“Need to Know”- is the term given to the requirement
1:00-2:30PM –– SJH-408 that the dissemination of classified matters be limited CFUNDCRIM strictly to those persons whose official military or WEEK 13: Classification of Documents government duties requires knowledge or possession Document- is any recorded information regardless of its thereof. physical form or characteristics and include but not limited to 7. Damage to National Security- refers to the prejudice, the following: embarrassment or injury of the Republic of the Philippines 1. Written matter whether hand written, printed or type. resulting from any act or omission. 2. All painted, drawn or engraved matter. 8. Declassify- the act of removing the security classification. 3. All sound and voice recording. 9. Reclassify or Regrading- this refers to the act of 4. All printed photographs and exposed or printed film, still or changing the assigned classification to classified matter. moving. 10. Upgrading- this refers to the act of assigning the matter a 5. All reproduction of the foregoing for whatever purpose. higher classification than that previously assigned to it.
Four Classified Matters Two Kinds of Documents
1. Top Secret (Green Color code) 1. Personal- letters, diary and notebook; it should be - is any information and materials, the authorized disclosure treated usually the same with official documents. of it would cause exceptionally grove damage to the 2. Official- orders, manual, newspapers, leaflets, nation, politically, economically or militarily. overlays, maps and magazines. Authority to Classify Top Secret Matters: 1. Secretary of National Defense Categories of Documents 2. Chief of Staff and its equivalent to the PNP. Category A- information which contain reportable time 3. Major services commanders. sensitive order of battle information 4. Area and Unified Commands of the PA, PNP, and significant information. and its equivalent to the PAF and PN. - it contains the “SATULE” information. - It should be given priority because it is a critical 2. Secret (Red Color Code) information. - is any information and materials, the unauthorized - It is critical to friendly operations - Requires disclosure of which endanger National Security, causes immediate action. serious injury to the interest and prestige of the nation or Category B- anything that contains communications, of any government activity or of great advantage to foreign cryptographic documents or systems should nation. be classified as Secret and requires special Authority of Classify Secret Materials: handling. It should be declassified by higher 1. Commanders of Infantry Battalion authorities. 2. Person enumerated under Top Secret - All category B does are classified as secret because it 3. Special and Personnel staff of GHQ may contain information that maybe category A. 4. General and Special staff of Major Service areas Category C- other information which contains something and unit commanders that should be an intelligence value. 5. Superintendent of the PMA and PNPA - contains exploitable information regardless of its contents. 6. Commanders of post, depots, station of separate - It could be category A or B. units - Unscreened materials or documents should be 7. Chief of Military mission or group categorized as category C. Category D- No value, yet lower level will never 8. Armed Forces Attaches classify documents as category D. 9. Commandants of service Schools - do not decide at the lower echelon that document bas no value. It is the duty of the higher 3. Confidential (Blue Color Code) HQS. - any information and material the unauthorized disclosure of which would be prejudicial to the interests and prestige Three types of Translation to the national or governmental activity or would cause 1. Full- everything is translated or forwarded administrative embarrassment or unwanted injury to and or would be of advantage to foreign nations. 2. Extract- only portion of it is translated Authority to classify Confidential Matters: 3. Summary- translated only the main part 1. Any commissioned personnel Counter Intelligence Agencies: 4. Restricted (White or No Color Code) 1. Individual Soldier- Counter- intelligence - any information and material which requires special operations depend upon the individual soldier’s protection other than those determined to be ability to carry out proper security, camouflage, confidential, secret, and top secret. Yet prior to observation and reporting procedures. release require clearance with the records custodian. 2. All Units- to deny the enemy information our own forces, their activities, location and disposition. Handling Classified Security Information: 3. Censorship Units- specialized counter 1. Classify- this refers to the assigning of information in any intelligence functions due to their assigned tasks. form or materials one of the 4 security classification categories after determination has been made that the Commander’s Responsibility information requires the security protection as provided for The commander of the unit is responsible for the planning and in the regulation. execution of all CI measures designed and implemented to 2. Classified Matters- is any information and materials in safeguard military information, personnel, equipment and any form or any nature the safeguarding of which is installation within his command. The commander delegates necessary in the interest of national security and which is these responsibility to his staff. classified for such purpose by the responsible classifying authority. Counter Intelligence Staff Officer 3. Compromise- takes place through loss of security which The commander’s staff officer for intelligence is results from unauthorized persons obtaining knowledge of charged with the general staff responsibility for intelligence and classified matters. counter- intelligence 4. Unauthorized- persons not authorized to have access on classified matters. “ In times of National Emergency”; It is recognized the security and welfare of the nation must take precedence on certain civil 5. Compartmentation- refers to the grant of access to rights and privileges which are enjoyed by citizen in a stable, classified matter only to properly cleared persons. peacetime situation, wartime situation, it becomes necessary to implement certain restrictive measure which would -are information collected as additional while on EEI, These unconceivable in time of peace” are items that are also needed but are not given the right priority. Espionage- refers to the collection of secret informations that a government or organizations does not want any Police Intelligence Estimate (PIE) outsider to know. - a written study of the situation and conditions of a crime Sabotage- is an action against material, premises or utilities situation with the recommended course or courses of action. or production, which ensures, interferes with or obstruct the national security or ability of a nation to prepare for war. 2. COLLECTION OF INFORMATION-It refers to planning of Subversion- is an action principally clandestine or covert collection effort and actual collection of information activity. designed needed to undermine the military, economic, psychological, morale or political strength of a regime. Collection- gathering of the needed information from all Anything that will undermine the political, social, economic possible sources and the reporting of the information from all and other aspect of the country. possible sources and the reporting of the information to intelligence producing agency. Identification of Criminal Subversive elements Collection of information- it is the culling ( collect, brig Organized/ Syndicated crime groups- means a group of two together) of information from all possible overt sources. or more persons collaborating, confederating, or mutually Procurement of information- it is the aggressive effort to helping one another in the commission of crime. acquire a certain specific information which may not be readily 1. Kidnap for Ransom available. 2. Bank Robbery Five Successive steps of Collection Plan 3. Drug Syndicates 1. Determination of intelligence requirement 4. Carnappers 5. Terrorists groups 2. Formulation of the intelligence requirement 3. Determination of priority 6. Secessionists / Communist movement 4. Section of collection agencies Disaffection- is the lack of loyalty or affection for one’s 5. Supervision government or constitution. Treason- consists of levying for war against a country or the adherence to aid enemy by any Reasons why constant and continued supervision of the one owing allegiance to that country. collection effort is necessary: Sedition- is an inflammatory speech or conduct against the 1. to ensure compliance of order public order in the tranquility of a state with the intent to 2. to check incoming information interfere with the government operation or success of its 3. to keep abreast with the situation and the results mission. Insurgency- is a protracted political military activity achieved by the collection efforts needs modification. directed towards completely or partially controlling the resources of a country and the creation of an alternative Three (3) main aspects of Collection government through the use of irregular military force and 1. Guidance – the direction of collection effort illegal political organizations. 2. Coverage- complete functional fulfillment of the *Technical Intelligence- it concerns with foreign technical assigned mission to filed collecting agencies through full developments which have a practical military application and exploitations of all available sources of information and the the physical characteristics, performance, capability and initiative to develop new sources limitations of materials and installations housed by and for 3. Reporting- timely conveyance of information in usable foreign military forces. form the collecting agency to the intelligence producing unit.
