Professional Documents
Culture Documents
Intelligence
TOPICS
1. Information
2. The Characteristics and Context of Intelligence
3. Counterintelligence
4. Intelligence Cycle
5. Undercover Operations
6. Surveillance
7. Agents
LEARNING OUTCOMES
At the end of the lesson, you should be able to:
a. identify the possible sources of information, types and motives of
informant;
b. discuss the context, characteristics and principle covered by
intelligence;
c. apply the principle and application of counterintelligence;
d. examine the process, reliability and accuracy involved in intelligence
cycle; and
e. enumerate the purpose of conducing undercover.
TOPIC 1: INFORMATION
32
Sources of Information
Source of information is the network of data which can be linked or grouped in order to
obtain a concrete a reliable information based on the prevailing need or as the need arises. Some
of these common sources are:
a. Regular source – these are information gathered through people who have come
directly to the attention of the police commonly the complainant, witness or victim.
b. Cultivated source – these are information generally taken through the use of
informant or informer.
c. Grapevine source – these sources of information are gathered from those who are
in the underworld criminals or ex-convicts.
a. Government source – these are sources taken from government agencies or any
of its instrumentality.
b. Private source – these sources of information are usually taken from different
private entities and business organizations, public utilities such as water or electric
bills, and all other private sectors.
c. Internet source – this modern source of information is done through searching
specific detail by typing the desired key or phrase in the different search engine.
33
7. Self-aggrandizing – an informant who provides exaggerated information to the police
in order to gain advantage or attention.
8. Women – these are the most dangerous and difficult type of informants against male
subjects.
In addition, below are the common motives of the informant in providing information such as:
The power given by the state to police officers in gathering is so huge that it may be prone
to abuse. To protect the privacy of an individual citizen, the law prohibits certain police actions such
as the following:
1. Republic Act 4200 (Anti-Wiretapping). Under this law, the following acts are prohibited:
a. Tapping any wire or cable;
b. Using any other device or arrangement;
c. To secretly overhear, intercept, or record;
d. Private communication/conversation or spoken word; or
e. Without the knowledge or consent of all the parties
2. Republic Act. 10173 (Data Privacy Act). Under this law, the following acts are
prohibited:
a. Unauthorized processing of personal information;
b. Accessing personal information due to negligence
c. Improper disposal of personal information;
d. Processing of personal information for unauthorized purposes;
e. Unauthorized access or intentional breach;
f. Malicious disclosure; and
g. Unauthorized disclosure.
Take note, under the same law RA 10173, it defines personal information as any information
whether recorded in a material form or not, from which the identity of an individual is apparent or
can be reasonably and directly ascertained by the entity holding the information, or when put
together with other information would directly and certainly identify an individual.
Task/Activity
Activity 1: Application
Identify the type of informants. Their motive were illustrated below:
34
1. X provide information to the police concerning criminal activity because he is afraid
that they might hunt him.
2. Y is providing unnecessary information to the police
3. Mr. X provides information if he finds out that it has a higher price.
In addition, it must be noted that intelligence is not only used in line with the different police
operation but also in improving the political, economic and sociological advantage of the nation.
Apart from that, take note that intelligence should possess the following characteristics as it serves
its purpose. If not any information gathered will be hampered or might acquire false information. As
whole, any operation or activity might be jeopardized.
35
7. Intelligence requires continuous security measures
Take note to deny unauthorized disclosure or relevant information to enemy as well as
provide protection in handling classified materials.
SCOPE OF INTELLIGENCE
Intelligence also covers a wide range of area in its application. It might be a network of
information concerning national policy and national security which is known as National
intelligence. It could also be collected, analyzed, collated and evaluated information concerning
criminal investigation, criminal syndicate, organized crimes, and other police problems which are
known as Police intelligence. Those information regarding military activities which is at the same
essential to the different military operations is known as Military intelligence. Lastly, it could also be
Departmental intelligence, which refers to information needed by all the department agencies in the
execution of government plans and programs.
