You are on page 1of 14

WED | 05/03/2023 6.

“Need to Know”- is the term given to the requirement


1:00-2:30PM –– SJH-408 that the dissemination of classified matters be limited
CFUNDCRIM strictly to those persons whose official military or
WEEK 13: Classification of Documents government duties requires knowledge or possession
Document- is any recorded information regardless of its thereof.
physical form or characteristics and include but not limited to 7. Damage to National Security- refers to the prejudice,
the following: embarrassment or injury of the Republic of the Philippines
1. Written matter whether hand written, printed or type. resulting from any act or omission.
2. All painted, drawn or engraved matter. 8. Declassify- the act of removing the security classification.
3. All sound and voice recording. 9. Reclassify or Regrading- this refers to the act of
4. All printed photographs and exposed or printed film, still or changing the assigned classification to classified matter.
moving. 10. Upgrading- this refers to the act of assigning the matter a
5. All reproduction of the foregoing for whatever purpose. higher classification than that previously assigned to it.

Four Classified Matters Two Kinds of Documents


1. Top Secret (Green Color code) 1. Personal- letters, diary and notebook; it should be
- is any information and materials, the authorized disclosure treated usually the same with official documents.
of it would cause exceptionally grove damage to the 2. Official- orders, manual, newspapers, leaflets,
nation, politically, economically or militarily. overlays, maps and magazines.
Authority to Classify Top Secret Matters:
1. Secretary of National Defense Categories of Documents
2. Chief of Staff and its equivalent to the PNP. Category A- information which contain reportable time
3. Major services commanders. sensitive order of battle information
4. Area and Unified Commands of the PA, PNP, and significant information.
and its equivalent to the PAF and PN. - it contains the “SATULE” information.
- It should be given priority because it is a critical
2. Secret (Red Color Code) information.
- is any information and materials, the unauthorized - It is critical to friendly operations - Requires
disclosure of which endanger National Security, causes immediate action.
serious injury to the interest and prestige of the nation or Category B- anything that contains communications,
of any government activity or of great advantage to foreign cryptographic documents or systems should
nation. be classified as Secret and requires special
Authority of Classify Secret Materials: handling. It should be declassified by higher
1. Commanders of Infantry Battalion authorities.
2. Person enumerated under Top Secret - All category B does are classified as secret because it
3. Special and Personnel staff of GHQ may contain information that maybe category A.
4. General and Special staff of Major Service areas Category C- other information which contains something
and unit commanders that should be an intelligence value.
5. Superintendent of the PMA and PNPA - contains exploitable information regardless of its contents.
6. Commanders of post, depots, station of separate - It could be category A or B.
units - Unscreened materials or documents should be
7. Chief of Military mission or group categorized as category C.
Category D- No value, yet lower level will never
8. Armed Forces Attaches classify documents as category D.
9. Commandants of service Schools - do not decide at the lower echelon that document bas
no value. It is the duty of the higher
3. Confidential (Blue Color Code) HQS.
- any information and material the unauthorized disclosure
of which would be prejudicial to the interests and prestige Three types of Translation
to the national or governmental activity or would cause 1. Full- everything is translated or forwarded
administrative embarrassment or unwanted injury to and
or would be of advantage to foreign nations. 2. Extract- only portion of it is translated
Authority to classify Confidential Matters: 3. Summary- translated only the main part
1. Any commissioned personnel
Counter Intelligence Agencies:
4. Restricted (White or No Color Code) 1. Individual Soldier- Counter- intelligence
- any information and material which requires special operations depend upon the individual soldier’s
protection other than those determined to be ability to carry out proper security, camouflage,
confidential, secret, and top secret. Yet prior to observation and reporting procedures.
release require clearance with the records custodian. 2. All Units- to deny the enemy information our own
forces, their activities, location and disposition.
Handling Classified Security Information: 3. Censorship Units- specialized counter
1. Classify- this refers to the assigning of information in any intelligence functions due to their assigned tasks.
form or materials one of the 4 security classification
categories after determination has been made that the Commander’s Responsibility
information requires the security protection as provided for The commander of the unit is responsible for the planning and
in the regulation. execution of all CI measures designed and implemented to
2. Classified Matters- is any information and materials in safeguard military information, personnel, equipment and
any form or any nature the safeguarding of which is installation within his command. The commander delegates
necessary in the interest of national security and which is these responsibility to his staff.
classified for such purpose by the responsible classifying
authority. Counter Intelligence Staff Officer
3. Compromise- takes place through loss of security which The commander’s staff officer for intelligence is
results from unauthorized persons obtaining knowledge of charged with the general staff responsibility for intelligence and
classified matters. counter- intelligence
4. Unauthorized- persons not authorized to have access on
classified matters. “ In times of National Emergency”; It is recognized the security
and welfare of the nation must take precedence on certain civil
5. Compartmentation- refers to the grant of access to rights and privileges which are enjoyed by citizen in a stable,
classified matter only to properly cleared persons.
peacetime situation, wartime situation, it becomes necessary to
implement certain restrictive measure which would -are information collected as additional while on EEI, These
unconceivable in time of peace” are items that are also needed but are not given the right
priority.
Espionage- refers to the collection of secret informations
that a government or organizations does not want any Police Intelligence Estimate (PIE)
outsider to know. - a written study of the situation and conditions of a crime
Sabotage- is an action against material, premises or utilities situation with the recommended course or courses of action.
or production, which ensures, interferes with or obstruct the
national security or ability of a nation to prepare for war. 2. COLLECTION OF INFORMATION-It refers to planning of
Subversion- is an action principally clandestine or covert collection effort and actual collection of information activity.
designed needed to undermine the military, economic,
psychological, morale or political strength of a regime. Collection- gathering of the needed information from all
Anything that will undermine the political, social, economic possible sources and the reporting of the information from all
and other aspect of the country. possible sources and the reporting of the information to
intelligence producing agency.
Identification of Criminal Subversive elements Collection of information- it is the culling ( collect, brig
Organized/ Syndicated crime groups- means a group of two together) of information from all possible overt sources.
or more persons collaborating, confederating, or mutually Procurement of information- it is the aggressive effort to
helping one another in the commission of crime. acquire a certain specific information which may not be readily
1. Kidnap for Ransom available.
2. Bank Robbery
Five Successive steps of Collection Plan
3. Drug Syndicates
1. Determination of intelligence requirement
4. Carnappers
5. Terrorists groups 2. Formulation of the intelligence requirement
3. Determination of priority
6. Secessionists / Communist movement
4. Section of collection agencies
Disaffection- is the lack of loyalty or affection for one’s 5. Supervision
government or constitution. Treason- consists of levying for
war against a country or the adherence to aid enemy by any Reasons why constant and continued supervision of the
one owing allegiance to that country. collection effort is necessary:
Sedition- is an inflammatory speech or conduct against the 1. to ensure compliance of order
public order in the tranquility of a state with the intent to 2. to check incoming information
interfere with the government operation or success of its 3. to keep abreast with the situation and the results
mission. Insurgency- is a protracted political military activity achieved by the collection efforts needs modification.
directed towards completely or partially controlling the
resources of a country and the creation of an alternative Three (3) main aspects of Collection
government through the use of irregular military force and
1. Guidance – the direction of collection effort
illegal political organizations.
2. Coverage- complete functional fulfillment of the
*Technical Intelligence- it concerns with foreign technical assigned mission to filed collecting agencies through full
developments which have a practical military application and exploitations of all available sources of information and the
the physical characteristics, performance, capability and initiative to develop new sources
limitations of materials and installations housed by and for 3. Reporting- timely conveyance of information in usable
foreign military forces. form the collecting agency to the intelligence producing unit.

• Intelligence distinguished from Information Who are tasked to collect information:


*Information- A raw data or unevaluated material of every 1. Intelligence officer/agents
description derived from 2. Civilian agents
observation, communication, 3. Assets- refers to establishments, institutions,
reports, rumors, imagination, and
agencies, organizations or non- juridical persons. 4.
other Concerned citizens
sources from which intelligence is derived. -
Intelligence Information- any information gathered or Two basic collection Strategy
received which is of intelligence interest or
significance. 1. Resource Integration- one (1) agent
2. Agent Mixed or Redundancy- three or more agents
WEEK 14: THE INTELLIGENCE PROCESS assessing for the same assignment.