• Intelligence distinguished from Information Who are tasked to collect information:
*Information- A raw data or unevaluated material of every 1. Intelligence officer/agents description derived from 2. Civilian agents observation, communication, 3. Assets- refers to establishments, institutions, reports, rumors, imagination, and agencies, organizations or non- juridical persons. 4. other Concerned citizens sources from which intelligence is derived. - Intelligence Information- any information gathered or Two basic collection Strategy received which is of intelligence interest or significance. 1. Resource Integration- one (1) agent 2. Agent Mixed or Redundancy- three or more agents WEEK 14: THE INTELLIGENCE PROCESS assessing for the same assignment. Intelligence process refers to the cyclical steps followed from intelligence planning, collection, processing, dissemination Criteria of Collecting Agencies/units 1. Capability- physical ability of the unit 1. DIRECTING- In this phase the intelligence staff officer or 2. Balance/ Suitability- availability of the unit in selecting unit commander determines the priority intelligence the area of interest. requirements (PIR) and / or informations requirements (IR). 3. Multiplicity- ability to compare two or more prospected These are requirements then balanced and distributed to the collecting agencies. collecting agencies by direction or by request. 1. Determination of requirements Sources of Information 2. Determination of the essential elements of Source- where the information is obtained. information Organization- refers to the intelligence personnel or the 3. Establishments of priorities.(PIR’s) intelligence unit. 1. Persons (informant, syndicate, intelligence broker, Essential Element of Information (EEI) double agent) - it is what is given to collectors by the 2. Object supervising officer on what to gather for the particular 3. Records project or mission. -are those obtained items and information needed at a Intelligence Community- is the conglomeration of all particular time to permit decisions to be made with in an intelligence units and agencies in a country composed of acceptable degree. civilian, military and quasi military organization. - it defines the scope and nature of information which an agent pursues at a given time. Three (3) factors in the recruitment of human sources 1. Placements Other Intelligence Requirements (OIR) 2. Access- the most important factor. 3. Motivation 8. Covert- It is the information obtained without the Good sources of information: (These people volunteer for knowledge of the person against whom the information or various reasons/motivations ranging from the Nationalistic, documents may be used. Personal, Religious, or Materialistic gain) 9. Elicitation- the technique of acquiring information or 1. Victim of crimes intelligence of operational value through conversation with a 2. Ordinary citizens person who is not aware or unaware of the specific purpose of 3. Group leaders in the community the conversation. 4. Bar workers 10. Casing- is the reconnaissance and surveillance of a place, building, or area to determine its suitability for 5. Religious groups intelligence use or its vulnerability in an intelligence operation. 6. Merchants a. Surveillance-means to gather general 7. Other well- meaning observers. information over a wide area and it takes a longer time frame. Other important sources b. Reconnaissance- means to gather specific 1. Captured documents or detailed information at a particular time and place. 2. Government agencies 11. Cover- It is any device utilized by an individual, 3. Informers organization or group to ensure that no one who do not have 4. Informants the right to know will not be aware of the real purpose or intent 5. Libraries/files of the mission. 12. Observation and Description- it is the complete and INFORMANT AS DISTIGUISHED FROM INFORMER: accurate awareness by an individual of his surroundings and Informant- a person who gives information to the police encompasses the use of all the major senses to register and voluntary or involuntary , without any consideration, whereas; recognize its operational or intelligence significance. Observation- it is the factual reporting of what was observed. Informer- an individual who gives information for a price or 13. Order of Battle- it is the summary recording of one’s reward.(He may be in the payroll of the law enforcement specific criminal activities with entries covering matters with agency) intelligence and tactical interest, enumeration of personalities involved in the organization’s movement and activities. General Classification of Source of Information 14. Clandestine Operation- is a secret action 1. Open Sources- (Most information are obtained in this undertaken by an intelligence agent in behalf of an way, More than 90% of information are gathered in this organization, the government and other friendly forces. way. 15. Sketching – consist of putting ideas in an accurate 2. Non- Open or Closed Sources- are those that are pictorial form. It is a means describing on object or area to not obtainable openly. They can be located inside satisfy a particular need. building’s safe or vault, known only in the minds of some 16. Photography- is the process of producing image on a scientist, or through the employment of technical sensitized material by variant form or radiant energy. means.(Bugging and tapping) 17. Provocation-is an action taken in order to incite reaction from a know adversary or to observe reactions of Bugging- it is the placement of a hidden microphone to the adversaries. target to collect to telephone conversation. Wire tapping- a method of collecting information through 18. Portrait Parle- a means of using descriptive terms in interception of telephone conversation. relation to the personal features of individual and it can briefly describe as a word description or spoken pictures. Three types of Opposition in gathering information 2. PROCESSING THE INFORMATION 1. Active opposition- members of foreign intelligence operatives including their potential assets. - it is the means by which the information secured by collecting agency is converted into intelligence required by 2. Friendly opposition- military personnel and their the consumer. colleagues - In this phase, collected information is transformed into 3. Passive opposition- those who are undecided at the intelligence. It involves four stages: moment whether to side which organization. Selection- is the method by which information is made available to appropriate researchers after it reaches the Note: Information which is of low reliability and doubtful is not intelligence producing organization. This is not to be confused discarded or refused acceptance because processing will with initial selection which is performed during the collection. evaluated and interpret this info and may still be found useful and relevant. Many seemingly unimportant and insignificant A. Recording- It is the reproduction of information through information later turns out to be the writing or in some other form of graphical representation and “break” the police is waiting for. the arranging of information into groups of related items Aids in recording •Methods of Collection of Information 1. Intelligence journal 1. Overt-information are procured openly without regard in to whether the subject of the investigation becomes 2. Situation map knowledgeable of the purpose for which it is being gathered. 3. Intelligence files 2. Interview- the casual questioning of a person who is 4. Intelligence workbook not under the control of the interviewer. - It is a method of obtaining information although he maybe B. Evaluation- This is considered judgement of the accuracy, ignorant of the true or real purpose. completeness, and meaning of an item of information. It 3. Interrogation- is the skilful questioning of the subject involves an examination of both the source and content of the or person who is under control. report in question, since the value of an item of information depends upon the reliability of the source as well as the 4. Instrumentation- the application of instruments and probability or plausibility of the information itself. source or the methods of physical sciences to detect or determine the agency and the accuracy of the information. participation of the subject. 5. Research – investigation to get facts through the files Pertinence- usefulness of the information. Information is of other agencies or company records. considered pertinent if: 6. Investigation – is the collection of facts or knowledge a. It deals with the enemy or area of from other sources, either from regular sources, public spirited operation. citizens, informants or informer. b. If it is needed immediately. 7. Debriefing- the subject is cooperative or under some c. If it is of present or future potential degree of control and is aware of the intelligence interest. value. administrative organizations, mineral deposit production Reliability- The research analyst’s first step is try to determine facilities, distribution of population and other geographical the reliability of this particular source, which is best matter. accomplished by checking its performance. If previous 3. Charts, Graphs and Statistical Tables- useful for information derived form this source has consistently proven to plotting or compiling information dealt with by economic and be accurate, it can be considered a highly reliable- source; if it sociological intelligence such as the study of military has been frequently in error, it must regarded as relatively manpower. unreliable. 