In the area of police intelligence, it includes criminal intelligence, internal security
intelligence, and public safety intelligence. Criminal Intelligence (CRIMINT) refers to the knowledge
essential to the prevention of crimes and the investigation, arrest and prosecution of criminal
offenders. Internal Security Intelligence (INSINT) refers to the knowledge essential in the
maintenance of peace and order. Lastly, Public Safety Intelligence (PUSINT) which refers to the
knowledge essential in ensuring the protection of lives and properties.
Line Intelligence on the other hand is a type of intelligence that is immediate in nature and
can be available or developed within a short period of time. It is a kind of intelligence required by
the commander to provide for planning and conduct tactical and administrative operation in
counterinsurgency. This includes knowledge of People, Weather, Enemy and Terrain (PWET)
which is fundamental in planning and conducting tactical and administrative operation in a
counterinsurgency.
People includes the living condition of the people, sources of income, their education,
government livelihood projects and the extent of enemy influence to the people. Weather refers to
the visibility, cloudy, temperature, precipitation (rain) or windy of the climate. Enemy as the term
suggest, refers to the study of location, strength, disposition, tactical capability and vulnerability of
the enemy. Terrain includes relief and drainage system, vegetation, surface material, manmade
features and some military aspects of terrain which includes cover and concealment, obstacle,
critical key terrain features, observation and fields of fire, and avenues of approach.
Task/Activity
36
TOPIC 3: COUNTER INTELLIGENCE
In the field of Civil Security counterintelligence helps in providing measures that affect non-
military nationals who are residing in an area either permanently or temporarily. One of the best
application also of counterintelligence is the Censorship, as this aids in controlling the movement of
the different person particularly those are expected to destroy any government institutions or
projects. In the conduct of Special Operations, counterintelligence also provides protection against
counter subversion, sabotage, and espionage.
In the field of Counter Intelligence (CI) Operation, it could either be Counter Human Intel,
Counter Imagery Intel or Counter Signal Intel. Counter Human Intel (HUMINT) seeks to overcome
enemy attempts to use human sources to collect information or to conduct sabotage and
subversion. Counter Imagery Intel (IMINT) are actions such as surveillance radar, photo thermal
and infrared systems and rely heavily on pattern and movement analysis and evaluation of the
enemy. Lastly, Counter Signal Intel (SIGINT) which determines enemy SIGINT and related enemy
weaknesses, capabilities and activities, assess friendly operations to identify patters, profiles and
develop, recommend and analyze countermeasures.
37
In providing protection to vital information, the type of counterintelligence that could be
utilized is either through passive or active measure. Passive CI Measures include protection of
classified and sensitive information to the unauthorized individual through secrecy, communication
security, and other various safeguards. Active CI Measures on the other hand, are those measures
that actively block the enemies’ effort to gain information or engage in espionage, subversion, and
sabotage.
In addition, the concept of counterintelligence does not only limit to the protection of vital
information or to hide ones identity from the enemy but also includes detection, prevention, and
neutralization of enemy activities. Detection is about knowing the clandestine operation of the
enemy. Prevention is about avoiding enemy attacks or infiltration while neutralization is the
suppression of enemy activities.
To sum up, counterintelligence is very significant to but not limited to the following such
that:
1. Denying information to the enemy;
2. Reducing the risk of a command;
3. Protecting vital information and property;
4. Increasing security forces; and
5. Decreasing the enemy’s ability to create plans against the organization.
Task/Activity
Intelligence Cycle is defined as the process of obtaining information which includes proper
procedure and sequence of steps starting from planning, collection, and the dissemination of
information to appropriate persons. Intelligence cycle is important as it provides the necessary
details in attaining the mission. Mission is the purpose why intelligence should be gathered and
used for particular undertaking. This is considered as the heart of the intelligence cycle.
38
Planning Phase
In intelligence cycle, planning is defined as the process of determining the extent and
scope of the needed preparation which includes the supervision of the collection of information and
other requirements based on the standard priorities.
In planning for the collection, the following factors should be considered such as:
1. Sources of information
2. Operations of the command
3. Characteristics of the enemy; and
4. Methods in gathering information.
Sources of information pertains to the individual or group, association or entity which may
possess possible information tom which an individual desires to be gathered. Operations of
command is the manner how the collecting agency and even the agency upon which data will be
gathered acts or works for a particular purpose in order to determine the needed preparation or
security. Characteristics of the enemy refers to the capabilities, power, influence, and connection of
the enemy forces upon any person to whom the data to be collected shall be directed or used.
