Professional Documents
Culture Documents
Page 2 of 16
N. Akbar His treasons activities were discovered and
Known as Akbar the Great, was Mughal compelled to commit suicide.
Emperor from 1556 until his death. His spying led to the death of over 500,000 agents
The "Great Mogul" and wise master of Hindustan and soldiers combined in his 13 years episode as a
employed more than 4,000 agents for the sole spy.
purpose of bringing him the truth that his throne
might rest upon it. T. Sir Samuel Luke
Chief Scout of Oliver Cromwell who was able to
O. Battle of Midway dethrone King Charles I in British Civil War of
It was one of the most important naval battles of 1640's.
the Pacific Campaign of World War II. Sir Samuel Luke was said to be hard-working in
In June 1442, the turning point of the Naval in the inquiring on the enemy.
Pacific, the victory gained by the Americans was
due to the disrupted messages from the Imperial U. John Churchill
Japanese Navy. His leadership of the allied armies consolidated
Military historian John Keegan called it "the most Britain's emergence as a front-rank power. He
stunning and decisive blow in the history of naval successfully maintained unity among the allies,
warfare." thereby demonstrating his diplomatic skills.
It was Japan's worst naval defeat in 350 years. He told critics of his enormous expenditure on
espionage that “No war can be conducted
Q. Julius Caesar successfully without early and good intelligence,
During his time, the staff of each legion includes and such advices cannot be had but a very great
ten "speculators" who served as an information- expense
collecting agency.
The "speculators" were the first intelligence V. Edward I
personnel to appear definitely in a military Also known as Edward Longshanks and the
organization. Hammer of the Scots (Latin: Malleus Scotorum),
Military success of the Romans was aided by was King of England from 1272 to 1307.
communication system, Made use of carrier He was temperamental, and this, along with his
pigeons, which made possible the amazing speed height, made him an intimidating man, and he often
with which intelligence of the Imperial Rome was instilled fear in his contemporaries.
transmitted. Modern historians are divided on their assessment
They also employed ciphers to ensure secrecy of of the king: while some have praised him for his
communications. contribution to the law and administration, others
have criticised him for his uncompromising attitude
R. Wilhelm Johann Karl Eduard Steiber towards his nobility.
Otto von Bismarck's master spy and director of the He is credited with many accomplishments during
Prussian Feldgendarmerie. his reign, including restoring royal authority after
Stieber was both an agent of domestic surveillance the reign of Henry III, establishing Parliament as a
and an external agent. permanent institution and thereby also a functional
Along with Joseph Fouché, he invented modern system for raising taxes, and reforming the law
information gathering through statutes.
He is known as the Prussia's "King of An English monarch who started utilizing English
Sleuthhounds" as minister of police he studied the informants especially to determine seditious
use of propaganda and censorship as well as writings against the crown and identify
utilizing statistical intelligence accounting.
Steiber's thorough organization and ruthless, his W. George Washington
sinister innovations and cold, calculating As Grand Master mobilized the free masons of the
manipulation of human weakness made him the colonies at the outbreak of the American war of
spymaster who most shape the course of the 20th Independence.
century espionage. First President of the United States (1789–1797),
the commander-in-chief of the Continental Army
S. Alfred Redl during the American Revolutionary War, and one of
He was one of the leading figures of pre-World War the Founding Fathers of the United States.
I espionage. Because of his strategy, Revolutionary forces
His term in office was marked by innovation, and captured major British army’s at Saratoga in 1777
he used very high technology for the time to and Yorktown in 1781.
ensnare foreign intelligence agents Historians praise Washington for his selection and
A homosexual Double Spy who while working as supervision of his generals, encouragement of
intelligence direct proof Austria and Hungary, spied morale and ability to hold together the army,
the Russians. coordination with the state governors and state
Page 3 of 16
militia units, relations with Congress and attention interests while ensuring safety for the people of
to supplies, logistics, and training. Australia against national threats.
