You are on page 1of 179

Police

Intelligence
BY : REMARK M. GALAN, RCrim
Top 5 LEC
April 2016
Historical Background

 MOSES

 The earliest recorded matter pertaining to


intelligence is found on the Holy Bible
(Numbers 13:17), when MOSES utilized
designated rulers of the tribes of Israel as
advance party in determining the exact
situation at the Land of Canaan and enables
them to easily settle there. The mission lasted
for around 40 years.
 RAHAB

 “The Harlot of Jericho”.

 (Joshua 2:1-21) who sheltered and


concealed the agents of Israel. She made
a covenant with the agents and duped
their pursuers.
 DELILAH

 She was an impromptu intelligence agent


of the Philistines.

 Used her feminity to gain intelligence from


powerful enemy, Samson, the strongest
man in the world during his time.

 She allowed Philistines spies to hide in


her house (Judges 16:9).
 SUN TZU

 A Chinese philosopher who authored the book entitled


“The Art of War”.

 According to him, Foreknowledge cannot be elicited


from spirits, or from gods, or from analogy with past
events nor from calculations.

 “If you know thy enemy and know yourself, you need
not fear the results of a hundred battles”. “If you
know yourself and not the enemy, for every victory,
you suffer defeat”. “If you know neither yourself nor
the enemy you are a fool who will meet defeat in
every battle”.
 ALEXANDER THE GREAT

 He devised the “first letter sorting” and


opening to obtain information.

 While marching in Asia , he investigated


all the letters and the detection of
malcontents whether the legitimate cause
were exposed.
 GEN. ROMANO Q. SERTORIUS

 The Roman commander in Spain who


possessed a white pawn and allowed it to
become widely known that he derived both
secrets and guidance from the pawn.

 His intelligence agents credited their


information to the supernatural power of
animals.
 AKBAR

 “The Great Mogul” and sagacious


master of Hindustan.

 Employed more than 4,000 agents for


the sole purpose of bringing him the truth
that his throne might rest upon him.
 GENGHIS KHAN

 The leader of the so-called Mongol


Conquerors and used effective propaganda
by spreading rumors of Mongol terror.

 He used intelligence to conquer China and


invade Cathy.

 He instructed his generals to spend spies


and used prisoners as source of information.
 RICHELIEU

Became the most powerful person in


France in part because King Louis XIII
was weak King.
He became a Cardinal and the Chief or
Prime Minister of King Louis XIII.
Introduced the network of covert
collectors who transmitted prompt and
accurate information to Paris regarding
the rebels and dissidents of the kingdom.
 FREDERICK THE GREAT

 “The Father of Organized Military


Espionage”.

 He established rules for obtaining and using


every grade of spy or intelligence.

 Threats and bribes, promises of promotion and


gains were used.

 Divided his agents into four (4) classes.


1. Double spies
The low informers and unreliable
renegades spreading false information to the
enemy.
2. Common spies
Recruited among poor folk, glad to earn
small sum.
3. Spies of consequences
Couriers and noblemen, staff officers, and
kindred conspirator, requiring bribe or bait.
4. Persons who are forced to undertake
espionage against their will.
 HANNIBAL

 The Carthaginian General, who roamed


around the city often disguising as beggar
to gather first hand information.

 Considered as one of the brilliant military


strategist.

 He developed an effective intelligence


system for 15 years in Rome.
 JULIUS CAESAR

 During his time, the staff of each legion


includes ten “speculators” who served as
an information-collecting agency.

 The “speculators” were the first intelligence


personnel to appear in military organization.

 He employed ciphers to ensure secrecy of


information.
 KARL SCHULMEISTER

 Napoleon’s eye and Napoleon’s military secret


service.

 He is a master of deceit, who used black mail to


obtain vital information pertaining to the
personality and identity of the enemies of
Napoleon during the 18th century.

 Under a cover role , he was able to infiltrate the


Austrian General Staff and studied the
characters of the Generals .
 GEORGE WASHINGTON

 He, as a grand master, mobilized the


free masons of the colonies at the
outbreak of the American war of
independence.
 FRANCIS WALSINGHAM

 He protected Queen Elizabeth I from


countless assassins.

 He organized the secret police and


established a spy network to detect fleet
movement of enemies of the British Empire
particularly the Portuguese.  

 Organized the first National Intelligence


Service.
 NAPOLEON BONAPARTE

 “One spy in the right place is worth twenty (20)


thousand men in the field”.

