  Yardley began his career as a code clerk in the
Queen of Scots. U.S. State Department. He accepted a Signal
Corps Reserve commission and served as a
H. Karl Schulmeister cryptologic officer with the American Expeditionary
 He was an Austrian double agent for France during Forces in France during World War I.
the reign of Napoleon I.  His career in cryptology began with his work in the
 He is famous as "Napoleon's Eye". code room, as he broke the U.S. government
 He acted as a General in Napoleon's army, codes that crossed his desk.
undertook espionage missions that took him into  Head of the MI-8, The forerunner of the Top Secret
England and Ireland, and was appointed National Security Administration a.k.a Black
commissioner of police for Vienna during Chamber, a Cryptanalytic Organization.
Napoleon's second occupation in 1809
 He was credited for establishing counter M. Napoleon Bonaparte
intelligence conducted against spies.  He was a French military and political leader who
 He is a master of deceit who used black mail to rose to prominence during the latter stages of the
obtain vital information pertaining to the personality French Revolution and its associated wars in
and identify of the enemies of Napoleon during the Europe.
18th Century.  has been a major influence on many civil law
jurisdictions worldwide, but he is best remembered
I. Joseph Petrosino for his role in the wars led against France by a
 He was a pioneer in the fight against organized series of coalitions, the so-called Napoleonic Wars.
crime.  "One Spy in the right place is worth 20,000 men in
 The various crime fighting techniques that the field".
Petrosino pioneered during his law enforcement

Page 2 of 16
N. Akbar  His treasons activities were discovered and
 Known as Akbar the Great, was Mughal compelled to commit suicide.
Emperor from 1556 until his death.  His spying led to the death of over 500,000 agents
 The "Great Mogul" and wise master of Hindustan and soldiers combined in his 13 years episode as a
employed more than 4,000 agents for the sole spy.
purpose of bringing him the truth that his throne
might rest upon it. T. Sir Samuel Luke
 Chief Scout of Oliver Cromwell who was able to
O. Battle of Midway dethrone King Charles I in British Civil War of
 It was one of the most important naval battles of 1640's.
the Pacific Campaign of World War II.  Sir Samuel Luke was said to be hard-working in
 In June 1442, the turning point of the Naval in the inquiring on the enemy.
Pacific, the victory gained by the Americans was
due to the disrupted messages from the Imperial U. John Churchill
Japanese Navy.  His leadership of the allied armies consolidated
 Military historian John Keegan called it "the most Britain's emergence as a front-rank power. He
stunning and decisive blow in the history of naval successfully maintained unity among the allies,
warfare." thereby demonstrating his diplomatic skills.
 It was Japan's worst naval defeat in 350 years.  He told critics of his enormous expenditure on
espionage that “No war can be conducted
Q. Julius Caesar successfully without early and good intelligence,
 During his time, the staff of each legion includes and such advices cannot be had but a very great
ten "speculators" who served as an information- expense
collecting agency.
 The "speculators" were the first intelligence V. Edward I
personnel to appear definitely in a military  Also known as Edward Longshanks and the
organization. Hammer of the Scots (Latin: Malleus Scotorum),
 Military success of the Romans was aided by was King of England from 1272 to 1307.
communication system, Made use of carrier  He was temperamental, and this, along with his
pigeons, which made possible the amazing speed height, made him an intimidating man, and he often
with which intelligence of the Imperial Rome was instilled fear in his contemporaries.
transmitted.  Modern historians are divided on their assessment
 They also employed ciphers to ensure secrecy of of the king: while some have praised him for his
communications. contribution to the law and administration, others
have criticised him for his uncompromising attitude
R. Wilhelm Johann Karl Eduard Steiber towards his nobility.
 Otto von Bismarck's master spy and director of the  He is credited with many accomplishments during
Prussian Feldgendarmerie. his reign, including restoring royal authority after
 Stieber was both an agent of domestic surveillance the reign of Henry III, establishing Parliament as a
and an external agent. permanent institution and thereby also a functional
 Along with Joseph Fouché, he invented modern system for raising taxes, and reforming the law
information gathering through statutes.
 He is known as the Prussia's "King of  An English monarch who started utilizing English
Sleuthhounds" as minister of police he studied the informants especially to determine seditious
use of propaganda and censorship as well as writings against the crown and identify
utilizing statistical intelligence accounting.
 Steiber's thorough organization and ruthless, his W. George Washington
sinister innovations and cold, calculating  As Grand Master mobilized the free masons of the
manipulation of human weakness made him the colonies at the outbreak of the American war of
spymaster who most shape the course of the 20th Independence.
century espionage.  First President of the United States (1789–1797),
the commander-in-chief of the Continental Army
S. Alfred Redl during the American Revolutionary War, and one of
 He was one of the leading figures of pre-World War the Founding Fathers of the United States.
I espionage.  Because of his strategy, Revolutionary forces
 His term in office was marked by innovation, and captured major British army’s at Saratoga in 1777
he used very high technology for the time to and Yorktown in 1781.
ensnare foreign intelligence agents  Historians praise Washington for his selection and
 A homosexual Double Spy who while working as supervision of his generals, encouragement of
intelligence direct proof Austria and Hungary, spied morale and ability to hold together the army,
the Russians. coordination with the state governors and state

Page 3 of 16
militia units, relations with Congress and attention interests while ensuring safety for the people of
to supplies, logistics, and training. Australia against national threats.

