You are on page 1of 18

LESSON 6

Intelligence

TOPICS
1. Information
2. The Characteristics and Context of Intelligence
3. Counterintelligence
4. Intelligence Cycle
5. Undercover Operations
6. Surveillance
7. Agents

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
a. identify the possible sources of information, types and motives of
informant;
b. discuss the context, characteristics and principle covered by
intelligence;
c. apply the principle and application of counterintelligence;
d. examine the process, reliability and accuracy involved in intelligence
cycle; and
e. enumerate the purpose of conducing undercover.
TOPIC 1: INFORMATION

The term information was consistently


mentioned in the previous chapters. Technically, it
refers to the element of investigation necessary for
gathering and collection of date to include its
progress as it moved forward in solving the case. As
opposed to its legal perspective, information is
defined as accusation in writing, charging a person
with an offense, subscribed by the fiscal, and filed in
court.

In connection to intelligence, information is


simply the “raw data”. This simply implies that in the
aspect of intelligence, information are just pieces or
its part. These pieces of information are useless
without being analyzed and evaluated so that they
can be disseminated and used by appropriate person. In contrast with information, intelligence
refers to collated, analyzed, and evaluated information appropriately acquired for a particular
purpose.

32
Sources of Information

Source of information is the network of data which can be linked or grouped in order to
obtain a concrete a reliable information based on the prevailing need or as the need arises. Some
of these common sources are:

1. People as source of information

a. Regular source – these are information gathered through people who have come
directly to the attention of the police commonly the complainant, witness or victim.
b. Cultivated source – these are information generally taken through the use of
informant or informer.
c. Grapevine source – these sources of information are gathered from those who are
in the underworld criminals or ex-convicts.

2. Record as source of information

a. Government source – these are sources taken from government agencies or any
of its instrumentality.
b. Private source – these sources of information are usually taken from different
private entities and business organizations, public utilities such as water or electric
bills, and all other private sectors.
c. Internet source – this modern source of information is done through searching
specific detail by typing the desired key or phrase in the different search engine.

Types and Motives of informant

Technically, the term informant refers to any


person who possess knowledge regarding crime,
criminal syndicate, or ongoing criminal activity and
provides information with the police with or without
consideration. It is usually used interchangeably with
the term informer. However, the term informer refers
most specifically to those persons who are recruited or
hired and paid in a regular basis just to provide
information.

Below are the common types of informants:

1. Anonymous – these are unidentified or


unknown informants and usually provide information to the police through telephone or
cellphones
2. Double-crosser – these are those informants who provide information in order also to
gain information from the police. Worst, they acquire more information than what they
give.
3. False Informant – these are those informants who provide false information or
information without bases.
4. Frightened Informants – an informant who provides information due to panic or
anxiety.
5. Legitimate – these are those informants who provide information voluntarily to the
police.
6. Mercenary - these are those informants who provide exaggerated information in
exchange for a reward, whether for money or any other consideration.

33
7. Self-aggrandizing – an informant who provides exaggerated information to the police
in order to gain advantage or attention.
8. Women – these are the most dangerous and difficult type of informants against male
subjects.

In addition, below are the common motives of the informant in providing information such as:

1. Civic – mindedness – informant provides information as a sense of duty and obligation


to assist the police.
2. Fear – the person gives information due tom oppression by enemies or other
impending danger.
3. Gratitude or gain – informant provides information to obtain a privilege toward the
welfare of his family.
4. Jealousy - the informant is pushed to provide information to the police due to his
resentment to the accomplishments or possessions of another.
5. Remuneration – a person informs the police for some pecuniary or other material gain
he is to receive.
6. Repentance – the informant provides information as a sign of regret for what he has
previously done.
7. Revenge – vengeance or retaliation is the sole purpose of the person in providing
information to the police.
8. Vanity – the person wants to gain favorable attention and importance from the police.

