You are on page 1of 27

Capiz Government & Business Center, Roxas City, Capiz

POLICE INTELLIGENCE & SECRET SERVICE


-Hernan B. Bunda, MS. Crim.-

INTELLIGENCE Defined:
 The product resulting from the collection, evaluation, analysis, interpretation, integration of all the
available information which concerns one or more aspect of various human activities which should
be known in advance in order to initiate a particular course of action.

POLICE INTELLIGENCE
 The product resulting from the collection, evaluation, analysis, integration, and interpretation, of all
the available information which concerns one or more aspect of criminal and subversive activities
which is immediately and potentially significant to police planning.

ALVIN TOFFLER
“A small bit of the right information can provide an immense strategic or tactical advantage, the denial of
a small bit of information can have catastrophic effects. “

NATURE OF POLICE INTELLIGENCE


 Intelligence is a product of a process which starts from the collection of information, its evaluation,
analysis, interpretation and integration with other information to arrive at a theory or conclusion
which is called as intelligence. Information therefore becomes intelligence after it had undergone the
above-cited process, which is sometimes called as intelligence cycle.
 Fundamentally speaking the purpose of intelligence is to increase the probability of accuracy in
operational staff decisions by furnishing the latter with accurate and timely intelligence. In other
terms, intelligence is also known as the eyes and ears of the chief of police.
 Oftentimes, police administrators are required to make major decisions based upon inadequate
information. Intelligence must fill the void often existing police decision-making. It is not magic
formula that may solve the different problems they face. Perhaps, it can give a true picture or actual
situation that he is facing.
 Most often, intelligence reports are inadmissible in court for they are considered as hearsay evidence
because the one making the report is not an eyewitness or has no direct knowledge of the incident or
situation being investigated. Intelligence reports are seldom submitted to court as part of any
evidence unless the case is so important that the identity of the agents involved could be sacrificed for
its successful prosecution.

HISTORY OF MILITARY INTELLIGENCE


The biblical Era;
1) Moses
 The first recorded case which involves the use of Intelligence was at the time of Moses. It was
evolved from the concept of Spying as attributed in the book of Numbers, chapter 13, verses 17-20.
Moses is 1st person who used intelligence when he gave instruction to the sons of the twelve tribes of
Israel who were tasked to spy the Promised Land Known as Canaan.
2) Rahab
 The second recorded case is found in the Book of Joshua, Chapter 2, and verses 1-2, When Joshua,
the son of Nun, secretly sent out two spies from shittim to reconnoiter the land and Jericho. While
conducting casing operations, the two spies were discovered and pursued by the enemy. They hid at
Rahab’s place and upon a covenant with the latter, Rahab misled the pursuing enemies by giving
them false information, thereby saving the lives of the agents and making their mission successful.
3) Delilah
 The third recorded event in the Bible is the story of Samson and Delilah which can be read in the
Book of Judges, Chapter 16, and verses 1-3. Philistinian used Delilah as their bait to capture Samson
and to discover the secret of his strength.

The conquest Era:


1) Alexander the Great in Macedonia
 He was noted to have used intelligence in order to find out the sentiments of his officers and soldiers.
When Alexander the Great was marching to Asia, there were rumors of disaffection growing among
1 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

his allies and mercenaries, he sought the truth, and got it by simplest expedient by devising the first
“letter sorting” and opening to obtain information.
2) Marcus Lucinius Crassus
 The crowded and unsanitary conditions of ancient cities like Rome caused frequent and dangerous
fire. Crassus, a millionaire, employing slaves and freemen organized a complicated enterprise
consisting of a private fire brigade made into an intelligence unit.
 Five hundred workmen, equipped with ropes, buckets, ladders and other equipped were ready until
one of Crassus roving agents tapped his vast communication system in reporting a fire. After a fire
alarm was sounded Crassus led his fire brigade to the scene, saw the direction of the wind and
interviewed people whose properties were endangered and offered to buy their properties at a very
low price. If the owners agreed to the sale, the fire brigade was called to stop the fire.
3) Frederick the great of Prussia
 The is known as the Father of Military Intelligence because he was the first to classify his spies into 4
classes namely, (1) common spies, those recruited among poor folk, glad to earn a small sum or to
accommodate as military officer;(2) Double Spies, are unreliable renegades, chiefly involved in
spreading false information to the enemy; (3) spies of consequence, couriers and noblemen, staff
officers, and kindred conspirators, requiring a substantial bribe or bait (4) Person who are force to spy
against their will through threats, intimidation, blackmail, or death.
4) Genghis Khan
 Renown as one of the great barbarian leaders of the world history. He achieved his victories not
through the untamed fury of his soldiers but through careful planning and organization. He was
known “The Great Mongol”, who used intelligence to conquer China and invade Cathay.
5) SunTzu
 A Chinese Philosopher who wrote the book entitled “The Art of War” in 500 B.C. because a
successful general by applying the principles in his book. His book begins with this statement: “the
art of war is of vital importance to the state. It is a matter of life and death, a road either to safety or
to ruin. Hence, under no circumstance can it be neglected.
6) Hannibal
 He was considered one of the brilliant military strategists in the history of military intelligence. He
had developed an effective intelligence system for 15 years in Rome. He usually roams around the
city often disguise himself as a beggar to gather firsthand information.
7) Schulmeister, Napoleon’s Eyes
 Karl Schulmeister, Napoleon’s military secret, was born on August 5, 1770. He began his career in
offensive espionage. Under a cover role, he was able to infiltrate the Austrian General Staff.
8) Stieber
 Incorporated intelligence in the General Staff support system. He further device military censorship
and organized military propaganda.
9) Alfred Redl
 One of the most brilliant intelligence agent, though a homosexual. Become chief of the Austro-
Hungarian Secret Service, but in fact a double agent of Russia. In 1913, his treason lead to the death
of 500,000 agents and soldiers combine in his 13 years’ espionage episode.
10) Donovan
 Major-General, organizer of the OSS, builder of a Central Intelligence System. The OSS whose
exploits, become legendary in World War II.
11) Battle of Midway
 In June 1442, the turning point of the Naval in the Pacific. The victory gained by the American was
due to the disrupted messages from the Imperial Japanese Navy.
12) Admiral Isoroku Yamamoto
 April 1943, the cryptoanalyst of the US Navy Communications Intelligence intercepted a top secret
signal relaying the travel of the Admiral. Enroute he was intercepted and crashed in the jungles of
Baugainville.
13) V2- Rackets
 OSS agents working in conjunction with the British Intelligence, through penetration and technical
intelligence discovering Punemunde which was the V2 guide missile research project of Germany. It
resulted to its destruction and heavy bombing.

History of Police Intelligence

2 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 The first use of intelligence was in the concept of spying as attributed to Chapter 13 of the book of
Numbers in the Holy bible, yet it did not immediately developed into what is known today as police
intelligence.
 What is known today as police intelligence had its own origin from military intelligence. The
development of a civilian police force did not brought with it the formation of an intelligence unit
within the force.
 Because basically, the primary purpose of the police was the maintenance of peace and order,
enforcement of the laws and prevention of crime. The need for police intelligence was only realized
after the birth of organized crime in the United States of America.
 Police Intelligence could be roughly estimated to have started in New York City in the early 1900’s
when “Italian Squad was form under the leadership of Joseph Petrosino.This is a police squad
credited for sending more or less five hundred men to prison and had complied extensive intelligence
data on members of the MAFIA and CAMORA which had slowly migrated from Sicily and Italy to
USA. Joseph Petrosino is a policeman of Italian origin who migrated to U.S.A. at the age of six. He
was killed in an ambushed in Plaza Marina Palermo. Sicily while obtaining criminal records of
suspected members of the Black HandSociety with the onset of organized crime. The need for
systematic police intelligence became a must for police forces in major cities of America.

Comparison of Military and Police intelligence:


 Distinction lies on its objectives or goals
 Military intelligence is basically concerned with the enemy and other factors which may contribute
to winning the war, while police intelligence is concerned with criminality and prevention.

AXIOM isan established principle which is universally accepted, a statement of self-evident truth. These are
facts that require no proof because truth of these statements is obvious.

Four (4) Axioms of Intelligence


A. AXIOM NR 1 – Intelligence is crucial to internal security.
B. AXIOM NR 2 – Intelligence is essential to all types of operations.
1) Internal Defense Operations.
2) Internal Development Operations.
3) Psychological Operations.
C. AXIOM NR 3 – Intelligence is the responsibility of all government agencies.
D. AXIOM NR 4 – Intelligence of the government must be superior to that of the enemy.