X. Hannibal B. Research and Analysis Wing (R&AW or RAW)


 He was a Punic Carthaginian military commander,  Research and Analysis Wing is India’s external
generally considered one of the greatest military intelligence agency.
commanders in history.  It was formed in September 1968 under the
 He was considered one of the brilliant military helmsman-ship of its first Director, R. N. Kao. Its
strategists in the history of military intelligence. creation was necessitated by the poor performance
 He had developed an effective intelligence system of the Intelligence Bureau (which then handled both
for 15 years in Rome. internal and external intelligence)
 He usually roam around the city often disguise  Its primary function is collection of external
himself as a beggar to gather first-hand intelligence, counter-terrorism and covert
information. operations.
 In addition, it is responsible for obtaining and
III. MOST OUTSTANDING INTELLIGENCE AGENCIES analyzing information about foreign governments,
INTELLIGENCE AGENCY corporations, and persons, in order to advise Indian
 It is a government agency responsible for the foreign policymakers.
collection, analysis or exploitation of information
and intelligence in support of law enforcement, C. General Directorate for External Security
national security, defense, and foreign policy  Directorate General for External Security is
objectives. France’s external intelligence agency.
 Effective instrument of a national power.  Operating under the direction of the French ministry
 Aggressive intelligence is its primary weapon to of defense, the agency works alongside the DCRI
destabilize the target. (the Central Directorate of Interior Intelligence) in
 Means of information gathering are both overt and providing intelligence and national security, notably
covert and may include espionage, by performing paramilitary and counterintelligence
communication, cooperation with other institutions, operations abroad.
and evaluation of public sources.  Its primary focus is to gather intelligence from
foreign sources to assist in military and strategic
Intelligence agencies can provide the following services decisions for the country.
for their national governments.  The agency employs more than five thousand
 Provision of analysis in areas relevant to national people.
security
 Give early warning of impending crises D. Federal Security Service of Russian Federation
 Inform national defense planning and military (FSD)
operations  The Federal Security Service of Russian
 Serve national and international crisis Federation (FSD) is the main domestic security
management by helping to discern the intentions of agency of the Russian Federation and the main
current or potential opponents successor agency of the Soviet-era Cheka, NKVD
 Inform national defense planning and military and KGB.
operations  The FSD is involved in counter-intelligence, internal
 Protect sensitive information secrets, both of their and border security, counter-terrorism, and
own sources and activities, and those of other state surveillance.
agencies  The FSD is responsible for internal security of the
 May act covertly to influence the outcome of events Russian state, counterespionage, and the fight
in favour of national interests, or against organized crime, terrorism, and drug
influence international security smuggling.
 Defense against the efforts of other national  The number of FSD personnel and its budget
intelligence agencies remain state secrets, although the budget was
reported to jump nearly 40% in 2006.
A. Australian Secret Intelligence Service (ASIS)
 Government intelligence of Australia which E. Bundesnachrichtendienst (BND)
is responsible for collecting foreign intelligence  The Bundesnachrichtendienst is the foreign
undertaking counter-intelligence activities and intelligence agency of the German government,
cooperation with other intelligence agencies  The BND acts as an early warning system to alert
overseas. the German government to threats to German
 Its primary responsibility is gathering intelligence interests from abroad.
from mainly Asian and Pacific interests using  It depends heavily on wiretapping and electronic
agents stationed in a wide variety of areas. surveillance of international communications.
 Its main purpose, as with most agencies, is to  It collects and evaluates information on a variety of
protect the country’s political and economic areas such as international terrorism, WMD
Page 4 of 16
proliferation and illegal transfer of technology, I. Mossad
organized crime, weapons and drug trafficking,  The Mossad is responsible for intelligence
money laundering, illegal migration and information collection and covert operations including
warfare. paramilitary activities.
 As Germany’s only overseas intelligence service,  It is one of the main entities in the Israeli
the BND gathers both military and civil intelligence. Intelligence Community, along with Aman (military
intelligence) and Shin Bet (internal security), but its
F. Ministry of State Security (MSS) director reports directly to the Prime Minister.
 Ministry of State Security is the security agency of
the People’s Republic of China. J. Inter-Services Intelligence (ISI)
 Article 4 of the Criminal Procedure Law gives the  With the lengthiest track record of success, the
MSS the same authority to arrest or detain people best know Intelligence so far on the scale of
as regular police for crimes involving state security records is ISI.
with identical supervision  The Inter-Services Intelligence was created as an
 One of the primary missions of the MSS is independent unit in 1948 in order to strengthen the
undoubtedly to gather foreign intelligence from performance of Pakistan’s Military Intelligence
targets in various countries overseas. during the Indo-Pakistani War of 1947.
 Many MSS agents are said to have operated in the  The best of its time, failed to counter ISI and
Greater China region. protect Soviet interests in Central Asia.
 It has protected its Nuclear Weapons since formed
G. Central Intelligence Agency (CIA) and it has foiled Indian attempts to attain ultimate
 It is an executive agency and reports directly to supremacy in the South-Asian theatres through
the Director of National Intelligence with internal destabilization of India. It is above All laws
responsibility for providing national in its host country Pakistan ‘A State, with in a
security intelligence assessment to senior United State’.
States policymakers.  Its personnel have never been caught on camera.
 A predecessor of the Office of Strategic Services  It is believed to have the highest number of agents
(OSS), which was formed in 1942 and renamed worldwide, close to 10,000.
CIA in 1947.
 CIA is the largest of the intelligence agencies and NATIONAL INTELLIGENCE COORDINATING AGENCY
is responsible for gathering data from other (NICA)
countries that could impact U.S. policy. It is the primary intelligence gathering and
 It is a civilian intelligence agency of the United analysis arm of the Philippine government, which is under
States government responsible for providing the Office of the National Security Adviser; NICA is in
national security intelligence to senior United charge of carrying out overt, covert,
States policymakers. and clandestine intelligence programs. Its motto
 The CIA also engages in covert activities at the is: "Knowledge is Safety”. Presently, NICA is in close
request of the President of the United States of coordination with the CIA, Mossad, Secret Intelligence
America. Service and intelligence services of ASEAN countries to
 It has failed to control terrorism activities including counter the threat of terrorism.
9/11, Not even a single top level Al-Qaeda leader The agency is led by a Director-General and is
captured own its own in the past 13 years –. assisted by a Deputy Director-General. The former
 Highly funded and technologically most advanced reports directly to the President. The NICA has a National
Intelligence set-up in the world. Intelligence Board that serves as an advisory board to the
 The First Director of the Agency was Rear Admiral Director-General before he would submit his findings to
Roscoe Hillenkoetter the President relating to national security matters
affecting the Philippines.
H. Secret Intelligence Service (SIS) MI-6
 The Secret Intelligence Service (SIS) supplies IV. PRINCIPLES OF INTELLIGENCE
the British Government with foreign intelligence. A. INTELLIGENCE AND OPERATION ARE
 It operates under the formal direction of the Joint INTERDEPENDENT
Intelligence Committee (JIC) alongside the  Intelligence provides valuable inputs for
internal Security Service (MI5), the Government effectiveness of police operation on the other hand
Communications Headquarters (GCHQ) and operation likewise is needed for continuity of
the Defense Intelligence (DI). intelligence activities.
 It is frequently referred to by the name MI6, a name  Operation and intelligence planners work hand and
used as a flag of convenience during the Second hand to attain greater degree of success in their
World War when it was known by many names. common effort.
 The existence of MI6 was not officially
acknowledged until 1994. B. INTELLIGENCE IS CONTINUOUS
 The basic principle of intelligence operations is that
intelligence activities follow a simple cycle, which is
Page 5 of 16
continuous at the same time that new information is C. MILITARY INTELLIGENCE – refers to the knowledge
being collected in response to direction, other by the military institution essential in the preparation and
information is being processed and intelligence is execution of military plans, policies and programs.
being used.
VI. INTELLIGENCE CYCLE
C. INTELLIGENCE MUST BE USEFUL
 It must serve the commander’s need and
requirements so that effort will not be wasted. PLANNING
 It should have an application and significance to
the operation.