4. Periodic digest- some subjects like political events, Probability- is judged by its consistency within itself, its which do not readily lend themselves to factual analysis, a circumstantially, its plausibility in view of general knowledge periodic digest or chronology will be of great assistance. The and experience , and its consistency with other information or purpose is for the condensing for ready reference the principal intelligence on the same related subjects. development around which the study of the subject must be 1. Consistency within itself- it is an important element built. in the probability of any time of information. The researcher will examine a report to determine if it is self- Three (3) steps in Analysis contradictory and examined if it makes sense. a. Assessment- is the shifting and sorting of evaluated 2. Circumstantially- means minuteness of detail. A information with respect to the mission vague and general report may be perfectly true, but b Integration- It is the combination of the elements stated in practically useless, because the essential details are assessment with other known information or intelligence to lacking. form a logical feature or hypothesis for enemy activities or 3. Plausibility- a report must be examined against the information of the operational are and characteristics of the background of general knowledge on the subject in mission of the command. question. c. Deduction- concerns in finding out the meaning of 4. Consistency with other information- a report must information as to the area of operation or be examined to determine its consistency with other enemy .It is the mental process designed to answer the information or intelligence on the same or related subjects question. “What does this info mean in relation to the mission of the command and the enemy situation in the area of Credibility- refers to the probable truth of the information operation. Letter Figure System- a conventional evaluation code , which rates both the reliability of source and probability accuracy of 4. DISSEMINATION and USE information. It consist of letter A to F to the source of the -This is the final phase of the cycle wherein the processed figures 1 to 6 assigned to the information itself. information or intelligence will be disseminated by means of reports, annexes, briefing, estimates, messages, and other Code of Evaluation of Reliability and Credibility of forms to the selected agency, unit or command to effect or Information implement the mission. After information has been collected Code and Evaluation of Sources of Information and processed into intelligence, it must be made available to A…………………….Completely Reliable all authorized persons or agencies having a need for it. The B ……………………Usually Reliable ideal intelligence report should be complete, accurate and C…………………….Fairly Reliable timely. D……………………Not Usually Reliable -Timeliness of dissemination means getting the E……………………Unreliable produced intelligence into the hands of all potential users in F…………………….Reliability not known time for them to make use of it. Efficient machinery must be provided for editing, reproducing, assembling and publishing. Code and Evaluation of Information Intelligence, however sound, thorough and significant is of no 1…………………… Confirmed by other sources value if it remains in files or in the hands of the researchers. 2…………………… Probably true -No two dissemination process are exactly alike. The 3…………………… Possibly true medium chosen for dissemination will in each case depend on 4…………………….Doubtfully true the type of intelligence, its urgency, its bulk, its security 5…………………….Improbable classification, the agency to which it is addressed, the manner 6…………………… Truth cannot be judged in which it will be sued, and the number of copies require. Dissemination procedures must be developed to fit various “A”- those based on direct observation requirements. “B”,” C”,” D”, E- those coming informants whose reliability can be judged on the basis of previous performance, rarely “A” or There are many types of media employed in the “B”. F- those form untested informants dissemination of intelligence: “Any sub source of the field observer should be rated “F” by 1. Informal means- intelligence may be disseminated the researcher unless he ahs had previous experience with the by this means and it usually assumes the form of personal same category”. consultation. 2. Oral presentation- Usually in the form of a briefing, a 3. Analysis- the determination of the significance of the lecture or a group conference or it may be personal information as well as the reliability of the source or the agent presentation to higher authority. and the accuracy of the information. It involves minute 3. Memoranda- Usually an informal memorandum to the examination of related items to determine the degree to which researcher’s superior, or to other interested agencies. they confirm, supplement or contradict each other thereby 4. Assigned/ Required Projects or Reports- These establishing accepted facts and relationships. are usually a requirement for intelligence by the consumer. Aids to the Process of Analysis 5. Periodic Publications- These media of dissemination are printed and intended for wide publication. - analysis requires extensive use of mechanical They contain data and discussions on relatively wide fields of devices and techniques for extracting and indexing contents of intelligence and are designed medium, the requirements of the incoming reports and compiling them in logical system. Only situation and other considerations, certain basic principles with the aid of these devices may be critically compared and apply in all cases. surveyed. Among the principal mechanical aides are: 6. Graphic Presentation- Maps, graphs, charts and photographs should receive maximum usage in all forms of 1. Card files- subdividing subject matter into its smallest dissemination. elements and providing a single card for each element. Sometimes it is possible to breakdown the data of each 7. Books- these formal, systematic presentations in element further and provide or design-printed cards that will printed form are used when dissemination of whole fields of provide spaces for the different facts. intelligence are desired, or to provide reference or training material to a large number of people 2. Situation Maps- some types of information are best recorded on situation maps such as unit locations, troop 8. Periodic Reports- this medium is used to movements, fortifications, boundary disputes, local disseminate substantial changes or improvements in previous knowledge, which is of interest to a number of agencies or provocative statement that may be incorrect, which will in persons. effect force the source to correct the collector. 9. Special reports- this medium is used to disseminated b. Man from Missouri Approach- The collector will substantial changes or improvements in previous knowledge disbelieve what the source is saying to a point where the which is of interest to a number of agencies or persons. source is force or prove the accuracy of his words through 10. Cables- spot intelligence is sometimes transmitted to additional information. representatives overseas by cable in order to aid them in their c. Joe Blow Approach (Know it all) –The collector will own report or in whatever missions they are performing. become arrogant and project a message that he/she knows 11. Films- the use of short motion picture films for the it all. dissemination of intelligence. d. National Pride Approach- nature propensity of all 12. Preparation of Material- dissemination of intelligence person to defend their country and its policies. The collector is usually in writing. will tie the required information to national pride in an attempt to get the source to confirm, deny or elaborate on Purpose of Dissemination : information. a. To enable the commander to make decisions e. Partial- Disagreement approach- seek to produce with confidence. talking by the word “I’m sure if I fully agree”. b. To provide knowledge in the like of which new information may be processed Types of Probe: 1. Competition Probe- this is effective when used in WEEK 15: Covert Methods of information Collection connection with the teacher- pupil approach. 1. ELLICITATION 2. Clarity Probe- used to elicit additional information in A system or plan whereby information of intelligence value is an area which the response is clear. obtained through the process direct intercommunication in 3. High Pressure Probe- it serves to pin down a subject which one or more of the parties to the community unaware of in a specific area or it maybe used to point out the specific purpose of the conversation. contradictions in what the subject has said. Characteristics: 4. Hypothetical Probe- present a hypothetical situation 1. Subject is not aware of the true reason for and to get the subject to react to the hypothetical situation. extent of your interest in his information. 2. You have a little control of the subject. CASING - It is the reconnaissance or surveillance of a building, 3. Elicited information usually consist of place or area to determine its suitability for intelligence isolated fragment of information. operation or its vulnerability in operations( position of the Three Phases enemy) 1. determination of the mission General Principles: 2. selection of the subject 1. Know the best route to take get there. 3. accomplishment of the mission Two devices in the conduct of Elicitation: 2. Know how to conduct yourself without attracting attentions. 1. Approach- the process of setting people to start talking. 3. Know what security hazards are in the area and how can they avoided or minimized. 2. Probe- the process to keep the person talking incessantly. 4. Know the best rout to extricated from the area.
