You are on page 1of 94

REVIEW ON

POLICE INTELLIGENCE

Review Instructor
PROF. ROMMEL K. MANWONG
Introduction

“WHATEVER I SEE OR HEAR OF A CONFIDENTIAL NATURE


THAT IS CONFIDED TO ME IN MY OFFICIAL
CAPACITY WILL BE KEPT EVER SECRET UNLESS
REVELATION ISNECESSARY IN THE
PERFORMANCE OF MY DUTY”

An Excerpt from the Law Enforcement Code


“If you know the enemy and know yourself, you need not fear the
result of a hundred battles.”
“If you know yourself and not the enemy, for every victory, you are
a fool who will meet defeat in every battle” - SUN TZU

“Against organized crime, internal affairs


in my defensive arm; Intelligence is my offensive arm.” – W. Parker

The old saying of Sun Tzu and the statement of William Parker
are true in military intelligence as well as in the field of law
enforcement and public safety. In other words, intelligence is
knowledge and knowledge is power. This, the need of
intelligence is increasingly important and apparent as the study
of history continues. - RKM
Definition of Terms
 National Intelligence – the total product of intelligence
developed by all governmental agencies that cover the broad
aspects of national policy and security.
 Military Intelligence – it is used in the preparation of military
policies, plans and programs. It includes the strategic and
combat intelligence.
 Strategic Intelligence – that knowledge pertaining to the
capabilities and probable courses of action of foreign nations.
 Combat Intelligence – is required by the commander in order
to determine the best use of his available firepower and
maneuver forces, to accomplish his mission, and to maintain the
security of his command.
 Counter Intelligence – an integral part of all intelligence
operations and as such can’t be separated from combat and
strategic intelligence. Its objective is to safeguard information
against espionage, material and installations against sabotage,
and personnel against subversive
 Order of Battle Intelligence – concerns the manner in which military forces are
organized and disposed.

 Technical Intelligence – concerns foreign technical developments, which have


a practical military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.

 Area of Operation – those aspects of the operational environment exclusive of


the military forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment
of an area in which military operations are taking place or planned.

 Capabilities – form a military standpoint, enemy capabilities are courses of


action which the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader
national standpoint, capabilities of a nation are the available, workable, courses
of action to accomplish national objectives.

 Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it


susceptible to any action, which reduces its war, potential, and or its will to fight.
HISTORICAL FEATURES
(Selected Concepts Only)
Biblical Setting

The earliest source of intelligence, in the age of belief is super


natural interventions in the affairs of men, were prophets, seers,
oracles, soothsayers and astrologers. Since God knew what
was going to happen ahead to time, having to some extent
ordained the outcome of events, it was logical to seek out divine
intentions in the inspiration of holy men in the riddles of oracles,
in the stars and often in dreams. The earliest recorded
instances of intelligence fathering can be found in the Holy Bible
(Numbers 13) “When Moses was in the wilderness with the
children of Israel, he was directed by the Lord to send a ruler to
each of the tribes of Israel to spy out the Land of Canaan which
the Lord had designed as their home. They spent forty days on
their mission and thereafter reported back to Moses their
findings.”
MOSES
One of the first recorded formalized intelligence efforts, with
format, can also be found in the Holy Bible Numbers 13:17

“And Moses sent them to spy out the land of Canaan and said
unto them, get you up this way southward, and go up into the
mountain; and see the lands, what it is; and the people that
dwell therein, whether they are strong or weak, few or many;
and what the land they dwelt in, whether in tents, or in
strongholds; and what land is; whether it be fat or lean, whether
there be wood therein, or not. And be of good courage and bring
of the fruit of the land.” The scriptures also named the twelve
intelligence agents whom the Lord directed Moses to sent into
the land of Canaan and records that “all those men were heads
of the children of Israel.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN

SHAMMUA THE SON OF ZACCUR – Tribe of Reuben


SHAPAT THE SON OF HORI – Tribe of Simeon
CALEB THE SON OF JEPHUNNEH – Tribe of Judah
IGAL THE SON OF JOSEPH – Tribe of Issachar
HOSHEA THE SON OF NUN – Tribe of Ephraim
PALTI THE SON OF RAPHU – Tribe of Benjamin
GADDIEL THE SON OF SODI – Tribe of Zebulun
GADDI THE SON OF SUSI – Tribe of Joseph, that is from the Tribe of Manasseh
AMMIEL THE SON OF GEMALLI – Tribe of Dan
SETHUR THE SON OF MICHAEL – Tribe of Asher
NAHBI THE SON OF VOPSHI – Tribe of Napthali
GEUEL THE SON OF MACHI – Tribe of Gad
RAHAB
The Harlot of Jericho (Joshua 2:1-21)” who
sheltered and concealed the agents of Israel,
made a covenant with the agents and duped
their pursuers. She was not only an
impromptu confederate of immense value for
the Jewish leader of that far distant day, but
also established a plot-pattern which is still of
periodic relief to motion picture producers.
DELILAH
The Philistine used her when she allowed
Philistine spies to hide in her house (Judges
16). Delilah was an impromptu intelligence
agent. Apart from her tonsorial specialty, she
also allowed sex to gain intelligence from a
powerful enemy. She achieved the largest
effective force of her employer’s adversaries
and contriving the stroke which put that force
out of action”.
IMPORTANT EVENTS AND PERSONALITIES
IN THE WORLD OF INTELLIGENCE

Sun –Tzu
A Chinese philosopher, creator of the “The
Art of War”
“Information must be obtained from men who
knew the enemy situation.”
“Know thy enemy and know yourself, you
need not fear the results of a hundred battles”
“If you know yourself and not the enemy, for
every victory, you are a fool who will meet
defeat in every battle.”
Alexander the Great

When Alexander the Great was marching to


Asia, were rumors of disaffection growing
among his allies and mercenaries, he sought
the truth, and got it by simplest expedient by
devising the first “letter sorting” and opening
to obtain information.
Sertorius
He was the Roman Commander in Spain who possessed a
White Fawn and allowed it to become widely known - that he
derived secrets and guidance from the fawn. His intelligence
agents credited their information to the supernatural power of
animals.