D. INTELLIGENCE MUST BE AVAILABLE ON TIME


 Intelligence must be communicated to the decision
DISSEMINATION MISSION COLLECTION
maker at the appropriate time to permit its most
effective use.
 It must reach the user in time to serve as basis for
appropriate action. Intel data must be disseminated
on time because late arrival is as good as useless.
PROCCESSING

E. INTELLIGENCE OPERATIONS REQUIRES


IMAGINATION AND FORESIGHT
 The success of objective is paramount importance.
Intelligence personnel are reminded to refrain from Planning and Supervision of the Collection Effort
utilizing criminal elements in Intel operation.  The intelligence officer must have a thorough
 They must use their resourcefulness to obtain more knowledge of the available sources of information,
than what is normally. the collecting agencies and type of information the
latter can provide.
F. INTELLIGENCE MUST BE FLEXIBLE  He must understand the operations of the
 Intelligence Operations must be changeable command in order to provide the particular
according to the present situation, condition and intelligence required for success.
other factors, Intelligence Operations are based on  He must have a thorough knowledge of the tactics,
reason and sound judgment. organizations and characteristics of the enemy.
 Procedures which do not readily adapt to a given  He must be especially competent in the fields of
situation are generally discarded. surveillance, reconnaissance, counter-
reconnaissance, and acquisition of operations.
G. INTELLIGENCE REQUIRES CONTINUOUS
SECURITY MEASURES A. PLANNING AND DIRECTING THE COLLECTION
 Deny unauthorized personal information about EFFORTS
operation and intelligence product, its source and 1. Determination of Requirements
organization itself.  Enemy capabilities, including time, place, strength,
 In the handling of classified materials there or other details
should be a working balance between secrecy  Enemy vulnerabilities, including nature, extent,
and operational convenience performance and other details
 Enemy order of battle and factors
V. CATEGORIES OF INTELLIGENCE  Terrain, including natural and artificial obstacles
A. NATIONAL INTELLIGENCE- integrated product of  Weather
intelligence developed by all government departments  Information desired by higher, lower or adjacent
concerning the broad aspect of national policy and headquarters
national security.
 National Policy – specific courses of action to 2. Determination of the Priority Intelligence
achieve the national objectives. Requirement {PIR formerly Essential Elements of
 National Security – this relate to the protection and Information (EEI)}
preservation of military, economic and a productive  Is an item of intelligence or information of
strength of a country including the security of the characteristics of the area of operations and the
government and domestics and foreign affairs against enemy, which the commander feels he needs
espionage, sabotage and subversion. before he can reasonably arrive at a decision.

B. DEPARTMENT INTELLIGENCE – the intelligence 3. Establishment of Priorities


required by department or agencies of the government to  Priorities reflect the criticality of the need for the
execute its mission and discharge its responsibilities. particular information. No formula exists which can
automatically determine priorities. Such
determination is a matter of judgment.

Page 6 of 16
B. COLLECTION OF INFORMATION  To provide a background basis for briefings and
To successfully plan and perform the collection effort, the other required intelligence reports
intelligence officer must have thorough knowledge of the  To provide the basis for overlays which graphically
available sources of information and collecting agencies portray the enemy situation
and the type of information they can provide and consider  To assist in the determination of the patterns of
the following: movement of guerilla insurgent forces
 Determine collecting agency  To focus attention on possible intelligence gaps
 Send orders or request which require redirection of the collection effort
 Supervise collection efforts
 Use tools or technique in collection  Intelligence Workbook or Worksheet
 Ensure timely collection  Systematic arrangement by subject heading which
aids in the sorting, evaluation and interpretation of
FACTORS IN CHOOSING COLLECTION AGENTS information and in the preparation of intelligence
 Capability – agents placement or access to other reports
target  It can be maintained depending on the
 Multiplicity – more agents requirements of the unit
 Balance – number of agents needed in operation
 Suitability – consistent with primary mission  Intelligence Files
 It necessary to permit ready access to all available
C. PROCESSING THE COLLECTED INFORMATION information and not just the current ones
Five steps in processing collected information which is  These are usually special file that may be kept by
then converted into Intelligence the unit

1. Recording – is the reduction of information into 2. Evaluation


writing or some other form of graphical representation  Determination of the pertinence of the
and the arranging of this information into groups information to the operation, reliability of the
related items. source of or agency and the accuracy of the
information.
COMMON MEANS OF RECORDING  Process by which the intelligence officer makes
 Journal decisions about the information contained in a
 Permanent chronological record of reports & report
messages that have been received & transmitted
 Action taken in response, usually 24 hours Evaluation to Determine:
 Journal entries should reflect a) Pertinence
1. An accurate and concise statement of the message, The question of pertinence is one of the first
report, or event questions that must be answered
2. A notation as to the sender or individual making the 1. Is this information about any of the requirements that
reports, to include specific unit position I have? Does it pertain to any of the problems that I
3. The time of receipt or dispatch and method of must solve?
transmission 2. Is this information needed immediately? If so, who
needs it?
 Intelligence Situation Map 3. Is this information of present or future value? If so, to
 A temporary graphic display of the current whom?
dispositions and major activities of the enemy
 Information of the friendly forces on this map is b) Reliability – judging the source of information or
usually limited to boundaries agency
 Location of command posts of higher, lower and
adjacent units; and forward edge of the battle area c) Accuracy – truth of information
 The latest time at which an activity was observed or
the disposition confirmed should be indicated when Is it possible for the reported fact or event to
plotting enemy activities and dispositions have taken place?
 The intelligence Officer keeps the situation map or  Is the report consistent within itself?
overlay as simple as possible  Is the report confirmed or corroborated by
 He should use authorized conventional or standard information from different sources or agencies.
signs, symbols and abbreviations  If the report does not agree with information from
 Some of the primary intelligence uses of the other sources which one is more likely to be true
situation map are the following:
 To display the enemy disposition and situation
 To provide a basis for comparison in order to
determine the significance of newly received data
pertaining to the enemy