Intelligence process refers to the cyclical steps followed from
intelligence planning, collection, processing, dissemination Criteria of Collecting Agencies/units
1. Capability- physical ability of the unit
1. DIRECTING- In this phase the intelligence staff officer or 2. Balance/ Suitability- availability of the unit in selecting
unit commander determines the priority intelligence the area of interest.
requirements (PIR) and / or informations requirements (IR). 3. Multiplicity- ability to compare two or more prospected
These are requirements then balanced and distributed to the collecting agencies.
collecting agencies by direction or by request.
1. Determination of requirements Sources of Information
2. Determination of the essential elements of Source- where the information is obtained.
information Organization- refers to the intelligence personnel or the
3. Establishments of priorities.(PIR’s) intelligence unit.
1. Persons (informant, syndicate, intelligence broker,
Essential Element of Information (EEI) double agent)
- it is what is given to collectors by the 2. Object
supervising officer on what to gather for the particular 3. Records
project or mission.
-are those obtained items and information needed at a Intelligence Community- is the conglomeration of all
particular time to permit decisions to be made with in an intelligence units and agencies in a country composed of
acceptable degree. civilian, military and quasi military organization.
- it defines the scope and nature of
information which an agent pursues at a given time. Three (3) factors in the recruitment of human sources
1. Placements
Other Intelligence Requirements (OIR) 2. Access- the most important factor.
3. Motivation 8. Covert- It is the information obtained without the
Good sources of information: (These people volunteer for knowledge of the person against whom the information or
various reasons/motivations ranging from the Nationalistic, documents may be used.
Personal, Religious, or Materialistic gain) 9. Elicitation- the technique of acquiring information or
1. Victim of crimes intelligence of operational value through conversation with a
2. Ordinary citizens person who is not aware or unaware of the specific purpose of
3. Group leaders in the community the conversation.
4. Bar workers 10. Casing- is the reconnaissance and surveillance of a
place, building, or area to determine its suitability for
5. Religious groups intelligence use or its vulnerability in an intelligence operation.
6. Merchants a. Surveillance-means to gather general
7. Other well- meaning observers. information over a wide area and it takes a longer
time frame.
Other important sources b. Reconnaissance- means to gather specific
1. Captured documents or detailed information at a particular time and place.
2. Government agencies 11. Cover- It is any device utilized by an individual,
3. Informers organization or group to ensure that no one who do not have
4. Informants the right to know will not be aware of the real purpose or intent
5. Libraries/files of the mission.
12. Observation and Description- it is the complete and
INFORMANT AS DISTIGUISHED FROM INFORMER: accurate awareness by an individual of his surroundings and
Informant- a person who gives information to the police encompasses the use of all the major senses to register and
voluntary or involuntary , without any consideration, whereas; recognize its operational or intelligence significance.
Observation- it is the factual reporting of what was observed.
Informer- an individual who gives information for a price or 13. Order of Battle- it is the summary recording of one’s
reward.(He may be in the payroll of the law enforcement specific criminal activities with entries covering matters with
agency) intelligence and tactical interest, enumeration of personalities
involved in the organization’s movement and activities.
General Classification of Source of Information 14. Clandestine Operation- is a secret action
1. Open Sources- (Most information are obtained in this undertaken by an intelligence agent in behalf of an
way, More than 90% of information are gathered in this organization, the government and other friendly forces.
way. 15. Sketching – consist of putting ideas in an accurate
2. Non- Open or Closed Sources- are those that are pictorial form. It is a means describing on object or area to
not obtainable openly. They can be located inside satisfy a particular need.
building’s safe or vault, known only in the minds of some 16. Photography- is the process of producing image on a
scientist, or through the employment of technical sensitized material by variant form or radiant energy.
means.(Bugging and tapping)
17. Provocation-is an action taken in order to incite
reaction from a know adversary or to observe reactions of
Bugging- it is the placement of a hidden microphone to the
adversaries.
target to collect to telephone conversation.
Wire tapping- a method of collecting information through 18. Portrait Parle- a means of using descriptive terms in
interception of telephone conversation. relation to the personal features of individual and it can briefly
describe as a word description or spoken pictures.
Three types of Opposition in gathering information
2. PROCESSING THE INFORMATION
1. Active opposition- members of foreign intelligence
operatives including their potential assets. - it is the means by which the information secured by
collecting agency is converted into intelligence required by
2. Friendly opposition- military personnel and their
the consumer.
colleagues
- In this phase, collected information is transformed into
3. Passive opposition- those who are undecided at the
intelligence. It involves four stages:
moment whether to side which organization.
Selection- is the method by which information is made
available to appropriate researchers after it reaches the
Note: Information which is of low reliability and doubtful is not
intelligence producing organization. This is not to be confused
discarded or refused acceptance because processing will
with initial selection which is performed during the collection.
evaluated and interpret this info and may still be found useful
and relevant. Many seemingly unimportant and insignificant
A. Recording- It is the reproduction of information through
information later turns out to be the
writing or in some other form of graphical representation and
“break” the police is waiting for.
the arranging of information into groups of related items
Aids in recording
•Methods of Collection of Information
1. Intelligence journal
1. Overt-information are procured openly without regard
in to whether the subject of the investigation becomes 2. Situation map
knowledgeable of the purpose for which it is being gathered. 3. Intelligence files
2. Interview- the casual questioning of a person who is 4. Intelligence workbook
not under the control of the interviewer.
- It is a method of obtaining information although he maybe B. Evaluation- This is considered judgement of the accuracy,
ignorant of the true or real purpose. completeness, and meaning of an item of information. It
3. Interrogation- is the skilful questioning of the subject involves an examination of both the source and content of the
or person who is under control. report in question, since the value of an item of information
depends upon the reliability of the source as well as the
4. Instrumentation- the application of instruments and
probability or plausibility of the information itself. source or the
methods of physical sciences to detect or determine the
agency and the accuracy of the information.
participation of the subject.
5. Research – investigation to get facts through the files Pertinence- usefulness of the information. Information is
of other agencies or company records. considered pertinent if:
6. Investigation – is the collection of facts or knowledge a. It deals with the enemy or area of
from other sources, either from regular sources, public spirited operation.
citizens, informants or informer. b. If it is needed immediately.
7. Debriefing- the subject is cooperative or under some
c. If it is of present or future potential
degree of control and is aware of the intelligence interest.
value.
administrative organizations, mineral deposit production
Reliability- The research analyst’s first step is try to determine facilities, distribution of population and other geographical
the reliability of this particular source, which is best matter.
accomplished by checking its performance. If previous 3. Charts, Graphs and Statistical Tables- useful for
information derived form this source has consistently proven to plotting or compiling information dealt with by economic and
be accurate, it can be considered a highly reliable- source; if it sociological intelligence such as the study of military
has been frequently in error, it must regarded as relatively manpower.
unreliable.
4. Periodic digest- some subjects like political events,
Probability- is judged by its consistency within itself, its which do not readily lend themselves to factual analysis, a
circumstantially, its plausibility in view of general knowledge periodic digest or chronology will be of great assistance. The
and experience , and its consistency with other information or purpose is for the condensing for ready reference the principal
intelligence on the same related subjects. development around which the study of the subject must be
1. Consistency within itself- it is an important element built.
in the probability of any time of information. The
researcher will examine a report to determine if it is self- Three (3) steps in Analysis
contradictory and examined if it makes sense. a. Assessment- is the shifting and sorting of evaluated
2. Circumstantially- means minuteness of detail. A information with respect to the mission
vague and general report may be perfectly true, but b Integration- It is the combination of the elements stated in
practically useless, because the essential details are assessment with other known information or intelligence to
lacking. form a logical feature or hypothesis for enemy activities or
3. Plausibility- a report must be examined against the information of the operational are and characteristics of the
background of general knowledge on the subject in mission of the command.
question. c. Deduction- concerns in finding out the meaning of
4. Consistency with other information- a report must information as to the area of operation or
be examined to determine its consistency with other enemy .It is the mental process designed to answer the
information or intelligence on the same or related subjects question. “What does this info mean in relation to the mission
of the command and the enemy situation in the area of
Credibility- refers to the probable truth of the information operation.