Legal Limitations in Obtaining Information

The power given by the state to police officers in gathering is so huge that it may be prone
to abuse. To protect the privacy of an individual citizen, the law prohibits certain police actions such
as the following:

1. Republic Act 4200 (Anti-Wiretapping). Under this law, the following acts are prohibited:
a. Tapping any wire or cable;
b. Using any other device or arrangement;
c. To secretly overhear, intercept, or record;
d. Private communication/conversation or spoken word; or
e. Without the knowledge or consent of all the parties

2. Republic Act. 10173 (Data Privacy Act). Under this law, the following acts are
prohibited:
a. Unauthorized processing of personal information;
b. Accessing personal information due to negligence
c. Improper disposal of personal information;
d. Processing of personal information for unauthorized purposes;
e. Unauthorized access or intentional breach;
f. Malicious disclosure; and
g. Unauthorized disclosure.

Take note, under the same law RA 10173, it defines personal information as any information
whether recorded in a material form or not, from which the identity of an individual is apparent or
can be reasonably and directly ascertained by the entity holding the information, or when put
together with other information would directly and certainly identify an individual.

Task/Activity

Activity 1: Application
Identify the type of informants. Their motive were illustrated below:

34
1. X provide information to the police concerning criminal activity because he is afraid
that they might hunt him.
2. Y is providing unnecessary information to the police
3. Mr. X provides information if he finds out that it has a higher price.

TOPIC 2: THE CHARACTERISTICS AND CONTEXT OF INTELLIGENCE

In line with the intention of


successful criminal investigation,
intelligence is at par one requirement that
needs to be satisfied and be given
attention. Even in history, intelligence
plays an important role in the success of
every war. In like manner, the success of
every war demonstrates and shows how
information was gathered and collected
correctly and precisely.
In modern times, intelligence is
used primarily to crack down organized
crime, defend from enemy attacks, and
aid in the progress of either covert or overt operation. Overt investigation simply means as
operation conducted openly while covert investigation in contrast is an operation conducted in
clandestine manner. Clandestine simply means as a secret. Considering that intelligence is the
backbone of police operation, then no operation should be made without successful and accurate
intelligence.

In addition, it must be noted that intelligence is not only used in line with the different police
operation but also in improving the political, economic and sociological advantage of the nation.
Apart from that, take note that intelligence should possess the following characteristics as it serves
its purpose. If not any information gathered will be hampered or might acquire false information. As
whole, any operation or activity might be jeopardized.

1. Intelligence and operation are interdependent


As intelligence provides valuable inputs for the effectiveness of police operation, in like
manner, operation provides for the continuity of intelligence activities.
2. Intelligence is continuous
This implies that intelligence must not be disrupted and must be continuous following
simple cycle from the time information is being collected in response to the need, up to
the time it will be processed and disseminated to appropriate person.
3. Intelligence must be useful
This means that intelligence must meet the commander’s need and should be relevant
to the current operation.
4. Intelligence must be available on time
Intelligence must be communicated and disseminated to appropriate person on time
as information that is too advance or late as useless.
5. Intelligence operations require imagination and foresight
Intelligence must be forecasted based on prudence with the intuition that information is
possible to be collected from a particular source.
6. Intelligence must be flexible
It must be noted that intelligence is adaptable to every situation of all kind as operation
might vary depending on the purpose and occasion.

35
7. Intelligence requires continuous security measures
Take note to deny unauthorized disclosure or relevant information to enemy as well as
provide protection in handling classified materials.

SCOPE OF INTELLIGENCE
Intelligence also covers a wide range of area in its application. It might be a network of
information concerning national policy and national security which is known as National
intelligence. It could also be collected, analyzed, collated and evaluated information concerning
criminal investigation, criminal syndicate, organized crimes, and other police problems which are
known as Police intelligence. Those information regarding military activities which is at the same
essential to the different military operations is known as Military intelligence. Lastly, it could also be
Departmental intelligence, which refers to information needed by all the department agencies in the
execution of government plans and programs.
In the area of police intelligence, it includes criminal intelligence, internal security
intelligence, and public safety intelligence. Criminal Intelligence (CRIMINT) refers to the knowledge
essential to the prevention of crimes and the investigation, arrest and prosecution of criminal
offenders. Internal Security Intelligence (INSINT) refers to the knowledge essential in the
maintenance of peace and order. Lastly, Public Safety Intelligence (PUSINT) which refers to the
knowledge essential in ensuring the protection of lives and properties.