 He organized the two bureaus.


1. Topographic Bureaus
– maintained large maps which covers latest
information.

2. Bureau of Intelligence
– consolidated all incoming information
regarding the enemy.
 ALFRED REDL

 One of the most brilliant intelligence agents,


though he was homosexual.

 Chief of the Astro- Hungarian secret service


and at the same time agent of Russia.

 His treason led to the death of 500, 000


thousands agents and soldiers combine in
his 13 years of spying.
 William J. Donovan

 An American soldier, lawyer, intelligence


officer and diplomat.

Head of the Office of Strategic Service


(OSS), responsible to establishing a
centralized military intelligence for the
United States whose valuable contribution
was vital to American Victory in the 2nd
World War.
 JOSEPH FOUCHE

 “Father of Modern Political


Espionage”.

 Bonaparte’s Head of Internal Security.

 Created a network of agent and his


assistance founded the modern system of
spying on spies later known as counter
espionage.
 Herbert Yardley

 an American Cryptologist, who founded


and led the cryptographic organization,
the Black Chamber.

 Head of MI-8, forerunner of the Top


Secret National Security Administration.
 Joseph Petrosino

 member, NYPD in early 1900, head of


Italian Squad. He is credited to smash
Black Society.

 dedicated his career to fight against


Italian and American Mafia such Camorra
and Black Hand.
 WORLD’S NOTABLE INTELLIGENCE
AGENCIES

1. USA – CIA, FBI


2. GREAT BRITAIN – MI- 5 and MI- 6
3. ISRAEL – MOSSAD
4. RUSSIA – KGB
 Central Intelligence Agency

 Principal agency for intelligence activities


and covert operations.
 Established by virtue of the US National
Security Act of 1947 signed into law by
President Harry S. Truman.
 Under the National Security Council.
 Rear Admiral Roscoe Hillenkoetter as 1st
Director.
 Federal Bureau of Investigation

 Established in 1908 as an investigative


arm of the U.S DOJ .

 On September 6, 1939 by a presidential


directive, it came to its responsibility the
task of a domestic intelligence.

 John Edgar Hoover, 1st Director.


 MI-6 (Secret Intelligence Service)

 It ran the famous “ Ultra” program during


World War II in which coded German
messages encrypted by the Germans
enigma machine were intercepted, broken
and translated aiding the allies on their
battlefield.
 MOSSAD

 The Institute for Intelligence and


Special Tasks (ha-Mossad le-Modiin
ule-Tafkidim Meyuhadim). Its focus is on
Arab nations and organizations throughout
the world.

 Israel’s principal agency for intelligence


collection, counter- terrorism and covert
action .
 MOSSAD was formed on April 1, 1951.

 Established by Prime Minister David Ben


Gurion.

 Its successes include the capture of Nazi


leaders, Adolf Eichmann. As well as
numerous triumphs of intelligence
gathering that contributed to Israel’s
victory in the 1967 Six Day War.
 KGB ( Komitet Gosudarsvennoy
Bezopasnosti)

 Doubled as Secret Police Force,


controlling the populace within the country
land and outside USSR, conducting
espionage, spreading “disinformation”
and attempting to destabilize foreign
government.
 KGB was the umbrella organization
name for the Soviet union's premier
security, secret police, and intelligence
agency, from 1954 to 1991. On the
December 21,1995, Russian President
Boris Yeltsin signed the decree that
disbanded the KGB, to be substituted by
the Federal Secret Service (FSB).
 FSB (Federal Security Service)

 Leading secret police organization of the


Russian Federation and main successor of the
Soviet Checka, and KGB.

 Its headquarters is in Lubyanka Square,


Moscow
 
 FSB is engaged mostly in domestic affairs and
is responsible for internal security of the Russian
state, counterespionage, and the fight against
organized crime, terrorism, and drug smuggling.
 NICA ( National Intelligence
Coordinating Agency)

 Primary intelligence collection and


analysis arm of the Philippine government
in charge in carrying out overt, covert and
clandestine intelligence programs.

 Motto: “Knowledge is Security”

 Founded on 1949.
NATURE OF INTELLIGENCE

 Intelligence

 It is the product resulting from the


collection, evaluation, analysis,
integration and interpretation of all
available information which should be
known in advance to initiate a particular
course of action.
 Intelligence vs. Information

 The latter is segmented; it comprised of


raw facts while the former is processed
information.
 Principles of Intelligence

1. Selection – it should be essential and


pertinent to the purpose at hand.

