Sunteți pe pagina 1din 82

CHAPTER ONE

DEFINTION OF TERMS
AND HISTORICAL SETTING

This Chapter present the important operation definition of terminologies used in the
context of this subject and the historical development of intelligence and secret service. It is in
this chapter that the reader can be able to trace and understand the importance of intelligence in
nation building and security in both peace and wartime

National Intelligence-refers to the product of intelligence developed by all governmental


agencies that covers the broad aspects of national policy and security.

Military Intelligence-it is use in the preparation of military policies, plans and programs. It
includes the strategic and combat intelligence.

Strategic Intelligence- that knowledge pertaining ti the capabilities and probable courses of
action of foreign natons.

Combat Intelligence-is required by the commander in order to determine the best use of his
available firepower and maneuver forces, to accomplish his mission, and to maintain the security
of his command
Counter Intelligence- an integral part of all intelligence operations and as such can’t be
separated from combat and strategic intelligence. Its objective is to safeguard information against
espionage, material and installation against sabotage personnel against subversive.
Technical Intelligence – concerns foreign technical developments, which- have practical
military application and the physical characteristic, performance, capabilities, and the physical
characteristics, performance, capabilities, and limitations of material and installation, used by
and for foreign

Area of Operation(AO)- those aspects of the operational environmentalexclusive of the military


forces involved.It concerns weather economics,politicssociology,hypdrographic (study of
seas,lakes,etc.) and characteristic of the environment of an area in which military operations are
taking place or planned.

Capabilities- form a military standpoint, enemy capability and which if adopted,will influenced
the accomplishment of the friendly mission, either favorable or not

Vulnerabilities- A nation’s vulnerabilities area the weaknesses, which make it susceptible to


any action, which reduces its war, potential, and or its will to fight

HISTORICAL SETTING

The desire for advance information is no doubt a manifestation of our instinct for survival.
A ruler may ask himself: “What will happen next? What course of action should I take? How
strong are my enemies? What are they planning against me?

From the beginning, we noted that such inquiries are made not solely about the situation and
prospect of the single individual but about those of the group- the tribe, the kingdom, and the
nation.The following are some of the important events and personalities in the world intelligence
work application:

Biblical Beginnings

The earliest sources of intelligence, in the age of belief are supernatural interventions in the
affairs of men, were prophets, seers, oracles, soothsayer and astrologers. Since the God knew
what was going to happen ahead to time, having to some extent ordained the outcome of events,
it was logical to seek out divine intentions in the inspiration if holy men in the riddles of oracles
in the stairs and often in dreams.The earliest recorded instance of intelligence fathering can be
found in the Holy Bible (Num.13)
‘When Moses was in the wilderness with the children of Israel, he was directed by the lord to
send a ruler to each of the tribes of Israel to spy out the Land of Canaan which the Lord had
designed as their home. They spent forty days on their mission and thereafter reported back to
Moses their findings.”
MOSES

One of the first recorded formalized intellingence efforts,


with format, can also be found in the Holy Bible Numbers
13:17 “And moses send them to spy out the land of Canaan
and said unto them, get you up this way southward, and go
up into the mountain; and see the lands, what it is ; and the
people that dwelt in, whether in tents, or in stronghold; what
the land is whether it be fat or lean whether be wood therein,
or not. And be of good courage and bring of the fruit of the
land.” scriptures also named the twelve intelligence agents
whom the Lord directed Moses to sent into the land of Canaan and records that “ all those men
were heads of the children of Israel.”

RAHAB
The Harlot of Jericho(Joshua 2:1-21)” who sheltered and
concealed the agents of Israel, made a covenant with agents of
Israel, made a covenant with the agents and duped their
pursuers. She was not only an impromptu confederate of
immense value for the Jewish leader of that far distant day, but
also established a plot- pattern which is still of periodic relief to
motion picture producers.

DELILAH

The Philistine used her when she


allowed Philistine spies to hide in her
house(Judges:16:1-19)
Delilah was an impromptu intelligence
agent. A part from her tonsorial
specialty, she also allowed sex to gain
intelligence from a powerful enemy. She achieved the largest effective
force of her employer’s adversaries and contriving the stroke which put that force ouf of action.”
SUN TZU

The East was ahead of the West in the raft of intelligence in 400 B.C rejecting the oracles and the
seers. Sun –Tzu, a Chinese philosopher takes a more practical view according to him, what is
called foreknowledge cannot be elicited from spirits, nor from gods nor from/ analogy with past
events nor from calculations. He wrote, “it must be obtained from mean who knew the enemy
situation.” It is no wonder that Sun-Tzu’s book entitled. “The Art of War” is the favorite readinof
the late Mao Tsetung and is a required reading material for the Chinese Communist Tacticians.

He further wrote the saying in which most people in the intelligence service believe became a
parlance in the world of intelligence:
“If you know thy enemy and know yourself, you need not fear the results of a hundred battles.”
“If you know yourself and not the enemy, for every victory you suffer defeat”
“If you know neither yourself not the enemy you are a fool who will meet defeat in every battle.”

ALEXANDER THE GREAT

When Alexander the Great was marching to Asia, were rumors of disaffection growing among
his allies and mercenaries.He sought the truth and got it by simpliestexpedient.He Devised the
first “letter sorting” and opening to obtain information.

GEN. ROMANO Q. SERTORIUS


The Roman commander in Spain who possessed a white fawn and
allowed it to be come widely known that he derived both secrets
and guidance from the fawn.His intelligence agents credited their
information to the supernatural power of animals

AKBAR

The “ Great Mogul” and sagacious


master of Hindustan employed more
that 4,00 agents for the sole purpose
of bringing him the truth that his
throne might rest upon it.

GENGHIS KHAN

A Mongol who use intelligence to conquer China and invade


Cathay. He instructed his Generals to send out spies and use
prisoners as sources of Information.

He was the leader of the so-called MONGOL


CONQUERORS, who used effective propaganda machine by spreading rumors of Mongol
Terror. They collected information on the weaknesses of rivals by posing themselves as
disguised merchants.

RENAISSANCE PERIOD

With rise of Nationalism and Development of modern Armies,Intelligence became apparent to


large states.

In England SIR FRANCIS WALSINGHAM, Under Queen Elizabeth, organized the first
Nation Intelligence Service. He employed spies on the staff of the Admiral in Command of the
Spanish Army and able to obtain information regarding Spanish Army and able to obtain
information regarding Spanish Army as to their Ships, equipment, forces and stores. He
protected Queen Elizabeth I from countless assasins.

In franceRICHELIEUintroduced the network of covert collectors who transmitted prompt and


accurate information to Paris regarding the activities of the rebels and dissidents of the Kingdom
Armand Jean Du Plessis was born in Paris on September 9,1585. He took the name Richelieu
from the name of his family’s estate. From the time he was born he set out on a military career.
By 1622 he became cardinal and in 1624 the Chief or Prime Minister of King Louis XIII.
Cardinal Richelieu became the most powerful persons in France, in part, because Louis was a
weak king and in part, because Richelieu was so strong. He had control of almost every facet of
frenchPolitics,from the daily activities of the court to foreign policy and affairs. His dual role as
head of the church in France and Prime Minister, allowed him to control the direction of the
government
Many historians for his intelligence and energy have admired Cardinal Richelieu . Many French
historians consider Richelieu as the founder of French unity, as
well as the person who released France from its medieval
nature.

LOUIS XIV- systemalized political policy, continuous


surveillance, postal censorhip and military intelligence
organization.
The French Intelligence system Continued since 15thCentury

NAPOLEON BONAPARTE
“One spy in the right place is worth 20,00 men in the field” He organized two Bureau of Interest:
BUREAU OF INTELLIGENCE- Consolidate all incoming information regarding the enemy for
presentation to the emperor and to obtain information as desired. TOPOGRAPHIC BUREAU-
maintains a large map, which covers the latest information regarding both enemy and friendly
forces

He maintained Military Intelligence and Secret Political Police Service all over Europe. Spy
against was of high proportion during his time wherein counterespionage came into popular
usage
agents into four classes

FREDERICK THE GREAT


He was known as the Father of Organized Military
Espionage

He has divided his agent into four classes:


a. Common spies recruited among poor folk, glad to earn
a small sum or to accommodate a military officer.
b. Double spies, the law informers and unreliable renegades of value, chiefly in spreading false
information to the enemy.
c. Spies of Consequences- couriers and noblemen, staff
officers, and kindred conspirators, invariable requiring
a substantial bribers or bait
d. Persons who are forced to undertake espionage
against his will

HANNIBAL
Considered one of the brilliant military strategies in his
history . He had developed an effective intelligence
system for 15 years in Rome, and he usually roam
around the City often disguise as a beggar to gather first
hand information.