Page 6 of 16
B. COLLECTION OF INFORMATION To provide a background basis for briefings and
To successfully plan and perform the collection effort, the other required intelligence reports
intelligence officer must have thorough knowledge of the To provide the basis for overlays which graphically
available sources of information and collecting agencies portray the enemy situation
and the type of information they can provide and consider To assist in the determination of the patterns of
the following: movement of guerilla insurgent forces
Determine collecting agency To focus attention on possible intelligence gaps
Send orders or request which require redirection of the collection effort
Supervise collection efforts
Use tools or technique in collection Intelligence Workbook or Worksheet
Ensure timely collection Systematic arrangement by subject heading which
aids in the sorting, evaluation and interpretation of
FACTORS IN CHOOSING COLLECTION AGENTS information and in the preparation of intelligence
Capability – agents placement or access to other reports
target It can be maintained depending on the
Multiplicity – more agents requirements of the unit
Balance – number of agents needed in operation
Suitability – consistent with primary mission Intelligence Files
It necessary to permit ready access to all available
C. PROCESSING THE COLLECTED INFORMATION information and not just the current ones
Five steps in processing collected information which is These are usually special file that may be kept by
then converted into Intelligence the unit
Page 7 of 16
EVALUATION GUIDE FOR COLECTED INFORMATION VII. POLICE INTELLIGENCE OPERATIONS
Reliability of Accuracy of POLICE INTELLIGENCE – The end product resulting
Information Information Source of the from the collection, evaluation, analysis, integration and
CODE: CODE: Information interpretation of all available information regarding the
CUFNUR CProPoDIT activities of criminals and other law violators for the
A 1 T – Direct Observation purpose of affecting their arrest, obtaining evidence, and
Completely Confirmed By by a commander or forestalling plan to commit crimes.
Reliable Other Sources Unit
B 2 U – Report by a A. CATEGORIES OF POLICE INTELLIGENCE
Usually Probably penetration or resident 1. STRATEGIC INTELLIGENCE – knowledge pertaining
Reliable True agent to the capabilities and vulnerabilities of a foreign nation,
C 3 V – Report by an AFP which is required by the National Planners for the
Fairly Possibly trooper or PNP formulation of an adequate National Defense in peace
Reliable True personnel in operation and forms the basis for, projected. This is intelligence
D 4 W – Interrogation of a information which is not immediate operational but rather
Not Usually Doubtfully captured enemy or long range.
Reliable True agent
E 5 X – Observation by a Components of Strategic Intelligence
Unreliable Improbable government or civilian Political Intelligence – deals with Domestic and
employee or official Foreign affairs and relation of government operations;
F 6 Y – Observation by a Basic Principles of the Government
Reliability Truth Cannot member of populace Government Structures
Cannot Be Be Judged Public Order and Safety
Z - Documentary Subversion
Judged
Intelligence and Security Organization
NOTE: You should LEARN BY HEART this Evaluation Economic Intelligence – deals with the extent and
Guide utilization of Natural and Human resources to the
industrial potential of the Nations
3. Analysis – This is the stage in which the collected Transportation and Telecommunication
information is subjected to review in order to satisfy Intelligence – concerned with the operations and
significant facts and derive conclusion there from. facilities not only the Military but also the Civilians.
Sociological Intelligence – deals with the
4. Integration – The combination of the elements demographic and psychological aspects of groups of
isolated analysis with other known information related to people.
the operation. Population and Manpower
Characteristics of the People
5. Interpretation Public Opinion – attitudes of the majority of
the people towards matters of public policy.
Process of determining the significance of new Education – based on literacy rate
information in the possible alternatives. Biographical Intelligence – deals with individual
The interpreter determines the significance of the
personalities who have actual possession of power
information as to the meaning of the interpreted
Armed Forces Intelligence – deals with the armed
information.
forces of the Nation.
Position of the Armed Forces – constitutional
D. Dissemination
and legal basis of its creation and actual role.
Processed information or intelligence data are
Organization and structure and territorial
disseminated to end users. disposition
Common methods of disseminating Intel data are
Military Manpower Recruitment
conferences, briefing and person to person
Order of Battle- arrangement of military troops
exchanges.
for battle.
Those in charge of the entire intelligence operation Geographical Intelligence – deals with the natural as
must make it a point that intelligence gets into the
well as manmade features of the physical environment
hands of those who commissioned it and those who
of man considered from the point in view of military
needs it (whether they know that they need it or not)
operations.
Using the intelligence, policy-makers come to
Location – military and economic importance
decisions, decisions that may well carry with them the
Size – measurement of which a nation can
need for more intelligence (and their trigger the
exchange space or time during war.
intelligence cycle again)
Shape
“Intelligence does no good at all if it simply
Weather and Climate
languishes on an analyst's desk or in dust-
Scientific Intelligence – deals with the progress of
collecting files”
the research and development as it affects the
In this process, consider the factors of timeliness,
economic and military potential of a nation.
correctness and security.