2. Timeliness – must be communicated to


the decision maker at the appropriate time
to permit its effective use.

3. Objectivity – only the well guided


succeed, there should be unity between
knowledge and action.
4. Interdependence – Intelligence is
subdivided into component elements to
insure complete coverage, eliminate
duplication.

5. Continuity – It is necessary that


coverage be continuous so that the shape
of what happens today could be studied in
the light of what happened before.
6. Flexibility – must have the ability to
change or be changed according to
circumstance.

7. Usefulness – intelligence is useless if it


remains in the minds, or in the files of its
collector.
8. Communication – must be
communicated to all the decision makers in
manner that they will understand.

9. Security – is achieved by the measures


which intelligence takes to protect and
preserve the integrity of its activities.
BROAD CATEGORIES OF
INTELLIGENCE

 National Intelligence

 knowledge formed from the integration


of the intelligence developed by all
government departments, which provide
the valuable inputs or the formulation of
national policy and the promotion of
national security.
 Departmental Intelligence – knowledge
required by an agency or department of
the government in order to execute its
mission.

 Military Intelligence – it is the


intelligence used in the preparation of
military policies, plans and programs.
 Police Intelligence

 It is the product resulting from the


collection, evaluation, analysis,
integration, and interpretation of all
available information which concerns one
or more aspect of the criminal
environment which is immediately or
potentially significant to police planning.
 Functional Classifications of Police
Intelligence

 Criminal Intelligence(CRIMINT)
– essential to the prevention of crimes,
investigation, arrest and prosecution of criminal.

 Internal Security Intelligence(INSIT)


– essential to the maintenance of peace and
order.

 Public Safety Intelligence(PUSINT)


– ensuring the protection of lives and properties.
ASPECTS OF INTELLIGENCE

 Strategic Intelligence – type of


intelligence primarily for long range in
nature.

 Line/ Combat/ Tactical


– Intelligence required by the
commander to provide for planning and
conduct tactical and administrative
operation in counter insurgency.
 Counter Intelligence

 Its objectives are to safeguard


information against espionage, protect
installations and materials from sabotage,
and guards against personnel engaging in
subversive activities.
 Three Categories of Counter Intelligence
Measures

Denial measures
– Secrecy discipline, document security, camouflage
and concealment and counter reconnaissance efforts.

 Detection measures
– PSI, Security tag or password, Reconnaissance.

 Deception measures
– use of escape and evasion, dummy position,
fabricated information.
Intelligence Cycle
Law
Evaluation & Enforcement
1.Planning &
Feedback Community
Direction

Crime
Problem
5. Intelligence
2.Information Dissemination
Collection Info
Network
&
Sources

3.Processing 4.Analysis &


of Info Production
 PHASE 1 – Planning and
Direction

1. Determination of Intelligence
Requirements.

2. Determination of the Essential Elements


of Information.

3. Establishment of Priorities.
 PHASE 2 – Collection

1. Criteria of Collecting Agencies / Units


– Capability, Balance/ Suitability, Multiplicity.

2. Two Basic Collection Strategies


– Resources Integration – one agent
– Agent Mixed Redundancy – 3 or more
agents

3. Who are tasked to collect information?


– Intelligence officers
 PHASE 3 – Processing

 Processing – it is the phase where


information becomes intelligence. It
involves recording, evaluation and
interpretation of information.
1. Recording
it is reducing into writing or
graphical representation.

2. Evaluation
it is determining the reliability of the
source and accuracy of the information.
A – COMPLETELY 1 – CONFIRMED BY
RELIABLE OTHER SOURCES
B – USUALLY 2 – PROBABLY TRUE
RELIABLE
C – FAIRLY RELIABLE 3 – POSSIBLY TRUE

D – NOT USUALLY 4 – DOUBTFULLY


RELIABLE TRUE
E – UNRELIABLE 5 – IMPROBABLE

F – RELIABILITY 6 – TRUTH CANNOT BE


CANNOT BE JUDGED JUDGED
3. Interpretation – it is establishing the
meaning and significance of the
information.

a. Analysis – shifting and isolating those


elements that have significance.

b. Integration – it is the combination of the


elements stated in the assessment.

c. Deduction – conclusions from the theory


developed.
 Phase 4 – Dissemination and Use

 Dissemination – timely conveyance of


information by any suitable means to
those who need it.
1. Timeless – must reach the user on
time to be useful.

2. Propriety – message must be clear,


concise and complete.