JULIUS CEASAR
During his time the staff of each legion includes “
speculators” who served as an information-collecting
agency. The “speculators” were the first intelligence
personnel to appear definitely in military
organization.Military success of the romans was aided by
communication system. Made use of carrier pigeons, which made possible the amazing speed
with which intelligence of Imperial Rome was transmitted: They also employed ciphers to ensure
secrecy of communications.

GEORGE WASHINGTON
Conspirator under oath abounds in the history of every nation.George Washington as Grand
Master Mobilized the free masons of the colonies at the
outbreak of the American war ofIndependence

KARL SCHULMEISTER
Karl Schulmeister, Napoleon’s eye, Napoleon’s military secret, was born on August 5, 1770. He
began his career in offensive espionage. Under a cover role, he was able to infiltrate the Austrian
General Staff.

ALFRED REDL

One of the most brilliant intelligent agent, though a homosexual. Become chief of the Austro-
Hungarian Secret Service, but in face a double agent of Russia. In 1913, his treason was
discovered and he was force to commit suicide

His treason lead to the death of 500,000 agents and soldiers combine in his 13years espionage
episode.

Wilhelm Johann Carl Eduard Stieber( (1818- January 29,1882)was Bismarch’s master
spy,director of the Bureaus. Stieber was both an agent of domestic surveillance and an external
agent. However, he worked in reality for the Tsar’s Ochrana. Along with Joseph Fouche, he
invented modern information gathering

Incorporated intelligence in the General Staff Support System. He further device military
censorhip and organized military propaganda. He work as a
census taker and developed an informal in the gathering of
data.

THE BRAHMA KAUTILY

In Ancient India, he overthrew the NANDA dynasty and


established the first MAYURYAN king in the indian throne.
He recommended of his king that for the ruler to succeed, the ruler should strike at his enemy’s
weak points by means of spies. He propose the following means to conquer enemy’s stronghold:

Intrigues and spies- Winning over enemy’s people- Siege and assault- Before beginning
military operation, a conqueror should know the comparative strength and weaknesses of himself
and his enemy. No war should be undertaken without careful examination of all factors reported
by king’s spies
MAYURYAN SPY SYSTEM- rivaled the modern Soviets and had the following task: Shadow
the king’s ministers and officials and attempt to determine their very thoughts –Report Wrong
doings of the people – Operative secretly in foreign countries- Spread unrest- Commit act of
sabotage- Assassinate political and military leaders- Official envoys were instructed to make
friends with officials of the enemy to compare their military strengths with their own.

William Donovan- Major General, organizer of the OSS (Office of the Strategic Service,US),
builder of a central intelligence system. The OSS whose exploits become legendary in World
War II.

Herbert Yardley- Head of the MI-8 The Forerunner of the Top Secret National Security
Adminitrationa.k.a Black Chamber, a Crypanalaytic Organization

Battle of Midway- In june 1442, the turning point of the Naval in the Pacific, the victory gained
by the americans was due to the disrupted messages from the
Imperial Japanese Navy.

Admiral Isoroku Yamamoto- April 1943, the cryptoanalyst of the


U.S Navy Communications Intelligence intercepted a Top secret
signal relaying the travel of the Admiral. En route he was
intercepted and crashed in the jungles of Baungainville

V2-Rrackets- OSS agents working in conjunction with the British


Intelligence, through penetration and technical intelligence
discovered Pneumundo, which was the V2 guide missile research
project of Nazi Germany. It resulted to its destruction and heavy
bombing.

State Informer- Edward I. King of England in 1725 organized a


systematic police system so called Witch and Ward. By Royal
proclamation the profession “State Informer” was created in
1734 enjoining all informers to expose criminal activites and be
compensated

JOSEPH FOUCHE

The French Statesman Joseph Fouche (1759-1820) served as minister of police under Napoleon
and was influential in the return of Louis XVIII to the throne in 1815.
Bonaparte’s Head of Internal Security. He created a network of agent. His assistance founded the
modern system of spying on spies which later was known as counter espionage.

JOSEPH PETROSINO

Joseph Petrosino- Member, New York Police Department in early 1900, he was the head of the
Italian Squad. Through extensive intelligence network, he is credited to smash the Black society.

The Federal Bureau of Investigation (FBI)- First established in 1980 as an investigative arm of
the U.S Department of Justice, It becomes what is known as the F.B.I. under its first director
John Edgar Hoover in 1924. On September 6,1939 by a presidential directive. It came to its
responsibility the task of a domestic intelligence.

The Central intelligence Agency (CIA)- The agency was created under the US National
Security Act of 1947 a.k.a Public Law 110 established by the late President Truman in January
1946. The CIA is under the Nation Security Council. The first Director of the Agency was Rear
Admiral Roscoe Hillenkoetter

The Committee for state security – Russia- The intelligence agency known as the KGB –
KomitetGosudarstvennoyBezopasnoti (KGB)

The Mossad (Ha-mossad le modilin u-letafquidimmeyuhadim)- The agency’s motto is found in


“Proverbs XI,14” Where no counsel is, the people fall, but in the multitude of counselors there in
safety. Mossad has two branches namely:
Aman-Military Intelligence (Israels Defense Forces) Shabak- General Security Service (Internal
Security); Shabak is from the word “shin bet” that means a defender who shall not be seen.
ReuvenShiloah was the first Director of MOSSAD

The KCIA- Korean Central Intelligence Agency

The Scotland Yard,the London Metropolitan Police Force Established by Sir Robert Peel in
1829, Thus the beginning of a colorful legendary police force and considered one of the most
efficient in the world today.
INTELLIGENCE AND THE WORLD WARS

WORLD WAR 1

1900- Europe powers developed modern staff systems and place intelligence on the same level
with personnel, operations and logistics. Intelligence then functioned in time of peace and war.

Intelligence during this period, concentrated on information about the armed forces of the enemy
and their capabilities

AIRCRAFT was introduced as a method of conducting aerial reconnaissance.

WIRELESS TELEGRAPH was used where in CODES AND CIPHERS were applied

ARMY INTELLIGENCE rapidly expanded during this period

“AGENT PROVOCATEUR”- was employed by the Russians for the purpose of internal
security and political repression. Spying was always the specialty of the Russians.

GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness throughout


Europe but declined at the outset of the war

BRITISH INTELLIGENCE –succeeded greatly by means of censorship and its CODE ROOM
combined with skillful use of COVERT agents

US expanded their NAVAL INTELLIGENCE wherein DOMESTIC


COUNTERINTELLIGENCE became a principal activity

US THREE BRANCHES OF INTELLIGENCE

POSITIVE BRANCH- function of collecting evaluating and disseminating intelligence. Prepare


situation and translate documents

NEGATIVE BRANCH- it is the counterintelligence functions which involve in investigating


disloyalty and sedition, investigate enemy activities investigate graft and fraud in organization

GEOGRAPHIC BRANCH- Produces maps, photographs, and terrain studies. SECTIONS-


Administration, Collection by attaches and troops, Codes and ciphers
WORLD WAR II

GERMAN INTELLIGENCE – started the war with the world’s best organized intelligence
service through advance preparation of intelligence accompanied by troop movements.

GERMAN INTELLIGENCE WEAKENED by the attitudes of the Officer Group wherein


they subordinated intelligence to operation and did not regard intelligence assignment worthy of
a soldier

JAPANESE INTELLIGENCE- failed because it was not provided with sufficient number of
trained personnel to assemble and evaluate the mass of materials which were collected although
Japanese Intelligence was involved in short war and defensive in nature

BRITISH INTELLIGENCE- its achievement was the delay in the use of German V-BOMB
against them.