As to the typology of police intelligence, it could either be strategic intelligence or line


intelligence. This pertains whether an intelligence value is designed for future or immediate use.
Strategic Intelligence is a type of intelligence that is long range in nature and requires a longer
period of time before being materialized and fully available. It is an intelligence data that are not of
an immediate value. It is usually descriptive in nature, accumulation of physical description of
personalities and modus operandi. It does not have immediate operational value, but rather long
range that may become relevant to future police operations.

Line Intelligence on the other hand is a type of intelligence that is immediate in nature and
can be available or developed within a short period of time. It is a kind of intelligence required by
the commander to provide for planning and conduct tactical and administrative operation in
counterinsurgency. This includes knowledge of People, Weather, Enemy and Terrain (PWET)
which is fundamental in planning and conducting tactical and administrative operation in a
counterinsurgency.

People includes the living condition of the people, sources of income, their education,
government livelihood projects and the extent of enemy influence to the people. Weather refers to
the visibility, cloudy, temperature, precipitation (rain) or windy of the climate. Enemy as the term
suggest, refers to the study of location, strength, disposition, tactical capability and vulnerability of
the enemy. Terrain includes relief and drainage system, vegetation, surface material, manmade
features and some military aspects of terrain which includes cover and concealment, obstacle,
critical key terrain features, observation and fields of fire, and avenues of approach.

Task/Activity

Activity 2: Case Analysis


1. Juan Dela Cruz is an intelligent officer who delivers the message to the ground
commander prior to the actual conduct of operation. What do you think are the possible
consequences?

36
TOPIC 3: COUNTER INTELLIGENCE

Counter intelligence is a type of


intelligence employed to protect the
interest and safeguard lives, property and
important information against possible
entry or infiltration of enemy forces from
being lost, destroyed or stolen. In police
parlance, this includes denying and
blinding enemy about police operation as
well as giving the police officer the
opportunity to gather information without
being detected. This is also the phase of
intelligence covering the activity devoted in
destroying the effectiveness of hostile
foreign activities and the protection of
information against the following:
1. Espionage – refers to the stealing of vital information either physical or in electric form;
2. Subversion – the recruitment of person who is working within an organization or
employment of any person to an organization who will work secretly in an attempt to
undermine or overthrow its current system.
3. Sabotage – refers to the stealing of properties of destruction of any material in order to
hamper or cause delay in the preparation or regular working duties.
Moreover, the application of counterintelligence is best appreciated in providing Military
Security as it provides the commander the necessary measures to be taken to protect itself against
espionage, enemy operation, sabotage, subversion or surprise. In Port Frontier and Travel
Security, counterintelligence aids in protecting the point of entry and departure in international
borders or boundaries.

In the field of Civil Security counterintelligence helps in providing measures that affect non-
military nationals who are residing in an area either permanently or temporarily. One of the best
application also of counterintelligence is the Censorship, as this aids in controlling the movement of
the different person particularly those are expected to destroy any government institutions or
projects. In the conduct of Special Operations, counterintelligence also provides protection against
counter subversion, sabotage, and espionage.

In the field of Counter Intelligence (CI) Operation, it could either be Counter Human Intel,
Counter Imagery Intel or Counter Signal Intel. Counter Human Intel (HUMINT) seeks to overcome
enemy attempts to use human sources to collect information or to conduct sabotage and
subversion. Counter Imagery Intel (IMINT) are actions such as surveillance radar, photo thermal
and infrared systems and rely heavily on pattern and movement analysis and evaluation of the
enemy. Lastly, Counter Signal Intel (SIGINT) which determines enemy SIGINT and related enemy
weaknesses, capabilities and activities, assess friendly operations to identify patters, profiles and
develop, recommend and analyze countermeasures.

37
In providing protection to vital information, the type of counterintelligence that could be
utilized is either through passive or active measure. Passive CI Measures include protection of
classified and sensitive information to the unauthorized individual through secrecy, communication
security, and other various safeguards. Active CI Measures on the other hand, are those measures
that actively block the enemies’ effort to gain information or engage in espionage, subversion, and
sabotage.

In addition, the concept of counterintelligence does not only limit to the protection of vital
information or to hide ones identity from the enemy but also includes detection, prevention, and
neutralization of enemy activities. Detection is about knowing the clandestine operation of the
enemy. Prevention is about avoiding enemy attacks or infiltration while neutralization is the
suppression of enemy activities.