3. Security – proper security measures


for classified matters.
 Qualities of an Intelligent Agent

 Integrity – intelligence agents will


encounter overflowing temptations of
women, money. He should maintain his
integrity and honesty despite those strong
temptations.

 Network – pool of contact is


undisputedly essential to the success of
every mission.
 Timeliness – being prompt in doing his
assignment will contribute much in giving
justice.

 Enthusiasm – no intelligence agent


would success in his objectives of he
does not possess this quality.

 Liberal – go beyond the usual beliefs and


practice.
 Acting Ability – ability to go down to the
level of the lower strata, minor, squatters.

 Guts – an incomparable courage to face


several tremendous obstacles.

 Endowed – being versatile and talented


is a key to adapt and being on top of
different situations.
 Nonpartisan – not controlled or
influenced by any political party.

 Tactfulness – ability to deal with other


people effectively without offending.
 Nature of Police Intelligence
Operations

 Overt Operations – gathering of


information or documents openly without
regard whether the subject or target
becomes knowledgeable of the purpose.

 Covert Operations – it refers to a secret


collection of raw information without the
knowledge of the subject.
 Intelligence Gathering Tradecrafts

1. Surveillance – it is disguised or secret


observation of persons, places and
vehicles for the purpose of obtaining
information regarding the identity or
activity of the subject.

 Oldest and easily used by the Police.


 Terminologies used in Surveillance

 Contact – person or subject picks or


deals with while he is under surveillance.

 Convoy – accomplice or associate of


the subject.

 Decoy – person almost similar to the


subject used to avoid or elude
surveillance.
 Infiltration – insertion of action agent
inside the target organization.

 Penetration – recruitment of action


agent inside the target organization.
 Drop – a convenient, secure, and
unsuspecting place where a police asset
and handler leaves a note.

 Made – subject becomes aware the he


is under observation.
 Pre - Surveillance Conference –
conference held before surveillance.

 Safe House – a place, building,


enclosed mobile, or an apartment where
police undercover men meet his action
agent for debriefing or reporting
purposes.

 Stake out – fixed point observation or


stationary.
 Types of Surveillance

1. According to Intensity and Sensitivity

a. Discreet – subject is unaware that he is


under observation.
b. Close – subject is aware that he is under
observation.
c. Loose – applied frequently or
infrequently, period of observation may
vary on each occasion.
2. According to Methods

a. Stationary – observation of place on a


fixed point position.
b. Moving – subject is followed from
place to place whether foot, motorized,
aerial or water.
c. Technical – uses communication and
electronic hardware, gadgets, systems
and equipments.
 Methods in Foot Surveillance

 One man shadow – most difficult as it


requires only one agent to tail the subject.

 Leapfrog – variation of one man method


wherein the route is known. Follow the
subject for a while, cease from tailing and
follow again where the subject usually
passes.
 Don’ts in Surveillance

 Do not make abrupt or unnatural


movements.
 Do not make use of disguise that attract
attention.
 Never stare at the subject.
 Do not attempt to innocent when assisted
by the subject.
 Never speak to another surveillant unless
absolutely necessary to accomplish mission.
 Don’t drink while working undercover.
Don’t take a woman on an undercover
assignment.
 Don’t claim to be a “big shot”.
 Don’t fail to provide a person in place who
can vouch for the operative.
 Don’t spend to much money.
 No window shopping.
 Don’t stop immediately on blind corners.
 Don’t get out immediately on public
conveyance.
 Don’t retrace steps.
 Do’s in Surveillance

 Maintain distance.
 Plan ahead and be aware on changes of
action.
 Take down notes safely.
 Make use of street furniture ( telephone
booth, sidewalk vendors, waiting shades,
etc.)
2. Casing

 reconnaissance or surveillance of a
building, place or area to determine its
suitability for intelligence use or its
vulnerabilities.
 Methods of Casing

1. Personal Reconnaissance – most


effective method and will produced the
most information since you know just
what your looking for.

2. Map Reconnaissance – may not


sufficient but it can produced a certain
amount of usable information.
3. Research – much information can be
acquired.

4. Prior Info – your unit and of the unit


will have file report that they may
provide you with info.

5. Hearsay – info usually gain by the


person operating in the area and
performing casing job.
 Surreptitious Entry

 Secret entry into an area for an


operational purpose without leaving any
trace of the break in.
 Purposes of Surreptitious Entry

1. Clandestine Photography – to photograph


documents, equipment, or objects of interests.