Page 8 of 16
2. COUNTER - INTELLIGENCE – phase of intelligence livelihood projects, extent of enemy influence to the
covering the activity devoted in destroying the people.
effectiveness of hostile foreign activities and the Weather – Visibility, Cloudy, Temperature,
protection of information against espionage, subversion Precipitation, Tactical capability, Enemy Vulnerability.
and sabotage. It also includes protection the organization Enemy – Location of the enemy, Strength of the
itself. enemy, Disposition, Tactical Capability, Enemy
a. Types of Counter-Intelligence Vulnerability
Passive CI Measures – protection of classified Terrain – relief and drainage system, vegetation,
and sensitive information to the unauthorized surface material, Man – Made features.
through secrecy, communication security, and
other various safeguards. B. FUNCTIONAL CLASSIFICATIONS OF POLICE
Active CI Measures – are those measures, INTELLIGENCE
which seek actively to block the enemies’ effort to Criminal Intelligence (CRIMINT) – refers to the
gain information or engage in espionage, knowledge essential to the prevention of crimes and
subversion, and sabotage. the investigation, arrest, and prosecution of criminal
b. Concept of Counter - Intelligence offenders.
Detection – knowing the clandestine operation of Internal Security Intelligence (INSINT) – refers to
the enemy. the knowledge essential to the maintenance of
Prevention – Application of CI measures to avoid peace and order.
enemy activities. Public Safety Intelligence (PUSINT) – refers to the
Neutralization – It is the containment of enemy knowledge essential to ensure the protection of lives
activities. and properties.
c. Objectives and importance of counter-intelligence
It Denies information to the enemy VIII. METHODS AND TECHNIQUES OF COLLECTING
It Reduces the risk of a command INFORMATION
Aids in achieving surprises Information – All evaluated materials of every
Increases the security of the command description including those derived from observation,
Decreases the enemy ability to create reports, rumors, imagery, and other sources from which
information about the forces. intelligence is produced.
d. Activities and Function of Counter-Intelligence
Protection of information against espionage TYPES OF AGENT USED IN COLLECTING OF
Protection of personnel against subversion INFORMATION
Protection of installations and materials against Agent of Influence- Agent who uses authority to
sabotage gain information
e. Categories of Counter-Intelligence operation Agent in Place- Agent who has been recruited
Military Security – it encompasses the within a highly sensitive target
measures taken by a command to protect itself Penetration Agent- Agent who have reached to
against espionage, enemy operation, sabotage, the enemy, gather information and able to get back
subversion or surprise. without being caught.
Port boundary and Travel Security – has to do Expendable Agent- Agent who leaks false
with the application of both military and civil information to the enemy.
security measures for counterintelligence control Double Agent- An enemy agent, who has been
at point of entry and departure, international taken into custody, turned around and sent back
borders and boundaries. where he came from as an agent of his captors.
Civil Security – it encompasses active and
passive counterintelligence measures affecting CLASSIFICATIONS OF SOURCES OF INFORMATION
the non-military nationals permanently or A. Open Sources – 99% of the information collected are
temporarily residing in an area under military coming from open sources or obtained from Overt
jurisdiction. Operation.
Special Operations – counter subversion,
sabotage and espionage. Overt Operation – also known as Open Operation,
method of collecting information openly regardless the
3. LINE OR TACTICAL INTELLIGENCE – it is the subject is aware that we are collecting information,
intelligence information which directly contributes to the commonly is by use of clipping.
accomplishment of specific objectives and immediate in Enemy Activities
nature, necessary for more effective police planning and Captured Documents
operation. Map
Weather Forecast, Studies, Reports
INTEL INFORMATION TO BE DETERMINED IN LINE Agencies
INTELLIGENCE (PWET)
People – Living Condition of the people, sources of B. Close Sources – Only 1% of information are obtained
income, education of the people, government from clandestine operation.
Page 9 of 16
Covert Operation – also known as Clandestine To check on source of information
Operation or Close Operation, method of collecting To develop leads to vital information
information secretly or by using a cover without the To confirm or deny allegations
knowledge of the subject. To provide protection
Page 10 of 16
Methods of shadowing Map Reconnaissance – it may not sufficient but it can
One man – Extremely difficult and should be produce a certain amount of usable information
avoided, if unavoidable keep subject in view at all Research – more information can be acquired best
times. used with other methods.