To sum up, counterintelligence is very significant to but not limited to the following such
that:
1. Denying information to the enemy;
2. Reducing the risk of a command;
3. Protecting vital information and property;
4. Increasing security forces; and
5. Decreasing the enemy’s ability to create plans against the organization.

Task/Activity

Activity 3: Bridging Questions


1. What are the different ways in protecting information? How sure you are that these
information are safe and free from any harmful actions of the enemy?

TOPIC 4: INTELLIGENCE CYCLE

Intelligence Cycle is defined as the process of obtaining information which includes proper
procedure and sequence of steps starting from planning, collection, and the dissemination of
information to appropriate persons. Intelligence cycle is important as it provides the necessary
details in attaining the mission. Mission is the purpose why intelligence should be gathered and
used for particular undertaking. This is considered as the heart of the intelligence cycle.

38
Planning Phase
In intelligence cycle, planning is defined as the process of determining the extent and
scope of the needed preparation which includes the supervision of the collection of information and
other requirements based on the standard priorities.
In planning for the collection, the following factors should be considered such as:
1. Sources of information
2. Operations of the command
3. Characteristics of the enemy; and
4. Methods in gathering information.
Sources of information pertains to the individual or group, association or entity which may
possess possible information tom which an individual desires to be gathered. Operations of
command is the manner how the collecting agency and even the agency upon which data will be
gathered acts or works for a particular purpose in order to determine the needed preparation or
security. Characteristics of the enemy refers to the capabilities, power, influence, and connection of
the enemy forces upon any person to whom the data to be collected shall be directed or used.
Methods in gathering of information simply refer to the different approaches as to how information
shall be gathered or collected. This will help intelligence officer to provide the necessary Essential
Elements of Information (EEI). These are information pertaining to the target area which the
commander feels he need before he can arrive with an accurate decision.
In addition, collecting agency refers to any organization, entity, association or individual
person that collects and gathers the needed information through an intelligence officer. Target area
refers to any individual, group, association or entity that subjected to for operation or intelligence
gathering.

COLLECTION PHASE
In intelligence cycle, collection refers to the information gathering done in compliance with
established procedure to avoid detection and penetrate successfully.
In collecting information, the following factors should be considered such as:
1. Who will collect the information
2. What information will be collected
3. Where are the places whereby information shall be collected
4. When is the right time to gather the information
5. How this information shall be collected; and
6. Why this information should be collected?
Take note that since the collection and gathering of data is a cycle, any information
gathered or collected to which the intelligence officer finds less value or no value at all shall be
recorded and, if possible, preserved as it may be used for future endeavors.
In selecting the collecting agent, the following factors should be considered:
1. The placement or access to the information;

39
2. The capability to gather the information;
3. The number of people who will gather the information; and
4. The strength and security of the target area.

COLLATION PHASE
In intelligence cycle, collation refers to the process involved in evaluating the accuracy and
reliability of the information collected. Reliability means judging the source of information while
accuracy simply means the level of truthfulness of the information collected.
In collation stage, all collected information will undergo the following:
1. Recording – refers to the systematic sorting of all documented information and present
them either in writing or some other form of presentation so that they can be analyzed
and studied for future action.
2. Analysis – the collected information is divided into different components; and isolate
those that are relevant to the mission or those that has intelligence value which
includes looking into the source of information, truthfulness of the information and who
provides the information
3. Evaluation – refers to the assessment of information done to determine the reliability of
the source and providing judgement in line accuracy to determine its truthfulness as
well as its pertinence to the current situation.
Reliability and Accuracy Table
REALIBITY OF INFORMATION ACCURACY OF INFORMATION SOURCE OF INFORMATION
A – COMPLETE RELIABLE 1 – CONFIRMED by other T – Direct Observation by Commander
sources of Unit
B – USUALLY RELIABLE 2 – PROBABLY TRUE U – Report by DPA or Resident Agent
C- FAIRLY RELIABLE 3 – POSSIBLY TRUE V - Report by PNP/AFP Troops
D – NOT USUALLY RELIABLE 4 – DOUBTFULLY TRUE W – Interrogation of Captured Enemy

E – UNRELIABLE 5 – IMPROBABLE X – Observation of gov’t/civilian


employee
F – REALIBITY cannot be judged 6 – TRUTH cannot be judged Y – Member populace

Z – Documentary

4. Integration – is the combination of all those isolated information from various sources
to produce a new information necessary for the success of the mission.
5. Interpretation – is the process involved in providing meaning and significance of new
information
6. Synthesis – provide conclusion based on the new information generated in relation to
the current situation.
Take note, processed information is now called intelligence.