2. Electronics Surveillance – installing of


wiretapping or bugging devices.

3. Operational Planning – casing for audio-


video surveillance or confirmation information
for securing of search warrant or for conduct
of surveillance.
 What is (Odex) Observation and
Description?

 Observation – a complete and accurate


observation that involves the use of all the
major senses.

 Description – actual and factual


reporting of one’s observation.
3. Elicitation

 It is a system or plan whereby


information of intelligence value is
obtained through the process of direct
intercommunication in which one or more
parties is/are unaware of the specific
purpose of the conversation.
 Devices used in Elicitation

Approach – setting people to start


talking.

 Probe – keeping people to talk


incessantly.
 Types of Approaches

1. Flattery Approach – founded on the fact


that people are susceptible to praise.

a. Teacher Pupil – subject treated as


authority.

b. Kindred- soul – showing enough


concern to the subject.
c. Good Samaritan – offers help and
assistance to the subject.

d. Partial disagreement – seeks to


produce talking by the word “ I’m not
sure but I fully agree”.
2. Provocative Approach – designed to
induce the source to defend a position,
state a creed, or correct a wrong.

a. Teaser- bait – make the source believe


you know more he/she about the topic.

b. Joe blow – purposely disagree to


induce anger.
c. Manhattan- Missouri Approach
– elicitor adopts an unbelievable
attitude above anything, he questions all
statements and opposition.

d. National Pride Approach – natural


propensity to defend country.
 Types of Probe

1. Completion probe – inserting bits of


factual information on a particular topic.

2. Clarity probe – request for additional


information where the source is
unclear.
3. Hypothetical probe – presents a
hypothetical situation and get the
subjects reaction.

4. High Pressure probe – serves to pin


down a subject in a specific area or
used to point out contradictions to what
the subject said.
 Procurement

 Aggressive effort to acquire certain


specific information which may not be
readily available.

 The essence of intelligence is access.


 Kinds of Agents used in Procurement

1. Expandable Agent – agent who leaked


false information to the enemy.

2. Double Agent – enemy agent who has


been captured, sent back where he came
from as an agent of his captors.

3. Agent of Influence – uses influence to


gain information.
4. Agent in Place – has been recruited
by an intelligence service with a highly
sensitive target.

5. Penetration Agent – agent who has


reached the enemy, gather information
and manage to get back alive.

6. Agent Provocation – induces or


incites other party.
 Selecting Action Agents

1. Placement – location of prospective


agent with respect to the target.

2. Access – capability of an agent to


obtain the desired info for the
intelligence organization or to perform
to intelligence collection mission in the
area.
 Undercover Assignment

 It is a form of investigation in which


investigator assumes a different and
unofficial identity for the purpose of
obtaining information regarding the
identity and location of the subject.

 Also known as Roping.


 Types of Undercover Assignment

1. Multiple Assignments – one or more assignments


covered simultaneously.

2. Rope Job – striking friendship with subject.

3. Dwelling Assignment – establish residence in or near


target area.

4. Social Assignment – places of entertainment and


amusement frequented by targets.

5. Work Assignment – observation at the place of work


of the subject.
 Cover and Undercover Operation

 Cover – means by which an individual


group or organization conceals the true
nature of its activities and existence from
the observer.

 Cover story – biographical account,


true or fictitious, which portray the
personality which an agent assumed.
 Types of Cover

1. Natural cover – using true or actual


personal background.

2. Artificial cover – using biographical data


adopted for a fictitious purpose.

3. Cover within a cover – use of secondary


to justify existence.

4. Multiple cover – any cover you wish.


 Interrogation

 Confrontational and vigorous questioning


of the person suspected of having
committed a crime.

 This is applied to a reluctant and


uncooperative suspect in order to divulge
information.
 Types of Interrogation

1. Narrative type – good for a cooperative


subject who is willing to divulge
information. Subject is allowed to talk
with little interruptions but the
investigator observe the reactions of the
subject while telling the story.