Two man – two agents are employed to follow the Prior Information – those records in your file unit that
subject may provide valuable information.
ABC method – reduces the risk of losing the subject, Hearsay – Information usually gain by the person
affords greater security agents detection operating in the area and performing casing job.
Progressive/ Leap from method – poor chances of
obtaining good results, agents are stations at a fixed BASIC PROCEDURES IN THE CONDUCT OF CASING
point assuming that subject followed the same Preparation of general location map
general route each day. Sketch of the adjoining establishment and prominent
Combined foot-auto surveillance – employment of features
surveillant on foot and agents in an automobile. Specific sketch or floor plan of main target
Detailed features of inner portion of target and its
WHAT ARE THE THINGS SHOULD BE AVOIDED IN description
SURVEILLANCE Photograph of the casing target (general to specific)
Don’t meet the eye of the subject
Don’t adopt a slinking, sleuthing, creeping 3. ELICITATION – The process of extracting information
manner from a person believes to be in possession of vital
Don’t wear story book disguises information without his knowledge or suspicion.
Don’t carry noticeable items
Don’t greet fellow agents TRAITS ON WHICH ELICITATION IS BASED
Don’t make entries in your notebook in public It is a natural tendency for people to talk about
place matters that may or may not concern him directly.
Don’t Spent money to much People also have a desire to correct the mistakes
of others and to express curiosity in things they are
ESSENTIAL REQUIREMENTS AND APPEARANCE not totally familiar with. Another tendency is the
Always be alert desire to gossip.
Be a good talker There is a general inability to keep secrets.
Be resourceful There is a need to be recognized, particularly the
Average size, built and general appearance lonely, neglected, vain, and those with feelings of
Have no peculiarities in appearance inferiority.
Should have perseverance and able to wait for There is tendency to underestimate the importance
hours of the information imparted.
There are habits derived from certain occupations
2. CASING – It is the careful inspection of a place or of advising, teaching, correcting, substantiating and
building to determine its suitability for a particular challenging.
operational purpose. It is also known as the There is a tendency to be indiscrete when not in
RECONNAISSANCE or RECCE in Military term. control of one’s emotions.
There is a tendency for professionals to share
PRINCIPLES IN CASING confidence or show off expertise to another of
Know the best route to get there his/her profession.
Know how to conduct yourself without attracting
attention TWO DEVICES IN THE CONDUCT OF ELICITATION
Know what security hazards are in the area and APPROACH
how can they avoid or minimize. It is the process of setting people to start talking, or to
Know the best route to extricate from the area. shift the direction of an existing conversation.
Page 11 of 16
his welfare to pay special attention to his 4. Employment of Technical Means
employment. Bugging – The use of an equipment or tool to listen
Partial disagreement Approach – Seek to and record discreetly conversations of other people.
produce talking by the word “I’m sure if I fully Wire Tapping - A method of collecting information
agree”. thru interception of telephone conversation.
B. Provocative Approach – this are designed to induce 5. Tactical Interrogation – The need for obtaining
the source to defend a position, or correct a wrong information of the highest degree of credibility taken on
impression. the minimum of time can be through interrogation which
Teaser Bait Approach – The elicitor varies and dependent entirely on the situation.
accumulates sources of knowledge about a
particular subject to tempt the subject to give his INTERROGATION TECHNIQUE
views. TERMS TO PONDER
Manhattan from Missouri Approach – The Interrogator – person who does the questioning
elicitor adopts an unbelievable attitude above Source – a person who for any reason submits
anything, he questions all the statements and information of intelligence interest usually on a
propositions. voluntary basis
Joe Blow Approach – Is “I” know the answer to Suspect – a person who for any reason believed to
everything approach, the elicitor adopts the be associated with prohibited activity
attitude of being approachable to any field. Witness – any person who has direct knowledge of
National Pride Approach – Nature propensity of facts concerning an event or activity
all persons to defend their country and its Interrogee – any person who is subjected to the
policies. interrogation process in any of its forms and phases
Interrogation report – an oral or written statement of
PROBES information by the questioning of in interrogee
A probe is an attempt to obtain more information after the
subject gives a vague, incomplete general response. A PHASES OF INTERROGATION
probe is used with an approach in order to sustain a Planning and Preparation
conversation. Approach (Meeting the Interrogee)
Completion – By inserting bits of factual Questioning
information on a particular topic, the source may Termination
be influenced to confirm and further expand on Recording
the topic. Reporting
Clarity – A request for additional information
where the source’s response is unclear. For 6. Observation and Description (ODEX)
example, “I agree, but what do you mean Observation – a complete and accurate
by…….?” observation by an individual of his surroundings
Hypothetical – Can be associated with a thought and encompasses the use of all the major sense
or idea expressed by the source. Many people to register and recognized its operational or Intel
who might not make a comment concerning an significance.