In 1942- a female special agent was able to transmit vital information concerning the activities
and installations of the main research station at Penemuenda.Its intelligence failed in the defeat
of GENERAL MONTGOMERY’S forces at ANNHEIM.

US INTELLIGENCE – In 1941, The Us Strategic Service was established to research and


anlyzemilitary , political and economic information as it affected the security of the Country.

US JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the navy in
the collection and analysis of Strategic information and to be responsible for the planning and
operation of Special services.

US greatest contribution to Intelligence was the development of the AMPHIBOUS WARFARE


where coordination of many types of intelligence activities was required to provide adequate
knowledge upon which to base the successful operation of a complex military force transported
over water with the objective of establishing itself on an enemy – held shore against opposition.

US success in WWH was there personnel were drawn CIVILIAN POPULACE, BUSINESS
AND PROFESSIONAL MEN AND WOMEN.

CHINESE INTELLIGENCE – In 1932, TAI LI- organized the China’s Secret Police ( the BIS)
to conduct espionage and counterespionage against Japanese spies and Chinese communist.

SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union
SMERSH OR “DEATH TO SPIES” was organized during the war as counterintelligence
concerned with disaffection among Soviet Troops and anti-communism in any form. FIVE
MAJOR DIVISION: Administration, Operation, Investigation, Prosecution and Personnel.

POST WAR PERIOD: The superpowers

SOVIET INTELLIGENCE SYSTEM- Described as omnipotent and omnipresent for its vast
intricate organization involving millions of people

SOVIET COUNTERINTELLIGENCE-“IRON CURTAIN”


-No one may cross the borders of the USSR without being detected.
-All communications are rigidly controlled. Its contribution to modern Intelligence was the
dissemination of false information designed to mislead and confuse opponents and prospective
victims.

GRU- MILITARY IINTELLIGENCE ORGANIZATION-is concerned with political events and


economic conditions and also collects information for intelligence purposes all over the world. It
directs foreign sabotage and maintains network of agents in military and special agents.

MGB-MILITARY INTELLIGENCE AND THE MINISTRY OF STAY SECURITY-formerly


NKGB was concerned on political espionage and propaganda abroad and for the control of
espionage activities of foreign communist countries

KGB- Resumed the former function of the old MGB. It Is now the official secret police agency
of the Soviet Union, in charge of the state security (Commission of State Security) K-Omissija
G- Osudarstennoj B- Ezopasnosti or KomitetGosudarstvennoyBezopasnosti

The Failure of the Soviet Intelligence is due to / Internal Supervision Leader had little trust in
their operative whom they keep under surveillance.

BRITISH INTELLIGENCE SYSTEM

Composed of Several Intelligence Agencies:


SIS- Secret Intelligence Service
M16- British Secret Service (Military Intelligence Section 6) a.k.a Box 850

George Mansfield Smith-Cumming was the First Director

M15- Military Intelligence Section 5, founded 1909- devoted to counter-espionage


SPECIAL BRANCH OF SCOTLAND YARD- is charged with guarding the Royal Family and
Important Bristish Officials and Visiting Foreign Dignitaries

FRENCH INTELLIGENCE SYSTEM

SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE ESPIONAGE(SDECE-


FOREIGN Intelligence and counterintelligence Service)-under the Prime Minister
GENERAL CHARLES DE GAULLE- Set up the Bureau Central de Renseignements d’
Action(BCRA Central Officer for Intelligence and Action in London in 1940. It is an expansion
of the service De Reassignments (SR-Intelligence Service which is a part of the Old
RenziemeBureau(Second Bureau) of the French General staff

SURETE NATIONALE- part of French Intelligence Server (Police- Intelligence

GERMAN INTELLIGENCE

East Germany

RED GESTAPO- security service organized by East Germany to combat the Covert activities of
the West Germany Group when it was still divided by the Berlin Walls
STASI- Ministry for state security

West Germany

BND- BundesNachrichtenDiesnt( Federal Intelligence Service )

CHAPTER TWO
ESSENTIAL INTEREST IN INTELLIGENCE

INTELLIGENCE DEFINED

A. Webster defines intelligence as:


Intelligence is the capacity for understanding and for other forms of adaptive intellect of
behavior, the mind in operation

Knowledge of an event, circumstances, etc, received or imparted: the gathering or distribution of


information: the staff of persons engaged in obtaining such information
B. Psychology
Intelligence is the capacity of a person to adjust to flew situation through the use of what has
been previously learned.

C. Government Commission Task Force


It means the collection, processing, collation, interpretation, evaluation and dissemination of
information, with references to national security

In certain context, it may also mean the network or the system for the collection, collation ,
interpretation, evaluation, processing and dissemination of information. “The term as used here
doesn’t include any police powers or authorities, any investigative function other that those
involve in the collection of information nor any function involved in the enforcement of laws,
orders, or regulation

D. Dictionary of Military Terms


Intelligence is the end product resulting from the collection, evaluation, analysis, integration and
interpretation of all available information which may have immediate or potential significance to
the development and execution of plans, Policies and programs of the users.

Objective of Intelligence
The fundamental objective of intelligence is to ensure rational and timely decision-making

Functions of Intelligence in General

Today all counties have their intelligence services. They maybe different in their organization,
efficiency and method buy they all have the basic functions:

1. The collection or procurement of information


2. The evaluation of the information which then become intelligence
3. The dissemination of intelligence to those who need it.
4. Counter intelligence- it is known as negative intelligence.
It is an activity dedicated to the concealment and protection of one’s own information from the
adversary intelligence operation. It Is a defensive function of intelligence

Other Functions of Intelligence


1. To procure and obtain political, economical, psychological, sociological, military and other
information, which may bear upon, national interest and which had been collected by the
different governmental department and agencies.
2. To serve all branches of the government
3. To collect, when necessary, supplemental information whether at its own instance or at the
request of any governmental agency and official from other various sources.
4. To integrate, analyze process and disseminate to authorized governmental agencies and
officials studies.

Principles of intelligence

General- “Principle” are fundamental guides to action, broad statements of truth from which
others are derived.

Criteria

Universality of application- it should apply to as many phases and aspects of intelligence as


possible. It should guide not only the production of intelligence but also the concomitant
activities essential to the process as well as the organization and though and actions of the
individual composing it.

It must be broad- truly a general rule. It should form the basis for a formulation of corollary and
subsidiary guides it must be a formulation of corollary and subsidiary guides.
It must be important, indeed essential, to intelligence – if a guide is truly important and essential
then its violations should bring its own immediate penalties

They must not be mutually exclusive; instead each should complement the other

Doctrine
There exist an essential unity between knowledge and action; that knowledge enhances the
effectiveness of action- and minimizes the chances of error

The principles

Objectivity – in Intelligence, only the well guided succeed. It Is a basic intelligence concept that
there be unity between knowledge and action. It follows therefore the intelligence should interact
and condition the decision; In intelligence must be adapted to the needs of the decision; it is both
giver and taker. Action or decision is planned by knowledge and guided by it at every step

Interdependence- Intelligence is artificially subdivided into component elements to insure


duplications and to reduce the overall task or manageable sizes. Nevertheless, each subdivision
remains as essential part of unity contributes proportionately to the end result; possesses a
precise interrelationship; and interacts with each other so as to achieve a balanced and
harmonious whole.(No one man can fulfill but no domination, and spirit of working together.)

Continuity- Intelligence must be continuous. It is necessary that coverage be continuous so that


the shape of what happens today could be studied in the light of what was happened before,
which in turn would enable us to predict the shape of this to come

Communication- Intelligence adequate to their needs must be communicated to all the decision
makers in manners that they will understand and form that will permit its most effective use.

Usefulness- Intelligence is useless if it remains in the minds, or in the files of its collector or its
producers. The story must be told and it must be told well. The story must be convincing and to
be convincing it must not only be plausible or factual but its significance must be shown.