2. Question and Answer type – this is


preferable when the subject is timid.
 Interrogation Techniques

a. Open Techniques – interrogator is


open and direct in his approach and
makes no attempt to conceal the
purpose.

b. Common Interest – interrogator must


exert effort to impress the interrogee of
their common interest.
c. Record File (we know all technique) –
the interrogator prepare a file on the
source listing all known information
regarding the life history of the interrogee
to include his activities and known
associates.

d. Exasperation – effectively employed


against hostile interrogee. Interrogator
must be alert because interrogee may
fabricate information to gain relief from
irritation.
e. Opposite Personality – use of two
interrogators playing opposite roles.
Also known as “Mutt and Jeff ”.

f. Egotist Technique (Pride and Ego)


– usually successful when employed
against an interrogee who has
displayed a weakness or a feeling of
insecurity.
g. Silent Technique – employed against
nervous or the confident type of
interrogee.

h. Question Barrage Technique (Rapid


Fire Questioning) – intended to
confuse the interrogee and put him into
a defensive position. The interrogee
become frustrated and confused, he
will likely reveal more than he intended.
 Classification of Clandestine Agents

 Principal Agent – managerial agent and


the leader of an agent network.

 Action Agent – doer of clandestine task.

 Support Agent – agent who engages in


activities that support the clandestine
operations
 Types of Action Agent

 Counter Intelligence Agent – obtains


information about one or more opposition
targets.

 Legal Traveller – agent who is able to


travel to and from a hostile area to perform
information collection mission.
 Propagandist – undertakes action to
mold the attitudes, opinions, and action of
an individual group or mission.

 Saboteur – undertakes positive action


against friendly power resulting in the loss
of use, temporary or permanent, of an
article, material and facility.
 Guerilla – member of paramilitary group
organized to harass the enemy in a war
situation.

 Provocation – induces an opposition to


act to his own detriment by discrediting
himself.
 Kinds of Support Agent

1. Surveillant – observes personnel and


places of operational interest.

2. Investigator – procures information on


persons or things of operational interest.

3. Procurers of Funds – obtain special


currency that are needed in operational
use.
4. Procurers of Supplies – procures
ordinary and critical supplies.

5. Safe house Keepers – manage and


maintain safe house for operational use.

6. Communication Agent – facilitates


communication equipment.
 Information

 All evaluated materials of every


description including those derived from
observation, reports, rumors, imagery.

 Is a communicated knowledge by
others obtaining by personal study,
investigation, research, analysis,
observation.
 Persons as Sources of Information

 Informant – person who gives


information voluntarily without any
consideration.

 Informer – those who give information to


the police in consideration of price or
reward.
 Types of Informants

1. Rival Elimination Informant


– usually anonymous and his purpose
is to eliminate rivals or competitors.

2. Anonymous Informant
– those who gives information through
telephone call with the hope that the
informant cannot be identified.
3. False Informant – reveals information
usually of no consequences, or stuff
concocted in thin air.

4. Self Aggrandizing Informant – hangs


about the fringe of underworld and delight in
surprising the police with choice bits of
information.

5. Mercenary Informant – has something to


sell. He may be of value but revenge motive
is present as a proof in selling the
6. Operational/ Legitimate – includes
those operators of licensed premises
who do not want their place of business
to become the hangout of dangerous
criminals.

7. Secret/ Confidential – one who


provides the investigator with
confidential information about a crime or
about the actual or potential tendency of
an individual or group to commit a crime.
 Other Classification of Informants

a. Woman Informant – may be a female


associate of any criminal. She may be able to
give valuable information and is not suspected
by the criminal boyfriend, but beware female
species are more deadly than male for she
can always change her mind.

b. Double Crosser Informant – uses his


seeming desire to give information as an
excuse to talk to the police on order to get
more information from them than he gives.
c. Frightened Informant

 Prodded by fear or self interest.

 He may be the “little man” who runs to the


police when he sees his confederates are
about to be involved in dangerous criminal
act and he will be placed in dangerous
situation.

 This is the weakest link in criminal chain.


 Sub- type of Informant

1. Incidental Informant – a person who


casually imparts information to an
officer with no intention of providing
subsequent information.

2. Recruited Informant – a person who is


selected, cultivated, and developed into
a continuous source of info.
 Common Motives of Informant

 Reward
 Revenge
 Fear and avoidance of punishment
 Friendship/ Career development
 Patriotism
 Vanity
 Civic mindedness
 Repentance
 Competition
 Steps of Informant Processing

1. Selection – desires to identify and


recruit an informant who has access to
criminal organization.

2. Investigation – investigation of the


potential informants who is tentatively
identified as “ probable”.
3. Approach – must be done in a setting
with pleasant surrounding free from
probability of compromise.