Methods in gathering of information simply refer to the different approaches as to how information
shall be gathered or collected. This will help intelligence officer to provide the necessary Essential
Elements of Information (EEI). These are information pertaining to the target area which the
commander feels he need before he can arrive with an accurate decision.
In addition, collecting agency refers to any organization, entity, association or individual
person that collects and gathers the needed information through an intelligence officer. Target area
refers to any individual, group, association or entity that subjected to for operation or intelligence
gathering.
COLLECTION PHASE
In intelligence cycle, collection refers to the information gathering done in compliance with
established procedure to avoid detection and penetrate successfully.
In collecting information, the following factors should be considered such as:
1. Who will collect the information
2. What information will be collected
3. Where are the places whereby information shall be collected
4. When is the right time to gather the information
5. How this information shall be collected; and
6. Why this information should be collected?
Take note that since the collection and gathering of data is a cycle, any information
gathered or collected to which the intelligence officer finds less value or no value at all shall be
recorded and, if possible, preserved as it may be used for future endeavors.
In selecting the collecting agent, the following factors should be considered:
1. The placement or access to the information;
39
2. The capability to gather the information;
3. The number of people who will gather the information; and
4. The strength and security of the target area.
COLLATION PHASE
In intelligence cycle, collation refers to the process involved in evaluating the accuracy and
reliability of the information collected. Reliability means judging the source of information while
accuracy simply means the level of truthfulness of the information collected.
In collation stage, all collected information will undergo the following:
1. Recording – refers to the systematic sorting of all documented information and present
them either in writing or some other form of presentation so that they can be analyzed
and studied for future action.
2. Analysis – the collected information is divided into different components; and isolate
those that are relevant to the mission or those that has intelligence value which
includes looking into the source of information, truthfulness of the information and who
provides the information
3. Evaluation – refers to the assessment of information done to determine the reliability of
the source and providing judgement in line accuracy to determine its truthfulness as
well as its pertinence to the current situation.
Reliability and Accuracy Table
REALIBITY OF INFORMATION ACCURACY OF INFORMATION SOURCE OF INFORMATION
A – COMPLETE RELIABLE 1 – CONFIRMED by other T – Direct Observation by Commander
sources of Unit
B – USUALLY RELIABLE 2 – PROBABLY TRUE U – Report by DPA or Resident Agent
C- FAIRLY RELIABLE 3 – POSSIBLY TRUE V - Report by PNP/AFP Troops
D – NOT USUALLY RELIABLE 4 – DOUBTFULLY TRUE W – Interrogation of Captured Enemy
Z – Documentary
4. Integration – is the combination of all those isolated information from various sources
to produce a new information necessary for the success of the mission.
5. Interpretation – is the process involved in providing meaning and significance of new
information
6. Synthesis – provide conclusion based on the new information generated in relation to
the current situation.
Take note, processed information is now called intelligence.
DISSEMINATION PHASE
In intelligence cycle, dissemination refers to the actions taken to transfer processed
information to appropriate persons. Extra care should be considered in disseminating information
and should be based on the “need to know principle”. Meaning, information or those that had
40
already intelligence value should only be passed, handed, and disseminated among persons who
have the personality to know or acquire the same.
In line with dissemination, the intelligence can be disseminated in any of the following:
1. Fragmentary orders from top to bottom of the command
2. Memorandum, circulars, special orders
3. Operations order, oral written
4. Conference – staff members
5. Other report and intelligence documents
6. Personal Contact
Who are the users of intelligence?
1. National Leaders;
2. Military commanders;
3. Advisors and Staff;
4. Friendly nations;
5. Head / Chairman of an organization; and
6. Any person with authority or right over the intelligence
Task/Activity
Activity 4: Understanding
1. What are the steps undertaken in the different phases of the intelligence cycle?
2. What is the purpose of determining the reliability and accuracy of the information?
41
In police work, undercover operation is done in order to acquire necessary inputs from a
particular person or place that might possess valuable information. It also assisted the investigation
in apprehending law violators.