actual event may express an opinion on a Description – the actual and factual reporting of
hypothetical situation. one’s observation of he reported sensory
High Pressure Probe – it serves to pin down a experience recounted by another.
subject in a specific area or it may be used to
point out contradictions in what the subject has Psychologist estimate that approximately
said 85% of your knowledge is gathered through sight
13% of your hearing
Guidelines in Conducting Elicitation: 2% of your other three senses
Begin with a topic of mutual interest.
LISTEN to the source and be PATIENT IX. COVER AND UNDERCOVER OPERATIONS
Gradually steer the topics to the areas of interest. Undercover Operations- also referred to as
Use approaches and probes when the opportunity “Roping” Undercover is disguising one's own
arises. identity or using an assumed identity for the
Exploit the topic until it begins to deteriorate. purposes of gaining the trust of an individual or
Switch to an innocent subject before departing or organization to learn secret information or to gain
terminating the interview. the trust of targeted individuals in order to gain
Leave an opening for future access. information or evidence.
Record information when security considerations Cover – It refers to the changing, forging or
allow. Do not take notes in the presence of the falsifying agent’s real personality including but not
source. Try to remember all the pertinent information limited to things, location, job, and others that will
discussed. be used in undercover assignment.
Page 12 of 16
Cover Story – A biographical data through fictional and etiquette rules. So the resettling back into the
that will portray the personality of the agent he normal police role requires the coming off of old
assumed, a scenario to cover the operation. habits, language and dress. After working such free
Cover Support – An agent assigned in target lifestyles, agents may have discipline problems or
areas with the primary mission of supporting the exhibit neurotic responses.
cover story.
Maintenance of identity – Living a double life in a
IMPORTANCE OF COVER new environment presents many problems.
Secrecy of Operation against enemy intelligence Undercover work is one of the most stressful jobs an
Secrecy of Operation against friendly agencies who do agent can undertake. The largest cause of stress
not have the need to know identified is the separation of an agent from friends,
Successful Accomplishment of the mission family and their normal environment. This simple
isolation can lead to depression and anxiety.
TYPES OF COVER
Artificial – altering the background that will PLANNING UNDERCOVER ASSIGNMENT
correspond to the operation Determine the level of which investigation is
Multiple – Includes different cover intended.
Natural – Actual or True Background. Developing appropriate cover story and cover
Selection of qualified personnel.
ORGANIZATIONAL COVER Considerations of all undercover operations details
An account consisting of biographical data which to include documentation
when adopted by individual will assume the Briefing, coaching, and rehearsing.
personality he want to adopt.
SPECIAL QUALIFICATION OF UNDERCOVER AGENT
OBJECTIVES OF ORGANIZATIONAL COVER 1. Thorough knowledge of the area, the people and
1. To camouflage and protect operational personnel and customs were agent will operate
their activities. 2. Preferably single and unmarried
2. Protect installation in which clandestine activities are 3. Thorough knowledge of the language or dialect
based. spoken in the area of operation.
Page 13 of 16
OPERATIONAL SECURITY GUIDELINES ON Frightened Informants – weakest link in criminal
UNDERCOVER ASSIGNMENTS chain, motivated by anxiety.
1. The agent’s appearance must be inconspicuous Self-Aggrandizing – moves around the center of
2. The SUBJECT should cultivate the AGENT, rather criminals delight in surprising the police about bits of
than the reverse information.
3. Analyze SUBJECT and appeal to his ego, vanity Mercenary – Information for sale needed something
and interest for exchange of information.
4. Obtain SUBJECT’S confidence (Rapport) Double-Crosser – He wants to get more information
5. Play along with the SUBJECT’S plan from the police more than he gives.
6. Don’t be impatient, over-anxious or too eager Women – Most dangerous
7. Don’t displayed more interest in statements or Legitimate – operators of business desire to give
actions of the SUBJECT and of the SUBJECT’S information for legitimate reasons.
associates than is compatible with the cover story.
