Professional Documents
Culture Documents
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.”
“If you know yourself but not the enemy, for every victory, you will suffer a defeat.”
“If you know neither yourself nor the enemy, you are a fool who will meet defeat in every battle.”
This old saying is true in military intelligence as well as in the fields of law enforcement and public safety. This has a
standing and valid statement even before the advent of Christianity, the validity of which has not changed by the passing of time.
In other words, intelligence is knowledge and knowledge is power. Thus, the need of intelligence is increasingly important and
apparent as the study of history continues.
Intelligence Defined:
As the product resulting from collecting information concerning as actual and potential situation and condition relating to
foreign activities and to foreign or enemy held areas.
PRINCIPLES OF INTELLIGENCE:
1. Timeliness
2. Flexibility
3. Foresight
4. Security
Police Intelligence - It is evaluated and interpreted information concerning organized crime and other major problems.
Military Intelligence - It is an evaluated and interpreted information concerning as actual or possible, enemy or theatre of
operations, including weather and terrain, together with the conclusions drawn there from. Military intelligence comprises the
broad fields of strategic intelligence and combat intelligence.
Organized Crime - It is the combination of two or more persons for the purpose of establishing by terror or corruption in the
city/municipality or section of, either a monopoly, or virtual monopoly of criminal activity in a field that provides a continuing
financial profit.
Criminal World - The social organization of the criminals is termed as the underworld. The underworld is a world in itself
apart, having its own social classes from the hobo to the moon-eyed gangsters or racketeers.
Criminal Syndicate - It is a stable business with violence applied and directed at unwelcome competitors. It is a merger of
capitalist or financiers, entered into for the purpose of prosecuting a scheme requiring large resources of capital, especially one
having the objectives of obtaining control of the market of a particular commodity.
A) Intelligence as a process is an activity which treats processes information as a basis for departmental policy and
decision making.
B) Intelligence as an organization is an institution composed of persons who pursue a special kind of knowledge for the
purpose of planning the collection of information, processing and dissemination of intelligence relating to organized crime, vice,
integrity members of the police, subversion ans insurgency activities, person and condition that promote disturbance to peace
and order and other major police problems.
C) Intelligence information which is primarily long range in nature with little or no immediate practical value is classified
a strategic intelligence.
3. Line Intelligence -- The type of intelligence which is of an immediate nature and necessary for more effective police
planning and operations.
1. Covert - if the information is obtained without the knowledge of the person against whom the information or
documents may be used, or if the method of procurement is done not in an open manner.
2. Overt - if the information of documents procured openly without regard as to whether the subject of the
investigation becomes knowledgeable of the purpose or purposes for which it is being gathered.
1. Check the conditions in the community relating to crime, vice, juvenile delinquency and indications of subversion and
insurgency.
2. Determine through counter-intelligence application matters pertaining to personnel security, physical security, and
documents security of the police organization.
3. Determine the follow-up leads and help in the solution of individual criminal cases.
4. Identify criminal elements and other lawbreakers as well as their associates.
5. Assist in the arrest of wanted criminals and those wanted under RA 1700 otherwise as “Anti-Subversion Act”.
6. Check on the quality and effectiveness of the operation of the police force.
7. Check on the security conditions of the police personnel, funds, equipment and materials.
8. Help in crime control and prevention; and
9. Serve as a tool of management for planning and organizational improvement purpose.
ii. Departmental Intelligence. Of far greater import in the project of control and prevention upon
which administration must rely as one of the most indispensable tools of management.
1. The Police Intelligence Units shall employ overt and covert operations depending upon the nature of the police
problems involved. Only carefully selected and properly trained personnel shall be employed for police intelligence
work.
2. The Police intelligence coverage and activities shall be directed primarily towards the detection, identification,
neutralization and negation of criminal and/or activities that promote disturbance to peace and order and other
current/potential police problems.
3. The Police Intelligence Units shall further perform other intelligence coverage directed by higher headquarters/offices.
A commander of any police station finds it difficult to ascertain vice and organized crime conditions in his community and the
integrity of his force except by using an intelligence unit working directly under him.
1. The Head. The intelligence unit should be headed by a man in whom the chief has complete confidence
2. Operations. The intelligence unit should operate secretly and in much the same manner as the vice division.
3. Reports. It is even more important that the unit commander be informed of the activities of this unit than of the
operating divisions in the department
4. Tasks. The intelligence unit will be primarily concerned with organized crime. It is not the task of this unit to
arrest persons guilty of participating in criminal activities but rather to furnish the commander with the necessary facts
so that he may place them before the division responsible for their correction as the proper action; unless there is
evidence that police personnel of that division may be involved in the criminal.
A) As a rule, initial recording, evaluation and processing of information will be made at the lowest collecting intelligence
agencies at the station levels. Line intelligence produced at this level may be disseminated to lower and adjacent
agencies/units on need to know basis only.