Page 7 of 16
EVALUATION GUIDE FOR COLECTED INFORMATION VII. POLICE INTELLIGENCE OPERATIONS
Reliability of Accuracy of POLICE INTELLIGENCE – The end product resulting
Information Information Source of the from the collection, evaluation, analysis, integration and
CODE: CODE: Information interpretation of all available information regarding the
CUFNUR CProPoDIT activities of criminals and other law violators for the
A 1 T – Direct Observation purpose of affecting their arrest, obtaining evidence, and
Completely Confirmed By by a commander or forestalling plan to commit crimes.
Reliable Other Sources Unit
B 2 U – Report by a A. CATEGORIES OF POLICE INTELLIGENCE
Usually Probably penetration or resident 1. STRATEGIC INTELLIGENCE – knowledge pertaining
Reliable True agent to the capabilities and vulnerabilities of a foreign nation,
C 3 V – Report by an AFP which is required by the National Planners for the
Fairly Possibly trooper or PNP formulation of an adequate National Defense in peace
Reliable True personnel in operation and forms the basis for, projected. This is intelligence
D 4 W – Interrogation of a information which is not immediate operational but rather
Not Usually Doubtfully captured enemy or long range.
Reliable True agent
E 5 X – Observation by a Components of Strategic Intelligence
Unreliable Improbable government or civilian  Political Intelligence – deals with Domestic and
employee or official Foreign affairs and relation of government operations;
F 6 Y – Observation by a  Basic Principles of the Government
Reliability Truth Cannot member of populace  Government Structures
Cannot Be Be Judged  Public Order and Safety
Z - Documentary  Subversion
Judged
 Intelligence and Security Organization
NOTE: You should LEARN BY HEART this Evaluation  Economic Intelligence – deals with the extent and
Guide utilization of Natural and Human resources to the
industrial potential of the Nations
3. Analysis – This is the stage in which the collected  Transportation and Telecommunication
information is subjected to review in order to satisfy Intelligence – concerned with the operations and
significant facts and derive conclusion there from. facilities not only the Military but also the Civilians.
 Sociological Intelligence – deals with the
4. Integration – The combination of the elements demographic and psychological aspects of groups of
isolated analysis with other known information related to people.
the operation.  Population and Manpower
 Characteristics of the People
5. Interpretation  Public Opinion – attitudes of the majority of
the people towards matters of public policy.
 Process of determining the significance of new  Education – based on literacy rate
information in the possible alternatives.  Biographical Intelligence – deals with individual
 The interpreter determines the significance of the
personalities who have actual possession of power
information as to the meaning of the interpreted
 Armed Forces Intelligence – deals with the armed
information.
forces of the Nation.
 Position of the Armed Forces – constitutional
D. Dissemination
and legal basis of its creation and actual role.
 Processed information or intelligence data are
 Organization and structure and territorial
disseminated to end users. disposition
 Common methods of disseminating Intel data are
 Military Manpower Recruitment
conferences, briefing and person to person
 Order of Battle- arrangement of military troops
exchanges.
for battle.
 Those in charge of the entire intelligence operation  Geographical Intelligence – deals with the natural as
must make it a point that intelligence gets into the
well as manmade features of the physical environment
hands of those who commissioned it and those who
of man considered from the point in view of military
needs it (whether they know that they need it or not)
operations.
 Using the intelligence, policy-makers come to
 Location – military and economic importance
decisions, decisions that may well carry with them the
 Size – measurement of which a nation can
need for more intelligence (and their trigger the
exchange space or time during war.
intelligence cycle again)
 Shape
 “Intelligence does no good at all if it simply
 Weather and Climate
languishes on an analyst's desk or in dust-
 Scientific Intelligence – deals with the progress of
collecting files”
the research and development as it affects the
 In this process, consider the factors of timeliness,
economic and military potential of a nation.
correctness and security.
Page 8 of 16
2. COUNTER - INTELLIGENCE – phase of intelligence livelihood projects, extent of enemy influence to the
covering the activity devoted in destroying the people.
effectiveness of hostile foreign activities and the  Weather – Visibility, Cloudy, Temperature,
protection of information against espionage, subversion Precipitation, Tactical capability, Enemy Vulnerability.
and sabotage. It also includes protection the organization  Enemy – Location of the enemy, Strength of the
itself. enemy, Disposition, Tactical Capability, Enemy
a. Types of Counter-Intelligence Vulnerability
 Passive CI Measures – protection of classified  Terrain – relief and drainage system, vegetation,
and sensitive information to the unauthorized surface material, Man – Made features.
through secrecy, communication security, and
other various safeguards. B. FUNCTIONAL CLASSIFICATIONS OF POLICE
 Active CI Measures – are those measures, INTELLIGENCE
which seek actively to block the enemies’ effort to  Criminal Intelligence (CRIMINT) – refers to the
gain information or engage in espionage, knowledge essential to the prevention of crimes and
subversion, and sabotage. the investigation, arrest, and prosecution of criminal
b. Concept of Counter - Intelligence offenders.
 Detection – knowing the clandestine operation of  Internal Security Intelligence (INSINT) – refers to
the enemy. the knowledge essential to the maintenance of
 Prevention – Application of CI measures to avoid peace and order.
enemy activities.  Public Safety Intelligence (PUSINT) – refers to the
 Neutralization – It is the containment of enemy knowledge essential to ensure the protection of lives
activities. and properties.
c. Objectives and importance of counter-intelligence
 It Denies information to the enemy VIII. METHODS AND TECHNIQUES OF COLLECTING
 It Reduces the risk of a command INFORMATION
 Aids in achieving surprises Information – All evaluated materials of every
 Increases the security of the command description including those derived from observation,
 Decreases the enemy ability to create reports, rumors, imagery, and other sources from which
information about the forces. intelligence is produced.
d. Activities and Function of Counter-Intelligence
 Protection of information against espionage TYPES OF AGENT USED IN COLLECTING OF
 Protection of personnel against subversion INFORMATION
 Protection of installations and materials against  Agent of Influence- Agent who uses authority to
sabotage gain information
e. Categories of Counter-Intelligence operation  Agent in Place- Agent who has been recruited
 Military Security – it encompasses the within a highly sensitive target
measures taken by a command to protect itself  Penetration Agent- Agent who have reached to
against espionage, enemy operation, sabotage, the enemy, gather information and able to get back
subversion or surprise. without being caught.
 Port boundary and Travel Security – has to do  Expendable Agent- Agent who leaks false
with the application of both military and civil information to the enemy.
security measures for counterintelligence control  Double Agent- An enemy agent, who has been
at point of entry and departure, international taken into custody, turned around and sent back
borders and boundaries. where he came from as an agent of his captors.
 Civil Security – it encompasses active and
passive counterintelligence measures affecting CLASSIFICATIONS OF SOURCES OF INFORMATION
the non-military nationals permanently or A. Open Sources – 99% of the information collected are
temporarily residing in an area under military coming from open sources or obtained from Overt
jurisdiction. Operation.
 Special Operations – counter subversion,
sabotage and espionage. Overt Operation – also known as Open Operation,
method of collecting information openly regardless the
3. LINE OR TACTICAL INTELLIGENCE – it is the subject is aware that we are collecting information,
intelligence information which directly contributes to the commonly is by use of clipping.
accomplishment of specific objectives and immediate in  Enemy Activities
nature, necessary for more effective police planning and  Captured Documents
operation.  Map
 Weather Forecast, Studies, Reports
INTEL INFORMATION TO BE DETERMINED IN LINE  Agencies
INTELLIGENCE (PWET)
 People – Living Condition of the people, sources of B. Close Sources – Only 1% of information are obtained
income, education of the people, government from clandestine operation.