Akbar
He was known to be the sagacious master of the Hindustan. He
employed more than 4,000 agents for the sole purpose of
bringing him the truth that his throne might rest upon it.
Genghis Khan

He was known “The Great Mongol”, who used


intelligence to conquer China and invade Cathay. He
instructed his Generals to send out spies and used
prisoners as sources of information. The leader of the
so-called MONGOL CONQUERORS - made use of
effective propaganda machine by spreading rumors
of Mongol Terror, they collected information on
weaknesses and rivalries of Europe. The leaders
usually disguised as merchants.
 RENAISSANCE PERIOD

With the rise of Nationalism and development of modern armies,


intelligence became apparent to large states. In England, Sir Francis
Walsingham, under Queen Elizabeth, organized the first National
Intelligence Service. He employed spies on the staff of the Admiral in
Command of the Spanish Army and able to obtain information
regarding Spanish Army as to their ships, equipment, forces and stores.
He protected Queen Elizabeth I from countless assassins.

In France, Richlieu – introduced the network of covert collectors who


transmitted prompt and accurate information to Paris regarding the
activities of the rebels and dissidents of the kingdom.

Louis XIV – systematized political policy, continuous surveillance,


postal censorship and military intelligence organization were his
contributions.
The French Intelligence System continued since 15th Century.

Napoleon Bonaparte once said, “One Spy in the right place is


worth 20,000 men in the field”. He organized two Bureaus of
Interest: Bureau of Intelligence – which consolidate all
incoming information regarding the enemy for presentation to
the emperor and to obtain information as desired, and
Topographic Bureau – which maintains a large map which
covers the latest information regarding both enemy and friendly
forces. He maintained Military Intelligence and Secret Political
Police Service all over Europe. His main arm was “Spy against
spy” concept.
Frederick the Great

He was known as the “Father of Organized Military


Espionage”. He has divided his agents into four classes:

 Common spies – those recruited among poor folk, glad to earn


a small sum or to accommodate as military officer.
 Double spies – are unreliable renegades, chiefly involved in
spreading false information to the enemy.
 Spies of Consequences – couriers and noblemen, staff
officers, and kindred conspirators, requiring a substantial bribe
or bait,
 Persons who were forced to undertake espionage against
their own will.
Hannibal
He was considered one of the brilliant military strategists in the
history of military intelligence. He had developed an effective
intelligence system for 15 years in Rome. He usually roam
around the city often disguise himself as a beggar to gather first
hand information.
Julius Caesar
During his time, the staff of each Roman Legion
includes ten “speculators” who served as an information-
collecting agency. The “speculators” were the first intelligence
personnel to appear definitely in a military organization. Military
success of the Romans was aided by communication system.
Made use of carrier pigeons, which made possible the amazing
speed with which intelligence of Imperial Rome was transmitted.
They also employed ciphers to ensure secrecy of
communications.
 George Washington
Conspirator under oath abounds in the history of every nation. George
Washington was grand master in intelligence. He mobilized the Free
Masons of the colonies at the outbreak of the American war of
Independence.

 Karl Schulmeister
He was Napoleon’s eye, Napoleon’s military secret, born on August 5,
1770. He began his career in offensive espionage under a cover role.
He was able to infiltrate the Austrian General Staff.

 Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He
further device military censorship and organized military propaganda.
He introduced military censorship and organized military propaganda.
He works as a census taker and developed informal gathering of data.

 Alfred Redl
He was one of the most brilliant intelligent agents. Though a
homosexual, he became Chief of the Austro – Hungarian Secret
Service. He became a double agent of Russia. In 1913, his treason was
discovered and he was forced to commit suicide. His treason also led to
the death of almost 500,000 agents and soldiers combined in his 13
years espionage episode.
Brahma Kautilya

In Ancient India, he overthrew the Nanda Dynasty and


established the first MAYURYAN king in the Indian throne. He
recommended to his king that for the ruler to succeed, the ruler
should strike at his enemy’s weak points by means of spies. He
proposed the following means to conquer enemy’s stronghold:
Intrigues and spies - Winning over enemy’s people - Siege and
assault - Before beginning military operation, a conqueror
should know the comparative strength and weaknesses of
himself and his enemy. No war should be undertaken without
careful examination of all factors reported by the kings’ spies.
 Maj. General Donovan
He was the organizer of the OSS, builder of a central intelligence
system - OSS whose exploits become legendary in World War II.
 V2 – Rackets - OSS agents working in conjunction with the British
Intelligence, through penetration and technical intelligence discovered
Punemundo which was the V2 guide missile research project of Nazi
Germany. It resulted to its destruction and heavy bombing.
 Battle of Midway
In June 1442, the turning point of the Naval in the Pacific, the victory
gained by the Americans was due to the disrupted messages from the
Imperial Japanese Navy.
 Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of the U.S. Navy
Communications Intelligence intercepted a top-secret signal relaying
the travel of the Admiral. En route, he was intercepted and crashed in
the Jungles of Baungainville.
 State Informer
Edward I, King of England in 1725 organized a systematic
police system so called Witch and Ward. By Royal
proclamation, the profession “State Informer “was created in
1734 enjoining all informers to expose criminal activities and be
compensated.
 Fouche of France
A Frenchman born in 1759, rose to become the most feared and
respected intelligence director in French history. He created a
network of agent. His assistance founded the modern system of
spying on spies, which later was known as counter espionage.
 Joseph Petrosino
He was member of the New York Police Department in early
1900, he was the head of the Italian Squad. Through extensive
intelligence network, he was credited to smash and
neutralization of the Black Society.
 Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of Justice and
became what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On
September 6, 1939 by a presidential directive, it came to its responsibility the task of a
domestic intelligence.

 Central Intelligence Agency


The agency was created under the US National Security Act of 1947. It was the Central
Intelligence group established during the time of President Truman in January 1946. The
CIA was under the National Security Council.

 Committee for State Security


Russia - The Intelligence agency known as the KGB - Komitet Gosudarstvennoy
Bezopasnosti (KGB)

 British Secret Service – Great Britain

 Mossad – Israel

 Britain: Scotland Yard, London Metropolitan Police Force


It was established by Sir Robert Peel in 1829 which signaled the beginning of a colorful
legendary police force and considered one of the most efficient in the world today.
Intelligence and the World Wars
WORLD WAR 1

 1900 – Europe powers developed modern staff systems and place intelligence on the same
level with personnel, operations and logistics. Intelligence then functioned in time of peace
and war. Intelligence during this period, concentrated on information about the armed
forces of the enemy and their capabilities. AIRCRAFT was introduced as a method of
conducting aerial reconnaissance. WIRELESS TELEGRAPH was used wherein CODES
AND CIPHERS were applied. ARMY INTELLIGENCE rapidly expanded during this period.

 GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness


throughout Europe but declined at the outset of the war.

 BRITISH INTELLIGENCE – succeeded greatly by means of censorship and its CODE


ROOM combined with skillful use of COVERT agents.

 US expanded their NAVAL INTELLIGENCE wherein DOMESTIC


COUNTERINTELLIGENCE became a principal activity. At this time US created three
branches of its Intelligence System: POSITIVE BRANCH – function of collecting evaluating
and disseminating intelligence. Prepare situation estimate and translate documents;
NEGATIVE BRANCH – it is the counterintelligence functions which involve in investigating
disloyalty and sedition, investigate enemy activities, investigate graft and fraud in
organization; GEOGRAPHIC BRANCH – Produces maps, photographs, and terrain studies.
SECTIONS - Administration, Collection by attaches and troops, Codes and ciphers
WORLD WAR II

 GERMAN INTELLIGENCE – started the war with the world’s best organized
intelligence service through advance preparation of intelligence accompanied by
troop movements. GERMAN INTELLIGENCE WEAKENED by the attitude of the
Officer Group wherein they subordinated intelligence to operation and did not
regard intelligence assignment worthy of a soldier.

 JAPANESE INTELLIGENCE – failed because it was not provided with sufficient


number of trained personnel to assemble and evaluate the mass of materials
which were collected although Japanese Intelligence was involved in short war
and defensive in nature.

 BRITISH INTELLIGENCE – the delay in the use of German V-BOMB against


them was their main achievement during this time.

 In 1942 – a female special agent was able to transmit vital information


concerning the activities and installations of the main research station at
Penemuenda. Its intelligence failed in the defeat of GENERAL
MONTGOMERY’S forces at ANNHEIM.
 US INTELLIGENCE – In 1941, The US Strategic Service was established to research and
analyze military, political and economic information as it affected the security of the country.
US JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the navy
in the collection and analysis of strategic information and to be responsible for the planning
and operation of special services. US greatest contribution to intelligence was the
development of the AMPHIBIOUS WARFARE where coordination of many types of
intelligence activities was required to provide adequate knowledge of the successful
operation of a complex military force transported over water with the objective of
establishing itself on an enemy – held shore against opposition. US successes in WW II
were based on personnel drawn from CIVILIAN POPULACE, BUSINESS AND
PROFESSIONAL MEN AND WOMEN.

 CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police to


conduct espionage and counterespionage against Japanese Spies and Chinese
communist.

 SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union.

 SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence


concerned with disaffection among Soviet troops and anti-communism in any form. Its five
major divisions are: Administration, Operation, Investigation, Prosecution, and Personnel.
POST WAR PERIOD: The superpowers

 Soviet Intelligence System


It was described as omnipotent and omnipresent for its vast intricate organization involving
millions of people. SOVIET COUNTERINTELLIGENCE known as “IRON CURTAIN”
signified that no one may cross the borders of the USSR without being detected. This
means that all communications are rigidly controlled. Its contribution to modern intelligence
was the dissemination of false information designed to mislead and confuse opponents and
prospective victims. The MGB – MILITARY INTELLIGENCE AND THE MINISTRY OF
STATE SECURITY formerly NKGB was concerned on political espionage and propaganda
abroad and for the control of espionage activities of foreign communist countries. The KGB
resumed the former function of the old MGB. It is now the official secret police agency of
the Soviet Union, in charge of the state security KGB means (Commission of State
Security) K- Omissija G- Osudarstyennoj B – Ezopasnosti or Komitet Gosudarstvennoy
Bezopasnosti

 British Intelligence System


It is composed of several intelligence agencies such as the BRITISH MILITARY
INTELLIGENCE DIVISION (MID) which is divided into 20 different departments. The M15 –
devoted to counterespionage and security. It is the special branch of the SCOTLAND
YARD charged with guarding the Royal Family and important British officials and Visiting
Foreign Dignitaries.
 French Intelligence System
The SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE
ESPIONAGE (SDECE-FOREIGN Intelligence and counterintelligence Service)
was under the office of the Prime Minister. GENERAL CHARLES DE GAULLE
set up the Bureau Central de Renseignements et d’ Action (BCRA Central Office
for Intelligence and Action in London in 1940. It is an expansion of the Service
De Reassignments (SR-Intelligence Service which is a part of the Old Renzieme
Bureau (Second Bureau) of the French General Staff. SDECE concerned on
Strategic and Counterintelligence while SURETE NATIONALE became part of
French Intelligence Service.

 German Intelligence System


The RED GESTAPO which serves as security service organized by East
Germany to combat the covert activities of West Germany Group when
Germany was still divided by the Berlin Walls.

 United States Intelligence System


The CIA and the FBI – the CIA is one among the biggest in the world in terms of
intelligence networking. CIA and the FBI and the other state/ federal units of
intelligence services were US main intelligence agencies.
Agents of Betrayal
Intelligence is sometimes described as a “world of deceit and
betrayal”. Some of the high personalities which evidence this
description are:

 JUDITH COPLON, a political analyst of a Department of Justice,


was accused of taking unlawful possession of government
documents and spying for a foreign power.
 DR. EMIL JULIUS KLAUS FUCHS was accused of releasing
American Atomic Secrets to the Soviet in 1945 and to the British
in 1947. He detailed knowledge of the construction of atomic
bombs.
 ERNST HILDING ANDERSON was a Royal Swedish Navy who
provided military secrets to a foreign power and was found guilty
and sentences to life imprisonment in 1951.
ESSENTIAL INTERESTS IN
INTELLIGENCE
Intelligence Defined

 Webster defines intelligence as the capacity for understanding and for other
forms of adaptive intellect of behavior; the mind in operation; the power of
meeting any situation, especially a novel situation, successfully by proper
behavior adjustments; the ability to apprehend the interrelationships of
presented facts in such a way as to guide action towards goal; knowledge of an
event, circumstances, etc., received or imparted; the gathering or distribution of
information; the staff of persons engaged in obtaining such information.