Talking about cover, it could either be artificial or multiple type of cover. Artificial cover is
done if the undercover agent is modifying his identity based on the current operation or as the case
may require while the multiple cover involves the use of different cover that will fit to a given
situation.
As to assignment, it could either be residential, social or work assignment. Residential
assignment involves the employment of undercover agents in an area where the subject lives.
Social assignment on the other hand is the employment of undercover agent in an areas where the
subject frequents for fun and entertainment. Lastly, work assignment is employment of undercover
agents in areas where the subject works.
In addition, undercover operation is composed of the following elements, namely: the
head; target; and agent
The Head is the person who directs the organization conducting the undercover operation.
The target pertains to any person, place or things against which the undercover operation is to be
conducted while the agent refers to a person who conducts the clandestine activity. This could
either be a police officer or any person who can access and gather information from the target.
In the conduct of undercover operation, be cautious when confronting with ranks of
criminal a syndicate. When gathering information, be sure that you are good in elicitation.
Elicitation is a form of extracting information done through an interview with the person who might
possess valuable information concerning a person, event, organization or place without his
knowledge or suspicion.
In Elicitation, be sure to have a good approach and a proper probing technique. Approach
pertains to the manner as to how you will start talking while probe refers to the manner how will you
keep the person talk.
When reporting to the office, the investigator should meet any personality or his
companion with the law enforcement agency in a safe house only. The term safe house refers to a
safe place where the investigator or his informant will meet for briefing or debriefing purpose. To
avoid any suspicion from those who are in the ranks of a criminal syndicate, the undercover agent
may use couriers to provide feedback as to the current operation. Courier refers to the person who
carries an information to another person.
It could also be through leaving a message in some places or drop. Drop refers to a secure
place where agents or informants give their message to the other agents which could be either:
1. Dead Drop – the agent merely leaves the message
2. Live Drop – the courier hand over the message directly to the agent.
It must be noted that undercover agent must be very cautious at all times as any failure in
this operation might cost his life. Be reminded of the following while conducting undercover
operations:
1. Act naturally as possible
2. Do not overplay your part
3. Do not indulge in any activity, which is not in conformity with the assumed identity. This
means that if you play the part of a fisherman and have a knowledge, attitude, and
skills of a fisherman.
4. Do not make notes unless they are to be mailed or passed immediately. Use code or
cipher if possible (to be discussed in the next lesson)
42
5. Do not use liquor or any intoxicants except if necessary and limit the amount to avoid
being drunk
6. Limit your association with women.
Task/Activity
Activity 5: Analysis
1. What are the other things that you need to reconsider and remember while doing
undercover operation?
TOPIC 6: SURVEILLANCE
In collecting additional information about the
person or some places that is necessary in the
conduct of investigation, surveillance may be
conducted. Surveillance is defined as the
clandestine or secret observation of persons,
places or objects to acquire valuable
information. Unlike undercover operation, which
enters or infiltrates criminal syndicates,
surveillance is merely observation or watching
the particular subject.
In the conduct of surveillance, subject refers to who or what is being observed which can
be any person, place, property, vehicle, group of people, organization or object as the target in
conducting surveillance. The agent here or the person conducting surveillance or making an
observation is referred as the surveillant. He is usually an investigator who disguises himself
purposely for surveillance. The conduct of surveillance is guided by the surveillance plan.
Surveillance plan simply refers to the outline or blueprint as to how surveillance should be
conducted.
While conducting surveillance, any person whom the subjects picks or deals with while he
is under observation is termed as contact. Take note to be observant as the subject may be
accompanied by a convoy or decoy. Convoy is an associate of the subject who follows him to
detect surveillance while decoy is a person or object used by the subject in attempt to escape the
eyes of surveillant.
The surveillant should be cautious not to alarm the subjects since he might be burn out.
Burn out or Made happens when subject under surveillance becomes aware that he is under
observation and identities the observer. If it happens, the subject often uses all the means to elude
the surveillance. When the surveillant does not know the whereabouts of his subject or the subject
had elude the surveillance, it means lost.