FUNCTIONAL CLASSIFICATION OF POLICE INTELLIGENCE

1) Criminal Intelligence (CRIMINT)


 production of intelligence essential to the prevention of crime and the investigation, arrest, and
prosecution of criminal offenders.
2) Internal Security Intelligence (INSINT)
 refers to the knowledge essential to the maintenance of peace and order.
3) Public Safety Intelligence (PUSINT)
 refers to the knowledge essential to ensure the protection of lives and property.

INTELLIGENCE CYCLE
 It is the process of developing raw information into finished intelligence for policymakers to use in
decision making and action. The process through which intelligence is obtained, produced, and made
available to users.It consists of four phases, namely;
1. The planning phase or Planning of collection Efforts
2. The Collection phase or the collection of information
3. The processing phase or the Processing of the Collected information into Intelligence
4. Dissemination of Intelligence

Phase 1. The planning phase or Planning of collection Efforts


 It is the foundation for the entire process. It is the springboard from which all Intelligence Cycle
activities are launched. This phase includes determining the information needed, deciding how to
collect that information, and setting up a timetable for collecting the information.
3 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 This phase is purposely to determine the Essential Elements of Information. The EEIs are categorized
according to the ff. used;
1. EXECUTIVE – It is required by executives in the government, military or police commanders
and is used as basis for policy and decision making.
2. CONTRIBUTORY – This is intelligence required to make staff plans and estimates which
contribute to decision and policy-making.
3. OPERATIONAL – This is additional intelligence required to carry out the effective
implementation of decision and policies.
4. COLLATERAL – Intelligence required by higher echelons of the government, military or
police establishments. Allies may also need this requirement.

Phase 2. The collection Phase or the Collection of Information


 This phase determines the unit or persons who are tasked to do the collection of the needed
information as embodied in the EEIs. The person tasked must be capable of the work, must have
access to the information, must be suitable to do the job, and task may be given to different units for
confirmation or comparison, and the workload must be balanced among the different agencies.

Three Major Types of Police Intelligence Operation

1) Line intelligence
– this type of police intelligence is also known as intelligence of immediate value. It is needed daily for
police planning and operation. It contains the daily incidents of crime occurrence, the activities of the
different police units, and the reaction of the community in favor or against police performance or
operation.
2) Strategic Intelligence
– this intelligence operation is otherwise long range in nature and has little immediate value. This type
of intelligence operation is directed towards criminal organizations or syndicates, drug traffickers,
subversive organizations, terrorist organizations whose activities are hidden in the eyes of the public,
or the police.
3) Counter Intelligence
– this type of police intelligence operation is primarily concerned with defending the police
organization against the activities of criminal elements or any other groups which seeks to destroy the
integrity of police department.

COUNTER –INTELLIGENCE OPERATIONS


 Designed to ensure the safeguarding of information, personnel, material and installation against:
Sabotage, Espionage, Subversive, activities of individual that constitute, threats to National Security.
 Involved all security measures both offensive-active and Defensive-Passive.

Passive – Defensive Measures


 This Counter-intelligence measures designed to conceal information from the enemy such as: Secrecy
Discipline, Communication security, Concealment and Camouflage, and Be included in SOP
Offensive-active Measures
 This Counter-intelligence measures designed to actively block the enemy’s effort or attempt to gain
information such as: Detection, Prevention, and Neutralization.

Types of Counter-intelligence Measures


1. Denial Measures 2. Detection Measure 3. Deception Measures

Means in acquiring specific information


 The essence of intelligence is access which means, someone or some device has to get close enough
to a thing, to a place or a person, to observe and to discover the desired facts without arousing the
attention of those who protect them.

To this end, a number of means may be used and these are;


1) The Classical Intelligence such as and which may utilize human being to gather information.

4 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

2) The Modern or Technical Intelligence which employs machine such as satellites, electronic gadgets to
gather information.

SOURCES OF INFORMATION
 One of the most important aspects of intelligence is information. Without it, there will be no
intelligence. Information, however, does not come in handily, that a great need for time, effort and
money is needed to gather it. It is also worthwhile to know and cultivate the different sources of
information, like people, records, events, objects, etc.

Classification of sources of information


1) Regular sources
– records, files from government agencies, news items. The bulk of information of this nature is news
items. Included also is news or TV broadcast, intercepted radio, telephone message and stored
computer data.
2) Cultivated Sources
– information furnished by informants or informers.
3) Grapevines Sources
– these are information coming from the underworld characters such as prisoners or ex-convicts.

METHODS OF INTELLIGENCE OPERATION

1) Overt Operations
 this type of operations is done if the information or documents are procured openly without regard as
to whether the subject of investigation becomes knowledgeable of the purpose for which it is being
gathered. Gathering of information openly is usually done through open sources like public or
private records, newspaper, Tactical Intetc.

TACTICAL INTERROGATION
 The need for obtaining information of the highest degree of credibility taken on the minimum of time
can be through interrogation which varies and dependent entirely on the situation. In tactical
interrogation, familiarization of the following is necessary:

Interrogation Techniques:
Techniques of Approach
 the purpose is to gain the cooperation of the source and induce him to answer questions which will
follows.

1. The “Open Techniques”


– the interrogator is open and direct in his approach and makes no attempts to conceal the
purpose of the interrogator. It is best employed when the interrogee is cooperative. It is
frequently used at the tactical level where time is a major interrogator.
2. The “Common Interest” Technique
– the interrogator must exert effort to impress the interrogee of their common interest. The
interrogator must look for he point out the real advantages the interrogee will receive if he
cooperates .
3. Record File (we know all technique)
– the interrogator prepare a file on the source listing all known information (record should be
padded to make it appear to be very extensive). The information must contain the life history
of the interrogee to include his activities and known associates (Party- bio-data of the
interrogee is important). The “we know all” s used in conjunction with the record file. During
the approach, the interrogator may ask the interrogee about a subject, if he refuses to
cooperate, the interrogator may provide the answer in order to impress him that the
interrogator knows him very well (all is known).
4. Exasperation
– Techniques (Harassment) – effectively employed against hostile type interrogee. The
interrogator must be alert because the interrogee may fabricate information to gain relief from
irritation (monotype). Subject Interrogee is placed in a longer period of interrogation without
rest or sleep. The interrogator permits the source to go to sleep and subsequently awaken for
5 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

another series of questioning (this is done repeatedly). After many repetitions, the interrogee
will be exasperated and will finally cooperate hoping that he can be allowed to rest or sleep.
Ask a question, listen to a reply and then ask the same question repeatedly (use a tape
recorder if possible). The purpose is to bore the interrogee thoroughly until he begins to
answer questions freely to end the harassment.
5. Opposite Personality Technique
– also known as “Mutt and Jeff”, “Threat and Rescue”, “Bud Guy – God Guy’, “Sweet and
Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of two (2) interrogators playing opposite
roles.
6. Egotist Techniques (Pride and Ego)
– usually successful when employed against an interrogee who has displayed a weakness or a
feeling of insecurity. You may reverse the technique by complimenting the interrogee in
hopes of getting him to admit certain information to gain credit. Described him as the best
person, superior or comrade.

7. “Silent” Technique
– employed against nervous or the confident type of interrogee. Look out the interrogee
squarely in the eye with sarcastic smile (force him to break eye contact first). He may ask
questions but the interrogator must not answer. Patience is needed until the interrogator is
ready to break silence.
8. “Question Barrage” Technique (Rapid Fire Questioning)
– intended to confuse the interrogee and put him into a defensive position. The interrogee
become frustrated and confused, he will likely reveal more than he intended, thus creating
opening for further questioning.

2) Covert operations
 This type of operations is done when the gathering of information or documents is secret or without
the knowledge of the person of organization to whom such information or documents are to be used.
The following are covert types of police intelligence operation;
a) Agent i) Use of Sound Equipment
b) Use of Informers or informants (bugging or wiretapping)
c) Surveillance j) Use or Radar or Sonar (use of
d) Casing Or Reconnaissance satellites).
e) OBSERVATION AND k) Crypt Analysis.
Description A.K.A (ODEX) l) Censorship
f) Undercover Operation m) Document Exploitation or
g) ELICITATION Exploitation of Captured
h) Surreptitious Entry material

AGENT
 A person unofficially employed by an intelligence service, often as a source of information

Kinds of agent used in the procurement of information


1) Agent in Place
 an agent who has been recruited by an intelligence service within a highly sensitive target, who is just
beginning a career or have been long or (outsider) insider.
2) Double Agent
 An enemy agent, who has been captured, turned around and sent back where he came from as an
agent of his captors.
3) Expendable Agent
 an agent though whom false information is leaked to the enemy.
4) Penetration Agent
 an agent who has such reached the enemy, get information and would manage to get alive.
5) Agent of Influence
 an agent who uses influence to gain information.
6) Agent of Provocateur

6 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 a secret agent hired to incite suspected persons to some illegal action, outbreak, etc., that will make
them liable to punishment.