Letter Figure System- a conventional evaluation code , which
rates both the reliability of source and probability accuracy of 4. DISSEMINATION and USE
information. It consist of letter A to F to the source of the -This is the final phase of the cycle wherein the processed
figures 1 to 6 assigned to the information itself. information or intelligence will be disseminated by means of
reports, annexes, briefing, estimates, messages, and other
Code of Evaluation of Reliability and Credibility of forms to the selected agency, unit or command to effect or
Information implement the mission. After information has been collected
Code and Evaluation of Sources of Information and processed into intelligence, it must be made available to
A…………………….Completely Reliable all authorized persons or agencies having a need for it. The
B ……………………Usually Reliable ideal intelligence report should be complete, accurate and
C…………………….Fairly Reliable timely.
D……………………Not Usually Reliable -Timeliness of dissemination means getting the
E……………………Unreliable produced intelligence into the hands of all potential users in
F…………………….Reliability not known time for them to make use of it. Efficient machinery must be
provided for editing, reproducing, assembling and publishing.
Code and Evaluation of Information Intelligence, however sound, thorough and significant is of no
1…………………… Confirmed by other sources value if it remains in files or in the hands of the researchers.
2…………………… Probably true -No two dissemination process are exactly alike. The
3…………………… Possibly true medium chosen for dissemination will in each case depend on
4…………………….Doubtfully true the type of intelligence, its urgency, its bulk, its security
5…………………….Improbable classification, the agency to which it is addressed, the manner
6…………………… Truth cannot be judged in which it will be sued, and the number of copies require.
Dissemination procedures must be developed to fit various
“A”- those based on direct observation requirements.
“B”,” C”,” D”, E- those coming informants whose reliability can
be judged on the basis of previous performance, rarely “A” or There are many types of media employed in the
“B”. F- those form untested informants dissemination of intelligence:
“Any sub source of the field observer should be rated “F” by 1. Informal means- intelligence may be disseminated
the researcher unless he ahs had previous experience with the by this means and it usually assumes the form of personal
same category”. consultation.
2. Oral presentation- Usually in the form of a briefing, a
3. Analysis- the determination of the significance of the lecture or a group conference or it may be personal
information as well as the reliability of the source or the agent presentation to higher authority.
and the accuracy of the information. It involves minute 3. Memoranda- Usually an informal memorandum to the
examination of related items to determine the degree to which researcher’s superior, or to other interested agencies.
they confirm, supplement or contradict each other thereby 4. Assigned/ Required Projects or Reports- These
establishing accepted facts and relationships. are usually a requirement for intelligence by the consumer.
Aids to the Process of Analysis
5. Periodic Publications- These media of
dissemination are printed and intended for wide publication.
- analysis requires extensive use of mechanical
They contain data and discussions on relatively wide fields of
devices and techniques for extracting and indexing contents of
intelligence and are designed medium, the requirements of the
incoming reports and compiling them in logical system. Only
situation and other considerations, certain basic principles
with the aid of these devices may be critically compared and
apply in all cases.
surveyed. Among the principal mechanical aides are:
6. Graphic Presentation- Maps, graphs, charts and
photographs should receive maximum usage in all forms of
1. Card files- subdividing subject matter into its smallest
dissemination.
elements and providing a single card for each element.
Sometimes it is possible to breakdown the data of each 7. Books- these formal, systematic presentations in
element further and provide or design-printed cards that will printed form are used when dissemination of whole fields of
provide spaces for the different facts. intelligence are desired, or to provide reference or training
material to a large number of people
2. Situation Maps- some types of information are best
recorded on situation maps such as unit locations, troop 8. Periodic Reports- this medium is used to
movements, fortifications, boundary disputes, local disseminate substantial changes or improvements in previous
knowledge, which is of interest to a number of agencies or provocative statement that may be incorrect, which will in
persons. effect force the source to correct the collector.
9. Special reports- this medium is used to disseminated b. Man from Missouri Approach- The collector will
substantial changes or improvements in previous knowledge disbelieve what the source is saying to a point where the
which is of interest to a number of agencies or persons. source is force or prove the accuracy of his words through
10. Cables- spot intelligence is sometimes transmitted to additional information.
representatives overseas by cable in order to aid them in their c. Joe Blow Approach (Know it all) –The collector will
own report or in whatever missions they are performing. become arrogant and project a message that he/she knows
11. Films- the use of short motion picture films for the it all.
dissemination of intelligence. d. National Pride Approach- nature propensity of all
12. Preparation of Material- dissemination of intelligence person to defend their country and its policies. The collector
is usually in writing. will tie the required information to national pride in an
attempt to get the source to confirm, deny or elaborate on
Purpose of Dissemination : information.
a. To enable the commander to make decisions e. Partial- Disagreement approach- seek to produce
with confidence. talking by the word “I’m sure if I fully agree”.
b. To provide knowledge in the like of which
new information may be processed Types of Probe:
1. Competition Probe- this is effective when used in
WEEK 15: Covert Methods of information Collection connection with the teacher- pupil approach.
1. ELLICITATION 2. Clarity Probe- used to elicit additional information in
A system or plan whereby information of intelligence value is an area which the response is clear.
obtained through the process direct intercommunication in 3. High Pressure Probe- it serves to pin down a subject
which one or more of the parties to the community unaware of in a specific area or it maybe used to point out
the specific purpose of the conversation. contradictions in what the subject has said.
Characteristics: 4. Hypothetical Probe- present a hypothetical situation
1. Subject is not aware of the true reason for and to get the subject to react to the hypothetical situation.
extent of your interest in his information.
2. You have a little control of the subject. CASING - It is the reconnaissance or surveillance of a building,
3. Elicited information usually consist of place or area to determine its suitability for intelligence
isolated fragment of information. operation or its vulnerability in operations( position of the
Three Phases enemy)
1. determination of the mission
General Principles:
2. selection of the subject
1. Know the best route to take get there.
3. accomplishment of the mission
Two devices in the conduct of Elicitation: 2. Know how to conduct yourself without attracting
attentions.
1. Approach- the process of setting people to start
talking. 3. Know what security hazards are in the area and how
can they avoided or minimized.
2. Probe- the process to keep the person talking
incessantly. 4. Know the best rout to extricated from the area.

Purpose of Elicitation: Importance of Casing:


1. To acquire information which is unbelievable through 1. Aids in planning for operation.
other channel. 2. Aids to Agent handler in briefing high agents.
2. To obtain information which although unclassified is 3. Offers the degree of protection for the operation.
not public known. 4. Aids in the operational testing of agents.
3. To provide operational information and background
data on potential source of information. Information desired in Casing
4. To assist various individual. 1. Area Condition and Habits
a. Detailed sketch and photograph of the area.
Planning and Preparation: b. Customs, habits, language and dress in
1. Determine what information is necessary or essential order to be able to blend with the community.
2. Determine who has access to the information. c. Transportation facilities, the fare, station, in
3. What are the vulnerabilities order not to ask questions.
4. How susceptible the subject to elicitation. d. Knowledge of establishments determine
5. Outline elicitation points prior to meeting and prepare what are desirable, if are free from raids anytime to
specific questions and know your subject well. avoid compromise.
e. You must know what kind of people residing
Types of Approach: in the neighborhood so that agent will know what
1. Flattery- people are susceptible to praise Variants: appropriate actions he takes.
a. Teacher- Pupil approach- the subject is treated as f. Restrictions
an authority. We request him/her to enlighten us and we g. Description of the subject
solicit his viewpoint and opinions.
b. Kindred Soul approach-The subject has been place 2. Active Opposition
in a pedestal having some specialized quality and you a. Criminal
flatter him/ her by showing enough concern for his/ her 1. capabilities
welfare to pay special attention to his enjoyment. b. Foreign Intelligence Services
c. Good Samaritan approach- is sincere and valid 2. People they employ
offers of help and assistance are made to the subject. c. All alien intelligence information
d. Idol- The collector builds the them based on his/her 3. intentions
deep admiration of he source of information and express d. Strategic intelligence
curiosity on how one could achieve such greatness. 4. fear
5. vulnerabilities
2. Provocative approach-discover a wide range of
conversational gambits. 3. Disposal Plan( incase of compromise)- Either
Variants: swallow or flush the information, temporarily or
a. Teaser Bait Approach- the collector will direct the permanently depending upon the situation.
conversation and to a certain topic and throw out a
4. Escape and Evasions- In case of compromise, the vital conference are the unit’s SOP, guidelines, regulations and
agent must get out entirely from the target. instructions also includes designation of a leader, equipment's
to be used, codes and signals, general instructions, funding
• Conducts Prior, During, and after Casing requirements.
Stake out or Plant-is the observations of places or areas from
Pre- Action to the conduct of Casing a fixed point.