Page 9 of 16
Covert Operation – also known as Clandestine  To check on source of information
Operation or Close Operation, method of collecting  To develop leads to vital information
information secretly or by using a cover without the  To confirm or deny allegations
knowledge of the subject.  To provide protection

ELEMENTS OF COVERT OPERATION TERMS TO PONDER IN SURVEILLANCE


1. Sponsor – directs the organization conducting the  Surveillant – is the plainclothes investigator assigned
clandestine activity. to make the observation.
2. Target – Person, place or things against which the  Subject – is who or what is observed. It can be a
clandestine activity is to be conducted. person, place, property, and vehicle, group of people,
3. Agent – It refers to a person who conducts the organization or object.
clandestine Operations to include Principal Agents,  Area Target Study – refers to area of operation of
Action Agents, and Support Agents. surveillance activities
 Principal Agent – Leader or management Agent in  Log – chronological records of activities that took
clandestine operation usually undertaken by the case place in the establishment under surveillance.
officer.  Safe house- Refers to a place where agents meet
 Action Agent – The who one who conducts the each other for purposes of de-briefing and reporting.
clandestine Operation that includes:  Live Drop- Refers to a place where agents or
 Espionage Agent – Agent who clandestinely procure informants leave their messages to the other Agents.
or collect information.  Decoy- A person or object used by the subject in
 Propagandist – Agents who molds the attitudes, attempt to elude Surveillant
opinions, and actions of an individual group or nation.  Convoy- An associate of the subject who follows him
 Saboteur – Agents who undertakes positive actions to detect surveillance.
against an unfriendly power, resulting in the loss of  Contact - Any person whom the subjects picks or
use temporarily or permanently of an article or others. deals with while he is under observation and identifies
 Guerilla – Agent who is a member of paramilitary the observer
group organized to harass the enemy in a hot war  Made – when subject under surveillance becomes
situation. aware that he is under observation and identifies the
 Strong Arm – Agent who is made to provide special observer also known as “ Burnt out”
protection during dangerous phase of clandestine  Lost – when the surveillant does not know the
operations. whereabouts of his subject or the subject had eluded
 Provocateur – Agent who induces an opponent to the surveillance.
act to his own detriment by discrediting himself or by
revealing his true purpose or identity. TYPES OF SURVEILLANCE
 Support Agent – Agent who is engaged in activities A. ACCORDING TO METHODS
which supports the clandestine operations and or the  Stationary Surveillance – also referred to as Fixed
action agent in his operations that includes the and Stakeout Surveillance – is used when you know
following: or suspect that a person is at or will come to a
 Surveillant – Agent who observes persons and known location when you suspect that stolen goods
places of operations of interest. are to be dropped or when informants have told you
 Investigator – Agent who undertake to procure that a crime is going to be committed.
information or things of clandestine operation.  Technical Surveillance – by the use of
 Procurer of Funds – Agent who obtain money when communications and electronics gadgets, system and
needed for operational use. equipment.
 Safe house Keeper – Agents who manages and  Moving Surveillance or Shadowing or tailing –
maintains a safe house for clandestine operations simply the act of following a person.
like meetings, safe heavens, training, briefing, and
debriefing. B. ACCORDING TO INTENSITY AND SENSITIVITY
 Communication Agent – Agent who is detailed as  Loose tail – employed where a general impression
securing of clandestine communications. of the subject’s habits and associates is required.
Employed also when the subject is a material witness
KINDS OF COVERT OPERATION and must be protected from harm or other
1. SURVEILLANCE – is the covert, discreet observation undesirable influences.
of people and places for the purpose of obtaining  Close tail – extreme precautions are taken against
information concerning the identities or activities of losing the subject is employed where constant
subjects. surveillance is necessary.
 Rough Shadowing – employed without special
OBJECTIVES OF SURVEILLANCE precautions, the subject maybe aware of the
 To identify persons involved in certain activities surveillance.
 To secure basis for securing search warrant
 To obtain detailed information about the nature,
scope of subjects activities

Page 10 of 16
Methods of shadowing  Map Reconnaissance – it may not sufficient but it can
 One man – Extremely difficult and should be produce a certain amount of usable information
avoided, if unavoidable keep subject in view at all  Research – more information can be acquired best
times. used with other methods.
 Two man – two agents are employed to follow the  Prior Information – those records in your file unit that
subject may provide valuable information.
 ABC method – reduces the risk of losing the subject,  Hearsay – Information usually gain by the person
affords greater security agents detection operating in the area and performing casing job.
 Progressive/ Leap from method – poor chances of
obtaining good results, agents are stations at a fixed BASIC PROCEDURES IN THE CONDUCT OF CASING
point assuming that subject followed the same  Preparation of general location map
general route each day.  Sketch of the adjoining establishment and prominent
 Combined foot-auto surveillance – employment of features
surveillant on foot and agents in an automobile.  Specific sketch or floor plan of main target
 Detailed features of inner portion of target and its
WHAT ARE THE THINGS SHOULD BE AVOIDED IN description
SURVEILLANCE  Photograph of the casing target (general to specific)
 Don’t meet the eye of the subject
 Don’t adopt a slinking, sleuthing, creeping 3. ELICITATION – The process of extracting information
manner from a person believes to be in possession of vital
 Don’t wear story book disguises information without his knowledge or suspicion.
 Don’t carry noticeable items
 Don’t greet fellow agents TRAITS ON WHICH ELICITATION IS BASED
 Don’t make entries in your notebook in public  It is a natural tendency for people to talk about
place matters that may or may not concern him directly.
 Don’t Spent money to much People also have a desire to correct the mistakes
of others and to express curiosity in things they are
ESSENTIAL REQUIREMENTS AND APPEARANCE not totally familiar with. Another tendency is the
 Always be alert desire to gossip.
 Be a good talker  There is a general inability to keep secrets.
 Be resourceful  There is a need to be recognized, particularly the
 Average size, built and general appearance lonely, neglected, vain, and those with feelings of
 Have no peculiarities in appearance inferiority.
 Should have perseverance and able to wait for  There is tendency to underestimate the importance
hours of the information imparted.
 There are habits derived from certain occupations
2. CASING – It is the careful inspection of a place or of advising, teaching, correcting, substantiating and
building to determine its suitability for a particular challenging.
operational purpose. It is also known as the  There is a tendency to be indiscrete when not in
RECONNAISSANCE or RECCE in Military term. control of one’s emotions.
 There is a tendency for professionals to share
PRINCIPLES IN CASING confidence or show off expertise to another of
 Know the best route to get there his/her profession.
 Know how to conduct yourself without attracting
attention TWO DEVICES IN THE CONDUCT OF ELICITATION
 Know what security hazards are in the area and APPROACH
how can they avoid or minimize. It is the process of setting people to start talking, or to
 Know the best route to extricate from the area. shift the direction of an existing conversation.