Selection- In intelligence should be essential and pertinent to the purpose at hand. Intelligence
involves the plowing through a maze of information, the considering and innumerable number of
means or of picking the most promising of a multitude of leads The requirement of decision-
making covers very nearly the entire span of human knowledge. Unless there is selection of only
the most essential and the pertinent, intelligence will go off in all direction in one monumental
waste of effort

Timeliness- Intelligence must be communicated to the decision maker at the appropriate time to
permit its most effective use. This is one of the most important and most obvious, for
Intelligence that is too soon or too late are equally useless. Timeliness is one principle that
complements all the others.

Security- Security is achieved by the measures which intelligence takes to protect and preserve
the integrity of his activities if intelligence has no security, it might be as well beings run like a
newspaper

THE INTELLIGENCE OFFICER

Attributes Common to Intelligence Directors


1. Exceptional organizing ability
2. Ability for intelligence work
3. Prodigious memory and a sense of history
4. Broad Knowledge of many subjects, to include complex technical matters.
5. Insatiable curiosity
6. What might be called “ intellectual ruthlessness and cold cynicism”

General Qualification of an Intelligence Officer


1. College graduate
2. Passed prescribed test for intelligence officer (IO)
3. Passed background investigation(BI)
4.Good moral Character
5. Loyal to Republic of the Philippines
6. No undesirable traits such as gambling, excessive drunkenness, indebtedness, drug addiction,
etc.
7.Passed by screening committee

Desirable Qualities of an Intellence Officer


1. Knowledge ability- Intelligence and mental capacity
2. Perceptive about people- Good judge of character
3. Flexibility/ Adaptability- able to work with others, even under difficult conditions.
4 Can distinguish between fact and fiction; between essentials and non-essential.
5.Possess inquisitiveness or an inquiring mind
6 Have ingenuity- able to improvise, looks for solution
7. Observant and alert-able to improvise looks for solutions
8.Able to express ideas clearly, briefly and interestingly
9.Discipline-susceptibility to operational control; good sense of time
10. Patient and hardworking
11.Good memory
12. Integrity
13.Objectivity- should not carried away by prejudice or bias
14. Discreet- knows when to keep mouth; does not brag about what he knows or important
connection

General Activities in Police Intelligence

Strategic Intelligence-The intelligence information which primarily long range in nature with
little practical immediate operation value.

Line Intelligence-which is of an immediate nature and necessary for more effective police
planning and operation

National Intelligence- it is the integrated product of intelligence developed by all the


governmental branches. departments concerning the broad aspect of national security and policy.
It is concerning to more than one department or agency and it is not produced by single entity. It
is used to coordinate all the activities of the governmental in developing and executing integrated
and national policies and plans.

Counter Intelligence- Phase of Intel covering the activity devoted in destroying the effectiveness
of hostile foreign activities and to the protection of info against espionage, subversion and
sabotage.

Undercover Work- is an investigative process in which disguises and pretext cover and deception
are used to gain the confidence of criminal suspects for the purpose of determining the nature
and extent of any criminal activities that maybe contemplating or perpetuating.

Functional Classification of Police Intelligence

Criminal Intelligence (CRIMINT)- production of intelligence essential to the prevention of


crimes and the investigations, arrest , and prosecution of criminal offenders.

Internal Security Intelligence (INSINT)- refers to the knowledge essential to the maintenance of
peace and order.

Public Safety Intelligence (PUSINT)- refers to the knowledge essential to ensure the protection
of lives and properties

Forms of Intelligence

Sociological Intelligence-deals with the demographic and psychological aspects of groups of


people
*Population an manpower
*Characteristic of the people
*Public opinion- attitude of the majority of the people towards matter of public policy
*Education-based of literacy rate

Biographical Intelligence-deals with individual’s personalities who have actual possession of


power.

Armed Force Intelligence- deals with armed forces of the nation

*Position of the Armed Forces Constitutional and legal basis of its creation and actual role
*Organizational structure and territorial disposition
*Military manpower recruitment.
*Order of Battle

Geographical Intelligence-Deal with the progress of research and development as it affects the
economic and military potential of a nation

TYPES OR KINDS OF INTELLIGENCE

Common to all intelligence activities are

STRATEGIC INTELLIGENCE-An intelligence data that are not of an immediate value. It is


usually descriptive in nature accumulation of physical description of personalities, modus
operandi. It does not have immediate operational value but rather long range that may become
relevant to future police operation.

LINE INTELLIGENCE – It is the kind of intelligence required by the commander to provide for
planning and conduct tactical and administrative operation in counter insurgency. This pertains
to knowledge of People, Weather, Enemy and Terrain (PWET) used in planning and conducting
tactical and administrative operation in a courier insurgency.

Intel information to be determine in Line Intelligence are:

. PEOPLE – Living condition of the people, Sources of income, Education of the people,
Government livelihood projects, Extent of enemy influence to the people

. WEATHER – Visibility, Cloudy, Temperature, Precipitation (rain), Wind

. ENEMY – Location of the enemy, Strength of the enemy, Disposition, Tactical capability,
Enemy vulnerability

.TERRAIN – Relief and drainage system, Vegetation , Surface material, Man-made features

Five Military aspects of terrain are:

. Cover and concealment

. Obstacle

. Critical key terrain features

. Observation and fields of fire

. Avenues of Approach

COUNTER INTELLIGENCE (CI)

This kind of intelligence covers the activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of info against espionage, subversion and sabotage.

Three Activity of CI

1. Protection of information against espionage.


2. Protection of personnel against subversion
3. Protection of installations and material against sabotage

Two General Types of CI

Passive Measure – are those measures, which seek to conceal info from the enemy.
Active Measure – are those measures, which seek actively block the enemy’s efforts to gain info
or engage in espionage, subversion or sabotage

COUNTER INTELLIGENCE is also known as Negative Intelligence. Negative Intelligence is


a generic term meaning three different things:

1. Security Intelligence – means that the total sum of efforts to counsel the national
policies, diplomatic decisions, military data, and any other information of a secret
nature affecting the deny information to unauthorized persons. Its effort is to deny
information to unauthorized persons by restricting to those who are explicitly
authorized to posses it.
2. Counter Intelligence – is the organized effort to protect specific data that might be of
value to the opponent’s own intelligence organization.

Some of its functions are:

. By censorship of the following – Correspondence, Broadcast, Telecast, Telephone


conversations, Telegrams and cables, etc

. It aims to prevent the dissemination of any information that might aid an opponent

. Maintenance of files of suspect

. Surveillance of suspects

.Mail reading, Wire tapping and recording

.Infiltration of the enemy intelligence organized to procure information about its method,
personal, specific operation and interest.

3. Counter-Espionage – In counter-espionage, negative intelligence becomes a dynamic


and active effort. Its purpose is to investigate actual or theoretical violation of
espionage law, to enforce those laws and to apprehend any violators. It is a job to catch
a spies. It is basically a police function.

According to Sir Bassil Thomson – former chief of Scotland Yard Criminal Investigation
Division:

“A basis requirement of the secret agent is disguise himself and his mission. Much of his
training and basic skill is dedicated to concealment. He is supposed to be supplied with a
foolproof cover story and good documents. He must be a man of exception ability or else he
would not be chosen for this intricate job. The trapping of the dark intruder is a formidable talk.”

The aim of Counter-Espionage is to locate the enemy, to identify the enemy, and to neutralize the
enemy.

FIVE IMPORTANCE Of Effective CI


1. Denies info to the enemy

2. Reduces the risk of a command

3. Ands in achieving surprises

4. Increases the security of the command

5.Decreases the enemy ability to create info about our forces

Five Categories of CI Operation

1. Military Security – it encompasses the measures taken by a command to protect itself


against espionage, enemy operation, sabotage, subversion or surprise.

Examples are:

Secrecy discipline

Special safeguarding of classified info.