1. Analyze the Mission Tailing or Shadowing- observation of a person’s movement.
Undercover man- it refers to a person trained to observe and
2. Study overt information penetrate certain organization suspected of illegal activities
3. Check the resources and later reports the observations and information so that
4. Cover operational action can be made.
5. Timing Liaison Program- this is the assignment of trained intelligence
6. Support requirements personnel to other agencies in order to obtain information of
police intelligence value. (agencies like the press, credit
During the Casing agencies, labor unions, telephone companies)
Safe house- is a place, building, enclosed mobile, or an
1. Copy information discreetly, invent something so as
apartment, where police undercover men meet his action
not to invite attention.
agent for debriefing or reporting purposes.
2. Avoid repetitions to avoid suspicion. The personal Drop- a drop is a convenient, secure, and unsuspecting place
meeting place must be outside of target area, and then where a police undercover man, informer or informant by a
maintain cover story. pre arrangement leaves a note , a small package, an envelope
3. Act naturally to item for the action agent, supervisor or another agent.
Convoy- an accomplice or associate of the subject.
After the Casing Decoy- any person or subject, almost similar to the subject
Use your own discretion used to avoid or elude surveillance. Contact- any individual
whom the subject speaks or deal with in any way while under
Stages of Casing: surveillance.
1. Area familiarization Finger man- an individual who can positively point the subject.
2. Actual inspection of the area Put the finger on- to identify the subject by pointing him out in
3. Re-casing person or in photograph. Put to bed- when the subject under
surveillance returns to quarter and apparently retire for the
Five Fundamental Principles of Casing: night.
Contact- any person whom the subject picks or deals with
1. to gain contact as soon as possible and maintain while he is under surveillance. Made (Burn out)- when the
continuously.
subject under surveillance becomes aware that he is under
2. Maneuver freely in conformity with operations (dry observation and identifies the observer.
run) Lost- when the surveillance do not know the where about of
3. To fight only when necessary 4. To report all items of their subject or the subject had eluded the surveillance.
information.
5. To develop the situation. Classification of Surveillance according to intensity
1. Discreet- one in which every effort is made to insure
Steps in the Conduct of Casing: that the subject is unaware that he is under
1. Preparation of general location map. observation/surveillance.
2. Sketch of the adjoining establishment and prominent 2. Close Surveillance- one in which maintaining
features. constant observation of the subject is the objective
3. Specific sketch of floor plan of main target. regardless of whether or not he becomes aware of the
4. Detailed features of inner portion of target and its surveillant.
description. 3. Loose- one in which maybe applied frequently or
5. Photograph of the casing target. infrequently with the period of observation varied of each
occasion.
Types/ Forms of Casing 4. (Harassment)- suspected criminals are under
1. Surveillance- means to gather general information surveillance wherein you can harass him.
over a wide area and it takes a longer period of time.
Classification according to method
2. Reconnaissance- means to gather specific or
detailed information at a particular time and place. 1. Fixed or Stationary method- wherein the
surveillance remains in relatively fixed position to observe
• Surveillance the activities at specific location (Stake out/ Plant)
- It is a process or act of keeping person, premises or 2. Moving Surveillance- The surveillant follows subject
vehicles under observation in order to acquire detailed form place to place in order to maintain continuos watch
information concerning the activities, identities and contact of over the individual or activity. The surveillant follows the
the subject. It is concerned primarily with persons. Places and subject on foot, in a vehicle in an air craft or on ship.
objects can be closely watched by are generally incident to the 3. Technical and Audio- visual surveillance- This
primary interest of seeking information about people. involves the use of sophisticated communication and
- It involves many varied techniques and skills including electronic equipment’s and devices. (taps and bugs)
preparation, foot surveillance, automobile surveillance,
stationary of fixed surveillance, and reconnaissance. Also, Electronics- is the filed of science and engineering concerned
tailing, shadowing, trailing or keeping the subject under with the behavior of electrons in devices and the utilization of
observation. such devices. Any equipment, device, gadget, or mechanism
that utilizes electron flow as in a tube, transistor, and other
Objectives of Surveillance- is to disclose or divulge the semi- conductors belongs to electronics.
existence of illegal criminal activities and to reveal the
identities of hose engaged in such activities. Telephone Scrambler- is technically a “speech inverter”
whereby essential speech frequencies are divided into several
Terms used in surveillance: ranges by filters and then inverted to produce a scramble
Surveillant- A person who conducts surveillance which speech when intercepted. This is not a guarantee to be
includes only observations. “descrambled” by a third party.
Subject/Rabbit- The subject is the person or place watched.
Pre- Surveillance Conference (Briefing)- a conference held EDPS- (Electronic Data Processing System) – same as
among the team members, the police intelligence unit before a computer
surveillance is conducted. It is called by the head of the team
or the intelligence operations officer/ Subjects taken up in this
Tape Recorder (TR)- is a mechanical- electronic device for d. It is necessary at all times to be close
recording voice, music and other audio frequency material. enough to immediately observe the subject if he
Special Methods of Surveillance enters a building, tuns corners or similar sudden
1. Wire tapping- The telephone lines is tapped some moves.
where along the line, either in the street line or in the 2. Two- Man Shadow
telephone company. The tapped lines are run into a - This is more advantageous because it permits immediate
recorder which is monitored by the investigator. change and are less likely to be recognized. One shadower
2. Concealed Microphones- The microphone may be will follow the subject and the other may either be abreast , or
concealed in the room or maybe disguised as a common on the opposite side of the street, or following the shadower.
object such as a desk ornament. The wires are run out to The use of two officers affords greater security against
a nearby room where the conversation is recorded. detection and reduce risk of losing the subject.
3. Tape recorder- A pocket size tape recorder maybe a. On streets crowded with pedestrian and vehicular
concealed when recording the conversation. traffic, both surveillants should normally remain on the
4. Television- Closed circuit system may be used so same side of the street as the subject;
that the activities of the subject maybe observed by the 1. The first officer trailing the subject
surveillant at a distance. fairly closely; and
2. the second officer trailing the first
Kinds of Surveillance agent some distance behind.
A. Surveillance of Places b. On less crowded streets, one officer should normally
The crimes which requires this type of surveillance are walk on the opposite side of the street nearly abreast of the
gambling, abortion, prostitution, illegal sale of drugs or alcohol, subject and
dishonesty among employees or infidelity in a divorce.
c. In order to avoid detection, the two officers should
make periodic changes in their position relative to the
How Surveillance of Place is Conducted.
subject.
A careful survey of the surrounding area should be made. The
3. Three- man Shadow or ABC method
character of the neighborhood, the residents and the transients
The use of three officers reduces still further the risk of losing
should be noted. The observation point should be selected.
the subject and affords greater security against risk.
Two types of place surveillance a. The three man method, or ABC or 1-2-3, permits a
greater variation of position of the officers and also permits
1. Using a room in a nearby house or business
an officer who suspects he has been spotted by the subject
establishment and remaining undercover.
to drop out.
2. Remaining outdoors and posing as a person who
would normally conduct his business in such an area, ex. A
b. Use of three man method under normal traffic
conditions:
laborer, carpenter, street vendor, etc.
1. The “A” officer keeps a reasonable distance behind
Equipment used in the surveillance of a place: the subject.
1. Picture camera with telephoto lens. 2. The “B” officer follows “A” and concentrates on
keeping “A” in view.
2. Binoculars
3. Tape recording apparatus 3. The “C” officer walks on the opposite of the street
slightly behind the subject.
4. Wire tapping and bugging devices 4. The “B” officer may be responsible for detecting any
5. Other recording instruments confederate or convoy of the subject being utilized to
detect surveillance.
B. Shadowing or Tailing
- it is the act of following a person.
c. Use of the ABC method on streets with little or no
traffic.
1. Two officers may be on the opposite side of the street or 2.
Preparation for Surveillance:
One officer may be in front of the subject.