Purpose of Elicitation: Importance of Casing:
1. To acquire information which is unbelievable through 1. Aids in planning for operation. other channel. 2. Aids to Agent handler in briefing high agents. 2. To obtain information which although unclassified is 3. Offers the degree of protection for the operation. not public known. 4. Aids in the operational testing of agents. 3. To provide operational information and background data on potential source of information. Information desired in Casing 4. To assist various individual. 1. Area Condition and Habits a. Detailed sketch and photograph of the area. Planning and Preparation: b. Customs, habits, language and dress in 1. Determine what information is necessary or essential order to be able to blend with the community. 2. Determine who has access to the information. c. Transportation facilities, the fare, station, in 3. What are the vulnerabilities order not to ask questions. 4. How susceptible the subject to elicitation. d. Knowledge of establishments determine 5. Outline elicitation points prior to meeting and prepare what are desirable, if are free from raids anytime to specific questions and know your subject well. avoid compromise. e. You must know what kind of people residing Types of Approach: in the neighborhood so that agent will know what 1. Flattery- people are susceptible to praise Variants: appropriate actions he takes. a. Teacher- Pupil approach- the subject is treated as f. Restrictions an authority. We request him/her to enlighten us and we g. Description of the subject solicit his viewpoint and opinions. b. Kindred Soul approach-The subject has been place 2. Active Opposition in a pedestal having some specialized quality and you a. Criminal flatter him/ her by showing enough concern for his/ her 1. capabilities welfare to pay special attention to his enjoyment. b. Foreign Intelligence Services c. Good Samaritan approach- is sincere and valid 2. People they employ offers of help and assistance are made to the subject. c. All alien intelligence information d. Idol- The collector builds the them based on his/her 3. intentions deep admiration of he source of information and express d. Strategic intelligence curiosity on how one could achieve such greatness. 4. fear 5. vulnerabilities 2. Provocative approach-discover a wide range of conversational gambits. 3. Disposal Plan( incase of compromise)- Either Variants: swallow or flush the information, temporarily or a. Teaser Bait Approach- the collector will direct the permanently depending upon the situation. conversation and to a certain topic and throw out a 4. Escape and Evasions- In case of compromise, the vital conference are the unit’s SOP, guidelines, regulations and agent must get out entirely from the target. instructions also includes designation of a leader, equipment's to be used, codes and signals, general instructions, funding • Conducts Prior, During, and after Casing requirements. Stake out or Plant-is the observations of places or areas from Pre- Action to the conduct of Casing a fixed point. 1. Analyze the Mission Tailing or Shadowing- observation of a person’s movement. Undercover man- it refers to a person trained to observe and 2. Study overt information penetrate certain organization suspected of illegal activities 3. Check the resources and later reports the observations and information so that 4. Cover operational action can be made. 5. Timing Liaison Program- this is the assignment of trained intelligence 6. Support requirements personnel to other agencies in order to obtain information of police intelligence value. (agencies like the press, credit During the Casing agencies, labor unions, telephone companies) Safe house- is a place, building, enclosed mobile, or an 1. Copy information discreetly, invent something so as apartment, where police undercover men meet his action not to invite attention. agent for debriefing or reporting purposes. 2. Avoid repetitions to avoid suspicion. The personal Drop- a drop is a convenient, secure, and unsuspecting place meeting place must be outside of target area, and then where a police undercover man, informer or informant by a maintain cover story. pre arrangement leaves a note , a small package, an envelope 3. Act naturally to item for the action agent, supervisor or another agent. Convoy- an accomplice or associate of the subject. After the Casing Decoy- any person or subject, almost similar to the subject Use your own discretion used to avoid or elude surveillance. Contact- any individual whom the subject speaks or deal with in any way while under Stages of Casing: surveillance. 1. Area familiarization Finger man- an individual who can positively point the subject. 2. Actual inspection of the area Put the finger on- to identify the subject by pointing him out in 3. Re-casing person or in photograph. Put to bed- when the subject under surveillance returns to quarter and apparently retire for the Five Fundamental Principles of Casing: night. Contact- any person whom the subject picks or deals with 1. to gain contact as soon as possible and maintain while he is under surveillance. Made (Burn out)- when the continuously. subject under surveillance becomes aware that he is under 2. Maneuver freely in conformity with operations (dry observation and identifies the observer. run) Lost- when the surveillance do not know the where about of 3. To fight only when necessary 4. To report all items of their subject or the subject had eluded the surveillance. information. 5. To develop the situation. Classification of Surveillance according to intensity 1. Discreet- one in which every effort is made to insure Steps in the Conduct of Casing: that the subject is unaware that he is under 1. Preparation of general location map. observation/surveillance. 2. Sketch of the adjoining establishment and prominent 2. Close Surveillance- one in which maintaining features. constant observation of the subject is the objective 3. Specific sketch of floor plan of main target. regardless of whether or not he becomes aware of the 4. Detailed features of inner portion of target and its surveillant. description. 3. Loose- one in which maybe applied frequently or 5. Photograph of the casing target. infrequently with the period of observation varied of each occasion. Types/ Forms of Casing 4. (Harassment)- suspected criminals are under 1. Surveillance- means to gather general information surveillance wherein you can harass him. over a wide area and it takes a longer period of time. Classification according to method 2. Reconnaissance- means to gather specific or detailed information at a particular time and place. 1. Fixed or Stationary method- wherein the surveillance remains in relatively fixed position to observe • Surveillance the activities at specific location (Stake out/ Plant) - It is a process or act of keeping person, premises or 2. Moving Surveillance- The surveillant follows subject vehicles under observation in order to acquire detailed form place to place in order to maintain continuos watch information concerning the activities, identities and contact of over the individual or activity. The surveillant follows the the subject. It is concerned primarily with persons. Places and subject on foot, in a vehicle in an air craft or on ship. objects can be closely watched by are generally incident to the 3. Technical and Audio- visual surveillance- This primary interest of seeking information about people. involves the use of sophisticated communication and - It involves many varied techniques and skills including electronic equipment’s and devices. (taps and bugs) preparation, foot surveillance, automobile surveillance, stationary of fixed surveillance, and reconnaissance. Also, Electronics- is the filed of science and engineering concerned tailing, shadowing, trailing or keeping the subject under with the behavior of electrons in devices and the utilization of observation. such devices. Any equipment, device, gadget, or mechanism that utilizes electron flow as in a tube, transistor, and other Objectives of Surveillance- is to disclose or divulge the semi- conductors belongs to electronics. existence of illegal criminal activities and to reveal the identities of hose engaged in such activities. Telephone Scrambler- is technically a “speech inverter” whereby essential speech frequencies are divided into several Terms used in surveillance: ranges by filters and then inverted to produce a scramble Surveillant- A person who conducts surveillance which speech when intercepted. This is not a guarantee to be includes only observations. “descrambled” by a third party. Subject/Rabbit- The subject is the person or place watched. Pre- Surveillance Conference (Briefing)- a conference held EDPS- (Electronic Data Processing System) – same as among the team members, the police intelligence unit before a computer surveillance is conducted. It is called by the head of the team or the intelligence operations officer/ Subjects taken up in this Tape Recorder (TR)- is a mechanical- electronic device for d. It is necessary at all times to be close recording voice, music and other audio frequency material. enough to immediately observe the subject if he Special Methods of Surveillance enters a building, tuns corners or similar sudden 1. Wire tapping- The telephone lines is tapped some moves. where along the line, either in the street line or in the 2. Two- Man Shadow telephone company. The tapped lines are run into a - This is more advantageous because it permits immediate recorder which is monitored by the investigator. change and are less likely to be recognized. One shadower 2. Concealed Microphones- The microphone may be will follow the subject and the other may either be abreast , or concealed in the room or maybe disguised as a common on the opposite side of the street, or following the shadower. object such as a desk ornament. The wires are run out to The use of two officers affords greater security against a nearby room where the conversation is recorded. detection and reduce risk of losing the subject. 