INFORMANTS/INFORMER
 INFORMERS are those who give information in exchange of something, like money, goods,
accommodations or favor while INFORMANTS are those people who give information without
expecting rewards or favor.

Recruitment of informant or informer


 The recruitment and handling of informant or informer are quite similar in procedure. The only
difference lies in the motivation of the two. The distinction between an informant and informer lies in
money, price or favor.
 Sometimes an ordinary informant may turn into a recruited or full time informer after proper
cultivation. A good recruiting officer must know the different reasons or motives of person in giving
information.

Common motives of Informant in giving Information


1) Vanity - The motive is for self-aggrandizement by gaining favorable attention and importance by the
police.
2) Civic-mindedness – Those imbued with the sense of duty and obligation to assist the police in their
task.
3) Fear – It is the engendered illusion of oppression from enemies or from impending dangers.
4) Repentance – Those lesser criminals such as accomplices or accessories who will have a change in
heart to unburden their conscience.
5) Avoidance of Punishment – his only way out is to cooperate and reveal a much greater crime to the
authorities.
6) Gratitude or gain – an expression of thanks giving for a favor or help received.
7) Competition or rivalry – he wants to eliminate the other party by exposing it to authorities;
8) Revenge – to hit back to his opponent through the authorities.
9) Jealousy – driven by jealousy or envy against the other party being exposed.
10) Remuneration – solely for monetary or other gain.

Informants can be classified into:


1) Anonymous 8) Ordinary
2) Automatic 9) Double Crosser Informant
3) Frightened Informant 10) Rival Elimination
4) Penetration 11) Woman Informant
5) Self-Aggrandizing Informant 12) False informant
6) Full time 13) Legitimate Informant
7) Mercenary Informant

Handling of informer/informants
Important points to consider in handling of informant/informer:
1) Supervisors or agent handler must always practice secrecy discipline and he must never tell the
identity of the informants or informer except to the commanding officer.
2) A code name or cone number should be assigned to each informer/informant and must be kept in a
safe privy available only to the handler and commanding officer;
3) An informant or informer should not be made to testify in court except in a very serious case wherein
his identity can be sacrificed for the successful of the prosecution of the accused;
4) Personal meetings, contacts or communication with the informer or informant must be planned in
advance, and should not be done in public or police office;
5) Regardless of occupation, education, or character they should be treated courteously and with justice
and fairness;
6) Be exact about monetary transaction and keep your promise;
7) Never use derogatory names or words and do not let your informants/informers know each other
8) Protect them and never let them down if they need your help;
9) Always maintain a regular contact with them;
10) Accept all information received at a face value subject to verification or evaluation;
7 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

11) Train them properly al all aspects of the tradecrafts and never let them run the show. Always be in
control; and
12) In sending them to a mission, give them specific assignment through proper briefing and upon return
they should undergo a debriefing.

SURVEILLANCE
 It is the disguised or secret observation of places and things for the purposes of obtaining information
concerning the identities of activities of the target of the subject. A form of clandestine investigation
which consist of keeping persons, place or other targets under physical observation in order to obtain
evidence or information pertinent to an investigation.

Pre-surveillance Conference
 a conference held among the team members, the police intelligence unit before surveillance is
conducted.

Surveillance plan
 the plan must establish the required type of personnel, the general and specific instructions for
surveillance. Ensure that the overall objective or the surveillance is understood.
 All participating personnel will have common understanding of the operational limitations, signals
and special instruction which have been improved.

Objectives of surveillance of places


1) To detect criminal activities.
2) To discover the identity of person who frequently at the establishment and to the determination of
their relationship.
3) To discover the habits of a person who lives in or frequents in the place.
4) To obtain evidence of a crime or to prevent the commission of a crime.
5) Basis for search warrant.
6) To apprehend person in the commission of an offense.

Requirements and appearance of surveillant


1) Be of average size, built and general appearance.
2) Have no noticeable peculiarities in appearance.
3) Should not wear inconspicuous jewelry or clothing.
4) Have nothing about him to attract attention.
5) Have perseverance and able to wait for hours.
6) Always be alert.
7) Be resourceful, versatile and quick-witted.
8) Be a good talker, able to talk his way out of embarrassing situation without arousing suspicion.
9) Have one or two good standard “lines” or reasons regarding presence in the area.

Definitions of terms;

Agent
 acts on behalf of another whether individual, organization or foreign government, works under the
direction of a principal agent or case officer.
Agent Handling
 is the management of agents, principal agents and agent networks by intelligence officers typically
known as case officers.
Be made
 to be detected or suspected of being a surveillant by the subject.
Bugging
 eavesdropping by electronic means, such as hidden microphone or radiotransmitter; bug –a device
used for such eavesdropping.
Burn the surveillance
8 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 when a surveillants behavior causes the subject to surmise or know that he or she is under
surveillance.
Convoy
 a countermeasure to detect a surveillance; a convoy, usually a person, is employed to determine
whether or not a subject is under surveillance.
Cut-Out
 is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of
information between agents.
Dead Drop Spike
 is a concealment device used to hide money, maps, documents, microfilm and other items.
Dead Drop/Dead Letter Box
 is a method of espionage trade craft used to pass items between 2 individuals using a secret location
and thus not require to meet directly. A secret location where materials can be left for another party to
retrieve
Decoy
 a cover supporting the surveillant who can become a convoy whenever surveillant is burned.
Drop
 any person is a convenient, secure and unsuspecting place where police undercover men meet his
action agent for debriefing or reporting purposes.
Eaves Dropping
 Is the act of secretly listening to the private conversation of others without their consent.
Espionage/Spying
 involves a government or individual obtaining information that is considered secret of confidential
without the permission of the holder of the information.
Fixed surveillance
 similar to stakeout.
Flip
 apprehended criminals who turn informants.
Live Drop
 2 persons meet to exchange items or information.
Mustard Plaster
 a form of open surveillance; here, the subject is followed so closely that surveillant and subject are
almost I lock step. It is tantamount to protective custody.
Open surveillance
 a surveillance with little or no attempt as concealment; also termed “rough surveillance”. The subject
is most likely aware of the surveillance, but must not be lost.
Plant
 similar to stakeout and undercover.
Propaganda
 is a form of communication that is aimed at influencing the attitude of a community toward some
cause or position.
Safehouse
 is a place, building, enclosed mobile, or an apartment, where police undercover men meet for
debriefing or reporting purposes.
Shadow
 to follow secretly; to place a person under surveillance.
Snitches
 jailhouse informants.
Stakeout
 also called a plant or fixed surveillance; here the surveillant remains essentially in one position or
locale.
Subject
 the party under surveillance
Surveillant
 the person conducting surveillance
Technical surveillance

9 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 Surveillance involving the use of scientific devices to enhance hearing or seeing the subject’s
activities.
Undercover
 an undercover agent who often gets to know or work alongside the subject. The term “roping”
describes this situation, and the undercover agent is said to be planted.

Classification of Surveillance

A. According to Intensity and Sensitivity:


1) Close Surveillance
 the subject is kept under constant surveillance. Also termed “tight surveillance,” the aim is not to
lose the subject even the risk of being “made”. subject is aware that he is under observation
varied on each occasions
2) LooseSurveillance
 subjects need not be kept under constant observation. The surveillance should be stopped if the
subject becomes suspicious. A loose surveillance is normally used when a general impression of
the subject's habits and associates are required.
3) Combination of Loose and Close
 It usually depends on a specific act of the subject. Preplanning is helpful, but you must observe
and interpret the act or circumstances accurately. By so doing you can implement the plan.
Suppose the plan is for loose surveillance until a certain event occurs. After that, surveillance is
to become close. Proper determination must be made as to when the specific event has occurred.

B. According to Methods:

1) Stationary
 This is termed as a "stakeout" or "plant." A fixed surveillance is conducted when a person or
activity remains in place. This is observation of place usually a gambling, joint, a residence
where illegal activities are going on (fixed position)
2) Moving
 A mobile surveillance is sometimes termed "tailing" or "shadowing." A mobile
surveillance may be made on foot or by vehicle. When a mobile surveillance is made by vehicle,
it is term “Tailgating”. It is conducted when persons being observed move from point to point and
are followed by surveillants. surveillance follow the subject from the place to place to maintain
continuous watch of his activities
3) Technical
 this is a surveillance by the use of communications and electronic hardware’s, gadgets, system
and equipment

Equipment
1) Camera with telephoto lens 5) Wiretapping device
2) Moving Picture Camera 6) Other instrument miniaturized one-way
3) Binoculars radio
4) Tape recording apparatus

Kinds of surveillance
1) Surveillance of places or Casing 3) Undercover Investigation/Operation or
2) Tailing or shadowing roping

CASING OR RECONNAISSANCE
 Casing is the term use in the police organization while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building place or area to determine its suitability for
Intel use or its vulnerability in operations. It aids in the planning of an operation by providing needed
information. It assists the agent handler to install confidence in his agent during briefing phase by
being able to speak knowingly about the area of operation. Casing is also considered a security
measure because it offers some degree of protection for those operating in an area unfamiliar to them.