Preparation is a must before engaging in actual
surveillance work. It is an absolute requirement. As such, d. Use of ABC method on very crowded streets.
those assigned to do the job must study all files of information 1. All three officers should generally be on the
relating to: same side of the street;
a. subject-(name, detailed description including photos, 2. The leading officer should follow closely to
Identifying characteristics and mannerisms, identity and the subject to observe his actions at intersections or if
description of known or suspected contacts or associates of he enters a building, alley etc.
the subject, and all background information on subjects) e. As in the two- man method, the officers
b. Type, scope and extent of crimes known or suspected should frequently alter their relative to the subject.
to be involved in the case. f. Under normal traffic conditions, when the subject
c. Type of neighborhood or locality (type of inhabitants, approaches a street intersection, the “C” officer, (across
Dress, language and dialects, degree of education and the street) should lead the subject and should reach the
culture) intersection first. By using pausing at the corner, or
d. Specific locations and places known or suspected to crossing the street turning in. Illustration:
be involved in the case.( meeting places and hang outs,
caches, hideouts, addresses frequented by the subjects) Other Surveillance Methods:
e. Vehicles involved in the case (description and plate a. The leap frog Method
numbers, street routes, garage and repair facilities) -This is used in attempting to locate the hide out of a
suspect from a vantage point without moving after the subject.
Methods of Shadowing The following day the shadower takes up a watch from the
point at which the subject was last seen.
a. Foot Surveillance
1. One- man shadow b. Fixed Surveillance
- A fix surveillance of a subject’s residence or place of
- This is the most common because it involves the use of the
business may be conducted. This may require the renting of a
least number of men but is extremely difficult and should be
room nearby. One window must overlook the subjects’
avoided. In this type of surveillance, the shadower will follow
premises. The window shade must be arranged that the
the subject and make notes authentically of all that the subject
observation may be over rather than under or at the side of the
does.
shade. A shade that keeps moving and is not drawn quite to
a. The subject must be kept in view at all times. the bottom of a window will attract attention. On a fixed
b. One- man surveillance will usually be very close and surveillance, it is likely that the subject is cautious and will lick
somewhat dependent on pedestrian traffic and physical for any signs of strangers or strange vehicles in the
characteristics of the area. neighborhood. He will also be observant of nearby houses and
c. When walking on the opposite side of a street, the buildings. Open Shadow
officer should keep almost abreast of the subject.
- This is a method of surveillance that is used to good
advantage in affecting the subject psychologically. Usually two B. Automobile Surveillance
men are used as shadowers, sometimes three. Number one This requires careful preparation, wherein the
shadow picks up the subject and “tails” him in such a manner shadowers must use a vehicle if the subject uses a vehicle.
as to give his activities away to the subject. He wants the The vehicle used by the shadowers must be non-descript,
subject to recognize him as a “tail”. Number two shadow preferably rented vehicles since they can be changed often.
remains in the back ground, when number one’s shadow is The license plates must be anonymous if the car used in
certain the subject has “made” him, he permits the subject to shadowing are official or government vehicles. The “tail” car
“lose” him. may be changed several times a day to lessen chances of
being detected. It is preferred that there be three men in
Tactics and Techniques of Shadowing: shadow car. Number one man is the driver, number two
General: watches for a convoy, number three takes notes. The notes
The subject should be kept unaware of the shadowing include and place every act and every contact of the subject
operation. The investigator should be inconspicuous. He vehicle and its passengers. Complete descriptions are made
should not be detected looking directly at the subject. He of all persons contacted if their identities are unknown.
should shift from left to right never remaining for long directly
behind the subject. Both side of the street should be used. If Disguising the Car
the subject is aware of the tailing, he should request for his a. License Plate – a popular type of black color car
immediate removal. should be used and care must be taken that the license plates
Particular: are not identified. This can be remedied by the following:
a. Turning Corner- If the subject turns a corner, the 1. Use of security plates
surveillant should not hurry. If the subject is lost, the nature 2. Use of “colorum cars” “drive-it- yourself”
of the neighborhood will determine the subsequent rented cars
procedure. In most cases, it is preferable to lose the
suspect than to alert him to the tail.
3. Borrowing cars from friends.
b. Entering a Building- If the building is a store, the b. Appearance- Various devices may be used to
change the appearance of a car. Placing and removing
surveillant should wait until the subject comes out. In
stickers, wind shield adornments, shifting head lights from dim
buildings having a number of exits, it is necessary to follow
to bright , re- arranging the seats of occupants, changing the
him inside. If the subject enters an elevator, the surveillant
occupants cloths, changing or removing hats, changing the
should board the same elevator.
number of occupants, etc.
c. Taking a bus- The surveillant should board the same
bus, sit behind the subject and on the same side. If he
misses the bus, he should hire a taxi and board the bus at WEEK 16
a point ahead. A. Undercover Assignments (“Roping”)
d. Taking a taxi- When the subject takes a cab, the • it is a form of investigation in which the investigator
surveillant records the time, place and name of the taxi’s assumes a different and unofficial identity in order to
company and license. He should endeavor to follow in obtain information. It requires the assumption by a police
another taxi. If this results in failure, he should trace the agent of an identity in keeping with the situation to be
taxi by means of recorded information and ascertain the explored. The agent must drop his identity and adopt
destination from the taxi driver. another.
e. Taking a train- If the subject shows his intention of • It is an investigative technique in which agent conceal
buying a ticket, the surveillant should endeavor to get in his official identity and obtain information from that
line behind him with one person intervening. If he hears organization.
the destination requested by the subject he may buy a
similar ticket. Importance of Undercover investigation
f. In a restaurant - The surveillant should allow a few In law enforcement agencies, members of organized
minutes to elapse before following the subject into a crime, local gambling operators and prostitutes make it their
restaurant. He should then take an obscure sect and business to get to know the faces of as many member of the
arrange to finish his meal at the same time as the subject. police department as possible. For this reason, rookie officers
g. In a hotel- An inquiry can be made concerning the are always in demand for undercover assignments in the vice
room of the subject. If he registered, the surveillant can and narcotics units.
take the adjoining room. In business and industry, the vast majority of
h. In a telephone booth- The surveillant should either go undercover agents are found in here, not law enforcement.
into the next booth or stand near enough to hear. He They are employed directly by corporations or employed by
should note the telephone book use and the page at which private agencies for internal investigation. Their importance in
it was left open. business and industry is the prevention and control of
i. In the Theater- The surveillant should sit behind the employee theft.
subject and take not of the various exits which are
available. Objectives of Undercover Work
1. Obtaining evidence
Risks constantly incurred by the shadower 2. Obtaining information
1. The risk of being recognized as a shadower of the 3. Checking informant
subject. 4. Fixed surveillance
2. The risk of being “lost” or eluded by the subject. 5. Checking loyalty
- The surveillant must be prepared to take intelligent 6. Subversive organizations
countermeasures. If the subject is conscious that he is being
followed up, he will either desist entirely form the pursuit of his
7. Security check
objective or render surveillance as difficult if not impossible. 8. Preliminary to Search or Raid
The surviellant should drop the surveillance at one and must
exercise care in his subsequent drop or rather action. Type of Undercover according to time frame:
a. Test for Tailing- The common trick of the suspect 1. Long- range- operations can provide reliable,
when he becomes conscious that he is being “tailed” is to accurate and continuing access to information which
board a public conveyance, such as bus, street car, or would not be otherwise attainable.
subway train, and then jumping off the vehicle. 2. Short-range- the duration of short undercover activity
b. The Convoy- Sometimes the suspect is being may vary considerably, form one- time interview to a
guarded against shadowers. The convoy is usually at the series of separate , but related actions over an extended
rear of the subject. It may be therefore necessary for the period of time.
surveillant to keep a look out behind him to guard against
Uses of Undercover:
this. If the subject has a follower or convoy, the shadower
must get behind the convoy and follow him instead of the 1. Used independently to get first hand information about the
subject of investigation.
subject.
a. Gains confidence of suspected person. Cover Story – is any scenario made to cover up the operation.
b. Agent penetration. • A biographical data through fictional, which will
c. Verify information from human resources. portray the personality of the agent, he assumed any scenario
d. Uncover concealed identity.
to cover up the operation.
2. Supplements other investigative techniques.
• A fictitious background and history for the new
character of the investigation should be prepared, including the
a. to assist in locating evidences.
names, address and descriptions of the assumed places of
b. Laying ground works for searches by gaining entry.
education, employment, associates, neighborhoods, trades
and travels. The investigator’s background story should
Selection of Undercover Worker seldom, of ever, be wholly fictitious.
The ideal undercover agent is a combination of an actor and a
good investigator. The selection be made in consideration of Cover support- an agent assigned in target areas with the
the following elements. primary mission of supporting the cover story.
a. Background- A good undercover man must be able
to fit to the environment of his assignment. He must be able to Provision should be made in the cover story for some of
suit his speech and line of thinking to that of his associates. the following.