8. Don’t betray knowledge of the SUBJECT’S MOTIVES OF INFORMANTS
background which was gained from the preliminary Vanity – conceited act/character of the criminal
investigation or files. resulting to self - betrayal or tantamount to guilt,
9. Don’t get involved with SUBJECT’S girlfriend. gaining favorable attention and importance by the
10. Don’t let any relations with SUBJECT incur enmity, police.
envy or jealousy of the SUBJECT’S associates. Civic-mindedness – sense of duty and obligation to
11. Don’t become unnecessarily friendly with women assist the police.
12. Don’t overact the cover story. Fear – A person under an illusion of oppression by
13. Don’t reveal more cover story details than enemies or of other impending danger.
necessary. Repentance – One who has a change of heart and
14. Don’t carry weapons unless told to do so wishes to report a crime that is preying on his
15. Don’t make unexplainable trips or phone calls conscience.
16. Don’t maintain contact with personal friends or Gratitude or gain – An expression of appreciation to
relatives obtain a privilege or an interest in the welfare of his
17. Don’t display money more than the amount family during his detention.
provided for by the cover story Revenge – To settle a grudge due to settle a previous
18. Don’t reveal the true identity unless is a part of injury
preconceived plan Jealousy – envious of the accomplishments or
19. Don’t drink intoxicating beverages if it can be possessions of another and wishes to humiliate him.
avoided. Remuneration – a person who informs solely for the
20. Don’t assume the “big shot” attitude. An pecuniary or other material gain he is to receive.
outstanding characteristic will bring the AGENT
under scrutiny. STEPS IN RECRUTMENT OF INFORMANT
21. Beware of entrapment Selection – to identify and recruit an informant who
REMEMBER: THE COMPROMISE OF YOUR TRUE has access to several subversive organizations,
IDENTITY COULD ENDANGER YOUR LIFE OR Access is the valuable factor in recruiting the potential
COMPROMISE THE MISSION. informant.
Investigation – It must establish possible existing
XI. INFORMERS AND INFORMANTS motives as to this person might assist the officer, if
A. Informants – Any person who hand over information necessary conduct a Complete Background
to the agents which is relevant to the subject. The investigation to the possible informant.
informant may openly give the information clandestinely Approach – it must be done in a place conducive to
and choose to remain anonymous. the possible informant, avoid places which might have
any probability of compromise, approach must be
Informant Net – It refers to a controlled group of people done in a foreign territory.
who worked through the direction of the agent handler. Testing – It must commence with limited assignment,
with a gradual integration into more important mission.
PURPOSES OF INFORMANTS IN INTELLIGENCE
OPERATIONS TREATMENT OF INFORMANT
Gain access to areas and targets inaccessible to Avoid using derogatory terms in referring to informants
intelligence. Avoid disclosing the real identity of the informant
Provide anonymity to investigation and operation. Protect the interest of the informant and consider all
Increase the scope of area and target coverage. the information from known to unknown
Consider all information from known to unknown
TYPES OF INFORMANTS information as valuable until proven otherwise.
Anonymous – Unidentified or unknown informants Express appreciation for all information received
False Informant – reveals information of no regardless of its value
consequences, value or stuff connected within thin air. Keep appointment on time even though informant may
not
Page 14 of 16
Don’t get over anxious, be patient and take your time It includes computerized encryption to protect
Don’t become an informant’s informant. transmissions of data and messages
Difficulty of printing and distributing codebooks under
Informers – refers to any person who provides conditions of absolute secrecy
information to the agents in a regular basis regarding
to the subject they are either paid regularly or in base- PRINCIPLES OF CRPYTOGRAPHY
to-case basis. The system should be, if not theoretically unbreakable,
unbreakable in practice.
XII. CRYPTOGRAPHY: CODES AND CIPHERS The design of a system should not require secrecy
CRYPTOGRAPHY and compromise of the system should not
It was derived from the Greek work “Kryptos” which inconvenience the correspondents.
means “secret” and “graphos” which means “writing”. The key should be memorable without notes and
It is defined as an art and science of codes and should be easily changeable
ciphers. The cryptograms should be transmittable by telegraph
This is done through the use of “Speech Inverter” The apparatus or documents should be portable and
whereby essential speech frequencies are divide into operable by a single person
several ranges by filters then inverted to produce it The system should be easy, neither requiring
scrambled speech when intercepted. knowledge of a long list of rules nor involving mental
strain.