10 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

Methods of Casing
1) Personal Reconnaissance
 A personal reconnaissance of an area is the most effective method and will produce the most
information since you know just what you are looking for.
2) Map Reconnaissance
 A map reconnaissance alone may not be sufficient but it can produce a certain amount of usable
information. From a map, it is possible to get a good survey of road and street network.
3) Research
 Such information can be acquired through research. Research normally entails a study of
unclassified sources such as local newspapers, periodicals, public bulletins, telephone and city
directories, radio and television broadcasts, and other available references.
4) Prior Information
 Your unit will have on file reports from other activities within your unit, and also from other
intelligence units that may provide you with information. In addition, town studies, geodetic
surveys, etc., can provide you with valuable information.
5) Hearsay
 This type of information is usually gained by the person operating in the area of performing the
casing job. Casing should always be done with your ears open when visiting such places as
restaurants, bars, places of amusement, and while riding on a public transport facility. Some
hearsay information may be gained by discreet questioning of the people in the area.

OBSERVATION AND Description A.K.A (ODEX)

Observation
 a complete and accurate observation by an individual of his surroundings an encompasses the use of
all the major sense to register and recognized its operational or Intel significance
Description
 the actual and factual reporting of one’s observation of he reported sensory experience recounted by
another Psychologist estimate that approximately 85% of our knowledge is gathered through sight,
13% from sense of hearing and only 2% through the three other senses

SHADOWING OR TAILING
 It is the act of following a person overtly or covertly.

Methods of shadowing or tailing


a) One-Man Surveillance.
 One investigator is used to conduct the surveillance. It is best employed in a fixed surveillance. It
should be avoided in moving surveillance because it provides the least amount of flexibility in the
surveillant, in addition to watching the subject should take notes, watch for convoys, and collect
evidences.
b) Two-Man or “AB” Surveillance.
 In the “AB” technique of surveillance, the surveillant behind the subject is always known as “A”
surveillant. “A” follows the subject and “B” either follows on the same side of the street or from
across the street.
c) Three-Man or ABC Surveillance.
 The most effective technique of foot surveillance is the “ABC” technique. It employs three
surveillance, and is intended to keep two sides of the subject covered. “A” follows the subject.
“B” follows “A” and concentrates on keeping “A” in sight rather than the subject. “B” also
watches for convoys. The normal position for “B” is behind “A”. “C” normally operates across
the street from slightly to the rear of the subject.
d) Leapfrog Surveillance.
 Two or more surveillants are used to conduct the leapfrog technique of surveillance. This is a
variation of the “AB” and “ABC” methods. It is simple to execute and greatly reduces the
chances of the subject reorganizing surveillant. Surveillant “A” follows “B”. Both surveillants
operate on the same side of the street as the subject. After a variable time or distance has elapsed
by prearrangement of signals, “A” falls back and allows “B” to assume the position “A” and “A”
becomes “B”.

11 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

e) Progressive Surveillance.
 The Progressive technique of surveillance is used when extreme caution is mandatory. It can be
presupposed by the surveillants that the subject will resort to every method it elude possible
surveillance. It is a slow technique and limited to subject that follow habitual daily routines.

Golden rule in Tailing


1. Golden rule number one is; “Never take your eyes off of the target
2. Golden rule number Two; “if the target sees the investigator three times the investigator is burnt.”
3. Golden rule number three; “if you want to make something happen, take your eyes off of the target
i.e., leave the area for a bathroom break, to grab a quick bite in the drive thru etc.”

COVER OR UNDERCOVER INVESTIGATION

Undercover Assignments
 it is form of investigation in which the operatives assumes a cover in order to obtain information.

Remember the Proverbal Basis which says:


It needs a thief to catch another thief. The history of the French Police proved that this saying is true.
The elite Frence Surete, tasked to investigate criminal cases, hired an ex –convict as an informer. This ex-
convict produced later became the Chief of the French Surete and the man was Vidocq.

Objectives of undercover work


1) Obtaining evidence 5) Checking loyalty
2) Obtaining information 6) Subversive organization
3) Checking informant 7) Preliminary search or raid
4) Fixed Surveillance

Selection of the informants who will perform undercover work


1) Background 3) Intellect
2) Temperament

Common types of undercover assignment


1) Neighborhood assignment 3) Organizational assignment
2) Social assignment 4) Work assignment

Preparations OF UNDERCOVER ASSIGNMENTS


1) Study the Subject – name, address, description, family and relatives, associates, character and
temperament, vice, hobbies, education, others
2) Knowledge of the area and terrain – maps, national and religious backgrounds, transportation,
public utilities
3) Subversive Organization - history and background, biography of the official, identity and
background of members and former members, method of identification employed by the members,
files and records, nature, location and accessibility, meeting
4) Cover Story – the scenario must be appropriate to cover up operation and avoidance of identification
of mission.

Rules of Undercover Assignment


1) Don’t drink while working undercover 4) Don’t claim to be a “big shot”
2) Don’t court women 5) Don’t fail to provide a person in a place
3) Don’t take a woman on an undercover who can vouch for the operative
assignment 6) Don’t spend money too much.

COVER
 It is a means by which an individual, group or organization conceals the true nature of its activities
and existence from the observer.

Functions of cover
a) Offensive – Gives access to the target and facilities the achievement of clandestine objectives.
12 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

b) Defensive – Serves to prevent detection

Types of cover
1) Natural cover
 Using true or actual personal background to fit the purpose.
2) Artificial cover
 A cover using biographical data adopted for a fictitious purpose.
3) Cover within a cover
 Use of secondary cover in case of compromise which necessitates the admission of a lesser crime.
4) Multiple cover
 Any cover identity wished.

ELICITATION
 It is a system or plan whereby information of intelligence value is obtained through the process direct
intercommunication in which one or more of the parties to the common are unaware of the specific
purpose of the conversation. The three phases are determination of the mission, selection of the
subject, and accomplishment of the mission.

CLASSIFICATION OF DOCUMENT OR HANDLING OF CLASSIFIED SECURITY


INFORMATION
 The handling and classification of classified information has a universal format and procedure and it
is almost the same throughout the democratic world.
 In our country, we are guided by two Memorandum Circulars from the office of the President of the
Philippines, and they are Memorandum Circular Nr. 78 dated August 14, 1964 and Memorandum
Circular Nr. 196 dated July 19, 1968. These two Memoranda are used as the basis for the handling
and classification of documents to date.

IMPORTANT TERMINOLOGIES:
1) COMPARTMENTALIZATIONof Information means
 to limit access to information to persons who directly need to know certain information in order
to perform certain tasks. The idea is that the fewer people know, the better, because as the number
of people “in the know” grows, so does the risk or likelihood that such information could be
compromised or fall into the hands of the opposition.
2) DECLASSIFY
 the removal of security classification from classified matter.
3) RECLASSIFY/REGRADING
 the act of changing the assigned classification of matter.
4) UPGRADING
 is the act of assigning to a matter of higher classification to a classified document
5) DOWNGRADING
 is the act of assigning to a matter of Lower classification to a classified document

FOUR CATEGORIES OF CLASSIFIED MATTER

TOP SECRET
 These are information and materials, the unauthorized disclosure of which would result cause
exceptionally grave damage to the nation, politically, economically, or from a security aspect. This
category is reserved for the nations’ closest secretes and is to be used with great reserve. It is covered
with legal size bond paper lined with a ½ - inch green border.
 Ex.
a) Very important political documents containing negotiations for major alliances.
b) Scientific developments in methods of warfare, e.g., vital matters relating to atomic warfare,
defense against biological warfare, or matters affecting future strategies.

A. Classification Authority
 Rest exclusively to the head of the Department. This may be delegated to authorized officers in
instances when necessary.

13 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

B. Reproduction
 May be copied, extracted or reproduced only when classifying authority has authorized such action.
 Permission to reproduce shall not extend beyond a specified number of copies which are treated the
same as the original.
 At the time of issuance, each document must contain a notation as follows;
 Reproduction of this document contain in whole or in part is prohibited except with the
permission of the issuing office or higher authority;
 Reproduction of paragraph(s), i.e, 1&2, of this document is prohibited except with the
permission of the issuing office or higher authority;
 Shall be carried out under the supervision of an authorized officer. All materials and waste incidental
to the reproduction shall be accounted for and disposed of.