His educational and technical background must rise to the 1. Frequent contact with the subject.
required level.
2. Freedom of movement and justification for actions.
b. personality is required. He should have the
necessary self-confidence to carry him through the more
3. Background that will permit the investigator to
maintain a financial and social status equivalent to that of
trying moments and the resourcefulness to adjust to change of
the subject.
plans or situations.
c. Intellect- The undercover agent must , above all, be 4. Mutual points of interests between the agent and
subject.
intelligent. He should have a clear view of the objective of the
mission and the over-all strategy that must be employed in its 5. Means of communication with agent’s superiors.
accomplishment. = 6. Alternated cover story in the event that the original
cover story is compromised, (Plan B)
Basic Qualification 7. A method of leaving the area quickly at the conclusion
1. Mental above average of the mission.
2. Senses keen perception
3. Memory Essential Uses of Cover:
4. Self confidence 1. Maintain secrecy of operations against enemy
5. Temper intelligence.
6. Endurance 2. Maintain secrecy of operations against friendly
7. Character agencies who do not have the “need to know”.
8. Personality 3. Pursues successful accomplishment of the mission.
9. Natural attitude
Types of cover:
10. Courage and patience
Special Qualification 1. Natural- using actual or true background
1. knowledge of the language 2. Artificial or manufacture- using fabricated
2. area background regarding events biographical data adopted for the purpose.
3. knowledge about the customs and habits 3. Cover with a cover- Use of secondary cover in case
4. physical appearance
of compromise which necessitates the admission and
confession of a lesser crime.
Common types of Places assigned for Under cover Work. 4. Multiple cover- any cover wished.
a. Neighborhood Assignment
b. Social Assignment Hazard to Cover:
c. Organizational Assignment 1. Passive opposition- refers to people who are not
d. Work assignment directly involved insecurity and CI activities.
• Preparation of Assignments
2. Friendly or un hostile opposition- refers to friendly
organizations that may hinder the operations.
a. Study of the subject
3. Unfriendly or hostile active opposition- refers to
1. Name
the enemy intelligence operations that may compromise the
2. Address undercover.
3. Description
4. Family and relatives Precautions or Guidelines in Case of Compromise
5. Associates 1. Move out immediately
6. Character and temperament 2. Start new facilities for operation and develop it.
7. Drug 3. Build entirely new cover.
8. Hobbies 4. Use circuitous routes and provide counter
9. Education surveillance measures.
10. Occupation and specialty 5. Be specifically careful of former contacts with non
b. Knowledge of the Area intelligence personnel.
1. Maps 6. Be patient, build slowly and carefully.
2. National and Religious Background
Aging the cover
3. Transportation
It is the process of being in an area/ condition/ cover an
4. Public utilities
undercover for the considerable period of time to acquire a
c. Subversive Organizations seemingly true identity for the purpose of gaining root of his
1. History and background of organization. Biography of the official accepted fictitious background.
2. Identity and background of members and former members.
3. Method of identification employed by members. Organizational cover:
4. Files and records- nature , location, accessibility -is an account consisting of biographical which when adopted
by a individual will assume the personality he want to adopt.
5. Meeting- schedule and meeting place.

A. Objectives of organizational Cover:


d. Cover - It is a means by which an individual group or
organization conceal the true nature of its acts
1. to camouflage and protect operational personnel and
their activities.
and or existence from the observer.
2. Protects installations in which activities are based.
4. Women Associates- Of criminals are frequently
B. Three types of Organizational Cover: emotional and jealous. It is best therefore to treat them with
1. Cell Cover- intended for small operating groups, exceptional consideration. It maybe necessary to avoid their
wherein the members of the groups are not working association. One of the criminals or woman may become
together. inquisitive.
2. Group Cover- provides security for three or more
individuals appearing to be working together. Communication with Headquarters
3. Cover family- combination and or compartmental of Intelligence Communications System- The sender, the
individual, cell and group. receiver, the channel, the frequency and the message.
Concept:
C. Guidelines when organizational cover is Compromise Compartmentation (need to know basis) and the message is
camouflage or disguise by the use of signals, code and
1. make a physical move or relocation.
ciphers.
2. Start new facility for the old operation and let it grow.
3. Use new personnel Means of communications- Technical (radio, secret writings)
4. Let old personnel remain in place. and Non- technical (personal meeting, cut-outs, drops)
5. Build entirely new cover. a. Telephone- Communication between headquarters
6. When files are relocated use circuitous route to avoid surveillance and the undercover investigator must be accomplished by
and other CI. secret method. In calling headquarters by telephone it is
7. Be specifically careful in making contacts with non- intelligence best to use a dial tone in a public booth not connected with
personnel. the local switch board operator
8. Be patient. b. Written report- The written report maybe addressed
to a fictitious girl –friend at a pre-arranged general delivery
e. Physical Details- Personal possessions should be address which is under the control of officials from
obtained for the undercover investigator which are headquarters. It is best not to put the undercover
appropriate to the character assumed in quality, price, investigator’s return address in the envelope as the post
age, fit, degree of cleanliness; laundry marks, and office department might return it to the investigator’s
manufacturer’s design. Personal possessions may dwelling for insufficient postage or other reasons, in which
include: clothes, a pocket book, a watch, a ring, a case, it might fall into improper hands.
suitcase, stubs of tickets form amusement places, and c. Meeting- Meetings at secret, pre- arranged.
letters, certificates, and amount of money.
f. Testing- The investigator should memorize should Types of Cut- Out Devices:
memorize all details in connection with his assumed role 1. Intermediaries (Courier, live drops, custodian of accommodation)
and the fictitious portions of his biography. He should be 2. Cut- out devices (Stationary dead drops and Moving dead drops)
tested by prolonged questioning and surprise inquiries. 3. Cache- storage equipment
g. Disclosure of Identity- The investigator should be 4. Safe sites-safe house
instructed not to disclose his identity or he should remain
5. Signal
undercover if arrested by the civil authorities. A plan or act
should also be laid out against the contingency of Types of channels in special communication system:
accidental disclosure of identity. 1. Regular
2. Secondary
Golden Rules of an Undercover agent: 3. Emergency
1. Don’t drink while working as under cover. Drink is a
great tongue looser. But, it is well to get the subject. Characteristics of the Special Communications
2. Don’t court women. Usually the less contact the 1. Intelligence agent handler can activate or deactivate
agent has with women, the greater is the chance of success. communication system.
The investigator cannot afford to incur the enmity or jealousy of 2. Flow of communication is done from sender to the
a subject who might think that the investigator is “making time” ultimate recipient is encourage to meet intelligence
with his girl friend. requirement.
3. Don’t take woman on an undercover assignment. 3. Security of the information in it’s form and style and
The subject may become interested in the woman. If this the means used are the most important characteristic
happens, the subject attention is diverted from those things in intelligence communication.
which the investigator’s interests lie. The woman maybe placed
in an embarrassing or impossible situation form which Three forms of non- technical communications:
extrication may disclose the identity of the undercover 1. Personal meetings:
investigator.
a. Car pick-up
4. Don’t claim to be a “big shot”. It is too easy to identify
a big shot. It will cause more inquiries to be made in the place. b. Hotel meeting
It is better to assume a character of average status or less. c. Safe house meeting
5. Don’t fail to provide persons in the place who can d. Restaurant meeting
vouch for the investigator 2. Brief encounter – personal meeting between agent
6. Don’t spend too much money. Expenditure maybe in handler and the agent not more than 60 seconds in order to
keeping with the part, if not, suspicion is aroused. Many agents pass an urgent message.
have given themselves away by spending more money than 3. Brush pass- passing of an object between two
the amount justified. persons going in opposite directions.
4. MBU meeting- is the use of dead drop zone, loading
Conduct of undercover Work agent and assignment signal zone, unloading signal zone, visual signals, verbal
1. Demeanor- The undercover man must in every signals and danger signals.
respect live the part which he plays. His appearance, 5. Cut- outs- is a person or devices interpose between
language, attitude, opinions, interests and recreations must two persons or groups in order to provide communication.
support the assumed role. He should speak little, but let his
actions carry conviction. • Reconnaissance
2. Approach – This is the making of contracts with the - To gather specific or detailed information at a particular time
subject or subjects, who normally makes the first talk with the and place.
investigator.