4. Testing – should begin with limited


assignment, with gradual integration
into more important areas.
 Factors considered in Informant
Recruitment
 Sex
 Health
 Age
 Build
 Education
 Ability
 Personality
 General Treatment of Informant

1. Avoid the use of derogatory terms in


referring to informants of any type.
2. Avoid disclosing the identity of the
informant which will inmost cases ruin
his potential.
3. Protect the interest of the informant,
remember an investigator is usually just
as good as his sources of information.
4. Consider all information from known to
unknown information as valuable until
proven otherwise.
5. Be non-committal of the value of the
information received.
6. Express appreciation for all information
received regardless of its value.
7. Keep appointment on time even though
informant may not.
8. Don’t get over anxious, be patient. Take
your time.
9. Keep control of the investigation.
10. Keep what you know to yourself, don’t
become an informants informant.
 Important Terminologies

 People – most important source of


information.

 Inadvertent Spies – people with loose lips,


careless security attitude.

 Defectors – people fleeing the rule of


their own country.
 Walk- ins – people looking for a source
of extra income.

 Undercovers – people who had made a


plea bargain with law enforcement.

 Recruits – people tricked, bribed, or


blackmailed.
 False Flag – the case officer pretends to
hold nationality or be a person whom the
target expects to be friendly to the target’s
own interests.

 Stay behinds – are those left in place


by retreating troops in wartime.

 Cut- outs – act as intermediaries and


mercenaries.
 Security Clearance – certification by a
responsible authority that the person
described is cleared for access to
classified matter.

 Need to know Principle – principle


whereby access to classified matter may
only be given to those person to whom it
is necessary for the fulfillment of duty.
 Certificate of Destruction – certification
by a witnessing officer that the classified
matter describe therein is disposed of in
his presence, approved destruction.

 Compromise – loss of security, which


results from an authorized person
obtaining knowledge from classified
matter.
 Compartmentation – grant of access to
classified matter.

 Declassify – removal of security


classification from classified matter.

 Reclassify/ Regrading – act of changing


the assigned classification of matter.

 Upgrading – act of assigning to a matter


of higher classification.
 Categories of Classification of
Documents in descending order of
Importance

 Top Secret – Green


 Secret – Red
 Confidential – Blue
 Restricted – White
 Top Secret

 The unauthorized disclosure of which


would cause exceptionally grave damage
to the nation, politically, economically, or
from a security aspect.
 Secret

 The unauthorized disclosure of which


would endanger national security, cause
serious injury to the interest or prestige of
the nation or of any governmental activity
or would be of great advantage to a
foreign nation.
 Confidential

 The unauthorized disclosure of which,


while not endangering the national
security, would be pre- judicial to the
interest or prestige of the nation or any
governmental activity, or would cause
administrative embarrassment or
unwarranted injury to an individual or
would be of advantage to a foreign nation.
 Restricted

 Information and material which requires


special protection other than that
determined to be Top Secret, Secret, or
Confidential.
 Personnel Security Investigation (PSI)

 It is an inquiry into the character,


reputation, discretion and loyalty of
individual in order to determine a person’s
suitability to be given security clearance.
 Types of Personnel Security Investigation

1. National Agency Check (NAC) – an


investigation of an individual made upon the
basis of written information supplied by him
in response to official inquiry, and by
reference to appropriate national agencies.

2. Local Agency Check (LAC) – investigation


consist of written inquiries sent to
appropriate local government agencies.
 Background Investigation (BI)

 A thorough and complete investigation


of all or some of the circumstance or
aspects of a person’s life is conducted.

 more comprehensive investigation than


the NAC or the LAC.
 Types of Background Investigation

1. Complete Background Investigation


– consist of the investigation of the
background of an individual, particularly
all the circumstances of his personal life.

2. Partial Background Investigation


– investigation of the background of an
individual but limited only to some of the
circumstances of his personal life which are
deemed pertinent to the investigation.
 Factors considered in Background
Investigation

 Loyalty – faithful allegiance to the


Philippine Government.

 Integrity – uprightness in character,


soundness of moral principles.
 Discretion – the ability of tendency to
act or decide with prudence.

Moral – distinctive identifying qualities


which serves as an index to the essential
or intrinsic nature of a person.
 Character – the sum of the traits that
serves as an index to the essential
intrinsic nature of a person.

 Reputation – opinion or estimation in


which one is generally held.
 Motives that cause people to be
disloyal

 Revenge – one of the strongest


motivations.

 Material Gain – some people are so


avid for material gain that they will stop at
nothing to achieve this end.
 Personal Prestige – main desire is for
power- power over others.

 Friendship – close attachment to


another person.