3. Tape recorder- A pocket size tape recorder maybe a. On streets crowded with pedestrian and vehicular concealed when recording the conversation. traffic, both surveillants should normally remain on the 4. Television- Closed circuit system may be used so same side of the street as the subject; that the activities of the subject maybe observed by the 1. The first officer trailing the subject surveillant at a distance. fairly closely; and 2. the second officer trailing the first Kinds of Surveillance agent some distance behind. A. Surveillance of Places b. On less crowded streets, one officer should normally The crimes which requires this type of surveillance are walk on the opposite side of the street nearly abreast of the gambling, abortion, prostitution, illegal sale of drugs or alcohol, subject and dishonesty among employees or infidelity in a divorce. c. In order to avoid detection, the two officers should make periodic changes in their position relative to the How Surveillance of Place is Conducted. subject. A careful survey of the surrounding area should be made. The 3. Three- man Shadow or ABC method character of the neighborhood, the residents and the transients The use of three officers reduces still further the risk of losing should be noted. The observation point should be selected. the subject and affords greater security against risk. Two types of place surveillance a. The three man method, or ABC or 1-2-3, permits a greater variation of position of the officers and also permits 1. Using a room in a nearby house or business an officer who suspects he has been spotted by the subject establishment and remaining undercover. to drop out. 2. Remaining outdoors and posing as a person who would normally conduct his business in such an area, ex. A b. Use of three man method under normal traffic conditions: laborer, carpenter, street vendor, etc. 1. The “A” officer keeps a reasonable distance behind Equipment used in the surveillance of a place: the subject. 1. Picture camera with telephoto lens. 2. The “B” officer follows “A” and concentrates on keeping “A” in view. 2. Binoculars 3. Tape recording apparatus 3. The “C” officer walks on the opposite of the street slightly behind the subject. 4. Wire tapping and bugging devices 4. The “B” officer may be responsible for detecting any 5. Other recording instruments confederate or convoy of the subject being utilized to detect surveillance. B. Shadowing or Tailing - it is the act of following a person. c. Use of the ABC method on streets with little or no traffic. 1. Two officers may be on the opposite side of the street or 2. Preparation for Surveillance: One officer may be in front of the subject. Preparation is a must before engaging in actual surveillance work. It is an absolute requirement. As such, d. Use of ABC method on very crowded streets. those assigned to do the job must study all files of information 1. All three officers should generally be on the relating to: same side of the street; a. subject-(name, detailed description including photos, 2. The leading officer should follow closely to Identifying characteristics and mannerisms, identity and the subject to observe his actions at intersections or if description of known or suspected contacts or associates of he enters a building, alley etc. the subject, and all background information on subjects) e. As in the two- man method, the officers b. Type, scope and extent of crimes known or suspected should frequently alter their relative to the subject. to be involved in the case. f. Under normal traffic conditions, when the subject c. Type of neighborhood or locality (type of inhabitants, approaches a street intersection, the “C” officer, (across Dress, language and dialects, degree of education and the street) should lead the subject and should reach the culture) intersection first. By using pausing at the corner, or d. Specific locations and places known or suspected to crossing the street turning in. Illustration: be involved in the case.( meeting places and hang outs, caches, hideouts, addresses frequented by the subjects) Other Surveillance Methods: e. Vehicles involved in the case (description and plate a. The leap frog Method numbers, street routes, garage and repair facilities) -This is used in attempting to locate the hide out of a suspect from a vantage point without moving after the subject. Methods of Shadowing The following day the shadower takes up a watch from the point at which the subject was last seen. a. Foot Surveillance 1. One- man shadow b. Fixed Surveillance - A fix surveillance of a subject’s residence or place of - This is the most common because it involves the use of the business may be conducted. This may require the renting of a least number of men but is extremely difficult and should be room nearby. One window must overlook the subjects’ avoided. In this type of surveillance, the shadower will follow premises. The window shade must be arranged that the the subject and make notes authentically of all that the subject observation may be over rather than under or at the side of the does. shade. A shade that keeps moving and is not drawn quite to a. The subject must be kept in view at all times. the bottom of a window will attract attention. On a fixed b. One- man surveillance will usually be very close and surveillance, it is likely that the subject is cautious and will lick somewhat dependent on pedestrian traffic and physical for any signs of strangers or strange vehicles in the characteristics of the area. neighborhood. He will also be observant of nearby houses and c. When walking on the opposite side of a street, the buildings. Open Shadow officer should keep almost abreast of the subject. - This is a method of surveillance that is used to good advantage in affecting the subject psychologically. Usually two B. Automobile Surveillance men are used as shadowers, sometimes three. Number one This requires careful preparation, wherein the shadow picks up the subject and “tails” him in such a manner shadowers must use a vehicle if the subject uses a vehicle. as to give his activities away to the subject. He wants the The vehicle used by the shadowers must be non-descript, subject to recognize him as a “tail”. Number two shadow preferably rented vehicles since they can be changed often. remains in the back ground, when number one’s shadow is The license plates must be anonymous if the car used in certain the subject has “made” him, he permits the subject to shadowing are official or government vehicles. The “tail” car “lose” him. may be changed several times a day to lessen chances of being detected. It is preferred that there be three men in Tactics and Techniques of Shadowing: shadow car. Number one man is the driver, number two General: watches for a convoy, number three takes notes. The notes The subject should be kept unaware of the shadowing include and place every act and every contact of the subject operation. The investigator should be inconspicuous. He vehicle and its passengers. Complete descriptions are made should not be detected looking directly at the subject. He of all persons contacted if their identities are unknown. should shift from left to right never remaining for long directly behind the subject. Both side of the street should be used. If Disguising the Car the subject is aware of the tailing, he should request for his a. License Plate – a popular type of black color car immediate removal. should be used and care must be taken that the license plates Particular: are not identified. This can be remedied by the following: a. Turning Corner- If the subject turns a corner, the 1. Use of security plates surveillant should not hurry. If the subject is lost, the nature 2. Use of “colorum cars” “drive-it- yourself” of the neighborhood will determine the subsequent rented cars procedure. In most cases, it is preferable to lose the suspect than to alert him to the tail. 3. Borrowing cars from friends. b. Entering a Building- If the building is a store, the b. Appearance- Various devices may be used to change the appearance of a car. Placing and removing surveillant should wait until the subject comes out. In stickers, wind shield adornments, shifting head lights from dim buildings having a number of exits, it is necessary to follow to bright , re- arranging the seats of occupants, changing the him inside. If the subject enters an elevator, the surveillant occupants cloths, changing or removing hats, changing the should board the same elevator. number of occupants, etc. c. Taking a bus- The surveillant should board the same bus, sit behind the subject and on the same side. If he misses the bus, he should hire a taxi and board the bus at WEEK 16 a point ahead. A. Undercover Assignments (“Roping”) d. Taking a taxi- When the subject takes a cab, the • it is a form of investigation in which the investigator surveillant records the time, place and name of the taxi’s assumes a different and unofficial identity in order to company and license. He should endeavor to follow in obtain information. It requires the assumption by a police another taxi. If this results in failure, he should trace the agent of an identity in keeping with the situation to be taxi by means of recorded information and ascertain the explored. The agent must drop his identity and adopt destination from the taxi driver. another. e. Taking a train- If the subject shows his intention of • It is an investigative technique in which agent conceal buying a ticket, the surveillant should endeavor to get in his official identity and obtain information from that line behind him with one person intervening. If he hears organization. the destination requested by the subject he may buy a similar ticket. Importance of Undercover investigation f. In a restaurant - The surveillant should allow a few In law enforcement agencies, members of organized minutes to elapse before following the subject into a crime, local gambling operators and prostitutes make it their restaurant. He should then take an obscure sect and business to get to know the faces of as many member of the arrange to finish his meal at the same time as the subject. police department as possible. For this reason, rookie officers g. In a hotel- An inquiry can be made concerning the are always in demand for undercover assignments in the vice room of the subject. If he registered, the surveillant can and narcotics units. take the adjoining room. In business and industry, the vast majority of h. In a telephone booth- The surveillant should either go undercover agents are found in here, not law enforcement. into the next booth or stand near enough to hear. He They are employed directly by corporations or employed by should note the telephone book use and the page at which private agencies for internal investigation. Their importance in it was left open. business and industry is the prevention and control of i. In the Theater- The surveillant should sit behind the employee theft. subject and take not of the various exits which are available. Objectives of Undercover Work 1. Obtaining evidence Risks constantly incurred by the shadower 2. Obtaining information 1. The risk of being recognized as a shadower of the 3. Checking informant subject. 4. Fixed surveillance 2. The risk of being “lost” or eluded by the subject. 5. Checking loyalty - The surveillant must be prepared to take intelligent 6. Subversive organizations countermeasures. If the subject is conscious that he is being followed up, he will either desist entirely form the pursuit of his 7. Security check objective or render surveillance as difficult if not impossible. 