TYPES OF CASING TYPES OF APPROACH


 External – close observation and clear description of A. Flattery – people are susceptible to praise so use
an area, building or installation, particularly its these weaknesses as a way of approaching the subject
location, approaches and exits and its immediate for elicitation.
vicinity.  Teacher–Pupil Approach – the subject is
 Internal – close observation and clear description of treated as an authority than solicits his view point
the layout of a building, an office or a room etc. and opinion on a subject matter.
 Good Samaritan Approach – is the sincere and
METHODS OF CASING valid offers of help and assistance are made to
 Personal Reconnaissance – most effective method the subject
and will produced the most info since you know what  Kindred Soul Approach – The subject is placed
you’re looking for. in a pedestal having some specialized quality
then flatter him by showing enough concern for

Page 11 of 16
his welfare to pay special attention to his 4. Employment of Technical Means
employment.  Bugging – The use of an equipment or tool to listen
 Partial disagreement Approach – Seek to and record discreetly conversations of other people.
produce talking by the word “I’m sure if I fully  Wire Tapping - A method of collecting information
agree”. thru interception of telephone conversation.

B. Provocative Approach – this are designed to induce 5. Tactical Interrogation – The need for obtaining
the source to defend a position, or correct a wrong information of the highest degree of credibility taken on
impression. the minimum of time can be through interrogation which
 Teaser Bait Approach – The elicitor varies and dependent entirely on the situation.
accumulates sources of knowledge about a
particular subject to tempt the subject to give his INTERROGATION TECHNIQUE
views. TERMS TO PONDER
 Manhattan from Missouri Approach – The  Interrogator – person who does the questioning
elicitor adopts an unbelievable attitude above  Source – a person who for any reason submits
anything, he questions all the statements and information of intelligence interest usually on a
propositions. voluntary basis
 Joe Blow Approach – Is “I” know the answer to  Suspect – a person who for any reason believed to
everything approach, the elicitor adopts the be associated with prohibited activity
attitude of being approachable to any field.  Witness – any person who has direct knowledge of
 National Pride Approach – Nature propensity of facts concerning an event or activity
all persons to defend their country and its  Interrogee – any person who is subjected to the
policies. interrogation process in any of its forms and phases
 Interrogation report – an oral or written statement of
PROBES information by the questioning of in interrogee
A probe is an attempt to obtain more information after the
subject gives a vague, incomplete general response. A PHASES OF INTERROGATION
probe is used with an approach in order to sustain a  Planning and Preparation
conversation.  Approach (Meeting the Interrogee)
 Completion – By inserting bits of factual  Questioning
information on a particular topic, the source may  Termination
be influenced to confirm and further expand on  Recording
the topic.  Reporting
 Clarity – A request for additional information
where the source’s response is unclear. For 6. Observation and Description (ODEX)
example, “I agree, but what do you mean  Observation – a complete and accurate
by…….?” observation by an individual of his surroundings
 Hypothetical – Can be associated with a thought and encompasses the use of all the major sense
or idea expressed by the source. Many people to register and recognized its operational or Intel
who might not make a comment concerning an significance.
actual event may express an opinion on a  Description – the actual and factual reporting of
hypothetical situation. one’s observation of he reported sensory
 High Pressure Probe – it serves to pin down a experience recounted by another.
subject in a specific area or it may be used to
point out contradictions in what the subject has Psychologist estimate that approximately
said  85% of your knowledge is gathered through sight
 13% of your hearing
Guidelines in Conducting Elicitation:  2% of your other three senses
 Begin with a topic of mutual interest.
 LISTEN to the source and be PATIENT IX. COVER AND UNDERCOVER OPERATIONS
 Gradually steer the topics to the areas of interest.  Undercover Operations- also referred to as
 Use approaches and probes when the opportunity “Roping” Undercover is disguising one's own
arises. identity or using an assumed identity for the
 Exploit the topic until it begins to deteriorate. purposes of gaining the trust of an individual or
 Switch to an innocent subject before departing or organization to learn secret information or to gain
terminating the interview. the trust of targeted individuals in order to gain
 Leave an opening for future access. information or evidence.
 Record information when security considerations  Cover – It refers to the changing, forging or
allow. Do not take notes in the presence of the falsifying agent’s real personality including but not
source. Try to remember all the pertinent information limited to things, location, job, and others that will
discussed. be used in undercover assignment.

Page 12 of 16
 Cover Story – A biographical data through fictional and etiquette rules. So the resettling back into the
that will portray the personality of the agent he normal police role requires the coming off of old
assumed, a scenario to cover the operation. habits, language and dress. After working such free
 Cover Support – An agent assigned in target lifestyles, agents may have discipline problems or
areas with the primary mission of supporting the exhibit neurotic responses.
cover story.
 Maintenance of identity – Living a double life in a
IMPORTANCE OF COVER new environment presents many problems.
 Secrecy of Operation against enemy intelligence Undercover work is one of the most stressful jobs an
 Secrecy of Operation against friendly agencies who do agent can undertake. The largest cause of stress
not have the need to know identified is the separation of an agent from friends,
 Successful Accomplishment of the mission family and their normal environment. This simple
isolation can lead to depression and anxiety.
TYPES OF COVER
 Artificial – altering the background that will PLANNING UNDERCOVER ASSIGNMENT
correspond to the operation  Determine the level of which investigation is
 Multiple – Includes different cover intended.
 Natural – Actual or True Background.  Developing appropriate cover story and cover
 Selection of qualified personnel.
ORGANIZATIONAL COVER  Considerations of all undercover operations details
 An account consisting of biographical data which to include documentation
when adopted by individual will assume the  Briefing, coaching, and rehearsing.
personality he want to adopt.
SPECIAL QUALIFICATION OF UNDERCOVER AGENT
OBJECTIVES OF ORGANIZATIONAL COVER 1. Thorough knowledge of the area, the people and
1. To camouflage and protect operational personnel and customs were agent will operate
their activities. 2. Preferably single and unmarried
2. Protect installation in which clandestine activities are 3. Thorough knowledge of the language or dialect
based. spoken in the area of operation.