 Ideological Beliefs – if a person holds


inimical to their country, they are of
course vulnerable to approach by
subversive groups of agents.
 Weakness that make people
susceptible to pressure

 Close relative in foreign lands – threat


of mistreatment of loved ones under the
control of the threatening power.

 Gullibility – people who accept every


story at face value an can see no wrong
in anyone.
 Jealousy – most powerful motivations,
can be utilized by alert agents.

Weakness of Character – can easily be


dominated is fair prey for subversive
agents looking for a “ stooge” to aid them.

 Serious Indebtedness – person who is


heavily indebted is always looking for a
fast and easy way to recoup his losses,
and get out of debt.
 Addiction to Drugs – drugs addicts will
commit a crime to obtain their dope.

 Serious guilty episodes in the past –


being human, many of us have episodes
in our past of which we ashamed. Threats
to expose such episodes have always
powerful level for blackmailing a person.
 Cryptography

 It is an art or science of making,


devising, inventing, or protecting codes
and ciphers.

 It came from the Greek word “ kryptos”


which means secret and “graphos”
means writing.
 Types of Cryptography

 Steganography – deals with hidden or


secret writing, relies on different ways to
hide or disguise.

 Codes – a set of letters, numbers,


symbols and etc., that is used secretly to
send messages. Used more for economy
than for secrecy.
 Ciphers – a way of changing a message
to keep it secret.

 Encryption – is the process of translating


plain text data into something that
appears to be random and meaningless (
ciphertext).

 Decryption – process of converting


ciphertext back to plaintext.
 Plaintext (clear text) – original
communication to be scrambled or
enciphered.

 Cryptogram (cipher text) – product of


the enciphering process.

 Cryptanalysis – it refers to the science of


breaking codes and ciphers.
 Types of Code

1. Jargon Code

 A particular arbitrary phrase


corresponds to a particular predefined
message.

 Used long time especially World War II,


to send commands over broadcast radio
to resistance fighters.
Example:
Codeword: Boxer Seven Seek Tiger5
at Red Coral
Wherein:
Boxer Seven – Intelligence Unit
Seek – pursue
Tiger5 – Abu Sayyaf Group
Red Coral – Basilan
Plaintext: Intelligence unit pursue the
Abu Sayyaf Group at Basilan.
2. Number Code

 The above method is weak as it gives


some clues to code breakers leading to
the transposition of the codewords to
codenumbers.
Example:

Codeword: Boxer Seven Seek Tiger5 at Red Coral

Codenumber: 85772 24799 10090 12487

Wherein:
85772 – Boxer Seven – Intelligence Unit
24799 – Seek – pursue
10090 – Tiger5 – Abu Sayyaf Group
12487 – Red Coral – Basilan

Plaintext: Intelligence unit pursue the Abu Sayyaf


Group at Basilan.
 General Types of Ciphers

 Substitution Cipher – particular letter or


symbol is substituted for each letter.

 It is performed by reordering the letters


in the alphabet.

 An example is , a cipher devised by


Julius Caesar shifts all the letters in the
alphabet by three places.
 Represent the entire cipher by two rows
of letter

Plaintext: ABCDEFGHIJKLMN
OPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQ
RSTUVWXYZABC
 Example:
MARIA OZAWA IS HOT.
PDULD RCDZD LV KRW.
 Transposition Cipher – shuffles the letters
around.

Tips in preparing:
 Changed the order of plaintext letters to
derive the ciphertext.
EXAMPLE:
MARIA OZAWA IS HOT.
TOH SI AWAZO AIRAM
 Write the message without word divisions in
rows of letters arranged in a rectangular block.
EXAMPLE:
MARIAOZAWAISHOT
 Transpose the letters in a prearranged
order, such as by vertical columns,
diagonals, or spirals or by more
complicated system.

EXAMPLE:
MAR
IAO
ZAWAI
SHOT
 The arrangement of the letters in the
enciphered message depends upon the
size of the block of code words used.

 Swapping of every pair of letters in a


plaintext.
EXAMPLE:
ARMALITE
RAAMILET
 Concealment

 Simple kind of Cryptography, because


message is written normally and merely
hidden.
EXAMPLE:
I WILL DO IT.IF NOT TODAY,
THEN TRUST ME. SIGNED SMITH.
PDI: ( copy every third word)
Hidden message: DO NOT TRUST SMITH.
THANK YOU FOR
LISTENING AND
GODBLESS!!!

You might also like