Security of troop movement

Special handling of weather & escapes

Counter subversion with in the armed forces

Tactical measures in combat area

2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for CI control at point of entry and departure, international
borders or boundaries

Examples are:

Security screening and control of frontier Security control of merchants, seaman and crew of
commercial aircraft, Security control of frontier crossing point, Security control of seaports
3. Civil Security – it encompasses active and passive CI measures affecting the non-military
nationals permanently or temporarily residing in an area under military jurisdiction,

Examples are :

Systematic registration of civilians and aliens Control of circulation, Curfew,

Surveillance of suspected political organizations

Security screening of labor, Issuance of passes and permits

Control of internal commerce

4. Censorship – it is the control and examination of the Civil, National, Armed forces, Field
press, the POWs.
5. Special Operations – counter subversion, sabotage and espionage.

What is CI Operation?

CI operation is also called CI Investigation. It is an activity that constitutes that value of the CI
workload, worldwide and includes specific investigation of individual and incidence which for
the most part are conducted in an overt but discreet manner.

Three Categories of CI Measure

Denial Measure – Secrecy discipline, Document security, Camouflage and concealment,


Communication security, Military censorship, Counter reconnaissance

Detection Measure – PSI, Security tag or pass card, Challenge or password,


Reconnaissance

Deception Measures – Ruse – use of escape and evasion, Dummy position, Fabricated info

CI Branch and Functions

CI MISSION

1. Detection – identify the threat


2. Evaluation – analyzing the data plan
3. Counter action and Prevention – recommend counter measures in neutralizing the target.
Categories of CI Operation

Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use human
sources to collect information or to conduct sabotage and subversion which includes CI Special
Operations, Liaison, Counter Security, CI Screening, CI Screening

Counter Imagery Intel (IMINT) – includes action taken to determine enemy SIGINT and
related EW capabilities and activities. These actions include surveillance radar, photo thermal

And infrared systems. Successful; counter – IMINT operations rely heavily on pattern and
movements analysis and evaluation.

Counter Signal Intel (SIGINT) – determine enemy SIGNINT and related EW capabilities
and activities, access friendly operations to identify patterns, profiles and develop, recommend
and analyze counter measures.

Functions of CI Personnel

1. Identify insurgent indicators


2. Construct a database on insurgent infrastructure.
3. Analyze current intelligence infrastruclure trends.
4. Recommend CI targets for exploitation
5. Recommend specific operations on specific CI targets.
6. Recommend population / resources control measures
7. Ensures installation base security
8. Conduct liaison with other agencies.

CHAPTER THREE
THE INTELLIGENCE CYCLE

Intelligence is different from mere information-processing. It’s not the sort of brain
intelligence, or small-letter i intelligence that psychologist study.Intelligence is “secret
knowledge of an enemy, the king of knowledge which stands independently of the means
by which it is obtained and the process by which it is distilled”.

Intelligence is the same as “foreknowledge, a kind of prophecy-like craft which is


always on alert, in every part of the world, toward friend and foe alike” Intelligence is
never an end in itself, but always directed toward other ends, such as winning a war,
coming out ahead of the competition, or aiding the investigation of crime, in which case
the title “intelligence analyst” is practically synonymous with “Crime analyst”

Intelligence is also a social science, since it tries to analyze and predict political,
economic, and social behavior. Social Science is value-free, and intelligence is somewhat
similar in trying not to be completely partisan or political. Like criminology, intelligence
tries to be policy-relevant to a government’s formulation and implementation of policy to
further its national security interest and to deal with threats from actual or potential
adversaries”.

Intelligence can be though of as a process (the means by which secret information is


collected, analyzed, and disseminated), as a product (the analyses, reports , and briefings
that are useful or actionable), and an organization(a collection of units or agencies that
carry out intelligence work). As a process intelligence is illustrated on the next page:

The Intelligence Cycle


Planning and Supervision of collection Effort
1. The IO must have a thorough knowledge of the available sources of information, the
collecting agencies and type of info the latter can provide.
2.He must understand the operations of the command in order to provide the particular Intel
required for success
3. He must have a thorough knowledge of the tactics, organizations, and characteristics of the
enemy.
4. He must be especially competent in the fields of acquisition of operations.
5.He should also have a basic understanding of he weather elements and their influence upon
personnel, material and terrain

5 Successives Steps Comprising the Collection Planning


1. Determination of the intelligence requirements
2. Determination of priority, which will be assigned, to these intelligence requirements
3.Balancing the intelligence requirements with available collection agencies to arrive at a
equitable allocation of collection efforts
4. Selecting the collecting agency to be employed and the issuance of collection directives.
5. Supervision and inspection to insure that the collection directives are carried out properly

THE PHASES OF THE INTELLIGENCE CYCLE

PHASE I-Direction the Collection Efforts


(Determination of Intelligence Requirements)

What is the priority Intelligence Requirements (PIR formerly Essential Element of


Information (EEI)?

It is an item of intelligence or information of the characteristic of the area of operations


and the enemy, which the commander feels he needs before he can reasonably arrive at a
decision.

Evaluation based on the existing situation-current domestic and foreign situations, national
objectives; there is no exact formula; judgment and experience are necessary.

IR-Information Requirement regarding the enemy and its environment, which needs to be
collected and processed in order to meet the PIR of a Chief or Head.
Categories of Intelligence Requirements

In relation to use

1. Executive- intelligence required by executive governmental and military commanders;


The executive requirements are the basis for decision and policy making

2.Contributory- the intelligence required to complete the staff process – make staff plans
and estimates that contribute to the decision and policy making.

3.Operational- additional intelligence required in planning and carrying out effectively the
decision or policy and carrying out effectively the decision or policy announce. Decisions
and policy require implementation.

4. Collateral- higher or adjacent echelons of the government or military establishment may


require info.

By type

1. Basic-general reference materials for use in the planning regarding the enemies, area of
operations, capabilities- static comprehensive
2.Current-temporary in nature and narrower in scope. Info required to scope with the current
objectives.
3.Estimative Intel-determines the future courses of action; required by the executives to plan
future military operations and policies

Formulation of Intelligence Requirements


1. What are their capabilities and vulnerabilities
2.What are the physical Characteristics of the probable area of operation?
3. What major polcies plan and decision must be made in the near future?
4. What step must be taken to preserve the security of the near future?
5.What is the information required by the higher,lower or adjacent echelons within the
Government or Armed forces?

Determination of the Priority

It is necessary to decide which items of information are more important –a system of priority
is need; critical importance and lesser importance” EEI- highest priority Intel requirements:
indicates the Intel requirements essential to planning.

Selection of Collecting Agencies


1.List all available sources; exploitation of collecting agencies.
2. Collection will be assigned in accordance with capabilitie;
3. Collection directives preparedonce the proper collecting agency has been selected to
exploit a particular source;
4.Collection directives do not limit the activities of the collecting agency;
5.Criteria for the selection of collecting agency ; suitability, capability, confirmation,
timeliness and balance.

Purpose of the Collection Plan

1.To insure logical and orderly analysis of the intelligence requirements.


2.To establish a workable collection scheme based on the analysis of the intelligence
requirements.
3.To provide definite and precise directives to collecting agencies.
4.To avoid possibility of omission, conflict or unnecessary duplication of collection effort.

Steps in Developing a Collection Plan


1.List the requirements in the order of priority
2.Break the requirements into indication- any evidence of actual or potential enemy activity
or characteristic of an area of operation enemy activity or characteristic of an area of
operation, habitual activities- need experience.
3.Fir those indications into existing situations- critical clues, security measures, attack,
defense, etc . . .
4. Basis for development for specific collection directive designed to exploit to the fullest the
collection directives, guide doesn’t limit.
5.Selection of Collecting Agencies- criteria for selection- suitability, capability,
confirmation, timeliness and balance Designation of particular time and place that the
required information is to be reported

PHASE II-Collection of information


1.Determine collecting agency
2.Send orders or request
3.Supervise collection effort
4.Use tools or technique in collection
5. Ensure timely collection

Factors in choosing collection Agent


1.Capability – agents placements or access to the target
2.Multiplicity-more agents
3.Balance
Methods of Collection
1. Over- open
2.Covert- secret

Collecting Agencies
1.Government Agencies/ Offices-variety information
2.Intelligence units/ agencies
3. Organizations

Trade crafts
1.Photography
2.Investigations/ Elicitation/ Interrogation
3. Surveillance
4.Sound Equipment
5.Surreptitous Entry- keys and locks
6. Use of an artist
7.Communication

PHASE III-Processing the Collected Information

Steps in Processing Raw Information

1.Collation-Organization of raw data and information into usable form; grouping similar
items of information so that they will be readily accessible.