C. Inventory
 Physical inventory is required by the head of the department twice a year. Appropriate action on
custodial deficiencies shall be made.

D. Transmission
 TOP SECRET matter shall be transmitted by any of the following means:
 By direct contact of the officer’s concern
 By the officially designated courier
 By accompanied diplomatic pouch
 TOP SECRET matter shall not be transmitted by mail, express, or electrical means, unless in
cryptographic form.

E. Storage
 Safe, steel filing cabinet or other steel container equipped with a built-in, three-position, and dial-type
combination lock.
 In secure open room or vault which is approve for such use by the head concerned.

F. Destruction
 by burning or pulping by the custodian in the presence of witnessing officer designated by the
responsible head. The witnessing head must have a TOP SECRET clearance.

SECRET
 These are information and materials, the unauthorized disclosure of which would endanger national
security, cause serious injury to the interest or prestige of the nation or of any government activity or
would be of great advantage to a foreign land. It is covered with legal size bond paper lined with a ½
-inch red border.

 Ex:
a) Matters relating to new methods of warfare or defense, including scientific and technical
developments, not classified as TOP SECRET, e.g., new designs for service aircraft, guided
projectiles, tanks, radar and anti-submarine devices.

A. Classification Authority
 Same as TOP SECRET
B. Reproduction
 Same as TOP SECRET
C. Inventory
 Physical inventory is required by the head of the department twice a year. Appropriate action on
custodial deficiencies shall be made.
D. Transmission
 Between points within the Philippines:
 Direct contact with officers concerned
 Electrical means in cryptographic
 Courier specifically authorized by the transmitting agency
 Philippine Registered mail
 Between points from within and outside the Philippines, and vice Versa:
14 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 Direct contact with officers concerned


 Electrical means in Cryptographic
 Courier specifically authorized by the transmitting agency
 Accompanied by diplomatic pouch
E. Storage
 Same as Top Secret or in a steel filing cabinet equipped with a steel lock-bar and combination padlock
of which the manufacture’s identification numbers have been obliterated.
F. Destruction
 Same as TOP SECRET matter, except that the witnessing officer need SECRET clearance only;
 Records of Destruction

CONFIDENTIAL
 These are information and materials, the unauthorized disclosure of which while not endangering the
national security would be prejudicial to the interest or prestige of the nation or any governmental
activity, or would cause administrative embarrassment or unwarranted injury to an individual or
would be of advantage to a foreign nation. It is covered with legal sized bond paper lined with a ½ -
inch blue border.
 Ex:
a) Routine Intelligence Reports
b) Plans of government projects such as land development, hydroelectric schemes, road
development, or development of areas

A. Classification Authority
 Commissioned officers of the PNP, and their counterparts in the AFP and government agencies
B. Reproduction
 It is authorized except when the classification authority specifically denied it.
C. Inventory
 Physical inventory is not required. However, proper custody and maintenance of the documents are
required, based on the existing rules and regulations or records management and administration.
D. Transmission
 Same as secret matter
E. Storage
 Same as secret matter
F. Destruction
 Same as secret matter
 Except no witnessing officer and record of destruction

RESTRICTED
 Information and material which requires special protection other than that determined to be TOP
SECRET, SECRET, or CONFIDENTIAL. Cover sheet is not necessary, what is important is a bold
“RESTRICTED” word at the top and at the bottom of the bond paper.
 Ex:
a) Department books of instruction and training and technical documents intended for official
use only or not intended for release to the public.
b) Routine information relating to the supply and procurement of military supplies.

A. Classification Authority
 Authority to classify shall be the same as CONFIDENTIAL matter.
B. Reproduction
 Authorized
C. Transmission
 Shall be through normal dissemination system

Note: Storage, Destruction, and Inventory shall be the same as confidential

ACCES TO CLASSIFIED MATTER


1) The term “Need to Know”is the principle whereby access to classified matter may only be given to
those persons to whom it is necessary for the fulfillment of their duties.
15 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

SECURITY CLEARANCE
2) The certification issued by a responsible authority stating that the person described therein is cleared
for access to classified matters at the appropriate level.

Types of Security Clearance


a) Final – valid for 5 years unless revoked by issuing authority
b) Interim – valid for 2 years unless revoke by issuing authority

CERTIFICATE OF DESTRUCTION
3) The certification by a witnessing officer that the classified matter described therein has been disposed
of in his presence, approved destruction methods.

Executive Order No. 608, S . 2007 (SECTION 6. Administrative Liability)


 Any unauthorized disclosure, sharing, publication or use of the information contained in the classified
documents or materials shall be considered a grave offense and shall be punishable in accordance
with civil service rules and regulations. The filing of an administrative case against an erring
personnel or officer does not preclude the filing of any other appropriate criminal or civil case for the
same violation/s.

Art. 290. Discovering secrets through seizure of correspondence. —


 The penalty of prision correccional in its minimum and medium periods and a fine not exceeding 500
pesos shall be imposed upon any private individual who in order to discover the secrets of another,
shall seize his papers or letters and reveal the contents thereof.
 If the offender shall not reveal such secrets, the penalty shall be arresto mayor and a fine not
exceeding 500 pesos. The provision shall not be applicable to parents, guardians, or persons entrusted
with the custody of minors with respect to the papers or letters of the children or minors placed under
their care or study, nor to spouses with respect to the papers or letters of either of them.

Art. 291. Revealing secrets with abuse of office. —


 The penalty of arresto mayor and a fine not exceeding 500 pesos shall be imposed upon any manager,
employee, or servant who, in such capacity, shall learn the secrets of his principal or master and shall
reveal such secrets.

Art. 292. Revelation of industrial secrets. —


 The penalty of prision correccional in its minimum and medium periods and a fine not exceeding 500
pesos shall be imposed upon the person in charge, employee or workman of any manufacturing or
industrial establishment who, to the prejudice of the owner thereof, shall reveal the secrets of the
industry of the latter.

PERSONNEL SECURITY INVESTIGATION


4) It is an inquiry into the character, reputation, discretion and loyalty of an individual in order to
determine a person’s suitability or access to classified matter prior to the granting of security
clearance. Or it is the process of inquiring into a person’s suitability to be given a security clearance.

Types of PSI
1) National Agency Check (NAC)
 This is an investigation of an individual made on the basis of written information supplied by him
in response to an official inquiry, and can be used as reference by the appropriate agencies. It is
simply a check on the files and records of national agencies. The NACE under this type are as
follows:
a) NICA d) DI, NHQ, PNP
b) NBI e) CIDG, NHQ, PNP
c) Intelligence service, AFP or J2 f) G2 Division, PA
Division
2) Local Agency Check
16 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 This type of investigation consists of written inquiries sent to appropriate local government
agencies, former employees, character references and schools listed by the person under
investigation. The local agencies normally check besides past employment, schools and character
references, such as follows;
a) The locality where the individual is a resident
b) Mayor of the locality where the individual is a resident
c) City or municipal police station
d) Provincial or city prosecutor’s office
e) City or municipal Judge
3) Background Investigation
 This is a much more comprehensive investigation than the NAC or LAC. A thorough and
complete investigation of all or some of the circumstances of a person’s life is conducted.

Type of BI
1) PBI
 Consists of the investigation of the background of the individual, but limited only to some of the
circumstances of his personal life which are deemed pertinent to the investigation. The inquiry
specifically pertinent to individual life history including LAC, contact with references and former
employers.
2) CBI
 Consists of the investigation of the background of the individual, including all the circumstances of
his personal life. LAC and NAC.

WANTED LIST/WATCH LIST/TARGET LIST

Wanted List
 a list consisting of persons who are subjected for arrest. For a person to be included on the most
wanted list, the latter must have an issued Warrant of Arrest and accused of either organized or
heinous crime.

Mechanics for Removal and Downgrading of Entries from Wanted List or Watch List:

Removing Entries from Wanted List


 A person name shall be removed from the priority list only after the warrant for his arrest has been
served and placed behind bars. However, same person’s name shall be placed back in the priority list
if the person has:
a) Escaped while in detention pending the resolution of the case from the court
b) Jump Bail
c) Escaped while serving sentence

Downgrading Entries from Wanted List to Watch List


 In cases where a person has been arrested and is out on bail but is monitored to be involved in crimes
defined in the criteria for the priority list, same person’s name shall be removed from the priority list
and placed on the watch list.