To prevent this, as much as possible do not make yourself too close to the subject to avoid
detection. Just remember to have a log. Log refers to the chronological record of activities that the
subject had or took place in the target area. Target area refers to the area of operation of
surveillance activities. Remember not to forget to take not of whatever happened and, if possible,
take photographs.
TYPES OF SURVEILLANCE
43
The types of surveillance that the agent or surveillant use may vary depending on his
purposes. As such, it is job of the police investigator in charge as to what should be the best type
of surveillance that should be done in order to acquire details necessary for the case under
investigation or for future endeavors. The types of surveillance are discussed as follows:
1. Stationary surveillance – this surveillance is otherwise known as fixed, plant or
stakeout surveillance and is commonly done in one standard location. This is best
useful when:
a. A stolen property is expected to be dropped; or
b. A crime is expected to happen
2. Moving surveillance – this surveillance employed when the subject moves from one
place to another. The person is commonly tailing or shadowing the subject. Tailing or
shadowing simply means as the act of following a person’s movement either through
foot or with the use of an automobile. The subject of this surveillance is usually a
person. Under this method of surveillance, this could be done in the following manner:
a. Rough tail or open tail – otherwise known as rough shadowing, and is commonly
employed if the subject knows about the presence of the surveillant. Rough tail
can be used in the following scenario:
c. Loose tail – refers to the tailing commonly employed if the surveillant wants to
remain undetected. This tailing could be used best when:
44
5. Audio or electronic surveillance – this refers to the employment of bugging or
wiretapping devices. These two differ such that:
a. Bugging is the eavesdropping any communication or conversation with the aid
of any bug devices. Bug is a form of electronic device place in an
establishment to record, receive or transmit conversation.
b. Wiretapping is the interception of communication lines such as telephone or
cellphone lines in order to listen or record conversation.
Listening to people who are talking at the table beside you; and
Sitting beside the person who is talking to someone over telephone
lines.
Methods of Surveillance
45
4. Make a good decision as to where the subject will be going. In that case, the
surveillant is at the advantage in taking the right position or placement while following
the subject.
5. Regroup if chances are possible. Meaning, have the original placement but
necessarily the same surveillant when you started doing the shadowing of the subject.
This means that the first surveillant (A) may now become the second surveillant (B) or
vice versa.
6. Do not wear any apparel or clothing that is obvious or can catch the attention of the
subject.
7. Take photographs if possible, especially those contacts by the subject.
Task/Activity
46
Activity 6: Bridging Questions
1. Is it good to use vehicle while doing surveillance or shadowing a person?
What are its advantages and disadvantages?
TOPIC 7: AGENTS
47
1. Principal Agents – These are the leader or management agent in the clandestine
operation.
2. Action Agents – These are those who conducts the clandestine operation which is
further classified into:
a. Espionage Agent – an agent responsible for the collection of information;
b. Propagandist – these are agents who molds the attitude, action or opinion of
an individual or a group of people;
c. Saboteur – an agent directed to undertake action in line with destroying
temporarily or permanently, any material, an article or property which is
necessary in their normal operation;
d. Guerilla – these are agents who are part of paramilitary group organized to
cause great damage to the enemy during hot war situation;
e. Strong Arm – these are those agents who provide special protection in times
of dangerous phase of clandestine operation; and
f. Provocateur – these are agents who induces the enemy to act on their own
detriment or put them in disadvantage.
3. Support Agents – These are those who engage in activities in line with giving support
to the clandestine operations. This includes:
a. Surveillant Investigator – these are those who continue to observe any person
or places that is connected to the operation;
b. Procurer of Funds – these are those who obtain money needed to sustain the
operation;
c. Safe house Keeper – is the person responsible in maintaining the safe house
for training, briefing, debriefing or any other purposes; and
d. Communication Agent – the person responsible for securing the clandestine
operation.
As a whole, people may think that agents are cool and skillful in various aspects.
However, those skills are necessary in order for them to survive and go back alive to their
respective agency and family. Some of them were relocated and isolated in areas away from home
for the sole purpose of accomplishing their tasks as agents.
Task/Activity
Conduct and perform a surveillance operation. List down the things that you need to do or
you need to know about the subject and how you will conduct the surveillance based on
subject’s background.
48
49