8. Preliminary to Search or Raid The surviellant should drop the surveillance at one and must exercise care in his subsequent drop or rather action. Type of Undercover according to time frame: a. Test for Tailing- The common trick of the suspect 1. Long- range- operations can provide reliable, when he becomes conscious that he is being “tailed” is to accurate and continuing access to information which board a public conveyance, such as bus, street car, or would not be otherwise attainable. subway train, and then jumping off the vehicle. 2. Short-range- the duration of short undercover activity b. The Convoy- Sometimes the suspect is being may vary considerably, form one- time interview to a guarded against shadowers. The convoy is usually at the series of separate , but related actions over an extended rear of the subject. It may be therefore necessary for the period of time. surveillant to keep a look out behind him to guard against Uses of Undercover: this. If the subject has a follower or convoy, the shadower must get behind the convoy and follow him instead of the 1. Used independently to get first hand information about the subject of investigation. subject. a. Gains confidence of suspected person. Cover Story – is any scenario made to cover up the operation. b. Agent penetration. • A biographical data through fictional, which will c. Verify information from human resources. portray the personality of the agent, he assumed any scenario d. Uncover concealed identity. to cover up the operation. 2. Supplements other investigative techniques. • A fictitious background and history for the new character of the investigation should be prepared, including the a. to assist in locating evidences. names, address and descriptions of the assumed places of b. Laying ground works for searches by gaining entry. education, employment, associates, neighborhoods, trades and travels. The investigator’s background story should Selection of Undercover Worker seldom, of ever, be wholly fictitious. The ideal undercover agent is a combination of an actor and a good investigator. The selection be made in consideration of Cover support- an agent assigned in target areas with the the following elements. primary mission of supporting the cover story. a. Background- A good undercover man must be able to fit to the environment of his assignment. He must be able to Provision should be made in the cover story for some of suit his speech and line of thinking to that of his associates. the following. His educational and technical background must rise to the 1. Frequent contact with the subject. required level. 2. Freedom of movement and justification for actions. b. personality is required. He should have the necessary self-confidence to carry him through the more 3. Background that will permit the investigator to maintain a financial and social status equivalent to that of trying moments and the resourcefulness to adjust to change of the subject. plans or situations. c. Intellect- The undercover agent must , above all, be 4. Mutual points of interests between the agent and subject. intelligent. He should have a clear view of the objective of the mission and the over-all strategy that must be employed in its 5. Means of communication with agent’s superiors. accomplishment. = 6. Alternated cover story in the event that the original cover story is compromised, (Plan B) Basic Qualification 7. A method of leaving the area quickly at the conclusion 1. Mental above average of the mission. 2. Senses keen perception 3. Memory Essential Uses of Cover: 4. Self confidence 1. Maintain secrecy of operations against enemy 5. Temper intelligence. 6. Endurance 2. Maintain secrecy of operations against friendly 7. Character agencies who do not have the “need to know”. 8. Personality 3. Pursues successful accomplishment of the mission. 9. Natural attitude Types of cover: 10. Courage and patience Special Qualification 1. Natural- using actual or true background 1. knowledge of the language 2. Artificial or manufacture- using fabricated 2. area background regarding events biographical data adopted for the purpose. 3. knowledge about the customs and habits 3. Cover with a cover- Use of secondary cover in case 4. physical appearance of compromise which necessitates the admission and confession of a lesser crime. Common types of Places assigned for Under cover Work. 4. Multiple cover- any cover wished. a. Neighborhood Assignment b. Social Assignment Hazard to Cover: c. Organizational Assignment 1. Passive opposition- refers to people who are not d. Work assignment directly involved insecurity and CI activities. • Preparation of Assignments 2. Friendly or un hostile opposition- refers to friendly organizations that may hinder the operations. a. Study of the subject 3. Unfriendly or hostile active opposition- refers to 1. Name the enemy intelligence operations that may compromise the 2. Address undercover. 3. Description 4. Family and relatives Precautions or Guidelines in Case of Compromise 5. Associates 1. Move out immediately 6. Character and temperament 2. Start new facilities for operation and develop it. 7. Drug 3. Build entirely new cover. 8. Hobbies 4. Use circuitous routes and provide counter 9. Education surveillance measures. 10. Occupation and specialty 5. Be specifically careful of former contacts with non b. Knowledge of the Area intelligence personnel. 1. Maps 6. Be patient, build slowly and carefully. 2. National and Religious Background Aging the cover 3. Transportation It is the process of being in an area/ condition/ cover an 4. Public utilities undercover for the considerable period of time to acquire a c. Subversive Organizations seemingly true identity for the purpose of gaining root of his 1. History and background of organization. Biography of the official accepted fictitious background. 2. Identity and background of members and former members. 3. Method of identification employed by members. Organizational cover: 4. Files and records- nature , location, accessibility -is an account consisting of biographical which when adopted by a individual will assume the personality he want to adopt. 5. Meeting- schedule and meeting place.
A. Objectives of organizational Cover:
d. Cover - It is a means by which an individual group or organization conceal the true nature of its acts 1. to camouflage and protect operational personnel and their activities. and or existence from the observer. 2. Protects installations in which activities are based. 4. Women Associates- Of criminals are frequently B. Three types of Organizational Cover: emotional and jealous. It is best therefore to treat them with 1. Cell Cover- intended for small operating groups, exceptional consideration. It maybe necessary to avoid their wherein the members of the groups are not working association. One of the criminals or woman may become together. inquisitive. 2. Group Cover- provides security for three or more individuals appearing to be working together. Communication with Headquarters 3. Cover family- combination and or compartmental of Intelligence Communications System- The sender, the individual, cell and group. receiver, the channel, the frequency and the message. Concept: C. Guidelines when organizational cover is Compromise Compartmentation (need to know basis) and the message is camouflage or disguise by the use of signals, code and 1. make a physical move or relocation. ciphers. 2. Start new facility for the old operation and let it grow. 3. Use new personnel Means of communications- Technical (radio, secret writings) 4. Let old personnel remain in place. and Non- technical (personal meeting, cut-outs, drops) 5. Build entirely new cover. a. Telephone- Communication between headquarters 6. When files are relocated use circuitous route to avoid surveillance and the undercover investigator must be accomplished by and other CI. secret method. In calling headquarters by telephone it is 7. Be specifically careful in making contacts with non- intelligence best to use a dial tone in a public booth not connected with personnel. the local switch board operator 8. Be patient. b. Written report- The written report maybe addressed to a fictitious girl –friend at a pre-arranged general delivery e. Physical Details- Personal possessions should be address which is under the control of officials from obtained for the undercover investigator which are headquarters. It is best not to put the undercover appropriate to the character assumed in quality, price, investigator’s return address in the envelope as the post age, fit, degree of cleanliness; laundry marks, and office department might return it to the investigator’s manufacturer’s design. Personal possessions may dwelling for insufficient postage or other reasons, in which include: clothes, a pocket book, a watch, a ring, a case, it might fall into improper hands. suitcase, stubs of tickets form amusement places, and c. Meeting- Meetings at secret, pre- arranged. letters, certificates, and amount of money. f. Testing- The investigator should memorize should Types of Cut- Out Devices: memorize all details in connection with his assumed role 1. Intermediaries (Courier, live drops, custodian of accommodation) and the fictitious portions of his biography. He should be 2. Cut- out devices (Stationary dead drops and Moving dead drops) tested by prolonged questioning and surprise inquiries. 3. Cache- storage equipment g. Disclosure of Identity- The investigator should be 4. Safe sites-safe house instructed not to disclose his identity or he should remain 5. Signal undercover if arrested by the civil authorities. A plan or act should also be laid out against the contingency of Types of channels in special communication system: accidental disclosure of identity. 1. Regular 2. Secondary Golden Rules of an Undercover agent: 3. Emergency 1. Don’t drink while working as under cover. Drink is a great tongue looser. But, it is well to get the subject. Characteristics of the Special Communications 2. Don’t court women. Usually the less contact the 1. Intelligence agent handler can activate or deactivate agent has with women, the greater is the chance of success. communication system. The investigator cannot afford to incur the enmity or jealousy of 2. Flow of communication is done from sender to the a subject who might think that the investigator is “making time” ultimate recipient is encourage to meet intelligence with his girl friend. requirement. 3. Don’t take woman on an undercover assignment. 