 Base on Psychology- Intelligence is the capacity of a person to adjust to new


situations through the use of what has been previously learned.

 According to Government - Commission Task Force - It means the collection,


processing, collation, interpretation, evaluation and dissemination of information,
with references to national security. In certain context, it may also mean the
network or the system for the collection, collation, interpretation, evaluation,
processing, and dissemination of information. “The term as used here doesn’t
include any police powers or authorities, any investigative function other than
those involve in the collection of information nor any function involved in the
enforcement of laws, orders, or regulation.
 According to Military Terminologies - Intelligence is the end
product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information which
my have immediate or potential significance to the development
and execution of plans, policies and programs of the users.

 According to Police Parlance - The end product resulting from


the collection, evaluation, analysis, integration and interpretation
of al available information regarding the activities of criminal and
other law violators for the purpose of affecting criminals and
other law violators for the purpose of affecting their arrest,
obtaining evidence, and forestalling plan to commit crime.
The Principal Areas of Interest in Intelligence
 Military – offensive and defensive tactics, war plans, strategic
concepts and tactical principles, organizations, installations,
industrial lease, armed forces, command structure, command
personnel, material, tactics, morale,
 General – topographical and hydrographic characteristics,
historical backgrounds
 Diplomatic – foreign policies, alliances, diplomatic
establishment, foreign service personnel, technique of
conducting foreign relations
 Political – ideology, traditions, institutions, personalities, area
of friction
 Communications and Transportation – telephones,
telegraphs, wireless, railways, shipping, automobiles and
trucks, highways, aviation, ownership, policies, organization,
personnel
 Social – nationality structure, classes and caste, historical factors,
census, personal aspects, characteristics and mentality of people
forces, social legislation, radio, television, press, motion picture

 Intelligence – organizations, methods and personnel of competing


intelligence system

 Economic - On economics, the areas are on:

Financial – Monetary policies, Currency structure, Transactions,


Institutions, Personalities
Commercial – trade policies, markets, trading methods, price policies,
personalities
Industrial – structure of Capacity, manufacturing plants and processes,
raw material, energy rotations, labor relations, personalities
Mining – Mineral Resources, Production method, Output
Agriculture – policies, crop structure, cultivation method, mechanization,
financing, specific characteristics of rural
population
Principles of Intelligence
 Objectivity - in intelligence, only the well guided succeed. It is a basic
intelligence concept that there must be unity between knowledge and
action. It follows therefore that intelligence should interact and condition
the decision. Intelligence must be adapted to the needs of the decision;
it is both giver and taker. Action or decision is planned by knowledge
and guided by it at every step.

 Interdependence - Intelligence is artificially subdivided into component


elements to insure complete coverage, eliminate duplication and to
reduce the overall task or manageable sizes. Nevertheless, each
subdivision remains as essential part of unity; contributes
proportionately to the end result; possesses a precise interrelationship;
and interacts with each other so as to achieve a balanced and
harmonious whole.

 Continuity - Intelligence must be continuous. It is necessary that


coverage be continuous so that the shape of what happens today could
be studied in the light of what happened before, which in turn would
enable us to predict the shape of things to come.
 Communication - Intelligence adequate to their needs must be
communicated to all the decision makers in manner that they will
understand and form that will permit its most effective use.

 Usefulness - Intelligence is useless if it remains in the minds, or in the


files of its collectors or its producers. The story must be told and it must
be told well. The story must be convincing and to be convincing it must
not only be plausible or factual but its significance must be shown.

 Selection - Intelligence should be essential and pertinent to the purpose


at hand. Intelligence involves the plowing through a maze of
information, considering innumerable number of means or of picking
the most promising of a multitude of leads. The requirement of
decision-making covers very nearly the entire span of human
knowledge. Unless there is selection of only the most essential and the
pertinent, intelligence will go off in all directions in one monumental
waste of effort.
 Timeliness - Intelligence must be communicated to
the decision maker at the appropriate time to permit
its most effective use. This is one of the most
important and most obvious, for Intelligence that is
too soon or too late are equally useless. Timeliness is
one principle that complements all the others.

 Security - Security is achieved by the measures


which intelligence takes to protect and preserve the
integrity of its activities. If intelligence has no security,
it might be as well being run like a newspaper to
which it is similar.
General Activities
in Police Intelligence
 Strategic Intelligence – it is an intelligence activity which is primarily long range in
nature with little practical immediate operation value.

 Line Intelligence – it is an intelligence activity that has the immediate nature and value
necessary for more effective police planning and operation.

 National Intelligence - it is the integrated product of intelligence developed by all the


governmental branches, departments concerning the broad aspect of national security
and policy. It is concerned to more than one department or agency and it is not produced
by single entity. It is used to coordinate all the activities of the government in developing
and executing integrated and national policies and plans.

 Counter-Intelligence – phase of intelligence covering the activity devoted in destroying


the effectiveness of hostile foreign activities and to the protection of info against
espionage, subversion and sabotage.

 Undercover Work – is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of
determining the nature and extent of any criminal activities that maybe contemplating or
perpetuating.
Functional Classification
of Police Intelligence

 Criminal Intelligence – refers to the knowledge


essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.
 Internal Security Intelligence – refers to the
knowledge essential to the maintenance of peace
and order.
 Public Safety Intelligence – refers to the
knowledge essential to ensure the protection of
lives and properties.
Forms of Intelligence

 Sociological Intelligence – deals with the demographic and psychological


aspects of groups of people. It includes the population and manpower and the
characteristics of the people, public opinion – attitude of the majority of the
people towards matter of public policy and education.

 Biographical Intelligence – deals with individual’s personalities who have


actual possession of power.

 Armed Force Intelligence – deals with the armed forces of the nation. It
includes the position of the armed forces, the constitutional and legal basis of
its creation and actual role, the organizational structure and territorial
disposition, and the military manpower recruitment and Order of Battle

 Geographical Intelligence – deals with the progress of research and


development as it affects the economic and military potential of a nation.
THREE KINDS OF INTELLIGENCE

 Strategic Intelligence – as defined earlier, it is an intelligence


data that are not of an immediate value. It is usually
descriptive in nature, accumulation of physical description of
personalities, modus operandi. It does not have immediate
operational value but rather long range that may become
relevant to future police operations.