Watch List
 It consists of persons suspected to have committed organized or heinous crimes based from
unverified reports and are subject for further monitoring, investigation and case build-up.

Criteria for Inclusion in Watch List

Persons to be included in this category are those who have been implicated in:
a) Sworn Statements of victims, witnesses and arrested suspects
b) Tactical Interrogation/Debriefing Reports
c) Intelligence Reports, Information Reports, Agents Reports
d) Signed Letter Complaints
17 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

e) Other Official Reports

Mechanics for Removal and Upgrading of Entries from Watch List to Wanted List:

Removing Entries from Watch List to Wanted List


 If upon verification a person is found to have no involvement whatsoever, the person’s name shall be
removed from the watch list.

Upgrading Entries from Watch List to Wanted List


 On the other hand, if enough evidence to warrant the filing of a criminal case in court and a warrant
of arrest has been issued for the person included I the watch list, the person’s name shall be removed
from the watch list and placed in the priority list.

Target List
 It serves as master/reference list outlining pertinent data on organized crime groups/criminal gangs.
Persons to be included in this category are those who have been included in the priority list/Watch
List and who are at the same time members of organized groups/gangs. The purpose of this list is to
provide a consolidated reference containing data on organized crime groups for operational purposes.

Two Components of Target List:


Organized Crime Groups and Criminal Gangs

Based on the Memorandum released by DIDM on June 22, 2000 re defining Organized Crime Groups

Old Definition of Organized Crime Groups


 A group of two (2) or more persons collaborating, confederating or mutually helping one another in
the commission of a crime, including but not limited to robbery hold up, kidnapping for ransom,
prostitution, illegal recruitment, car napping, smuggling and piracy, cattle rustling, illicit drug
trafficking, labor rackets, manufacture and/or circulation of fake documents, licenses, stamps,
currencies and other government forms counterfeiting and bank frauds and other illegal activities.

Comparison of essential elements of an Organized Crime Groups and Criminal Gang

New Definition Organized Crime Groups Criminal Gang


1) A profit motivated and highly capable 1) A group of two (2) or more persons who have
group of persons or an enterprise a common identifying sign or symbol and
organized to undertake widespread, whose members individually or collectively
regular or long term, large scale, high engage in or have engaged in a pattern of
profile and diversified criminal activities criminal activity, creating an atmosphere of
that has high impact to the economy and fear and intimidation within the community
national security. or a specific area using violence and
intimidation.
Capability Capability
Organizational Structure Organizational Structure-tend to have less control
1) Composition-highly structured and complex over their members
2) Disposition-members have infiltrated a vast 1) Composition-loose connections of factions
variety of legitimate resources 2) Disposition-members may have previous
petty crimes experience
Resources Resources
1) High Profile Strength 1) Basic criminal tools
2) Highly sophisticated logistical support 2) Minimal logistical support
3) Highly specialized training and 3) Minimum or no specific training and
indoctrination indoctrination
Networking/Connections Networking/Connections
1) Well entrenched and fluid network 1) Local criminal network, if any
2) Tight operating linkages and influence with 2) Few or no operating linkages and influence
law enforcement and other government with the law enforcement or other
agencies government agencies

18 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

3) Initiated and maintained through bribery


and corruption on public officials
Modus Operandi Modus Operandi
1) High Profile 1) Less corporate-focus attention on making
2) Difficult to counter money from specific criminal activity
3) Violence and intimidation 2) Territorial-possession of turf
3) Scavenger-motivated by the needs to belong
to a gang
Personalities Personalities
1) Attained high level of criminal prominence, 1) Low level of criminal prominence, influence
influence and linkages not only in their AOR and linkages in their locality
but also outside of its boundaries 2) Mainly from financially/socially disadvantaged
sector of society
Motives Motive
1) Organizational profit and advantage 1) Profit and personal advantage
Nature and Criminal Activity Nature of criminal activity
1) Crimes that are high profile, sensational, 1) Crimes committed are perpetrated by hatred,
large scale, diversified and have high vendetta or if for profit on a particular crime
impact to the economy and national such as kidnapping only or robbery
security 2) Petty crimes
Time, Duration and Frequency Time, Duration and Frequency
1) Long term goals 1) Short term goals
2) Regularized operations 2) Irregular operations Limited to a specific area
3) Widespread or transcend provincial, of operation
regional, international political boundaries
Note:
The absence of attending essential requirements in the definition of OCG will rebound to
mere activities of criminal gangs. Hence, the definition of criminal gang is also important to provide a
clearer picture of gang related activities and immediately draw the dividing line between OCG and CG.

Phase 3. The processing Phase or the processing of theCollected information into Intelligence
 It is the phase in intelligence cycle wherein information becomes intelligence. The conversation of
raw data into a usable product known as intelligence is the most expensive and time-consuming
activity. The following are steps in the processing of information;

1) Recording – Intelligence recording is the reduction of all information or data into writing or other form
which is capable of being stored for future use.

The different intelligence recording system devices:


a) Intelligence Journal – it is permanent official and chronological recordings of events,
incidents, and information activities being undertaken by intelligence.
b) Intelligence Worksheet – this recording device wherein different information are entered and
collated in preparation for its final processing.
c) Situation Map – This map of the area, place or target where indicators are made depending
on the needs of the unit making it. Sometimes map pins are put at a place usually require that
both parties have identical code books wherein prevalent incidents or important events
occurred or where the presence of the enemy is reported.
d) Intelligence File – this is the compilation or file of different reports received by the unit.

2) Evaluation – The examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source or agency and credibility or the truth of the information. Reliability
of the source is represented by letters A to F. While credibility or the truth of information is represented
by number 1-6. The table of evaluation is as follows. The table of evaluation is as follows;

RELIABILITY OF ACCURACY OF SOURCE OF


INFORMATION INFORMATION INFORMATION
A-COMPLETE 1-CONFIRMED by other T- Direct Observation by
RELIABLE sources Comdr/Chf of Unit

19 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

B-USUALLY 2-PROBABLY TRUE U- Report by DPA or


RELIABLE Resident Agent
C-FAIRLY 3-POSSIBLY TRUE V- Report by PNP/AFP
RELIABLE Troops
D-NOT USUALLY 4-DOUBTFULLY TRUE W- Interrogation of
RELIABLE Captured Enemy
E-UNRELIABLE 5-IMPROBABLE X- Observation of
gov’t/civilian employee
F- REALIBILITY 6-TRUTH cannot be judged Y/Z- Documentary
cannot be judged

3) Interpretation – It is the determination of the significant of information relative to the mission or


objective. It has three steps to wit;
a) Analysis – shifting and isolating those elements that have significance to the mission or
objectives;
b) Integration – the combining of elements isolated in analysis and known information to form
a logical picture or theory
c) Deduction – the formulation of a conclusion from the theory developed, tested and
considered valid or the determination of the effect or meaning of the information.

PHASE 4. Dissemination of Intelligence


 This is the sending of information to the right user. The criteria governing dissemination are;
a) Timelin b) Propriet c) Security
es y

Intelligence Reporting and recording system


 As a rule, intelligence reports and recording of reports should be made from the lowest level of
intelligence unit. Dissemination of reports among the same units should be done “on the need to
know” basis only. Dissemination to higher headquarters should be accompanied by other information
or data or documents that will normally be processed at higher headquarters.

The different types of reports in intelligence are:


1) Agent’s Report (AR) – is a report made by an agent who is submitted to his agent handler or to his
unit.
2) Information Report (IR) - is a report made by an operative concerning any information on which
was gathered in the course of his assignment or function.
3) Operations’ Plan Report (OPLAN) – is a report coming from higher headquarters or higher level of
command to an operating unit obtaining thereat the details of certain operations.
4) Summary of Information (SOI) Report – is a type of report made by an member of the intelligence
community containing all information about anything which he had gathered in the course of his
work.
5) Surveillance Report (SR) – is a report made after surveillance. The report must include the
complete details of the operations to include pictures, notes, sketches, or other data which was
gathered during the course of the surveillance.
6) Casing Report (CR) – a report made after a casing operation. It must include a sketch map, or plan
of the building or room which is the subject of the casing. The sketch map or drawing must include
the general vicinity and the locality in which the target is located.
7) Interrogation Report (IR) – report after an interrogation against the enemy or suspect.
8) Investigation Report – a report made after an investigation.
9) Security Survey Report (SSR) – a report made after conducting security survey on any installation,
building, camp, officer or area.
10) Security Inspection Report (SIR) – a report made after a security inspection on a building, office or
areas.