2.Recording-is the reduction of info into writing or some other form of graphical
representation and the arranging of this info into writing or some form of graphical
representation and the arranging of this into groups of related ites.
-Police log book and Journal
-Intel-work sheet- Intel Fiels
-Situation Maps-Rouges Gallery
-MO Files

3.Evaluation-examination of raw information to determine intelligence value, pertinence of


the information, reliability of the source and agency, and its credibility or truth of
information.

Evaluation- is the determination of the pertinence of the information to the operation,


reliability of the source of or agency and the accuracy of the info.
Evaluation determines the follow:

-Pertinence-does it hold some value to current operation?


It is needed immediately
-Reliability- judging the source of information by the agency
-Credibility-truth of information; is it possible for the reported face or event to have taken
place? Is the report consistent within itself? Is the report confirmed or corroborated by infor
from different sources or agencies?If the report doesn’t not agree with info from other
sources

The Evaluation Guide

Evaluation of Reliability
A.COMPLETELY RELIABLE
B.USUALLY RELIABLE
C.FAIRLY RELIABLE
D.NOT USUALLY RELIABLE
E.UNRELIABLE
F.RELIABILITY cannot be juidged

Evaluation of Accuracy of Item


1.Confirmed by other sources
2.PROBABLY RUE
3.POSSIBLY TRUE
4.DOUBTFULLY TRUE
5.IMPROBABLE
6.TRUTH CANNOT BE JUDGED

Evaluation of Source Of Info


T- Direct Observation by Cmdr/Chief of Unit
U-Report by DPA or Resident Agent
V-Report by PNP/AFP Troops
W-Interrogation of Captured Enemy
X-Observation of Gov’t/ civilian employee
Y-Member of the populace
Z- Documentary
Other parts of Processing the Information

Interpretation- it is establishing the meaning and significance of the information. It involves


the following activities>
Analysis-shifting and isolating those elements that have significance in light of the mission
or nation objective.
Integration-combining the elements isolated in analysis and known information to form a
logical picture or theory.
Deduction-the formulation of conclusions from the theor developed, tested and considered
valid- determination of effort and meaning of the information.

PHASE IV-Dissemination and Use


Processed information are disseminated through Annexes, Estimates, Briefing, Messages,
Reports, Overlays, Summaries

The criteria that must be observed in dissemination are:

Timeliness-must reach the users on time to be of value. It must be disseminated in


accordance with the urgency and must reach the use in sufficient time to be use.
Propriety-The message must be clear, concise and complete, as well as in the proper form for
the receiver to readily understand its contents. It must be disseminated to the correct user,
presented in a form that lends itself to immediate use and distributed by the most effective
means appropriate to both time and security requirements.

Methods of Dissemination
1.Fragmentary orders from top to bottom of the command
2.Memorandum,circulars,special orders
3.Operation order, oral or written
4.Conference-staff members
5. Other report and intelligence documents
6. Personal Contact

Who are the users of intelligence?


1.National leaders and military commanders- formulation and implementation of nation
policies
2.Advisory and Staff-Preparations of plans and estimates
3.Friendly nations or other branches of the armed forces.
4.Processor-basis for evaluation and interpretation
CHAPTER FOUR

INFORMATION COLLECTION AND ITS SOURCES

INFORMATION

All evaluate materials of every description including those derive fro observation, reports,
rumors, imagery, and other sources from which intelligence in produced,

Information is a communicated knowledge by others obtaining by personal study,


investigation, research, analysis, observation. The use of modern gadgets in intelligence and
other things and material that possess or contain a desire information or knowledge.

Two General Classifications of sources of information:


1.Open Sources-99% of the info collected are coming from open sources
2.Close Sources-1% of info from close sources.

Overt Intelligence- is the gathering of information or documents procured openly without regard
as to whether the subject or target become knowledgeable of the purpose.

Open Sources: Includes information take from

-Enemy Activity- POW- Civilians – Captured documents


-Map- Weather, forecast, studies, report – Agencies

Covert Intelligence- is the secret procurement of information, which is obtained without the
knowledge of the person or persons. Safeguarding vital intelligence interest.

Close Sources: Information are usually take through


-Surveillance- Casing-Elicitation
-Surreptitious entry- Employment of technical means (Bugging and Tapping device)
-Tactical Interrogation-Observation and Description

Other sources of information: Over and Covert

-Routine patrol and Criminal investigation


-Use of informants and Interrogations
-Search and seizures and Cordon and scratch
-Checkpoints and Police public relations activities
-Coordination with law enforcement agencies
-Inmates of various city jails, national penitentiary, military stockade
-Statistics

PERSONS AS SOURCES OF INFORMATION

Informant Net- It is a controlled group of people who worked through the direction of the agent
handle. The informants, principal or cutouts supply the agent handler directly or indirectly with
Intel information

Informants(Asset)-People selected as sources of a information, which could be voluntary, or in


consideration of a price.

-Informant-refers to a person who gives information to the police voluntarily or involuntarily


without any consideration
-Informer- those who give information to the police for price or reward

Types of Informants

1.Criminal Informant- an informant who give information to the police pertaining to the
underworld about organized criminals with the understanding that his identity will be protected
2.Confidential Informant-is similar to the former but he gives information of the law to includes
crimes and criminals
3.Voluntary Informant- a type of informant who give information freely and willfully as a
witness to a certain act
4.Special Informant- those who gives information concerning specialized cases only and it is
regard a special treatment by the operatives (ex:teachers, businessmen)
5.Anonymous Informant-those who gives information through telephone with the hope that the
informant can not be identified

Sub-type of Informant
1.Incidental Informant-a person who casually imparts information to an officer with no intention
of providing subsequent information
2.Recruited Informant- a person who is selected cultivated and developed in to a continuous
source of info.

Categories of Recruited Informants:


1.Spontaneuos or Automatic Informant-Informants who by the nature of their work or position in
society have a certain legal, moral or ethical responsibilities to report info to the police
2.Ordinary run of the Mill Informants- Informants that are under the compulsion to report info to
the police
3.Special Employee-informants who are of a specific operational failure

Other classification of Informant


-Automatic-Penetration
-Full time
-Rival-Elimination
-False Informant- Frightened Informant
-Self-aggrandizing Informant
-Mercenary Informant
-Double Crosser Informant
-Woman Informant
-Legitimate Informant

Common Motives of Informants


-Reward
-Revenge
-Fear and avoidance of punishment
-Friendship
-Patriotism
-Vanity
-Civic-Mindedness
-Repentance
-Competition
-Other motives

Basic to Informant Recruitment


1.Selection- it is particularly desirable to be able to identity and recruit an informant who has
access to many criminal in-group or subversive organization. Wide access is probably the single
most important feature in the consideration of recruiting the potential informant

2. Investigation- the investigation of the potential informants that has tentatively identified as a
“probable” must be as thorough as possible. It must establish possible existing motives as to this
person might assist the police intel community. Failure to do so will deny this office who must
perform the approach and persuasion phase with little more that a guess. If necessary,conduct
complete background investigation(CBI)

3. Approach- approach must be done in a setting from which might include pleasant
surroundings, perhaps a confidential apartment, completely free form any probability of
compromise, preferably in an adjacent city or a remote area foreign to the informants living
pattern.