DISSEMINATION PHASE
In intelligence cycle, dissemination refers to the actions taken to transfer processed
information to appropriate persons. Extra care should be considered in disseminating information
and should be based on the “need to know principle”. Meaning, information or those that had

40
already intelligence value should only be passed, handed, and disseminated among persons who
have the personality to know or acquire the same.
In line with dissemination, the intelligence can be disseminated in any of the following:
1. Fragmentary orders from top to bottom of the command
2. Memorandum, circulars, special orders
3. Operations order, oral written
4. Conference – staff members
5. Other report and intelligence documents
6. Personal Contact
Who are the users of intelligence?
1. National Leaders;
2. Military commanders;
3. Advisors and Staff;
4. Friendly nations;
5. Head / Chairman of an organization; and
6. Any person with authority or right over the intelligence

Task/Activity

Activity 4: Understanding
1. What are the steps undertaken in the different phases of the intelligence cycle?
2. What is the purpose of determining the reliability and accuracy of the information?

TOPIC 5: UNDERCOVER OPERATIONS

Undercover operation is very vital in criminal


investigation. This serves as their arm in information
gathering or even in the capture of suspects. As per
definition, undercover operation is a form of
investigative technique whereby an undercover
agent usually investigators assume another identity
in order to infiltrate the ranks of criminal syndicates.
Take note that undercover agent should have their
best cover and cover story. Cover refers to the
means as to how investigators will hide original
identity while cover story is the biographical
portrayal of the investigator as to what role he will depict toward criminal syndicate while collecting
vital information. The person who provides support to the investigator is referred to as the cover
support. Undercover operation is otherwise known as roping although most of the time it refers to
the surveillance of certain activities or events.

41
In police work, undercover operation is done in order to acquire necessary inputs from a
particular person or place that might possess valuable information. It also assisted the investigation
in apprehending law violators.
Talking about cover, it could either be artificial or multiple type of cover. Artificial cover is
done if the undercover agent is modifying his identity based on the current operation or as the case
may require while the multiple cover involves the use of different cover that will fit to a given
situation.
As to assignment, it could either be residential, social or work assignment. Residential
assignment involves the employment of undercover agents in an area where the subject lives.
Social assignment on the other hand is the employment of undercover agent in an areas where the
subject frequents for fun and entertainment. Lastly, work assignment is employment of undercover
agents in areas where the subject works.
In addition, undercover operation is composed of the following elements, namely: the
head; target; and agent
The Head is the person who directs the organization conducting the undercover operation.
The target pertains to any person, place or things against which the undercover operation is to be
conducted while the agent refers to a person who conducts the clandestine activity. This could
either be a police officer or any person who can access and gather information from the target.
In the conduct of undercover operation, be cautious when confronting with ranks of
criminal a syndicate. When gathering information, be sure that you are good in elicitation.
Elicitation is a form of extracting information done through an interview with the person who might
possess valuable information concerning a person, event, organization or place without his
knowledge or suspicion.
In Elicitation, be sure to have a good approach and a proper probing technique. Approach
pertains to the manner as to how you will start talking while probe refers to the manner how will you
keep the person talk.
When reporting to the office, the investigator should meet any personality or his
companion with the law enforcement agency in a safe house only. The term safe house refers to a
safe place where the investigator or his informant will meet for briefing or debriefing purpose. To
avoid any suspicion from those who are in the ranks of a criminal syndicate, the undercover agent
may use couriers to provide feedback as to the current operation. Courier refers to the person who
carries an information to another person.
It could also be through leaving a message in some places or drop. Drop refers to a secure
place where agents or informants give their message to the other agents which could be either:
1. Dead Drop – the agent merely leaves the message
2. Live Drop – the courier hand over the message directly to the agent.
It must be noted that undercover agent must be very cautious at all times as any failure in
this operation might cost his life. Be reminded of the following while conducting undercover
operations:
1. Act naturally as possible
2. Do not overplay your part
3. Do not indulge in any activity, which is not in conformity with the assumed identity. This
means that if you play the part of a fisherman and have a knowledge, attitude, and
skills of a fisherman.
4. Do not make notes unless they are to be mailed or passed immediately. Use code or
cipher if possible (to be discussed in the next lesson)