 Line Intelligence – It is the kind of intelligence required by the


commander to provide for planning and conduct tactical and
administrative operation in counter insurgency. This pertains
to knowledge of People, Weather, Enemy and Terrain (PWET)
used in planning and conducting tactical and administrative
operation in a counter insurgency.
Intelligence information to be determined in Line Intelligence are:

 People - living condition of the people, sources of income,


education of the people, government livelihood projects, extent
of enemy influence to the people
 Weather – visibility, cloudy, temperature, precipitation (rain),
wind
 Enemy - location of the enemy, strength of the enemy,
disposition, tactical capability, enemy vulnerability
 Terrain - relief and drainage system, vegetation, surface
material, man made features. There are military aspects of
terrain which includes cover and concealment, obstacle, critical
key terrain features, observation and fields of fire, and avenues
of approach.
 Counter Intelligence (CI) - this kind of intelligence covers the
activity devoted in destroying the effectiveness of hostile foreign
activities and to the protection of info against espionage,
subversion and sabotage. Hence, the three activities of CI are:
protection of information against espionage; protection of
personnel against subversion; and protection of installations and
material against sabotage.

Measures in CI must be both passive and active. Passive


measures are those measures which seek to conceal info from
the enemy while active measures are those which seek actively
to block the enemy’s efforts to gain info or engage in espionage,
subversion or sabotage.
Counter Intelligence is also known as Negative Intelligence - a generic term meaning three
different things;

 Security Intelligence – means that the total sum of efforts to counsel the national policies,
diplomatic decisions, military data, and any other information of a secret nature affecting
the security of the nation form unauthorized persons. It is an effort to deny information to
unauthorized persons by restricting to those who are explicitly authorized to possess it.

 Counter-Intelligence - counter intelligence is the organized effort to protect specific data


that might be of value to the opponent’s own intelligence organization. Some of its functions
are: Censorship – of the following: correspondence, broadcast, telecast, telephone
conversations, telegrams and cables, etc., prevention of the dissemination of any
information that might aid an opponent; maintenance of files of suspect; surveillance of
suspects; mail reading, wire tapping and recording; infiltration of the enemy intelligence
organized to procure information about its method, personal, specific operations and
interest.

 Counter-Espionage - In counter-espionage, negative intelligence becomes a dynamic and


active effort. Its purpose is to investigate actual or theoretical violation of espionage laws, to
enforce those laws and to apprehend any violators.
Five Categories of CI Operation

 Military Security – it encompasses the measures taken by a


command to protect itself against espionage, enemy
operation, sabotage, subversion or surprise. Examples are:
Secrecy discipline - Special safeguarding of classified
information - Security of troop movement - Special handling of
weather & escapes - Counter subversion with in the armed
forces - Tactical measures in combat area

 Port Frontier and Travel Security – has to do with the


application of both military and civil security measures for CI
control at point of entry and departure, international borders or
boundaries. Examples are:Security screening and control of
frontier Security control of merchants, seaman and crew of
commercial aircraft, Security control of frontier crossing point
Security control of seaports
 Civil Security – it encompasses active and passive CI
measures affecting the non-military nationals permanently or
temporarily residing in an area under military jurisdiction.
Examples are: Systematic registration of civilians and aliens
Control of circulation, Curfew, Surveillance of suspected political
organizations, Security screening of labor, Issuance of passes
and permits, Control of internal commerce

 Censorship – it is the control and examination of the civil,


national, armed forces, field press, and POWs.

 Special Operations – counter subversion, sabotage and


espionage
Categories of CI Operation
 Counter Human Intel (HUMINT) – seeks to overcome enemy
attempts to use human sources to collect information or to
conduct sabotage and subversion which includes CI special
operations, liaison, counter security, and CI screening.

 Counter Imagery Intel (IMINT) - includes action taken to


determine enemy SIGINT and related enemy weaknesses,
capabilities and activities. These actions include surveillance
radar, photo thermal and infrared systems. Successful counter
– IMINT operations rely heavily on pattern and movement
analysis and evaluation of the enemy.

 Counter Signal Intel (SIGINT) – determine enemy SIGINT and


related enemy weaknesses, capabilities and activities, assess
friendly operations to identify patterns, profiles and develop,
recommend and analyze counter measures.
THE INTELLIGENCE CYCLE
PHASE 1

PLANNING THE COLLECTION


EFFORT
PHASE 2

COLLECTION OF
INFORMATION

PHASE 4 MISSION

DISSEMINATION AND USE


OF INFORMATION

PHASE 3

PROCESSING THE
COLLECTED INFORMATION
PHASE 1
Planning the Collection Effort
This phase of the cycle involve the
determination of the requirements of
intelligence. It is concerned with identifying
the so called Essential Element of
Information (EEI) - an item of intelligence or
information of the characteristics of the area
of operations and the enemy, which the
commander feels he needs before he needs
before he can reasonably arrive at a decision.
 What are their capabilities and vulnerabilities?
 What are the physical characteristics of the
probable area of operation?
 What major policies, plans and decisions must be
made in the near future?
 What step must be taken to preserve the security of
the nation?
 What is the information required by the higher,
lower or adjacent echelons within the government or
armed forces?
PHASE 2
Collection of information
This phase of the cycle is concerned with identification of the
collecting agency, the formulation of procedures on the manner
of collecting the information in conjunction with the plans as
achieved in phase one.

 Methods of Collection – information can be collected through


overt method (open system) or covert method
(secret/clandestine).
 Collecting Agencies – depending on the type of operation, the
collecting agency could be Government Agencies, Intelligence
units, or Organizations
 Trade Crafts – includes the use of photography, investigations /
elicitation / interrogation, surveillance, sound equipment,
surreptitious entry – keys and locks, use of an artist,
communication
PHASE 3
Processing the Collected Information
 This phase of the cycle is concerned with the examination and collation of all
collected information.

Steps in Processing Raw Information

Collection – organization of raw data and information into usable form; grouping
similar items of information so that they will be readily accessible.