FUNDAMENTAL OF CRYPTOLOGY
 Cryptology is the science dealing with the disguised or secret communication and is concerned with
methods and devices employed to camouflage communications (or even their existence) and to

20 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

penetrate such communications contrived by others. Although cryptology was concerned initially
with secrecy of written messages, its principles apply not only to enciphered or encoded messages
(cryptograms) but also to enciphered speech, facsimile and enciphered television transmission.

The different terms used in cryptology are as follows:


1) Code – is a system of words other symbols arbitrarily used to represent words, Code system.
2) Cipher – is a method of writing which substitutes other letters of characters for the letters intended
(substitution cipher) or transposes letters after arranging then in blocks or squares (transposition
cipher).
3) Cryptography – is the art of science which treats the various means and methods for rendering plain
text unintelligible, and reconverting unintelligible language by means other than cryptanalysis. The
product of cryptography is known as cryptograms or the secret text.
4) Cryptanalysis – is the process of converting cryptograms (usually of hostile origin) into plain text
without the key from a code book.
5) Plain text – the message that will be put into secret form. Usually the plain text is in the native
tongue of the communicator.
6) Encipher – is to convert a plain text messages into unintelligible language by means of a cipher
system.
7) Encode – is to convert a plain text messages into unintelligible language by means of a code system.
8) Encrypt – is to convert a plain text messages into unintelligible form by means of a cryptosystem.
9) Decipher – is to convert an enciphered message into its equivalent or original plain text by means of
a cipher system.
10) Decode – is to convert an encoded message into its equivalent plain or original plain text by means of
code system.
11) Decrypt – is to convert a cryptogram into plain text by reversal of the encryption process.
12) Key – is a symbol or sequence of symbols applied to the text to encrypt or decrypt.
13) Cipher System is a system which is involved with either transposition, or a combination of the two.
14) Transposition Cipher System – these systems are liker jigsaw puzzles in that all the places of the
whole original text are present but are merely disarranged.
15) Substitution Cipher System – is a system involving the treatment of individual letters or pairs of
letters of the clear text. Wherein they retain their relative position in the message but not their
identities and are replaced by other elements or text units so that the external but not their identities
and are replaced by other elements or text units so that the external form of the writing is
cryptographic in nature.
16) Null (s) – is a letter or are letters having no significance which are inserted as filters. Nulls or
Dummies are use to complete the system or geometric design or to complete five letter groups for
transmission.
17) Traffic Analysis – is the careful inspection and study of signal communication for the purpose of
penetrating camouflage communication network for the purpose of security.
18) Brevity Codes – is a prearranged system of words, symbols, numbers, or specific arrangement of
them which are used to represent other words or sentences. They are used in communication systems
to report early warning information, danger, signals, and action indicators (dead drop indicators)
cache is placed safe site comprise, etc.

1. SUBSTITUTION SYSTEMS
 This is an ancient system attributed to many persons. It is known that Julius Caesar used it. He
merely shifted the alphabet three letters forward, writing D in place of A, E for B, F for C, and so
forth. Using this method out clear test cipher alphabets would appear like this:

CLEAR OR PLAIN ALPHABET TEXT : A B C D E F G H I J K LM N O P Q R S T U V W X Y


Z
CIPHER ALPHABET :DEFGHI J KLMNOPQRST UVWXYZ AB
C
MESSAGE :WILL MEET YOU TONIGHT AT PLAZA LIBERTAD
CLEAR TEXT :WILLM EETYO UTONI GHTAT PLAZA
LIBER TADWX
21 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

CIPHER TEXT : ZLOOP HHWBR XWRQL J KWDW SODCD


OLEHU WDGZA

Enciphering
 It is accomplished by proceeding along the top horizontal row until appropriate clear text letter is
found directly under the clear text letter. This is repeated until all clear text letters have been end
ciphered.
Deciphering
 Deciphering the cipher text is done by merely reversing the procedure in enciphering by using the
same substitution system.

2. SIMPLE SUBSTITUTION WITH A KEY WORD


 The use of a key word “mixes” the cipher alphabet and breads the order that is obtained when only
shifting the alphabet is used.

MESSAGE :WILL MEET YOU TONIGHT AT PLAZA LIBERTAD


CLEAR OR PLAIN ALPHABET TEXT :ABCDEFGHI J KLMNO PQRS T UVWX
YZ
CIPHER ALPHABET :LOVEABCDF G H I J KMNPQR S TUWX
YZ
CLEAR TEXT :WILLM EETYO UTONI GHTAT PLAZA
LIBER TADWX
CIPHER TEXT : WFIIJ AASYM TSMKF CDSLS NILZL
IFOAQ SLEWX

3. TRANSPOSITION CIPHER SYSTEMS


 In this system, the individual letters are still present in the cryptogram. They have simply been
rearranged in a different order to form the cipher test. Writing a message backward is simple form of
transposition. Leonardo da Vinci wrote his notes in this system. More complex methods of the
transposition systems are available but it will take more time and effort to study it, hence we will be
contented with the basic for the moment and learn more of cryptology in some other time.

MESSAGE : WILL MEET YOU TONIGHT AT PLAZA LIBERTAD


CIPHER TEXT : DATRE BILAZ ALPTA THGIN OTUOY TEEML LIWZM

PRINCIPAL AREAS OF INTELLIGENCE INTEREST


a. Organized Crime
b. Subversive Organization
c. Terrorism

Organized Crime
 It is the combination of two or more persons for the purposed of establishing by terrors, threats,
intimidation or conception in the city or community section of either monopoly or virtual monopoly
or criminal activities in a field that provides continuing financial profit.
 The following are common example but not limited to MAFIA, YAKUZA, Hong Kong triad and
Chinese triad and etc;
 Most authorities point to Sicily and Italy and the development of Camora and Mafia as the beginning
of the techniques and methods used by organized crime. The historical development has some
significant to the intelligence organization in that it reflects the close knot family ties of the ruling
hierarchy of organized crime.

Subversive Organization
 It is an organized and systematic conspiracy to overthrow a duly constituted authority or government.
One of the common is the communist party of the Philippines, CCP, NPA, and NDF.
 The communist movement had split into three factions, the Re- Affirmists group headed by Jose
Maria Sison alias Armando Liwanag, the Revisionist Group led by Felimon Lagman alias Carlos
Forte or Popoy Lagman, and the New Bloc which is led by a conveyor.

22 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 Sison founded the CCP in December 26, 1968 is presently living in exile in Utrecht, Holand.

Communism
 It is a social and political movement which is based on Karl Marx’s interpretation of history and
which seeks to achieve communism by revolutionary means through the dictatorship of the
proletariat.It advocates that the ownership of property or means of production, distribution and
supply, by the whole of classless society, with wealth shared on the principle of “to echo according to
his need” each yielding fully according to his ability. Originated in “communist Manifesto” in 1848
by Karl Max and Friedrich Engels, both German philosophers who were considered as political
outcast during their time. In Rusia, It was Vladimir Llyich UlynovLenin together Leon Trotsky,
implemented the concept of a revolutionary party as part of communism (Bolshevik Part) which led
to the establishment of the Union of Soviet Socialist Republic (USSR). Later, the theory called
Marxist-Leninism
 In 1921, Mao Zedong, founded Shanghai Communist Party and led the Autumn Harvest uprising
which was crushed by the Koumintang militia. He fled to the mountains and built the Red Army.
After World War II Mao Zedong’s forces expelled Chiang Kai-Shek’s Koumintang to Taiwan. Mao
Zedong then established the People’s Republic of China.
 The first communist party in the Philippines was organized by the group of Luis Taruc during the
Japanese occupation of the Philippines. Their original purpose was to fight the Japanese but after the
war, they continued their insurrection against the government. President Ramon Magsaysay was
credited for the demise of the communist party which was built along the Soviet line of communism.
In December 26, 1968, the CCP organized by Jose Maria Sison along the Mao Zedong thought came
into existence with 25 full-pledge members.
 March 28, 1969, the CPP organized the New People’s Army (NPA) with 9 squads as its armed
component. In the early 1970’s, the National Democratic Front (NDF), the united front of the CPP
was organized and became the umbrella organization of those fighting the government after Martial
Law was declared in September 21, 1972 by President Ferdinand Marcos. The CPP/NPA/NDF
strength was estimated to have reached from 23,000 to 25,000 in 1988 and the protracted war that
was on-going had greatly affected the government.

Terrorism
 Terrorism is defined as the unlawful use of force or violence against persons or property to intimidate
or coerce government, the civilian population, or any segment thereof, furtherance of political or
social objectives.

Two (2) types of terrorism are;


1. Domestic – this involves groups or individual whose terrorist activities are at elements of our
government or population without foreign direction.
2. International – this involve terrorist activity committed by groups and individuals who are foreign-
based and or directed by countries of groups outside the country or whose activities transcend
national boundaries.