42
5. Do not use liquor or any intoxicants except if necessary and limit the amount to avoid
being drunk
6. Limit your association with women.

Task/Activity

Activity 5: Analysis
1. What are the other things that you need to reconsider and remember while doing
undercover operation?

TOPIC 6: SURVEILLANCE
In collecting additional information about the
person or some places that is necessary in the
conduct of investigation, surveillance may be
conducted. Surveillance is defined as the
clandestine or secret observation of persons,
places or objects to acquire valuable
information. Unlike undercover operation, which
enters or infiltrates criminal syndicates,
surveillance is merely observation or watching
the particular subject.

In the conduct of surveillance, subject refers to who or what is being observed which can
be any person, place, property, vehicle, group of people, organization or object as the target in
conducting surveillance. The agent here or the person conducting surveillance or making an
observation is referred as the surveillant. He is usually an investigator who disguises himself
purposely for surveillance. The conduct of surveillance is guided by the surveillance plan.
Surveillance plan simply refers to the outline or blueprint as to how surveillance should be
conducted.
While conducting surveillance, any person whom the subjects picks or deals with while he
is under observation is termed as contact. Take note to be observant as the subject may be
accompanied by a convoy or decoy. Convoy is an associate of the subject who follows him to
detect surveillance while decoy is a person or object used by the subject in attempt to escape the
eyes of surveillant.
The surveillant should be cautious not to alarm the subjects since he might be burn out.
Burn out or Made happens when subject under surveillance becomes aware that he is under
observation and identities the observer. If it happens, the subject often uses all the means to elude
the surveillance. When the surveillant does not know the whereabouts of his subject or the subject
had elude the surveillance, it means lost.
To prevent this, as much as possible do not make yourself too close to the subject to avoid
detection. Just remember to have a log. Log refers to the chronological record of activities that the
subject had or took place in the target area. Target area refers to the area of operation of
surveillance activities. Remember not to forget to take not of whatever happened and, if possible,
take photographs.
TYPES OF SURVEILLANCE

43
The types of surveillance that the agent or surveillant use may vary depending on his
purposes. As such, it is job of the police investigator in charge as to what should be the best type
of surveillance that should be done in order to acquire details necessary for the case under
investigation or for future endeavors. The types of surveillance are discussed as follows:
1. Stationary surveillance – this surveillance is otherwise known as fixed, plant or
stakeout surveillance and is commonly done in one standard location. This is best
useful when:
a. A stolen property is expected to be dropped; or
b. A crime is expected to happen

2. Moving surveillance – this surveillance employed when the subject moves from one
place to another. The person is commonly tailing or shadowing the subject. Tailing or
shadowing simply means as the act of following a person’s movement either through
foot or with the use of an automobile. The subject of this surveillance is usually a
person. Under this method of surveillance, this could be done in the following manner:

a. Rough tail or open tail – otherwise known as rough shadowing, and is commonly
employed if the subject knows about the presence of the surveillant. Rough tail
can be used in the following scenario:

 When the subject is a material witness of a crime; or


 A fugitive who knows that he is under constant surveillance.
Take note that rough tail also suffers some liabilities and charges like
police harassment or invasion of privacy.
b. Close tail or tight tail – this tailing is employed when it’s extremely important no to
lose the subject and a constant surveillance is needed. Close tail very useful
when:

 The subject will commit a crime;


 There is a need to know the subject’s exact habit; and
 Subject’s activities are necessary are necessary to another critical
operation.
This tailing is employed even if the subject recognizes the surveillant which means
that the subject must be within his distance and sight.

c. Loose tail – refers to the tailing commonly employed if the surveillant wants to
remain undetected. This tailing could be used best when:

 Surveillant needs the general information about the subject; and


 Surveillant needs to know the subject’s activities or associates.
If the subject is lost during surveillance, relocate the subject and continue the
surveillance.
3. Aerial surveillance – this type of surveillance is done using helicopters or other aerial
devices. This is commonly employed in areas that is not accessible to foot or
surveillance vehicle.
4. Video surveillance – this refers to the use of video equipment and other devices used
to record visual activity of the subject.