3. Security of the information in it’s form and style and The subject may become interested in the woman. If this the means used are the most important characteristic happens, the subject attention is diverted from those things in intelligence communication. which the investigator’s interests lie. The woman maybe placed in an embarrassing or impossible situation form which Three forms of non- technical communications: extrication may disclose the identity of the undercover 1. Personal meetings: investigator. a. Car pick-up 4. Don’t claim to be a “big shot”. It is too easy to identify a big shot. It will cause more inquiries to be made in the place. b. Hotel meeting It is better to assume a character of average status or less. c. Safe house meeting 5. Don’t fail to provide persons in the place who can d. Restaurant meeting vouch for the investigator 2. Brief encounter – personal meeting between agent 6. Don’t spend too much money. Expenditure maybe in handler and the agent not more than 60 seconds in order to keeping with the part, if not, suspicion is aroused. Many agents pass an urgent message. have given themselves away by spending more money than 3. Brush pass- passing of an object between two the amount justified. persons going in opposite directions. 4. MBU meeting- is the use of dead drop zone, loading Conduct of undercover Work agent and assignment signal zone, unloading signal zone, visual signals, verbal 1. Demeanor- The undercover man must in every signals and danger signals. respect live the part which he plays. His appearance, 5. Cut- outs- is a person or devices interpose between language, attitude, opinions, interests and recreations must two persons or groups in order to provide communication. support the assumed role. He should speak little, but let his actions carry conviction. • Reconnaissance 2. Approach – This is the making of contracts with the - To gather specific or detailed information at a particular time subject or subjects, who normally makes the first talk with the and place. investigator. 3. Entrapment- It is against public policy for an officer of Methods of Reconnaissance the law to incite or participate in the commission of the crime. 1. Personal Reconnaissance – this is the most The investigator may agree with the plan but he should never effective casing method and produces the most take part or make any suggestions or plan, or render any real information since you know just what you’re looking for. assistance with regards to the perpetration of the crime. However, this method does not permit the agent handler to use it frequently. 2. Map Reconnaissance- this method cannot g. Cover action agent- is a fully recruited completely answer all question, but produces good picture agent who is in a senior position usually within the of the general area to include road and street networks. government and is enable to exert influence from 3. Research- this normally means a study of foreign government upon the direction of the sponsor. unclassified sources such as atlases, local newspapers, periodicals, public bulletins, telephone and city directories, 3. Support Agent- an agent who engages in activities which radio and television broadcast and other available support the clandestine operation. This agent performs all references. (Biological Intelligence) types of auxiliary services at the direction of the case or project 4. Prior Information- this consists of reports on file with officer. the intelligence unit. Categories of Support agent 5. Hearsay- this is not considered to reliable. a. Surveillant- is a support agent who observes persons “Clipping Services”- it is the collection of news items of and paces of operational interests. intelligence value in publications both of local and foreign. b. Investigator- an agent who provides informations These published items are cut, and pasted with their captions. about persons or things of operational interests. So much information on a specific subject can be obtained c. Procurer of Funds- an agent who obtains special from publications like newspapers, magazines, periodicals, currency when needed for operational use. reports and other printed matters. d. Procurer of supplies- an agent who supplies or procures ordinary as will as critical operational materials. Police Liaison Program- this is the assignment of trained e. Safe house keeper- an agent that manages and intelligence personnel to other agencies in order to obtain maintain the safe house for operational use, such as for information of police intelligence value. briefings, meetings, debriefings and safehaven and training. Accommodation Address- this is forwarding address of a *Safe house- is a place, building, enclosed mobile, or a n police intelligence unit where mails, packages and other apartment where police undercover men meet his action communication will be sent. This can be a post office box in a agent for de-briefing or reporting purposes. city or suburban municipality, an office, a residential home, or another government office. f. Manager of Storage area- an agent who arranges the storage, distribution or transportation of operational supplies. Drop- is a convenient, secure and unsuspecting place where a police undercover man, informer or informant by g. Communication agent (Commo Agent)- an agent prearrangement, leaves a note, a small package, an envelope that facilitates communications. or time for the action agent, supervisor, or another agent. Motivation of an Agent 4. CLANDESTINE OPERATION 1. Ideology- believe in the principles of life - A secret action undertaken by an intelligence /counter 2. Patriotism intelligence organization in behalf of the government or other 3. Remuneration- mercenary-the primary motive friendly forces. 4. Career development Elements of Clandestine operation 1. Sponsor- refers to the organization or government that 5. Fear authorizes, approves, directs, controls and supports clandestine operational activities. It maybe represented by the Basic Agent Management Principle following: 1. Agent handler must be in charge of the operation a. Project officer 2. The act ensure the agent adherence b. Case officer 3. Good rapport must be established between the agent c. Agent handler handler and the agent. 2. Target or Rabbit- is a person, place, things or activity 4. The agent handler must constantly reinforce the against which the clandestine organization or operational agents activity is directed. Control- authority to direct the agent to carryout task or 3. Agent- is a person who is aware the he/she is requirement on behalf of the clandestine organization in an engaged in counter operational activity and willingly accepts acceptable manner and security. control and direction. Two categories of Control Classification of Clandestine agents: 1. Positive control- is characterized by professionalism and rapport. 1. Principal Agent or Agent Handler- is a managerial Types of positive control: agents motivation & psychological agent and inmost cases the leader of the agent network.. control 2. Action Agent- is the doer of the clandestine task and 2. Negative conteol- blackmail and threat. further classified according to the task that he was assigned. Types of negative control Espionage (Counter Intel/Intel agent)- is the primary and 1. Disciplinary action- includes verbal reprimand for most important human collector agent. poor performance or insecure actions withholding of salary Types of espionage or in extreme situation the threat of terminating professional a. Access agent relationship. a. Penetration agent 2. Escrow account- control of an agent by putting his salary in a bank to be with drawn only after a fulfillment of a b. Legal Traveler condition. b. Propagandist- an agent that undertakes 3. Blackmail action to mold the attitudes, opinions and actions of Key Elements of Control an individual, group, organization or nation. 1. Direction and control c. Saboteur- is an agent who undertakes a. leadership positive action against unfriendly power/ forces resulting in the loss temporarily or permanently of an b. action article, material or facilities which are being used. c. personal example 2. Natural weaknesses d. Guerilla- is a member of a paramilitary group organized to harass the enemy. a. inability to keep secret e. Strong man/arm- is an agent readily b. need for recognition available to provide special protection during c. strain of dual experience dangerous phases of the clandestine operation. d. experience f. Provocateur- an agent who induces an 3. Agent training opponent to act on his own detriment by discrediting 4. Agent testing himself or revealing his true purpose or identity. 5. Agent termination 7. He shall not reveal the identity of informants or informers nor require them to appear in court except with Information net- A controlled group of persons who worked the explicit approval of his commander or chief. through the direction of the agent handler. The informants 8. He shall be cautious in his relations with informants principal or cut- outs supply the agent handler directly or (a) to lessen the likelihood of the information taking or indirectly or intelligence information. being given unjustified privileges, and (b) to increase the effectiveness of their service. Factors to Consider in the Selection of Action Agents 9. He shall keep himself informed as o the identity of all 1. Placement- location or prospective agent with commercialized vice operator in the city or municipality, the respect to the target. nature of their activities and their operating relationship, 2. Access- the capability or ability of the prospective both in the locality and out of it, to each other, to public agent to obtain the desired information for the intelligence officials and to private persons. He shall use every legal organization or to perform the intelligence collection means to convict vice operators, and shall focus hi mission in the area. attention on higher echelons. a. Primary Access- it has direct access to the 10. He shall make frequent inspection of all places where desired information. commercialized vice may be suspected and places where b. Secondary Access- the access to the prostitutes, gamblers and drug addicts and dealers may desired information through principal source where congregate. He shall use every lawful means in the latter has the direct access. coordination with the other governmental agencies to c. Outside Access- the agent is employed arrest, and convict the offenders, to suppress their illegal outside the target and merely monitors information operations and drive them from the community. from a third person who is monitoring information in 11. He shall guard himself against being forced into ill- the area. advised action against minor noncommercial violators that may result in arousing public indignation, raids on church How can a handler test the thrust worthiness of an agent? buildings, homes and privately- occupied hotel rooms. 1. The handler initially sends the agent out on a 12. He shall coordinated with the bureau to get “test mission” to perform a minor task, information on newly arrived criminals and criminals hiding “If he/ she delivers, then it’s a plus. as well as activities of local offenders. 2. Another basic step is a thorough background 13. He shall maintain close surveillance eof suspects check on the individual to determine his or her procuring, maintaining or transporting women for connections. When the agent is employed in an “oplan”, prostitution. he or she signs a 14. He shall maintain a suitable record of activities and “contract” specifying his or her mission and the corresponding findings ad shall deep them constantly secure. payment for services. 