TERMS TO PONDER
Cryptanalysis – This is the process of converting XIII. SECURITY MEASURES & OPERATIONS IN
cryptograms into plain text without the key from a code RELATION TO INTELLIGENCE
book. A. Physical Security – The broadest type of security that
Crypto Analyst – Refers to those persons who break is concerned with the physical measures designed to
intercepted codes. safeguard personnel and prevent unauthorized access to
Cryptographer – It refers to a person who is highly equipment, facilities, materials, documents, and to protect
skilled in converting message from clear to them from espionage, sabotage, damage or theft
unintelligible forms by use of codes and cipher. B. Communication Security – The protection resulting
Coding – It is the changing of message from plain from the application of various measures which prevent
clear text to unintelligible form also known as or delay the enemy or unauthorized person in gaining
“Encrypting”. information through communication. This includes
Decoding – Transforming of coded message into transmission, cryptographic and physical security.
plain text also known as “Decrypting”. C. Document Security – Protection of documents,
Plain text – also known as clear text, it is the original classified matters and vital records from loss, access to
communication to be scrambled or enciphered. unauthorized persons, damage, theft and compromise
Cryptogram – also known as ciphertext, the product through proper storage and procedures.
of the enciphering process. Classify – Assigning of Information or material to
one of the four security classification after
TYPES OF CRPTOGRAPHY determining that such information requires security
Codes – it rely on code books, substitution of coded as prescribed by PNP regulation 200-012.
message to the code books. Reclassify – The act of changing the assigned
Stenography – It is a method of hiding the existence classification of a document or material.
of a message using tools. Declassify – The removal of the security
Ciphers – it include both computer generated ciphers classification from classified document or material.
and those created by encryption method Upgrading – The process of assigning higher
ROT1 – each letter of the alphabet is replaced with the category of document or information according to
following letter, so A is replaced with B, B is replaced the degree of security needed
with C, and so on. “ROT1” literally means “rotate 1 Compartmentation – The granting of access to
letter forward through the alphabet.” classified document or information only to properly
Transposition – the letters are rearranged according cleared persons when such classified information is
to some predetermined rule or key. required in the performance of their official duties,
Morse Code – Morse code is not a code but a cipher. and restricting it to specific physical confines when
Each letter of the alphabet, the digits 0-9, and certain feasible.
punctuation symbols, is replaced by a sequence of Security Clearance – is the certification by a
short and long beeps, often called “dots and dashes.” responsible authority that the person describe is
A becomes “•-”, B becomes “-•••” and so on. cleared for access to classified matter at appropriate
level.
COMPLICATIONS OF CRPYTOGRAPHY 1. Interim Clearance – Effectivity Two (2) Years
They are easy to decipher once they discovered the 2. Final Clearance – Effectivity Five (5) Years
codes
They are usually impossible to read without the key
code book
Page 15 of 16
CATEGORIES OF CLASSIFIED MATTER (PNPR 200-
0121)
1. Top Secret (GREEN) – Top Secret documents calls
for the utmost degree of protection. Unauthorized
revelation of this materials and information would
cause extremely severe damage to the nation, politically,
economically, or militarily.
2. Secret (RED) - Unauthorized disclosure of this
documents or things may put at risk the nation
security, cause serious injury to the reputation of the
nation, the reproduction of which will be considerable cost
and labor, or significant delay
3. Confidential (BLUE) - Unauthorized revelation of
which may be injurious to the reputation of the
nation or governmental activity or would cause
administrative humiliation or unnecessary injury.
4. Restricted (BLACK) - This are information which
should not be published or communicated to anyone
except for official purposes, These records are daily files,
routine in nature even if lost or destroyed, will not affect
operation or administration.
TYPES OF PSI
Local Agency Check – Refers to the investigation
of the records and files of agency in the area of
principal residence of the individual being
investigated.
National Agency Check – It consists of LAC
supplemented by investigation of the records and
files of the following agencies: PNP, ISAFP, NBI,
CSC, Bureau of Immigration and Deportation and
other agency
Background Investigation – a check made on an
individual usually seeking employment through
subjects records in the police files, educational
institutions, place of residence, and former
employers.
Page 16 of 16