TOP 10 BEST INTELLIGENCE AGENCIES IN THE WORLD 2019

1. Mossad
 the national intelligence agency of Israel, one of the top 10 countries with the most powerful nuclear
weapons in the world. It is one of the three branches of the Israeli Intelligence Community – the other
two being Shin Bet and Aman, which handles internal security and military intelligence, respectively.

2. Secret Intelligence Service (SIS)


 The Secret Intelligence Service is the foreign intelligence agency of the UK. Commonly known as
MI6, it is the second-most popular agency on this list, a distinction it owes to the James Bond movies.
Like almost all the other agencies on this list, the MI6 primarily deals with external affairs, leaving
internal affairs to the MI5.

23 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

3. Foreign Intelligence Service (SVR)


 It is the civilian foreign intelligence agency of the Russian Federation. It is the successor to the First
Chief Directorate of the KGB and works closely with the Main Intelligence Directorate, the military
foreign intelligence agency of Russia. The primary security agency of Russia, the Federal Security
Service, which mainly deals with internal affairs, the SVR is responsible for gathering intelligence
outside the country.

4. Central Intelligence Agency (CIA)


 It is the foreign intelligence agency of the US. It collects information from overseas, with minimal
information collection within the country. It is the most popular and easily recognizable intelligence
agency in the world, mainly due to its numerous appearances in Hollywood movies. The CIA was
formed in 1947, making it one of the oldest intelligence agencies on this list. The agency is tasked
with monitoring overseas developments that might threaten the US, especially relating to terrorism
and nuclear weapons and other weapons of mass destruction. The agency also handles
counterintelligence and cyber warfare.
5. Federal Intelligence Service (BND)
 The Bundesnachrichtendienst or the Federal Intelligence Service is the foreign intelligence agency of
Germany. It was formed in 1956 and directly reports to the German Chancellery. Being the only
overseas intelligence agency in the country, it is responsible for gathering both military and civil
intelligence.
 The BND is tasked with detecting all possible threats to German interests and national security from
overseas. The agency gathers information on terrorism, nuclear weapons and other weapons of mass
destruction, organized crime, drug and illegal human trafficking, and illegal migration.
6. Research and Analysis Wing (RAW)
 The foreign intelligence agency of India probably has the least conspicuous name out of all
intelligence agencies in the world. Outsiders might even think it’s just a non-government
organization. But don’t be fooled by the agency name – the Research and Analysis Wing is one of the
most capable in the world.
 The RAW plays an instrumental role in keeping India protected against terrorist attacks and
monitoring developments in other countries which could directly affect India.
7. Directorate-General for External Security (DGSE)
 Operating under the French Ministry of Defence, the Directorate-General for External Security is the
French equivalent of the Central Intelligence Agency. It mainly deals with foreign intelligence and
issues, with the Directorate-General for Internal Security handling domestic affairs.
8. Canadian Security Intelligence Service (CSIS)
 Canada is one of the safest countries in the world. Most of the credit for keeping the country safe
goes to the Canadian Security Intelligence Service, the main intelligence agency in Canada.
 The CSIS handles everything related to Canada’s national security. Duties include collecting
intelligence, running covert operations, and advising the government on potential security threats.
The CSIS is also Canada’s representative in the Five Eyes, an intelligence alliance between the US,
the UK, Canada, Australia, and New Zealand. The Five Eyes is considered one of the most extensive
espionage alliances in history, though it has long been under public scrutiny for its methods.
9. Australian Secret Intelligence Service (ASIS)
 Headquartered in Canberra, the Australian Secret Intelligence Service is the Down Under equivalent
of the Central Intelligence Agency. It mainly deals with international or foreign intelligence and
typically coordinates with other similar agencies around the world.
10. Ministry of State Security (MSS)
 The Ministry of State Security is the security agency and intelligence agency of China. It is
headquartered in Beijing and has 17 known bureaus or divisions, including a counterintelligence
division and a social research division.

24 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

 The MSS plays a central role in censoring the internet in China, cutting off the population from the
outside world and allowing the government to control what influences the Chinese people. The
agency is also responsible for handling internal dissent and anything that might cause citizens to rebel
against the ruling Communist Party.

TOP 10 – Most powerful intelligence agencies in the world 2019

1) Mossad (Israel)
2) Inter-Services Intelligence(ISI) ( Pakistan)
3) Secret Intelligence Service(MI6) (UK)
4) Central Intelligence Agency(CIA) ( USA)
5) Federal Intelligence Service (BND)
( Germany)
6) Research And Analysis Wing (India)
7) Directorate-General for External Security
(France)
8) Canadian Security Intelligence Service or
CSIS (Canada)
9) Australian Secret Intelligence Service
(Australia)
10) Ministry of State Security (China)

25 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz

THE PHILIPPINE INTELLIGENCE SERVICE

The National Intelligence Coordinating Agency (NICA)


 It is the primary intelligence gathering and analysis arm of the Philippine
government, in charge of carrying out overt, covert, and clandestine intelligence
programs. Presently, NICA is in close coordination with the CIA, Mossad, Secret
Intelligence Service and intelligence services of ASEAN countries to counter the
threat of terrorism.
 The agency is led by a Director-General and is assisted by Deputy Director-
General. The former reports directly to the President. Its present headquarters are
located in Quezon City. Trifonio Salazar is the current director general of NICA.
 The NICA has a National Intelligence Board that serves as an advisory board to the
Director-General before he would submit his findings to the President relating to
national security matters affecting the Philippines.
The Philippine Drug Enforcement Agency (PDEA)
 It is the lead anti-drugs law enforcement agency, responsible for preventing,
investigating and combating any dangerous drugs, controlled precursors and
essential chemicals within the Philippines. The agency is tasked with the
enforcement of the penal and regulatory provisions of Republic Act No. 9165 (R.A.
9165), otherwise known as the Comprehensive Dangerous Drugs Act of 2002.
 PDEA is the implementing arm of the Dangerous Drugs Board (DDB).
 The DDB is the policy-making and strategy-formulating body in the planning and
formulation of policies and programs on drug prevention and control. PDEA and
DDB are both under the supervision of the Office of the President.
The National Counter-Terrorism Action Group (NCTAG)
 It was formed on November 27, 2007, with its existence announced to the public on
November 29, 2007. It is an anti-terrorist body under the Philippine Anti-Terrorism
Council. The NCTAG is under the command of the Philippine National Security
Advisor.
National Bureau of Investigation
 It is an agency of the Philippine government under the Department of Justice,
responsible for handling and solving major high-profile cases that are in the interest
of the nation.
National Security Council (NSC)
 The principal advisory body to the President on the proper coordination and
integration of national security plans and policies(EO 33, November 8, 1992). The
NSC's function is to advise the President with respect to the integration of domestic,
foreign, and military policies relating to the national security. It is also said that it
serves as the President's principal arm for coordinating these policies among various
government departments and agencies in matters involving the national security.

Under Philippine National Police


1) One (1) of the Directorates of the PNP is the Directorate for Intelligence. This
Directorate is composed of four divisions; Intelligence Operations Division, Counter-
Intelligence and Security Division, Foreign Liaison Division and Intelligence Research
Division.
 The mission of the Directorate for Intelligence is; to assist the Chief, PNP in
attaining intelligence objectives through staff direction, planning, coordination,
control and supervision of all intelligence and counter-intelligence activities of the
PNP.
2) the PNP Intelligence Group was also activated as one of the operational units of the
PNP. The IG is under the Directorate for Intelligence.

26 | LEA – 5
Capiz Government & Business Center, Roxas City, Capiz

 Its function is to serve as the intelligence and counter-intelligence operating units


of the PNP.
3) Regional, Provincial, City and Municipal Police Offices and Units also have their own
intelligence divisions, branches or sections that function as intelligence and counter-
intelligence unit. This is being done in close coordination with the intelligence units of
the AFP and other law enforcement agencies.
-------END-------
DISCLAIMER:
This document does not claim any originality and cannot be used as a substitute for prescribed
textbooks. The information presented here is merely a collection by the committee members for their respective
teaching assignments. Various sources as mentioned at the end of the document as well as freely available
material from internet were consulted for preparing this document. The ownership of the information lies with
the respective authors or institutions.
REFERENCES:
• Montojo, Felipe G. (2006). Police Intelligence, National Bookstore
• San Diego, Gilbert C., Calima, Charles T., and Manwong, Rommel K., (2012) Compendium Criminal
Justice Education
Manwong, Rommel K., and San Diego, Gilbert C., (2010), Dynamics of Law Enforcement and Public
Safety Administration, Wiseman Book Trading Inc.,

Safety Administration

27 | LEA – 5

You might also like