3. A handler may employ the a secondary or Debriefing third agent to conduct a parallel operation to cross- Handler and agent also agree to hold periodic check the primary agent’s information. The first, second and debriefings, during which the later reports on all of the third agent s do not intelligence information gathered in the course of an operation. know each other nor are they aware of each other’s missions. “ It must be pointed out that handler usually start a project with The second or third agent may even report to the handler that initial information gathered from what is available in the media your primary agent in an enemy,” to even coffee shop talk, and the agent is required to pry in to “closed” information. How is informant Counter Checked if he is a broker or a risk to the job? WEEK 17 The supervisor at times tests him on his reports, have SOME INTELLIGENCE UNITS IN THE WORLD the informant tailed secretly, get into from other informants 1. CIA- Central Intelligence agency- Military intelligence who know him and /or an analysis later of the reports agency of United States of America and engaged in many submitted. It is an unwritten precept not to trust a crook trying undercover activities throughout the world. to sell other crooks but the check must be dome very discreetly 2. KGB- Komitet Gusodarstevenoy Bezopasnosti- or the informant can clam up, submit fabricated reports, or just Russia quit. 3. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim In case a control or project officer is reassigned or retired, M-eyudim)-“ Central Institute for Intelligence and Security”- what happens to his Informant? Israel The departing officer introduces his replacement to the informant in a secured place. If the informant is unwilling to 4. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known by its wartime work for the new boss, he has to go. Most however elect to designation, “MI6”, equivalent to US’s CIA, in charge with stay. gathering information overseas and with other strategic services ranging from foreign espionage to covert political Code Name- an alias or symbolic designations used by intervention. intelligence officer/ informants and even criminals for security. 5. SDECE- (Secret de Documentation Exterieure et Duties of an Intelligence Officer: Contre- Espionage)- France The following are the duties of the Intelligence officer if the 6. SAD- (Social Affairs Department)- China department has an Intelligence unit. 7. FBI- Federal Bureau of Investigation- its primary role 1. The police Intelligence officer obtain facts for the is counter intelligence limited to internal security within the commander relating to some conditions in its area of United States of America. responsibility. 8. “MI-5” - Great Britains’ civilian intelligence agency 2. The intelligence officer is a fact- finder, not an for internal counter intelligence, equivalent of US’ FBI and enforcer. He takes no direct action beyond reporting to the equivalent to Internal Security Section of Russia’s KGB. commander except in enforcing vice- laws. 9. NICA- National Intelligence Coordinating Agency- 3. He reports directly to the commander unless ordered Philippines to report to an appointed supervisor, the deputy or vice- commander. *Col. Rudolph Abel - (Russian)- was probably the highest 4. He shall be held accountable for failure to inform his ranking and most successful spy whoever infiltrated the supervisor regarding the conditions of the city or United States. municipality served. *Mathew Cevetic- a famous undercover assignment of FBI, infiltrated the communist party/ 5. He shall make contacts with the persons who are likely to have or are able to get the desired information. Personalities related in the evolution of intelligence 6. He shall use under cover men or agents to assist him 1. Sun Tzu- a Chinese(Father of Intelligence” philosopher, in in accomplishing his missions and objectives. his book “PING FA” (Art/Principles of War)- the earliest known textbook on the art appointed a minister of State seven years later, but was driven of general warfare- once said; “If you know your enemy and from office shortly after the assassination of the King’s know yourself, You need not fear the Result of a hundred Secretary. Appointed Cardianl in 1524, was recalled State battles. If you know yourself but not your enemy, for every office by King Louis XIII. victory, you will suffer defeat. If you know neither yourself nor your enemy, your are fool who will meet defeat in every battle. Cabinet Noir- a secret police organization is the creation of Its lessons were applied by Mao- Tse-tung during the long Cardinal Richelieu designed to intercept and analyze march and by the Japanese prior to Pearl Harbor. correspondence within the French Court and between the lesser nobility. Holy Bible- is here you can find the just recorded intelligence operations in history. 9. Major John Andre (1751-80) 1. Moses-One of the first recorded formalized John Andre, an officer of the 64th Regiment of Iowa is the only intelligence efforts, with format, can be found in the spy to be honored by a memorial tablet at Westminster Abbey. Book of Numbers 13:3-17. The scripture also named the From the son of a Swiss merchant of London. Andre proved twelve intelligence agents when the Lord directed Moses to incredibly popular when appointed to the post Adjutant General send into the land of Canaan and records that “all those men of New York, when the American general Benedict Arnold were heads of the children of Israel”. made surrender overtures to the English in 1780. Andre was delegated to negotiate with him. 2. Rehab- “The harlot” of Jericho (Joshua 2: 1-21) who sheltered and concealed the agents of 10. Benjamin Franklin (1706-90) Israel, made a covenant with the agent sand duped their He helped frame the American Declaration of Independence. pursuers. She was not only an impromptu confederate of Superficially, he was sober in thought and deed and diplomat immense value to the Jewish leaders of that far-distant day, of unquestioned integrity. Privately he was a British double but also established a plot- pattern which is still of periodic agent with unusually exotic social tastes. While American relief to motion- picture producers. ambassador to Paris, Franklin allowed his friend and chief assistant Edward Bancroft to organize a British Secret Service cell within the Embassy. 3. Delilah- a Palestine agent who used her charm to gain information from the powerful enemy. 11. Sertorius When Sertorius was the Roman Commander in Spain he was, 2. Alexander “The Great”- Under the tutelage of according to Polyaenus, the possessor of a white fawn that he Aristotle, Alexander the Great King of - Macedonia, trained to follow him every where, “..even to the steps of the became the first ruler to utilize intelligence as a weapon of tribunal”.. This little fawn was taught to approach at a given government. Using a system of identical staves and scrolic. signal, and Sertorius himself the signal, when about to He divided a simple but highly effective system of covert pronounce his decision in judicial cases. ciphers. - He introduced a primitive form of “Cabinet Noir” 12. Frederick “the Great” (Internal Monitoring) when he instigated postal censorship into The “Father of Organized Military Espionage”. the army and investigated letters and malcontents. 13. Hannibal 3. Daniel Defoe- He was also one of the British Hannibals invasion of Italy, the most brilliant and futile raid in Monarchy’s finest agents. Although, best known as the history, gained him victories and nearly bled Rome to death, author of “Robinson Crusoe and Moll Fladers. Defoe also but the mere slaughter of worked in the honorable, through secret services of Queen Romans and a great city’s despair would not have sustained Anne. Outwardly rebellious, a revolutionary pamphleteer, him for fifteen years if he had not also made powerful allies pilloried and twice imprisoned for seditious libel, his and developed an excellent intelligence system. He often background was hardly suited to the world of royal dressed as a beggar and went into the streets of Rome. espionage. He also uses the name “Alexander Goldsmith” sometimes “ Claude Guilot”. 14. Fouche of France Joseph Fouche, rose to become one of the most feared and 4. Belle Boyd-The daughter of Shenandoah Valley. A most respected intelligence directors in the history of France. farmer and merchant, Belle Boyd was a mere He created a network of agents that knew almost everything seventeen years old when the American Civil war so fatefully anyone did or was about to do. intruded her life 15. Schulmeister, “Napoleon’s Eyes”- He is Napoleons 5. Sir Francis Walsingham of England military secret service. He was credited with creating the first viable secret service in England. He protected Queen Elizabeth I from countless 16. Wilhelm Stieber- He made two major contributions to assassins. the sequence of military intelligence, namely military censorship and organized military propaganda. 6. Lord Baden – Powell - Known as the founder of the Boy scout Movement 17. Alfre Redl- One of the most brilliant intelligence and was also active spy. Baden Powell was commissioned into agents, though he was a homosexual. He rose to become the 13th Hussars on leaving school in 1876. After seven years’ chief of the Austro- Hungarian Secret Service , or in other service in India, his regiment was posted to Natal, South terms, Africa, where the young offcer carried out his first intelligence director of their military intelligence system. For more than half assignment, a cover reconnaissance of the 600-mile frontier of of his time as director of intelligence, Redl was acting as an the province. intelligence agent of Russia. 7. Mata Hari (1876-1917) In 1913, proof of Redl’s treason was discovered and shortly Ironically, Mata Hari is one of the Best known spies in history, thereafter, Redl was compelled to commit suicide. The history yet she was one of the worst. Born, Margarete Gertrud Zelle in of this 13- year episode as an arch spy, led to the death of Leeuwarden in Holland, she displayed an early independence over 500,000 agents and soldiers combined in the military and zest for life. At the age of seventeen, she answered a establishment lonely hearts advertisement trough which she met her future husband, John Macleod, a 38- year old officer from the Dutch East Indies.
8. Cardinal Richelieu (1585- 1642)
Cardinal Richelieu gave France her first organized system of espionage. The son of a noble family for Poltou, Armand du Plessis was consecrated Bishop of Lucon In 1505. Under the patronage of the Quenn Mother, Marie de Medici, he was