4.Testing-the testing program should begin,of course, with the limited assignment, with a gradual
integration into the more important areas. The occasional testing of an informant should continue
through the entire affiliation

Factors considered in Informant Recruitment

Sex – Health – Age- Built- Educational- Ability- Personality

General Treatment of Informant

1. A void the use of derogatory terms in referring to informants of any type


2. A void disclosing the identity of he informant which will in most cases ruin his potential
3.Protect the interest of the informant, remember an investigator is usually just as good as his
sources of information
4. Consider all information from known to unknown information as valuable until proven
otherwise
5. Be non-committal of the value of the info received
6.Express appreciation for all information received regardless of its values
7.Keep appointment on time even though informant may not
8. Don’t get over anxious, be patient. Take your time
9. Keep control of the investigation
10. Keep what you know to yourself, don’t become an informants informant

THE COLLECTION OF INFORMATION

Information is endless in terms of quantity, but is most exploitable when there is some
“schema” which organizing “categories of interest” by the kinds of things which can lend
themselves either to patterns, series or trends ( which can be easily , data analyzed ) or detailed
specifics like names, numbers, or addresses (which make the data amenable to line analysis)

Identification is important, as one often runs into the problems of stolen identities, aliases and
false IDS In intelligence work. Accuracy in numbers is also important, as,for example, in the
assessment of property value, smuggled quantities, costs of crime, as well as addresses.
Suspicious incidents are a challenging category one must learn to master with greater
consideration than is ordinarily given to such things. Given these challenges, then it is no wonder
that modern intelligence gather is usually an and human face, and it has to be a bit
overboard,shall we say,because the gathering or collection of intelligence is nothing more than
stealing someone’s secret which they are closely guarding. It is done strategically, which means
according to some direction, your opponents and allies are also most likely doing it and it is done
non-transparently, or in a secret. The policymaking process which is informed by intelligence
may be transparent, but the intelligence gathering or collection process rarely is disclosed. The
first requirement is that your target must have something worth stealing. If they don’t have
anything worth stealing, then all you’re doing is snooping or doing research. In business, this is
known as the difference between competitive intelligence and market research.

The military takes intelligence gathering rather seriously, as it is almost always collected for
the purpose of assessing risks and hazards in preparation for the order of battle (IPB, or
Intelligence Preparation of Battlespace). The most important thing to remember is that there is no
such thing as intelligence for intelligence sake. The who purpose of gathering information about
other’s secret and processing. it into intelligence is to provide your leaders or policymaker with
options to make policy more effective and efficient. There is no point in tasking, collecting,
analyzing, and distributing intelligence products if there’s no policy, issue , or anticipated issue
on the table.

There are five different categories of intelligence:


1 “ Current” Intelligence looks at day to day events
2 “Estimative” intelligence looks at what might happen
3. “Warning” intelligence gives urgent notice that something might happen
4. “ Research” intelligence is an in-depth study of an issue
5. “Scientific and technical” intelligence is information on foreign technologies

There are five different collection “ disciples” of intelligence:

HUMINT-Human Intelligence; the collection and processing of raw intelligence from a


clandestine agent working in the field

IMINT- Imagery Intelligence: the collection, mapping, and interpretation of photographs from
aerial units or satellites Sometimes this speciality is also called PHOTINT

MASISNT-Measurement and Signature Intelligence; a collective term bringing together


disparate elements that do not fit within the definition of Signals Intelligence, Imagery
Intelligence, or Human Intelligence. This category usually consists of acoustic intelligence ;
radar intelligence; nuclear radiation detection; infrared intelligence; electro-optical intelligence;
radio frequency; unintentional radiation; materials, effluent and debris sampling; and electro
optical and spectro-radiometric sources MASINT also refers to Signals or Imagery Intelligence
data streams which require specialized processing. As a finished product, MASINT is used
primarily to support military commanders and other users on a national or tactical scale.
OSINT-Open source Intelligence ; more than just newspaper clippings and the internet, OSINT
involves inventories of the full range of accessible, acknowledgeable and unclassified private
sector information sources. Some 80% of OSINT is not online, not available in English, and not
available in the U.S the purpose is to produce Just in time Enough intelligence and the process
involves discovery, discrimination, distillation, and delivery

SIGINT- Signals Intelligence;consisting of 4 subfields; (1) communications intelligence


(COMINT), which deals with electronic signals which contain speech or text; (2) electronics
signals analysis, primarily ELINT and RADINT, which deal with emitters such as beacons,
jammers, navigational signals, and radars, with the former forming electronic orders of battle and
called tactical ELINT; (3) foreign instrumentation signals intelligence (technical and intelligence
information derived from the collection and processing of foreign telemetry, beaconry, and
associated signals), which used to be called ELINT and also deals with PROFORMA (computer-
based data); and (4) signals conversion analysis, which deals with information derived from the
collection and processing of nonimagery infrared and coherent or non coherent light signals
hidden by such techniques as spectrum spreading or frequency-hopping.

Sometimes the term COMINT is used and treated as a subset of SIGNIT for Communication
Intelligence when the enemy simply passes unsecure information via radio, wire, or other
electromagnetic means, but there may be some processing of encrypted information, however
transmitted. There are a lot of job titles involved in the whole process. For example, interception
comprises teams for search, intercept, operator identification signal analysis, traffic analysis,
crypto analysis, decryption, study of plaintext, and the fusion of these processes and the
reporting of results. Different agencies divide up the interception tasks differently, as they do
with the processing of unencrypted written communications, press and propaganda broadcasts. If
something is unencrypted, then COMSEC, or Communications Security (like OPSEC), comes
into play; which involves measures to deny persons information derived from the national
security or any authenticity of a communications. ELINT since 2001 is generally only involved
when something is encrypted (consistent with the Unified Cryptological Architecture and NSA’s
mission detection of emissions emanating from atomic detonation or radioactive sources.
FININT, or financial intelligence, is a hard to-classify, newly emerging discipline, practiced
primarily by a Treasury Department agency that should most probably be considered a subset of
SIGNIT.

The Importance of Human Assets

People are the most important source of information especially in a worldwide scale of
intelligence collection.

Spies are the basic collection platform for any well-rounded intelligence system. Much of
intelligence gathering at the clandestine level is a lot like undercover police work. Like the
policeman’s attitude toward the “stool pidgeon” or “snitch,” it’s important to note that to
intelligence professionals (case officers or case handlers), an “agent” is a foreign national, an
informant, someone committed to treason and “spying” on his or her own country. The theory
behind working undercover is that it removes any impediments to acquiring information, and
allows a number of activities such as surveillance, eavesdropping, use of informants, and
espionage. It typically involves an assumed identity for a derined and considerable amount of
time.

Undercover work allows someone to circulate in areas where they are not ordinarily welcome.
The jobof anyone working undercover is to “make cases,” or in other words, to gather enough
information to enable a successful outcome, remembering that the goal is to be a hunter, not a
gatherer. The first rule of clandestine intelligence gathering is to go after the big game. You want
to payoff to be big. You want the largest impact impossible because you’ve maximized your
gathering operations as dangerously as possible. A distinction is usually made between agents
who are undercover and those who are under deep cover. This is sometimes referred to as “legal
v illegals” although more common terminology distinguishes between “official” and “unofficial”
cover. Official cover refers to disguising an intelligence officer as an attaché or liaison officer at
an embassy or overseas post. Nonofficial cover refers to someone in deeper disguise who is
acting like a businessman, journalist, tourist, or college professor on an exchange program.
Those people on nonofficial cover make up what is called the “NOC list”(for Nonofficial Cover),
and the NOC list is a closely guarded secret because NOCs are either high level principal agents
or staff employees under a variety of covers. There is usually little to no cover working out of an
embassy because everyone knows embassies are a hub of espionage. If a case officer under
official cover works out of an embassy, they can expect extensive surveillance of their every
move, so usually such officers restrict their recruitment activities hand, NOCs often have dual
nationality, and require handling by an inside case officer, and emply covers that distinguisher a
“cover for status” (the legitimacy to live and work in a particular country) and “cover for action”
(the aliases or identifies which allow operations to be carried out).