Recording – is the reduction of info into writing or some other form of graphical
representation and the arranging or this info into writing or some form of
graphical representation and the arranging of this into groups of related items.
Police log book and Journal, Intel-work Sheet - Intel Files, Situation Maps -
Rouges Gallery, Modus Operandi Files Evaluation – examination of raw
information to determine intelligence value, pertinence of the information,
reliability of the source and agency, and its credibility or truth of information.

Evaluation is the determination of the pertinence of the info to the operation,


reliability of the source of or agency and the accuracy of the info.
RELIABILITY ACCURACY
A - Completely reliable 1 - Confirmed by other
B - Usually reliable 2 - Probably true
C - Fairly reliable 3 - Possibly true
D - Not usually reliable 4 - Doubtfully true
E - Unreliable 5 - Improbable
F - Reliability cannot 6 - Truth cannot be
be judged judged
Source of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured Enemy
X- Observation of gov’t/civilian employee
Y/Z- Documentary
PHASE 4
Dissemination & Use of Information
This phase of the cycle refers to the activities
of transferring the processed information to
the proper users, most particularly the
authority that requires the activity. Processed
information can be disseminated through
annexes, estimates, briefing, message,
reports, overlays, and or summaries.
Methods of Dissemination
 Fragmentary orders from top to bottom of the
command
 Memorandum, circulars, special orders
 Operations order, oral or written
 Conference – staff members
 Other report and intelligence documents
 Personal Contact
Who are the users of intelligence?
 National leaders and military commanders –
formulation and implementation of national policies.
 Advisors and Staff – preparations of plans and
estimates
 Friendly nations or other branches of the armed
forces.
 Processor – basis for evaluation and interpretation.
 Head / chairman of an organization
 Any person with authority for purposes of planning.
INFORMATION
AND ITS SOURCES

INFORMATION IS THE LIFE-BLOOD OF


INTELLIGENCE

NO INFORMATION – NO INTELLIGENCE
Information

Information refers to all evaluated materials of every


description including those derived from observation, reports,
rumors, imagery, and other sources from which intelligence in
produced. Information is a communicated knowledge by
others obtaining by personal study, investigation, research,
analysis, observation.

Two General classifications of sources of information:

 Open Sources – 99% of the information collected are coming


from open sources.
 Close Sources – 1% of information are collected from close
sources.
 Overt Intelligence – is the gathering of information or documents
procured openly without regard as to whether the subject or target
become knowledgeable of the purpose
Open Sources: Includes information taken from
 Enemy activity
 POW and Civilians
 Captured documents
 Map - Weather, forecast, studies, report - Agencies

 Covert Intelligence – is the secret procurement of information, which


is obtained without the knowledge of the person or persons
safeguarding vital intelligence interest.
Close Sources: Include information which maybe taken
through:
 Surveillance
 Casing and Elicitation
 Surreptitious entry
 Employment of technical means (Bugging and Tapping device)
 Tactical Interrogation
 Observation and Description (ODEX)
PERSONS AS SOURCES OF
INFORMATION
Informant Net – It is a controlled group of people
who worked through the direction of the agent
handler. The informants, principal or cutouts supply
the agent handler directly or indirectly with Intel
information

Informants (Asset) – people selected as sources of


information, which could be voluntary, or in
consideration of a price.
 Informant – refers to a person who gives information
to the police voluntarily or involuntarily with out any
consideration
 Informer – those who give information to the police for
price or reward
Types of Informants

 Criminal Informant – an informant who give information to the


police pertaining to the underworld about organized criminals
with the understanding that his identity will be protected

 Confidential Informant – is similar to the former but he gives


information violate of the law to includes crimes and criminals

 Voluntary Informant – a type of informant who give information


freely and willfully as a witness to a certain act

 Special Informant – those who gives information concerning


specialized cases only and it is regarded a special treatment by
the operatives (ex. teachers, businessmen)

 Anonymous Informant – those who gives information through


telephone with the hope that the informant can not be identified
Sub-type of Informant
 Incidental Informant – a person who casually imparts
information to an officer with no intention of providing
subsequent information
 Recruited Informant – A person who is selected cultivated
and developed into a continuous source of info

Categories of Recruited Informants:


 Spontaneous or Automatic Informant – Informants who by
the nature of their work or position in society have a certain
legal, moral or ethical responsibilities to report info to the
police
 Ordinary (out-of-their-will) Informants – those under the
compulsion to report info to the police
 Special Employee – informants who are of a specific
operational nature
Other Classification of Informant
Other terms related to people who gives
information are Automatic Informant,
Penetrating Agent , Infiltrating Agent , Full
time Informant , Rival – Elimination Informant,
False Informant, Frightened Informant, Self-
aggrandizing Informant, Mercenary
Informant , Double Crosser Informant ,
Woman Informant , Legitimate Informant.
Motives of Informants
People give information to the police due to
various reasons. Their motives include
reward, revenge, fear and avoidance of
punishment, friendship, patriotism, vanity,
civic-mindedness, repentance, competition,
and other motives.
INFROMANT RECRUITMENT

 Selection – it is particularly desirable to be able to identity and recruit


an informant who has access to many criminal in-group or subversive
organization. Wide access is probably the single most important feature
in the consideration of recruiting the potential informant
 Investigation – the investigation of the potential informants that has
tentatively identified as a “probable” must be as thorough as possible. It
must establish possible existing motives as to this person might assist
the police Intel community. Failure to do so will deny this office who
must perform the approach and persuasion phase with little more that a
guess. If necessary, conduct complete background investigation (CBI)
 Approach – must be done in a setting from which might include
pleasant surroundings, perhaps a confidential apartment, completely
free form any probability of compromise, preferably in an adjacent city
or a remote area foreign to the informants living pattern.
 Testing – the testing program should begin, of course, with the limited
assignment, with a gradual integration into the more important areas.
The occasional testing of an informant should continue through the
entire affiliation
INTELLIGENCE OPERATIONS
Intelligence Operations is the result of
intelligence planning, planning is always
ahead of operation although an operation can
be made without a plan, it is usually due to
sudden and inevitable situations but definitely
this is poor intelligence management
THE 14 OPERATIONAL CYCLES