44
5. Audio or electronic surveillance – this refers to the employment of bugging or
wiretapping devices. These two differ such that:
a. Bugging is the eavesdropping any communication or conversation with the aid
of any bug devices. Bug is a form of electronic device place in an
establishment to record, receive or transmit conversation.
b. Wiretapping is the interception of communication lines such as telephone or
cellphone lines in order to listen or record conversation.

In addition, eavesdropping in the act of listening secretly to any conversation


who are within the same premise as with the person who intends to listen to
the conversation.
Example of this:

 Listening to people who are talking at the table beside you; and
 Sitting beside the person who is talking to someone over telephone
lines.
Methods of Surveillance

The manner as to how surveillance is to be conducted which includes the various


procedures and techniques employed by an agent or surveillance is referred to as the methods in
surveillance. This could be either be one man shadow, two man shadow, or three man shadow.
In one man shadow, as the number speaks, there is only one surveillant following the
subject. If two man shadow, two surveillant. In three man shadow three surveillant.

Procedures in the Conduct of One Man Shadow


1. Follow the subject, but not too close. A distance that is enough for you to see the
subject, but not too far to lose the subject.
2. If the subject turns, you either follow his path or cross to the other side, whichever you
think is practicable in the situation.
3. Make a good decision as to where the subject will be going. In that case, the
surveillant is at the advantage in taking the right position or placement while following
the subject.
4. Do not wear any apparel or clothing that are obvious or can caught the attention of the
subject.
5. Take photographs if possible, especially those contacts by the subject.

Procedures in the Conduct of Two Man Shadow


1. The first surveillant (A) should follow the subject while the second surveillant (B)
follows the first surveillant.
2. Both surveillant should have a proportional distance. Meaning, a distance that is
enough for them to see, but not too far to lose the subject. They must also have a
proportionate distance which means that they are not too far or too close to one
another.
3. If the subject either crosses the street or turns, allow the second surveillant (B) to
follow the subject while the first surveillant (A) should either cross or go straight but not
on the same side where the subject go. This time, the first surveillant should find the
right place and timing to regroup. He may stop and later follow surveillant (B) or turn
and catch them on the next corner depending on the situation.

45
4. Make a good decision as to where the subject will be going. In that case, the
surveillant is at the advantage in taking the right position or placement while following
the subject.
5. Regroup if chances are possible. Meaning, have the original placement but
necessarily the same surveillant when you started doing the shadowing of the subject.
This means that the first surveillant (A) may now become the second surveillant (B) or
vice versa.
6. Do not wear any apparel or clothing that is obvious or can catch the attention of the
subject.
7. Take photographs if possible, especially those contacts by the subject.

Procedures in the Conduct of Three Man Shadow


1. The first surveillant (A) should follow the subject while the second surveillant (B)
follows the first surveillant. The third surveillant (C) is in the same way whre the
subjects is going but on the opposite street parallel with surveillant (A)
2. Like in one man and two man shadow, both surveillant should have a proportionate
distance.
3. If the subject either crosses the street or turns, allow the second surveillant (B) to
follow the subject while the first surveillant (A) should either cross or go straight but not
on the same side where the subject gone. The third surveillant (C) should observe the
subject and act the role of either surveillant A or B depending on the situation.
Whoever becomes the third surveillant should follow the same. Later, they should find
the right place and timing to regroup.
4. Make a good decision as to where the subject will be going. In that case, the
surveillant is at the advantage in taking the right position or placement while following
the subject.
5. Regroup if chances are possible but again, not necessarily the same place where you
started doing the shadowing of the subject. This means that the first surveillant (A)
may now become the second surveillant (B) or vice versa and surveillant (B) becomes
now the surveillant (C) and surveillant (C) becomes now the surveillant (A) or vice
versa depending on the situation.
6. Do not wear any apparel or clothing that is obvious or can caught the attention of the
subject.
7. Take photographs if possible, especially those contacts by the subject.
Take not that the procedure taken either in one man, two man or three man shadow are
quite the same. They just differ in terms of their role and placement. In this way, alarming the
subject that he is under surveillance is quite small considering that there are two or three persons
conducting the surveillance.
Casing
Casing refers to the process of inspecting places to determine its suitability for operational
use. In the military, it is known as Reconnaissance. Sometimes, it is called the surveillance of
places or building. Casing could be done either:
1. Internal – it is inspection of the different parts of the building or any structure which
includes but not limited to the different rooms within the building.
2. External – this is the inspection and observation of the immediate areas surrounding
the building or any structure which includes location, direction, possible exits and
others.