GUIDELINES TO ORGANIZATIONAL COVER USES AND TYPES OF UNDERCOVER ASSIGNMENT


 Organizational cover must appear to produce  Residential/Dwelling Assignment- It is related to the
something. neighborhood of the subject, where the agent will live
 Should device that not all personnel will work together as a new resident without making any suspicion. His
at the same time. mission is to make friends within its neighborhood and
 Cover should be devoted to mission. gather information regarding the subject and possibly
 Start with small organizational cover and provide room getting closer to the subject
for expansion as it continue to grow.  Social Assignment- The agent will gain access to the
subject by going to the different hang out places of the
GUIDELINES WHEN COVER AND subject and gather information like knowing how to
ORGANIZATIONAL COVER IS COMPROMISED drink socially without getting drunk.
In case cover is compromised, the following must be  Work Assignment- The agent will be employed
observed: where the subject work to acquire information. The
 move-out immediately agent must know his work and focus his mind set and
 start new facility for operations and develop it habit to his work assignment or getting employed
 build entirely new cover where the investigator can observe the activities of the
 use circuitous route and provide careful counter- subject at his place of work.
surveillance  Subversive Organization- This is the most
 Be patient, build slowly and carefully. dangerous of all the undercover assignment; the agent
will join the organization of the subject itself he must
If organizational cover is compromised, the following know the ideologies of the group and the actions while
are the things to be considered inside should conform to the organization to avoid any
 make a physical move or re-location suspicion.
 start new facility for old operation and let it grow  Personal Contact Assignment – the investigator
 use new personnel required to develop the friendship and trust of the
 let old personnel remain in place subject.
 Build entirely new cover identity.  Multiple Assignment – The investigator is tasked to
cover two (2) or more of the above specific
HAZARDS OF UNDERCOVER OPERATIONS assignments simultaneously, it can produce extensive
 Reintegration back into normal duty – Agents work information with minimum expenses but more prone to
their own hours, they are removed from direct compromise.
supervisory monitoring and they can ignore the dress

Page 13 of 16
OPERATIONAL SECURITY GUIDELINES ON  Frightened Informants – weakest link in criminal
UNDERCOVER ASSIGNMENTS chain, motivated by anxiety.
1. The agent’s appearance must be inconspicuous  Self-Aggrandizing – moves around the center of
2. The SUBJECT should cultivate the AGENT, rather criminals delight in surprising the police about bits of
than the reverse information.
3. Analyze SUBJECT and appeal to his ego, vanity  Mercenary – Information for sale needed something
and interest for exchange of information.
4. Obtain SUBJECT’S confidence (Rapport)  Double-Crosser – He wants to get more information
5. Play along with the SUBJECT’S plan from the police more than he gives.
6. Don’t be impatient, over-anxious or too eager  Women – Most dangerous
7. Don’t displayed more interest in statements or  Legitimate – operators of business desire to give
actions of the SUBJECT and of the SUBJECT’S information for legitimate reasons.
associates than is compatible with the cover story.
8. Don’t betray knowledge of the SUBJECT’S MOTIVES OF INFORMANTS
background which was gained from the preliminary  Vanity – conceited act/character of the criminal
investigation or files. resulting to self - betrayal or tantamount to guilt,
9. Don’t get involved with SUBJECT’S girlfriend. gaining favorable attention and importance by the
10. Don’t let any relations with SUBJECT incur enmity, police.
envy or jealousy of the SUBJECT’S associates.  Civic-mindedness – sense of duty and obligation to
11. Don’t become unnecessarily friendly with women assist the police.
12. Don’t overact the cover story.  Fear – A person under an illusion of oppression by
13. Don’t reveal more cover story details than enemies or of other impending danger.
necessary.  Repentance – One who has a change of heart and
14. Don’t carry weapons unless told to do so wishes to report a crime that is preying on his
15. Don’t make unexplainable trips or phone calls conscience.
16. Don’t maintain contact with personal friends or  Gratitude or gain – An expression of appreciation to
relatives obtain a privilege or an interest in the welfare of his
17. Don’t display money more than the amount family during his detention.
provided for by the cover story  Revenge – To settle a grudge due to settle a previous
18. Don’t reveal the true identity unless is a part of injury
preconceived plan  Jealousy – envious of the accomplishments or
19. Don’t drink intoxicating beverages if it can be possessions of another and wishes to humiliate him.
avoided.  Remuneration – a person who informs solely for the
20. Don’t assume the “big shot” attitude. An pecuniary or other material gain he is to receive.
outstanding characteristic will bring the AGENT
under scrutiny. STEPS IN RECRUTMENT OF INFORMANT
21. Beware of entrapment  Selection – to identify and recruit an informant who
REMEMBER: THE COMPROMISE OF YOUR TRUE has access to several subversive organizations,
IDENTITY COULD ENDANGER YOUR LIFE OR Access is the valuable factor in recruiting the potential
COMPROMISE THE MISSION. informant.
 Investigation – It must establish possible existing
XI. INFORMERS AND INFORMANTS motives as to this person might assist the officer, if
A. Informants – Any person who hand over information necessary conduct a Complete Background
to the agents which is relevant to the subject. The investigation to the possible informant.
informant may openly give the information clandestinely  Approach – it must be done in a place conducive to
and choose to remain anonymous. the possible informant, avoid places which might have
any probability of compromise, approach must be
Informant Net – It refers to a controlled group of people done in a foreign territory.
who worked through the direction of the agent handler.  Testing – It must commence with limited assignment,
with a gradual integration into more important mission.
PURPOSES OF INFORMANTS IN INTELLIGENCE
OPERATIONS TREATMENT OF INFORMANT
 Gain access to areas and targets inaccessible to  Avoid using derogatory terms in referring to informants
intelligence.  Avoid disclosing the real identity of the informant
 Provide anonymity to investigation and operation.  Protect the interest of the informant and consider all
 Increase the scope of area and target coverage. the information from known to unknown
 Consider all information from known to unknown
TYPES OF INFORMANTS information as valuable until proven otherwise.
 Anonymous – Unidentified or unknown informants  Express appreciation for all information received
 False Informant – reveals information of no regardless of its value
consequences, value or stuff connected within thin air.  Keep appointment on time even though informant may
not