 Mission and Target


Infiltration – the insertion of action agent inside the target organization
Penetration – recruitment of action agent inside the target organization
 Planning
 Spotting
 Partial Background Investigation (PBI) or Complete Background Investigation
 Recruitment - the only qualification of an agent is to have an access to the target
 Training
 Briefing
 Dispatch
 Communication - technical method like telephone/radio, non-technical method like
personal meeting, live drop or dead drop
 Debriefing
 Payments – depends upon the motivation of informant
 Disposition – involve activity on rerouting, retraining, retesting, termination
 Reporting
 Operational Testing
COVER AND UNDERCOVER
 Cover - the means by which an individual
group of organization conceals the true
nature of its acts and or existence from the
observer.
 Cover story – a biographical data through
fictional that will portray the personality of the
agent he assumed, a scenario to cover up the
operation
 Cover Support – an agent assigned in target
areas with the primary mission of supporting
the cover story.
 Undercover Assignment – is an investigative technique in which agent conceal
his official identity an obtain information from that organization

Uses of Undercover Assignment


Use independently to get first hand info about the subject of investigation like:
a) Security evaluation of every installation
b) Gain confidence of suspended persons
c) Agent penetration
d) Verify info from human resources
e) Uncover concealed identity

Supplement other investigative techniques like:


a) Playing ground works for raids and searches by going entry
b) To assist in locating evidence
c) To install, maintain investigative equipments of undercover assignment
THE UNDECOVER AGENT
Special qualifications include knowledge of the language, area
background regarding events, knowledge about the custom and
habits, physical appearance, and must be an artist.

Factors considered in Selecting Cover Story


 Mutual Point of Interest
 Justification of presents
 Previous and permanent address
 Efficiency of role and freedom from the movement
 Means of communication
 Social and financial status
 Optional alternate plan
 Safe departure
Selecting Action Agents

 Placement – location of prospective agent with


respect to the target
 Access – it is the capability of a prospective agent to
obtain the desired info for the Intel organization or to
perform to Intel collection mission in the area.
 Primary Access – it is the access to the desired info
 Secondary Access – it is the access to the desired
info through a principal source where the latter has the
direct access
 Outside Access – the agent is employed outside the
target and merely monitor info from a third person who
is monitoring info n the area
CONTROL – authority to direct the agent to carryout task or requirement
on behalf of the clandestine organization in an acceptable manner
and security

Two Categories of Control


 Positive Control – is characterized by professionalism and rapport like
Agent motivation and Psychological control
 Negative Control – characterized by threat and it include the
following:
 Disciplinary Action – includes verbal reprimand for poor performance
or insecure actions withholding certain material rewards, reduction of
agents salary or in extreme situation the threat of terminating
professional relationship
 Escrow Account – control of an agent by putting hi salary in a bank to
be withdrawn only after a fulfillment of a condition
 Blackmail
Procuring Different Type of Agents

 Agent in Place – an agent who has been recruited by an


intelligence service within a highly sensitive target, who is just
beginning a career or have been long or (outside) insider.
 Double Agent – an enemy agent who has been captured,
turned around and sent back where he came from as an agent
of his captors
 Expandable Agent – an agent whom false information is
leaked to the enemy.
 Penetration Agent – an agent who has such reached the
enemy gets information and would manage to get back alive.
 Agent of Influence – an agent who uses influence to gain
information
 Agent of Provocation – one who provoke the enemy to give
information
METHODS OF COVERT
INTELLIGENCE
Surveillance
Surveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an
investigation. Surveillance of persons is called
Tailing or Shadowing, Surveillance of place is
called Casing or Reconnaissance, and
Surveillance of other things, events, and activities is
called Roping.
In Surveillance, the following are considered:
 Pre-Surveillance Conference – a conference held
among the team members, the police intelligence
unit before surveillance is conducted.
 Surveillance Plan – a plan established the as
required according to type of personnel, and the
general and specific instructions for surveillance.
 Area Target Study – refers to the area of operation
of surveillance activities.
 Surveillant – a person who conducts surveillance with includes only
observations.
 Stakeout or Plant – is the observation of places or areas from a
fixed point.
 Tailing or Shadowing – it is the observation of a person’s
movement.
 Undercover Man – it refers to a person trained to observe and
penetrate certain organization suspected of illegal activities and
later reports the observation and information’s that proper
operational action can be made
 Liason Program – the assignment of trained intelligence personnel
to other agencies in order to obtain information of police intelligence
value. (Agencies like the press, credit agencies, labor unions,
telephone companies)
 Safehouse – is a place, building, enclosed mobile, or an apartment,
where police undercover men meet for debriefing or reporting
purposes.
 Drop – any person is a convenient, secure and
unsuspecting place where police undercover men meet his
action agent for debriefing or reporting purposes.
 Convoy – an accomplice or associate of the subject used to
avoid or elude surveillant.
 Decoy – a cover supporting the surveillant who can become
a convoy whenever surveillant is burned.
 Contact – any persons whom the subject picks or deals
with while he is under observation and identifies the
observer.
 Made – when subject under surveillance becomes aware
that he is under observation and identifies the observer.
 Lost – when the surveillant does not know the whereabouts
of his subject or the subject had eluded the surveillance.
TYPES OF SURVEILLANCE

 According to Intensity and Sensitivity


 Discreet –subject person to be watch is unaware that he is under
observation
 Close – subject is aware that he is under observation varied on each
occasions
 Loose – applied frequently or infrequently, period of observation varied
on each occasion
 According to Methods
 Stationary – this is observation of place usually a bookie stall, a
gambling, joint, a residence where illegal activities are going on (fixed
position)
 Moving – surveillance follow the subject from the place to place to
maintain continuous watch of his activities
 Technical – this is a surveillance by the use of communications and
electronic hardware’s, gadgets, system and equipment
Special Equipment (Technical Supports)
 Camera with telephoto lens
 Moving Picture camera
 Binoculars
 Tape recording apparatus
 Wire taping device
 Other instrument – miniaturized one-way radio