3. Entrapment- It is against public policy for an officer of Methods of Reconnaissance
the law to incite or participate in the commission of the crime. 1. Personal Reconnaissance – this is the most
The investigator may agree with the plan but he should never effective casing method and produces the most
take part or make any suggestions or plan, or render any real information since you know just what you’re looking for.
assistance with regards to the perpetration of the crime. However, this method does not permit the agent handler
to use it frequently.
2. Map Reconnaissance- this method cannot g. Cover action agent- is a fully recruited
completely answer all question, but produces good picture agent who is in a senior position usually within the
of the general area to include road and street networks. government and is enable to exert influence from
3. Research- this normally means a study of foreign government upon the direction of the sponsor.
unclassified sources such as atlases, local newspapers,
periodicals, public bulletins, telephone and city directories, 3. Support Agent- an agent who engages in activities which
radio and television broadcast and other available support the clandestine operation. This agent performs all
references. (Biological Intelligence) types of auxiliary services at the direction of the case or project
4. Prior Information- this consists of reports on file with officer.
the intelligence unit.
Categories of Support agent
5. Hearsay- this is not considered to reliable.
a. Surveillant- is a support agent who observes persons
“Clipping Services”- it is the collection of news items of and paces of operational interests.
intelligence value in publications both of local and foreign. b. Investigator- an agent who provides informations
These published items are cut, and pasted with their captions. about persons or things of operational interests.
So much information on a specific subject can be obtained c. Procurer of Funds- an agent who obtains special
from publications like newspapers, magazines, periodicals, currency when needed for operational use.
reports and other printed matters. d. Procurer of supplies- an agent who supplies or
procures ordinary as will as critical operational materials.
Police Liaison Program- this is the assignment of trained e. Safe house keeper- an agent that manages and
intelligence personnel to other agencies in order to obtain maintain the safe house for operational use, such as for
information of police intelligence value. briefings, meetings, debriefings and safehaven and
training.
Accommodation Address- this is forwarding address of a *Safe house- is a place, building, enclosed mobile, or a n
police intelligence unit where mails, packages and other apartment where police undercover men meet his action
communication will be sent. This can be a post office box in a agent for de-briefing or reporting purposes.
city or suburban municipality, an office, a residential home, or
another government office.
f. Manager of Storage area- an agent who arranges
the storage, distribution or transportation of operational
supplies.
Drop- is a convenient, secure and unsuspecting place where
a police undercover man, informer or informant by g. Communication agent (Commo Agent)- an agent
prearrangement, leaves a note, a small package, an envelope that facilitates communications.
or time for the action agent, supervisor, or another agent.
Motivation of an Agent
4. CLANDESTINE OPERATION 1. Ideology- believe in the principles of life
- A secret action undertaken by an intelligence /counter 2. Patriotism
intelligence organization in behalf of the government or other 3. Remuneration- mercenary-the primary motive
friendly forces. 4. Career development
Elements of Clandestine operation
1. Sponsor- refers to the organization or government that 5. Fear
authorizes, approves, directs, controls and supports
clandestine operational activities. It maybe represented by the Basic Agent Management Principle
following: 1. Agent handler must be in charge of the operation
a. Project officer 2. The act ensure the agent adherence
b. Case officer 3. Good rapport must be established between the agent
c. Agent handler handler and the agent.
2. Target or Rabbit- is a person, place, things or activity 4. The agent handler must constantly reinforce the
against which the clandestine organization or operational agents
activity is directed.
Control- authority to direct the agent to carryout task or
3. Agent- is a person who is aware the he/she is
requirement on behalf of the clandestine organization in an
engaged in counter operational activity and willingly accepts
acceptable manner and security.
control and direction. Two categories of Control
Classification of Clandestine agents: 1. Positive control- is characterized by professionalism
and rapport.
1. Principal Agent or Agent Handler- is a managerial
Types of positive control: agents motivation & psychological
agent and inmost cases the leader of the agent network.. control
2. Action Agent- is the doer of the clandestine task and
2. Negative conteol- blackmail and threat.
further classified according to the task that he was assigned.
Types of negative control
Espionage (Counter Intel/Intel agent)- is the primary and 1. Disciplinary action- includes verbal reprimand for
most important human collector agent. poor performance or insecure actions withholding of salary
Types of espionage or in extreme situation the threat of terminating professional
a. Access agent relationship.
a. Penetration agent 2. Escrow account- control of an agent by putting his
salary in a bank to be with drawn only after a fulfillment of a
b. Legal Traveler
condition.
b. Propagandist- an agent that undertakes
3. Blackmail
action to mold the attitudes, opinions and actions of
Key Elements of Control
an individual, group, organization or nation. 1. Direction and control
c. Saboteur- is an agent who undertakes
a. leadership
positive action against unfriendly power/ forces
resulting in the loss temporarily or permanently of an b. action
article, material or facilities which are being used. c. personal example
2. Natural weaknesses
d. Guerilla- is a member of a paramilitary
group organized to harass the enemy. a. inability to keep secret
e. Strong man/arm- is an agent readily b. need for recognition
available to provide special protection during c. strain of dual experience
dangerous phases of the clandestine operation. d. experience
f. Provocateur- an agent who induces an 3. Agent training
opponent to act on his own detriment by discrediting 4. Agent testing
himself or revealing his true purpose or identity.
5. Agent termination 7. He shall not reveal the identity of informants or
informers nor require them to appear in court except with
Information net- A controlled group of persons who worked the explicit approval of his commander or chief.
through the direction of the agent handler. The informants 8. He shall be cautious in his relations with informants
principal or cut- outs supply the agent handler directly or (a) to lessen the likelihood of the information taking or
indirectly or intelligence information. being given unjustified privileges, and (b) to increase the
effectiveness of their service.
Factors to Consider in the Selection of Action Agents 9. He shall keep himself informed as o the identity of all
1. Placement- location or prospective agent with commercialized vice operator in the city or municipality, the
respect to the target. nature of their activities and their operating relationship,
2. Access- the capability or ability of the prospective both in the locality and out of it, to each other, to public
agent to obtain the desired information for the intelligence officials and to private persons. He shall use every legal
organization or to perform the intelligence collection means to convict vice operators, and shall focus hi
mission in the area. attention on higher echelons.
a. Primary Access- it has direct access to the 10. He shall make frequent inspection of all places where
desired information. commercialized vice may be suspected and places where
b. Secondary Access- the access to the prostitutes, gamblers and drug addicts and dealers may
desired information through principal source where congregate. He shall use every lawful means in
the latter has the direct access. coordination with the other governmental agencies to
c. Outside Access- the agent is employed arrest, and convict the offenders, to suppress their illegal
outside the target and merely monitors information operations and drive them from the community.
from a third person who is monitoring information in 11. He shall guard himself against being forced into ill-
the area. advised action against minor noncommercial violators that
may result in arousing public indignation, raids on church
How can a handler test the thrust worthiness of an agent? buildings, homes and privately- occupied hotel rooms.
1. The handler initially sends the agent out on a 12. He shall coordinated with the bureau to get
“test mission” to perform a minor task, information on newly arrived criminals and criminals hiding
“If he/ she delivers, then it’s a plus. as well as activities of local offenders.
2. Another basic step is a thorough background 13. He shall maintain close surveillance eof suspects
check on the individual to determine his or her procuring, maintaining or transporting women for
connections. When the agent is employed in an “oplan”, prostitution.
he or she signs a 14. He shall maintain a suitable record of activities and
“contract” specifying his or her mission and the corresponding findings ad shall deep them constantly secure.
payment for services.
3. A handler may employ the a secondary or Debriefing
third agent to conduct a parallel operation to cross- Handler and agent also agree to hold periodic
check the primary agent’s information. The first, second and debriefings, during which the later reports on all of the
third agent s do not intelligence information gathered in the course of an operation.
know each other nor are they aware of each other’s missions. “ It must be pointed out that handler usually start a project with
The second or third agent may even report to the handler that initial information gathered from what is available in the media
your primary agent in an enemy,” to even coffee shop talk, and the agent is required to pry in to
“closed” information.