Task/Activity
46
Activity 6: Bridging Questions
1. Is it good to use vehicle while doing surveillance or shadowing a person?
What are its advantages and disadvantages?

TOPIC 7: AGENTS

As agent is defined as any person capable, skilled,


and competent in collecting, extracting, gathering,
infiltrating, penetrating information of all kinds in
various sources as well as knowledgeable in the
science of disguise in order to avoid detection from the
enemy or any unwanted forces while doping
intelligence work. Intelligence work is defined as the
clandestine operation or activity done by any agents in
order to gather relevant facts for future operation.
Agents also play an important role in extracting information in any undercover operation.
They do interview of suspected individuals, infiltrate the rank of criminal syndicate or even disguise
as one of them with the sole purpose of acquiring vital information relevant to the success of the
operation. Most of the time, you do not recognize them or you do not see them. That is part of their
job in order to hide their identity as well as to protect the lives of their family and loved ones.
There are agents who use authority to gain information. He is called an agent of influence.
For those who are recruited within a highly sensitive target are called agent in place. There are
also agents who leak false information to the enemy and they are called expandable agents. Those
agents who have reached the enemy camp, gathered information, and are able to get back without
being caught are called penetration agents. However, there are also those who acted as double
agents. He is an enemy agents, who has been taken into custody, turned around and sent back
where he came from as an agent of his captors.

General Classification of Agents


Agents are generally classified based on their assignment whether they are those who
direct the planning in gathering information, directly penetrate the ranks of criminal syndicate or
supports the whole operation. These agents are as follows.

47
1. Principal Agents – These are the leader or management agent in the clandestine
operation.
2. Action Agents – These are those who conducts the clandestine operation which is
further classified into:
a. Espionage Agent – an agent responsible for the collection of information;
b. Propagandist – these are agents who molds the attitude, action or opinion of
an individual or a group of people;
c. Saboteur – an agent directed to undertake action in line with destroying
temporarily or permanently, any material, an article or property which is
necessary in their normal operation;
d. Guerilla – these are agents who are part of paramilitary group organized to
cause great damage to the enemy during hot war situation;
e. Strong Arm – these are those agents who provide special protection in times
of dangerous phase of clandestine operation; and
f. Provocateur – these are agents who induces the enemy to act on their own
detriment or put them in disadvantage.

3. Support Agents – These are those who engage in activities in line with giving support
to the clandestine operations. This includes:

a. Surveillant Investigator – these are those who continue to observe any person
or places that is connected to the operation;
b. Procurer of Funds – these are those who obtain money needed to sustain the
operation;
c. Safe house Keeper – is the person responsible in maintaining the safe house
for training, briefing, debriefing or any other purposes; and
d. Communication Agent – the person responsible for securing the clandestine
operation.
As a whole, people may think that agents are cool and skillful in various aspects.
However, those skills are necessary in order for them to survive and go back alive to their
respective agency and family. Some of them were relocated and isolated in areas away from home
for the sole purpose of accomplishing their tasks as agents.

Task/Activity

Activity 7: Internalizing Values


1. Which among the types of agent you feel that handles the most difficult job?
Why? You think you can do the same?
2. If you were to choose, which among the types of agent you wanted to
become? Why?

ASSESSMENT: Analysis and Evaluation

Conduct and perform a surveillance operation. List down the things that you need to do or
you need to know about the subject and how you will conduct the surveillance based on
subject’s background.

48
49

You might also like