A) The following standard prescribed codes of evaluation as to source and as to information shall be indicated on all
information forwarded or disseminated.
USES
Intelligence must be adequate for the use to which it is to be put. Intelligence must increase knowledge and
understanding of the particular problem under consideration in order that a decision could be reached. A thorough
understanding of the nature of the problem or the commander’s vision is essential for production of useful intelligence.
DISSEMINATION
Intelligence must be timely. The best intelligence is valueless unless it reaches the user in time to serve as a
basis for appropriate action.
SECURITY
a) Classified documents and/or information, Restricted, Confidential, Secret and Top Secret shall be handled in
accordance with prescribed security regulations.
b) Proper selection, screening and conduct of personnel security investigation shall be made of all Police intelligence
personnel.
c) Security Surveys and Inspection of all buildings, jails, Fire Units including armories, explosive and ammo dumps
occupied, rented, leased to or owned by the police shall be prescribed and conducted as the COP or head f office may
direct.
Establish and maintain a harmonious relationship or good rapport to all levels of the government agencies can
unloose a flood of useful information, while strained relationship will make the other agencies concerned be reluctant to give and
coordinate the desired understanding and cooperation. Liaisons with other agencies shall also be encourage to effect
coordination of intelligence coverage.
The primary function of the intelligence officer is to keep the Commander informed about:
- the enemy
- area of operations
- the unknowns
He also assists the Commander in the formulation and supervision of counterintelligence activities within the command.
Depending on the mission, the Commander and his staff require intelligence and information . . .
1. To arrive at sound and timely decision.
2. To protect the command.
3. To assist in the processing of other information.
2. Collection of Information
Collection is the systematic exploitation of sources of information by collection agencies and the delivery of the information
obtained to the proper intelligence section.
Sources of information are persons, things or actions from which enemy, weather, or terrain information is derived.
Major Sources include:
Enemy activities
Enemy prisoners of war (POW)
Captured enemy documents and materials
Enemy communication
Civilians
Maps
Weather Forecasts
Studies prepared by friendly units
Intelligence reports
A Collection Agency is an individual, organization or unit that has access to sources of information and the capability of
collecting information from them. It include
1. Troops - The primary mission of a unit determines the amount of information that it can provide
2. Intelligence Specialists - They are valuable collectors of information and especially trained personnel
3. Special Units - These units have various specific collection missions significant to the overall collection effort.
3. Processing of Information
Processing is the step by which intelligence is created from the raw material of information.
Steps:
Recording - It is consists of reducing information to writing or some form of graphical representation.
Evaluation of Information - The information is examined to determine its pertinence, reliability of the source
and the collection agency, and accuracy of the information.
Interpretation of Information - It determines the significance and meaning of information.
Recording
The purpose of recording is to facilitate the task of the intelligence officer.
Basically, there are three (3) general aids by which recording is accomplished:
1. Intelligence Journal - is the permanent, official, chronological record of operations of the intelligence section.
2. Intelligence Workbook - is a device which provides a means of systematic arrangement of information by type
of subjects.
3. Enemy Situation Map - is a temporary graphic record of the current disposition and major activities of the
enemy.
Recording
WHO, WHAT, WHEN. WHERE, WHY & HOW
MIIOT - Most important information on top
Other details
Evaluation
This determines the pertinence, reliability and accuracy of information:
Pertinence - The S2 first examine info to determine the degree to which it I relevant, and its possible
value.
Reliability - The basis for this consideration is the intelligence officer’s experience with, and
knowledge of the source and agency.
Evaluation
Surveillance, whether foot or vehicle, is predominantly a matter of common sense, ability, tact and ingenuity on the
part of the surveillant.
TERMINOLOGY
Subject of Surveillance - the person, place or object being watched
Surveillant - the person who does the following or maintains the watch.
Convoy - an associate of the subject who follows the subject in an attempt to detect surveillance.
Contact - any person with whom the subject speaks, to whom he gives articles, or from whom he receives articles.
Stake-out - a process wherein a part of the surveillant group clandestinely positions him in advantageous and fixed
position to clearly monitor and observe the subject and his activities.
Eye Ball - the channel which has direct observation of the subject by trailing the subject and relaying immediately
information to other members of the surveillance team.
OBJECTIVES OF SURVEILLANCE
1. Learn the identity of the person(s) involved in a given activity and obtain detailed info concerning the scope and
nature of his activities.
CATEGORIES OF SURVEILLANCE
1. Loose Surveillance - also known as discreet surveillance. Observation of the subject or object is not continuous. It
may be called off when the subject becomes suspicious.
2. Close Surveillance - Continuous observation of the subject is maintained at all times, even if he appears to become
suspicious.
3. Combination of Loose and Close Surveillance -Circumstances which usually depend on a specific act of the subject
may necessitate a change from a loose surveillance to a close surveillance without prior notice.