How is informant Counter Checked if he is a broker or a
risk to the job? WEEK 17
The supervisor at times tests him on his reports, have SOME INTELLIGENCE UNITS IN THE WORLD
the informant tailed secretly, get into from other informants 1. CIA- Central Intelligence agency- Military intelligence
who know him and /or an analysis later of the reports agency of United States of America and engaged in many
submitted. It is an unwritten precept not to trust a crook trying undercover activities throughout the world.
to sell other crooks but the check must be dome very discreetly 2. KGB- Komitet Gusodarstevenoy Bezopasnosti-
or the informant can clam up, submit fabricated reports, or just Russia
quit. 3. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim
In case a control or project officer is reassigned or retired, M-eyudim)-“ Central Institute for Intelligence and Security”-
what happens to his Informant? Israel
The departing officer introduces his replacement to the
informant in a secured place. If the informant is unwilling to
4. SIS- Secret Intelligence Service- Great Britains
intelligence agency and also known by its wartime
work for the new boss, he has to go. Most however elect to
designation, “MI6”, equivalent to US’s CIA, in charge with
stay.
gathering information overseas and with other strategic
services ranging from foreign espionage to covert political
Code Name- an alias or symbolic designations used by
intervention.
intelligence officer/ informants and even criminals for security.
5. SDECE- (Secret de Documentation Exterieure et
Duties of an Intelligence Officer: Contre- Espionage)- France
The following are the duties of the Intelligence officer if the 6. SAD- (Social Affairs Department)- China
department has an Intelligence unit. 7. FBI- Federal Bureau of Investigation- its primary role
1. The police Intelligence officer obtain facts for the is counter intelligence limited to internal security within the
commander relating to some conditions in its area of United States of America.
responsibility. 8. “MI-5” - Great Britains’ civilian intelligence agency
2. The intelligence officer is a fact- finder, not an for internal counter intelligence, equivalent of US’ FBI and
enforcer. He takes no direct action beyond reporting to the equivalent to Internal Security Section of Russia’s KGB.
commander except in enforcing vice- laws. 9. NICA- National Intelligence Coordinating Agency-
3. He reports directly to the commander unless ordered Philippines
to report to an appointed supervisor, the deputy or vice-
commander. *Col. Rudolph Abel - (Russian)- was probably the highest
4. He shall be held accountable for failure to inform his ranking and most successful spy whoever infiltrated the
supervisor regarding the conditions of the city or United States.
municipality served. *Mathew Cevetic- a famous undercover assignment of FBI,
infiltrated the communist party/
5. He shall make contacts with the persons who are
likely to have or are able to get the desired information.
Personalities related in the evolution of intelligence
6. He shall use under cover men or agents to assist him 1. Sun Tzu- a Chinese(Father of Intelligence” philosopher, in
in accomplishing his missions and objectives. his book “PING FA”
(Art/Principles of War)- the earliest known textbook on the art appointed a minister of State seven years later, but was driven
of general warfare- once said; “If you know your enemy and from office shortly after the assassination of the King’s
know yourself, You need not fear the Result of a hundred Secretary. Appointed Cardianl in 1524, was recalled State
battles. If you know yourself but not your enemy, for every office by King Louis XIII.
victory, you will suffer defeat. If you know neither yourself nor
your enemy, your are fool who will meet defeat in every battle. Cabinet Noir- a secret police organization is the creation of
Its lessons were applied by Mao- Tse-tung during the long Cardinal Richelieu designed to intercept and analyze
march and by the Japanese prior to Pearl Harbor. correspondence within the French Court and between the
lesser nobility.
Holy Bible- is here you can find the just recorded intelligence
operations in history. 9. Major John Andre (1751-80)
1. Moses-One of the first recorded formalized John Andre, an officer of the 64th Regiment of Iowa is the only
intelligence efforts, with format, can be found in the spy to be honored by a memorial tablet at Westminster Abbey.
Book of Numbers 13:3-17. The scripture also named the From the son of a Swiss merchant of London. Andre proved
twelve intelligence agents when the Lord directed Moses to incredibly popular when appointed to the post Adjutant General
send into the land of Canaan and records that “all those men of New York, when the American general Benedict Arnold
were heads of the children of Israel”. made surrender overtures to the English in 1780. Andre was
delegated to negotiate with him.
2. Rehab- “The harlot” of Jericho (Joshua 2: 1-21) who
sheltered and concealed the agents of 10. Benjamin Franklin (1706-90)
Israel, made a covenant with the agent sand duped their He helped frame the American Declaration of Independence.
pursuers. She was not only an impromptu confederate of Superficially, he was sober in thought and deed and diplomat
immense value to the Jewish leaders of that far-distant day, of unquestioned integrity. Privately he was a British double
but also established a plot- pattern which is still of periodic agent with unusually exotic social tastes. While American
relief to motion- picture producers. ambassador to Paris, Franklin allowed his friend and chief
assistant Edward Bancroft to organize a British Secret Service
cell within the Embassy.
3. Delilah- a Palestine agent who used her charm to
gain information from the powerful enemy.
11. Sertorius
When Sertorius was the Roman Commander in Spain he was,
2. Alexander “The Great”- Under the tutelage of according to Polyaenus, the possessor of a white fawn that he
Aristotle, Alexander the Great King of - Macedonia, trained to follow him every where, “..even to the steps of the
became the first ruler to utilize intelligence as a weapon of tribunal”.. This little fawn was taught to approach at a given
government. Using a system of identical staves and scrolic. signal, and Sertorius himself the signal, when about to
He divided a simple but highly effective system of covert pronounce his decision in judicial cases.
ciphers.
- He introduced a primitive form of “Cabinet Noir” 12. Frederick “the Great”
(Internal Monitoring) when he instigated postal censorship into The “Father of Organized Military Espionage”.
the army and investigated letters and malcontents.
13. Hannibal
3. Daniel Defoe- He was also one of the British Hannibals invasion of Italy, the most brilliant and futile raid in
Monarchy’s finest agents. Although, best known as the history, gained him victories and nearly bled Rome to death,
author of “Robinson Crusoe and Moll Fladers. Defoe also but the mere slaughter of
worked in the honorable, through secret services of Queen Romans and a great city’s despair would not have sustained
Anne. Outwardly rebellious, a revolutionary pamphleteer, him for fifteen years if he had not also made powerful allies
pilloried and twice imprisoned for seditious libel, his and developed an excellent intelligence system. He often
background was hardly suited to the world of royal dressed as a beggar and went into the streets of Rome.
espionage. He also uses the name “Alexander Goldsmith”
sometimes “ Claude Guilot”. 14. Fouche of France
Joseph Fouche, rose to become one of the most feared and
4. Belle Boyd-The daughter of Shenandoah Valley. A most respected intelligence directors in the history of France.
farmer and merchant, Belle Boyd was a mere He created a network of agents that knew almost everything
seventeen years old when the American Civil war so fatefully anyone did or was about to do.
intruded her life
15. Schulmeister, “Napoleon’s Eyes”- He is Napoleons
5. Sir Francis Walsingham of England military secret service.
He was credited with creating the first viable secret service in
England. He protected Queen Elizabeth I from countless 16. Wilhelm Stieber- He made two major contributions to
assassins. the sequence of military intelligence, namely military
censorship and organized military propaganda.
6. Lord Baden – Powell
- Known as the founder of the Boy scout Movement 17. Alfre Redl- One of the most brilliant intelligence
and was also active spy. Baden Powell was commissioned into
agents, though he was a homosexual. He rose to become
the 13th Hussars on leaving school in 1876. After seven years’ chief of the Austro- Hungarian Secret Service , or in other
service in India, his regiment was posted to Natal, South
terms,
Africa, where the young offcer carried out his first intelligence
director of their military intelligence system. For more than half
assignment, a cover reconnaissance of the 600-mile frontier of
of his time as director of intelligence, Redl was acting as an
the province.
intelligence agent of Russia.
7. Mata Hari (1876-1917)
In 1913, proof of Redl’s treason was discovered and shortly
Ironically, Mata Hari is one of the Best known spies in history,
thereafter, Redl was compelled to commit suicide. The history
yet she was one of the worst. Born, Margarete Gertrud Zelle in
of this 13- year episode as an arch spy, led to the death of
Leeuwarden in Holland, she displayed an early independence
over 500,000 agents and soldiers combined in the military
and zest for life. At the age of seventeen, she answered a establishment
lonely hearts advertisement trough which she met her future
husband, John Macleod, a 38- year old officer from the Dutch
East Indies.

8. Cardinal Richelieu (1585- 1642)


Cardinal Richelieu gave France her first organized system of
espionage. The son of a noble family for Poltou, Armand du
Plessis was consecrated Bishop of Lucon In 1505. Under the
patronage of the Quenn Mother, Marie de Medici, he was

You might also like