Methods available to employ in Surveillance


Ordinarily, the methods are surveillance of place, tailing or
shadowing (1-2-3 man shadow), undercover investigation,
special methods includes: wire tapping - concealed
microphones - tape recorder -television - electric gadgets
Counter Surveillance – the conduct of
operation is coupled with counter intelligence
measures such as window shopping, use of
convoys and decoys, stopping immediately
on blind corners, getting out immediately on
public conveyances, retracing, entering
mobile housing
CASING OR RECONNAISSANCE
Casing is the term use in the police organization
while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a
building place or area to determine its suitability for
Intel use or its vulnerability in operations. It aids in the
planning of an operation by providing needed
information. It assists the agent handler to install
confidence in his agent during briefing phase by
being able to speak knowingly about the area of
operation.
Casing is also considered a security measure
because it offers some degree of protection for those
operating in an area unfamiliar to them.
Method of Casing
 Personal Reconnaissance – the most effective
method and will produced the most info since you
know just what you’re looking for.
 Map Reconnaissance – it may not sufficient but it can
produce a certain amount of usable information
 Research - much info can be acquired through
research
 Prior Information – your unit and of the unit will have
file report that they may provide you with info
 Hearsay –info usually gain by the person operating in
the area and performing casing job
OBSERVATION AND DECRIPTION (ODEX)

Observation – a complete and accurate


observation by an individual of his surroundings
an encompasses the use of all the major sense to
register and recognized its operational or Intel
significance

Description – the actual and factual reporting of


one’s observation of he reported sensory
experience recounted by another
ELICITATION
It is a system or plan whereby information of
intelligence value is obtained through the process
direct intercommunication in which one or more of he
parties to the common is unaware of the specific
purpose of the conservation. The three phases are
determination of the mission, selection of the subject,
and accomplishment of the mission.

Two Devices in the conduct of Elicitation


Approach – process of setting people to start talking
Probe – to keep the people taking incessantly
Example of Approach:
Teacher – Pupil Approach – the subject is
treated as an authority then solicit his view
point and opinion on a subject matter.
Good Samaritan Approach – is the sincere
and valid offers of help and assistance are
made to the subject
PORTRAIT PARLE (P/P)
It is a means of using descriptive terms in
relation to the personal features of an
individual and it can be briefly described as a
world description or a spoken picture.
(Anthropometry - no two human beings has
the same body measurement)
BACKGROUND CHECKS AND INVESTIGATION
(BI- PSI or CBI)
Information needed:
 Domestic Background
 Personal Habit
 Business History
 Social or Business Associates
 Medical History
 Educational Background
 Family History
TACTICAL INTERROGATION

The need for obtaining information of the


highest degree of credibility taken on the
minimum of time can be through interrogation
which varies and dependent entirely on the
situation.
Types of Interrogation

 Screening - usually accomplished as soon as after capture,


apprehension or arrest of an interrogee. The objective is to
obtain background information about the interrogee and
determine his area of knowledge and ability.
 Formal Interrogation (Detailed) –the systematic attempt to
exploit to an appropriate depth those areas of the interrogee’s
knowledge, which have been identified in the screening
process.
 Debriefing – a form of eliciting information, which is generally
used when the area of intellectual capability of the interrogee
is known. Maximum use of the narrative and not try to trap the
person being debriefed with leading question. The
debriefer/interrogator must be familiar with the subject in
which the interrogation is being conducted.
 Interrogation of Lay Personnel (Specific Type) – the
techniques used are the same as in the interrogations, however,
especial effort must be made to established a common frame of
reference between the interrogator and the interrogee. The
amount of information obtained from this type will depend on the
interrogator’s inequity in establishing common terminology on
the source can understand which will enable the interrogator to
get the desired information.

 Technical Interrogation – the level of interrogation where the


source has specific and such detailed information that requires
a trained expert in the subject matter to be explored. It usually
covers the specific subject and time is not as limited as during
other interrogation.
Phases of Interrogation

 Planning and Preparation


 Approach (Meeting the Interrogee)
Questioning
 Termination
 Recording Reporting
INTERROGATION TECHNIQUES:

 Techniques of Approach – the purpose is to gain the cooperation of the


source and induce him to answer questions which will follows.
 The “Open Techniques” – the interrogator is open and direct in his approach
and makes no attempts to conceal the purpose of the interrogator. It is best
employed when the interrogee is cooperative. It is frequently used at the
tactical level where time is a major interrogator.
 The “Common Interest” Technique – the interrogator must exert effort to
impress the interrogee of their common interest. The interrogator must look for
he point out the real advantages the interrogee will receive if he cooperates
 Record File (we know all technique) – the interrogator prepare a file on the
source listing all known information (record should be padded to make it
appear to be very extensive). The information must contain the life history of
he interrogee to include his activities and known associates (Party- bio-data of
the interrogee is important). The “we know all” s used in conjunction with the
record file. During the approach, the interrogator may ask the interrogee about
a subject, if he refuses to cooperate, the interrogator may provide the answer
in order to impress him that the interrogator knows him very well (all is known).
 Exasperation – Techniques (Harassment) – effectively employed against
hostile type interrogee. The interrogator must be alert because the interrogee
may fabricate information to gain relief from irritation (monotype). Subject
Interrogee is placed in a longer period of interrogation without rest or sleep. The
interrogator permits the source to go to sleep and subsequently awaken for
another series of questioning (this is done repeatedly). After many repetitions,
the interrogee will be exasperated and will finally cooperate hoping that he can
be allowed to rest or sleep. Ask a question, listen to a reply and then ask the
same question repeatedly (use a tape recorder if possible). The purpose is to
bore the interrogee thoroughly until he begins to answer questions freely to end
the harassment.

 Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and
Rescue”, “Bud Guy – God Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil
and Angel”. Use of two (2) interrogators playing opposite roles.

 Egotist Techniques (Pride and Ego) – usually successful when employed


against an interrogee who has displayed a weakness or a feeling of insecurity.
You may reverse the technique by complimenting the interrogee in hopes of
getting him to admit certain information to gain credit. Described him as the best
person, superior or comrade.
 “Silent” Technique – employed against nervous or
the confident type of interrogee. Look out the
interrogee squarely in the eye with sarcastic smile
(force him to break eye contact first). He may ask
questions but the interrogator must not answer.
Patience is needed until the interrogator is ready to
break silence.

 “Question Barrage” Technique (Rapid Fire


Questioning) – intended to confuse the interrogee
and put him into a defensive position. The interrogee
become frustrated and confused, he will likely reveal
more than he intended, thus creating opening for
further questioning.

You might also like