METHODS OF SURVEILLANCE
1. Moving Surveillance - a moving surveillance is conducted when the person, object or activity being watched moves
from one place to another. In this situation, the surveillant actually follows the subject of interest.
2. Fixed Surveillance - is conducted when the person, object or activity being watched is not expected to move from
one area. The surveillant may, however, move from one vantage point to another on the immediate area.
Fixed Surveillance
Factors to be considered in preparation:
1. Determine the base of operations
2. Make a thorough caution reconnaissance of the area
3. Obtain the necessary equipment
4. Assign specific duties to each surveillant
5. Prepare an alternate Courses Of Action (COA)
Precautions
o Do not make an abrupt, unnatural move.
o Do not use theatrical disguise.
o Never stare directly at the subject.
o Never look directly at the subject’s eye.
o Do not attempt to appear too innocent.
o When in dangerous neighborhood, walk near the curb to reduce the possibility of attack from doorways
and alleys.
o Exercise extreme caution in dark alleys.
TECHNIQUES OF SURVEILLANCE
1. Foot Surveillance - employs the use of a single, or more than one surveillant where the surveillant and the
subject travel on foot and the surveillant has to shadow him or tail for the rest of the operation.
2. Vehicle Surveillance - may involve the use of one or more automobiles, or other conveyances normal to the
area.
Foot Surveillance
· One-Man Surveillance - One investigator is used to conduct the surveillance. It is best employed in a fixed
surveillance. It should be avoided in moving surveillance because it provides the least amount of flexibility in
the surveillance.
· Two-man or “AB” Surveillance
· In this technique, the surveillant behind the subject is always known as the “A” surveillant. “A” follows
the subject and “B” either follows on the same side of the street or from across the street.
· Three-man or “ABC” Surveillance
It employs three surveillants, and is intended to keep two sides of the subject covered. “A” follows the
subject. The normal position for “B” is behind “A”. “C” normally operates across the street.
· Leapfrog Surveillance
· Two or more surveillant are used to conduct this technique. This is a variation of the “AB” and “ABC”
methods. It is simple to execute and greatly reduces the chances of the subject recognizing the
surveillance.
· Progressive Surveillance
· This is used when extreme caution is necessary. It can be presupposed by the surveillants that the
subject will resort to every method to elude possible surveillance. It is a slow technique and limited to
subjects who follow habitual daily routines.
Vehicle Surveillance
Planning
The subject will move primarily by automobile, therefore necessitating the surveillant to follow by automobile. Hence,
the following factors should be taken consideration:
A dependable mode of transportation
License plates on car (as belonging to an official)
A two-way radio communication system
Consideration for carrying emergency supplies
Vehicle Surveillance
Precautions
Vehicles should not be operated in a conspicuous manner.
When on a rural road and the subject suddenly turns into a side road, do not follow; proceed the side
road and consciously observe the location of the subject.
If the subject suddenly halts after being followed at a high rate of speed for some distance, proceed
past him and give a pre-arranged signal for the other members of the surveillance team.
If the subject suddenly abandons his vehicle and boards a bus or street car, the assistant should board
the carrier at the next stop.
Detection of Surveillance
Alternating fast and slow driving
Committing obvious traffic violations
TYPES OF COVER
COVER REQUIREMENTS
1. provide freedom of movement.
2. protect the agent from compromise.
3. be consistent with the social status of the target.
4. provide adequate leisure times.
5. be sufficiently flexible to meet changes in the situation.
6. be consistent with the financial resources available to the agent.
COVER STORY
A biographical account, true or fictional or a combination of truth and fiction, which portrays the agent’s past history and
current status.
UNDERCOVER
A technique in which the agent conceals his true identity and status and adopts or assumed another role or character.
Special Qualifications
Knowledge of the language/dialect
Knowledge of Area Background and Current Events
Knowledge of the People
Physical Appearance
CLANDESTINE COMMUNICATION
“Contact between agent handler/case officer and action agent”
MEANS OF COMMUNICATION
1. Personal Meeting (PM)
“Face-to-face contact”
Considerations in PM Plans:
-location
-time
-cover story
-cover conversation
-signals
-risks of detection/counter surveillance
-Escape and evasion (emergency departure)- Brush Pass
- Meeting between Unknown (MBU)
- Brief Encounter
2. Cutouts
“A person or device interposed between to persons”
Purposes:
-hide relationship
-compartmentation
-security
-An individual who serves as a cutout is an “INTERMEDIARY”
-A place or thing used is a “CUTOUT DEVICE”
TYPES OF INTERMEDIARIES
a. Live Drop (LD)
b. Courier
c. Moving Live Drop
d. Accommodation Address
Cutouts
TYPES OF CUTOUT DEVICES
a. Dead Drop (DD) - place
b. Moving Dead Drop (MDD) –transportation
c. Mail
d. Advertisement
e. Telephone
f. Telegram
g. Radio