Page 14 of 16
 Don’t get over anxious, be patient and take your time  It includes computerized encryption to protect
 Don’t become an informant’s informant. transmissions of data and messages
 Difficulty of printing and distributing codebooks under
 Informers – refers to any person who provides conditions of absolute secrecy
information to the agents in a regular basis regarding
to the subject they are either paid regularly or in base- PRINCIPLES OF CRPYTOGRAPHY
to-case basis.  The system should be, if not theoretically unbreakable,
unbreakable in practice.
XII. CRYPTOGRAPHY: CODES AND CIPHERS  The design of a system should not require secrecy
CRYPTOGRAPHY and compromise of the system should not
 It was derived from the Greek work “Kryptos” which inconvenience the correspondents.
means “secret” and “graphos” which means “writing”.  The key should be memorable without notes and
 It is defined as an art and science of codes and should be easily changeable
ciphers.  The cryptograms should be transmittable by telegraph
 This is done through the use of “Speech Inverter”  The apparatus or documents should be portable and
whereby essential speech frequencies are divide into operable by a single person
several ranges by filters then inverted to produce it  The system should be easy, neither requiring
scrambled speech when intercepted. knowledge of a long list of rules nor involving mental
strain.
TERMS TO PONDER
 Cryptanalysis – This is the process of converting XIII. SECURITY MEASURES & OPERATIONS IN
cryptograms into plain text without the key from a code RELATION TO INTELLIGENCE
book. A. Physical Security – The broadest type of security that
 Crypto Analyst – Refers to those persons who break is concerned with the physical measures designed to
intercepted codes. safeguard personnel and prevent unauthorized access to
 Cryptographer – It refers to a person who is highly equipment, facilities, materials, documents, and to protect
skilled in converting message from clear to them from espionage, sabotage, damage or theft
unintelligible forms by use of codes and cipher. B. Communication Security – The protection resulting
 Coding – It is the changing of message from plain from the application of various measures which prevent
clear text to unintelligible form also known as or delay the enemy or unauthorized person in gaining
“Encrypting”. information through communication. This includes
 Decoding – Transforming of coded message into transmission, cryptographic and physical security.
plain text also known as “Decrypting”. C. Document Security – Protection of documents,
 Plain text – also known as clear text, it is the original classified matters and vital records from loss, access to
communication to be scrambled or enciphered. unauthorized persons, damage, theft and compromise
 Cryptogram – also known as ciphertext, the product through proper storage and procedures.
of the enciphering process.  Classify – Assigning of Information or material to
one of the four security classification after
TYPES OF CRPTOGRAPHY determining that such information requires security
 Codes – it rely on code books, substitution of coded as prescribed by PNP regulation 200-012.
message to the code books.  Reclassify – The act of changing the assigned
 Stenography – It is a method of hiding the existence classification of a document or material.
of a message using tools.  Declassify – The removal of the security
 Ciphers – it include both computer generated ciphers classification from classified document or material.
and those created by encryption method  Upgrading – The process of assigning higher
 ROT1 – each letter of the alphabet is replaced with the category of document or information according to
following letter, so A is replaced with B, B is replaced the degree of security needed
with C, and so on. “ROT1” literally means “rotate 1  Compartmentation – The granting of access to
letter forward through the alphabet.” classified document or information only to properly
 Transposition – the letters are rearranged according cleared persons when such classified information is
to some predetermined rule or key. required in the performance of their official duties,
 Morse Code – Morse code is not a code but a cipher. and restricting it to specific physical confines when
Each letter of the alphabet, the digits 0-9, and certain feasible.
punctuation symbols, is replaced by a sequence of  Security Clearance – is the certification by a
short and long beeps, often called “dots and dashes.” responsible authority that the person describe is
A becomes “•-”, B becomes “-•••” and so on. cleared for access to classified matter at appropriate
level.
COMPLICATIONS OF CRPYTOGRAPHY 1. Interim Clearance – Effectivity Two (2) Years
 They are easy to decipher once they discovered the 2. Final Clearance – Effectivity Five (5) Years
codes
 They are usually impossible to read without the key
code book

Page 15 of 16
CATEGORIES OF CLASSIFIED MATTER (PNPR 200-
0121)
1. Top Secret (GREEN) – Top Secret documents calls
for the utmost degree of protection. Unauthorized
revelation of this materials and information would
cause extremely severe damage to the nation, politically,
economically, or militarily.
2. Secret (RED) - Unauthorized disclosure of this
documents or things may put at risk the nation
security, cause serious injury to the reputation of the
nation, the reproduction of which will be considerable cost
and labor, or significant delay
3. Confidential (BLUE) - Unauthorized revelation of
which may be injurious to the reputation of the
nation or governmental activity or would cause
administrative humiliation or unnecessary injury.
4. Restricted (BLACK) - This are information which
should not be published or communicated to anyone
except for official purposes, These records are daily files,
routine in nature even if lost or destroyed, will not affect
operation or administration.

D. Personnel Security – the sum total procedures


followed, inquiries conducted and criteria applied to
determine the work suitable to a particular applicant or
the retention or transfer of a particular employee.

Personnel Security Investigation – is an inquiry into the


character, reputation, discretion, integrity, morals and
loyalty of an individual in order to determine a person’s
suitability for appointment access to classified matter.

TYPES OF PSI
 Local Agency Check – Refers to the investigation
of the records and files of agency in the area of
principal residence of the individual being
investigated.
 National Agency Check – It consists of LAC
supplemented by investigation of the records and
files of the following agencies: PNP, ISAFP, NBI,
CSC, Bureau of Immigration and Deportation and
other agency
 Background Investigation – a check made on an
individual usually seeking employment through
subjects records in the police files, educational
institutions, place of residence, and former
employers.

Complete Background Investigation – it is a type of BI


which is more comprehensive, that consist of detailed
information regarding the subject.

Partial Background Investigation – It is a type of BI but


limited only to some of the circumstances of his personal
life which are deemed pertinent to the investigation.

Page 16 of 16

You might also like