Stages of Undercover Work

THE EARLY STAGES- A typical pattern is to bring someone in as the girlfriend or boyfriend of
an infiltrator, and then distance themselves from the infiltrator. Once it’s clear to all the parties
involved that the undercover agent is single again, another undercover agent is brought in as the
boyfriend or girlfriend of the first undercover agent. This allows the gathering unit to work as a
team, which is better for safety. The initial targets are usually the big leaders of a group that has
been infiltrated, but often the undercover operatives have settle for going after the small fries
accumulating information and case material as they go. A supervisor or case officer usually
makes the decision about whether enough important information has been accumulated to decide
if and when the operation should be terminated, and a system will have usually been put in place
for the operative to turn over evidence on a systematic basis at one time
THE MIDDLE STAGES- some agents are allowed to create their own cover stories or legend,
and this will depend upon the type of behavior involved
(drugs,contraband,gambling,”subversive” groups terrorism). The need maybe arise for false
documents or computer records for such agents. This is not ordinarily done with minor cases.
The need may also arise for creating various kind of setup situations in which the agent “proves”
their criminality or loyalty by engaging in a staged showdown with police or a brush with the
law. The staged encounter may also be an opportunity to supervise the agent. Since supervision
and continued surveillance becomes more difficult as the operation progresses over time, agents
are sometimes busted to give a progress report and let management know if they need more or
less supervision.

THE LATE STAGES- some deep cover agents lose perspective and go native so agencies have
policies in place to help avoid this. Most agencies will call someone in who has been doing this
kind of work too long so that they can salvage their usefulness as a regular employee. Danger,
temptation, and paranoia play roles in the late stages, and it is always possible the person
becomes a rogue agent where one of the hallmarks of this is that they arrange their own private
surveillance and protection.

Recruiting Infiltrators

The smartest and safest way to steal anything is to recruit someone who can steal it for you and
who never knows your true identity. This works for just about anything you want to do that’s
illegal and you don’t want to get caught for it. One may balk at the ethical implications of this,
but once someone is properly recruited, you can use them for just about anything . They can be
used for sabotage, deception, covert operations, assassination, or just about anything.

Many intelligence operations are build on lies, deception, and using people, generally foolish
people. Using people generally follows a pattern.

1. the recruit doesn’t realize what they are going to be doing.


2. The recruiter fools them into thinking they aren’t doing anything so terrible
3. The recruiter traps them in situations where they have no choice but to whatever they’re told
to do

Employees of Intelligence services don’t consider themselves spies; they consider themselves
recruiters of spies . Sometimes, they sneak into foreign countries and do spy work themselves,
but they still primarily think of themselves as case officers, supervisors, or handlers. In actual
practice, there is a vast bureaucracy of people backing up the spy and their handler, or case
officer. In any clandestine operation, the upper echelon of a spy bureaucracy consist of
1. A regional desk officer, who oversees all HUMINT operations in that region of the world;
2. Watch officers, who staff a 24hour crisis center;
3. A counterintelligence officer, who oversees clandestine meetings between officer and agents;
and
4. A report officer, who acts as a liaison between officers in the field and analysis at headquarters

The spies themselves are mostly considered traitor or fools and tools come in an amazing
variety of forms:

1. People with loose lips, careless security attitude(inadvertent spies)


2. People fleeing the rule of their own country (defectors)
3. People looking for a source of extra income (walk-ins)
4. People who have made a plea bargain with law enforcement (undercovers)
5. People tricked, bribed, or blackmailed (recruits)
6. People caught spying against you (double agents)

Spies are usually classified as PRIMARY or ACCESS agents. A primary agent is someone
with actual access to the information you need. An access agent knows somebody who’s is
more important, and serves as a gateway or portal to others. Recruiting spies is all about
deception. Case officers regularly deceive spies as much as spies deceive the people they spy
on. Those who recruit and manage spies. However, must always come off as honest and
sincere friends, and tell believable lies. Much of tradecraft is the pursuit of skill at lying.
Here’s one of the most standard deceptions:

The False Flag- the case officer pretend to hold a nationality or be a person whom the target
expects to be friendly to the target’s own interest. Some example (1) a Chinese businessman
thinks he’s working: for the Republic of China when he is really spying for Taiwan; (2) a
student in Lima thinks he’s passing documents to Cuban intelligence when it’s actually the
CIA.

Three resources that a recruiter will need, and plenty of it are: money, drugs. And sex.
Money is generally used to attract a recruit’s attention and sooner or later, it’s all going to
come down the intelligence server; and at other times, activities will be self-financed. Drugs
are generally used to service or create an addiction which is then used for blackmail
purposes, if appropriate. Alcohol is the drug of choice, buy anything that will build rapport
and encourage talking is suitable. Sex almost never involves the case officer engaging in it
with the recruit. Instead, the case officer uses prostitutes paid to pretend being innocent
lovers, capitalizes on an ongoing affair, uses another recruit, or an innocent amateur.

Steps of Recruiting Infiltrators


PHASE ONE consists of Spotting, evaluating, and actual recruiting. PHASE TWO consist of
Testing, Training, Handling and Terminating the recruit.

SPOTTING means looking for people who have access. Handlers look for angry or desperate
people in mid-level management position. The best prospects are the ambitious and
disgruntled. Secondarily, handlers look for clerks, secretaries, or “invisible” people in the
organization. Often, they have personal problems or vice that can be worked as well as anger
and desperation. In many cases, the case officer will have to settle for an access agent who
can plant electronic surveillance devices

RECRUITING-takes the form of meeting and getting to know the target. A close, personal
relationship is cultivated, and trust is built. It starts with small, personal favors, an increase in
rewards and then the final step of asking someone to clearly betray their employer,
governments, coworker, lover, etc. Blackmail is used as a last resort if psychological ploys
fail.

In the advance second phase, TESTING means checking your informant’s information
against known facts. Regardless of the reason for error, if a spy doesn’t produce credible
information they should be threatened with termination at this point, or dropped as a source.
Spies are also often “fluttered” at this point, which means that they are given a polygraph
examination, or interrogated.

TRAINING- involves teaching the spy how to use specialized equipment and codes. One of
the other important things the spy will want training in is escape and evasion tactics. Training
should also involve coaching the person in how to spend money.

HANDLING- is a term short for “psychological handling” which usually involves the
passing of control from yourself to another, usually superior, case officer. The handing off of
spies is done for several reason: so they don’t get too close to their original recruiter; to make
them feel they are getting better protection; and to make them feel they are getting promoted.
Often, it has been your agency which has generated some fear, convincing the spy that their
mother or other relative need protection. Spies can be promoted all they way up to Admiral
or General since its only honorary rank.

TERMINATON-is always done by the agency. The most common reason given for
termination is budget problems. Usually, the person is allowed to immigrate and is given a
new identity, a desk job, and sometimes a pension. Other times, they are allowed to get
caught or killed. It’s important to break off all contacts with a terminated agent. They cannot
be allowed to quit or resign.
Case officers and their spies should work up a special communications code between them. It
may involve the type of clothing word, or a series of hand signals. Code words and nickname
are also usually involved. A code word generally refers to an intelligence document and has a
classified meaning; a nickname usually consists of two words and is assigned an unclassified
meaning. At a minimum, the following should be able to be communicated without words.

We need to meet so that we can talk.


I have material to pass on to you.
I think I am being followed.
You have a tail.
Everthing in OK.

Spies have copied, photographed, or memorized things, which they then pass on their
contacts. Most intelligence services use what are called COURIERS to handle all such
exchanges and contacts. Sometimes, couriers are involved in the initial recruitment and
training of a spy; and other times, they’re unrelated to the case. Professional messenger and
postal services are also sometimes used. A traditional exchange is:

(The Dead Drop- The spy and their courier have arranged a place usually a dumpster or
public garbage can where material is discarded and later picked up.)

Telephone conversations are always avoided, as are computerized forms of communicating


over the Internet. A few Internet exceptions exist, however, as a popular form of exchange
takes place not with encryption, but with postings in public bulletin boards or Usenet
discussion groups. In other words, no direct computer to computer connections are allowed.
SAFE HOUSES exist in almost every city. Most commonly, they are hotel or motel rooms;
other times, a rental house or apartment. Safe houses are always constantly being rented, the
purpose being that their newness prevents the planting of surveillance devices. As a general
rule, spies and visitors should always be blindfolded when taken to safe house.

Sexual and Non-sexual Compromises

Sex is only one of several methods for turning someone into a traitor or spy. Almost all the
motives for becoming such a person are expressed in the acronym MICE (Money Ideology
Compromises, Ego). Sex falls under the Compromise category. The letter “C” (for
Compromise) can itself be subdivided into three (3) distinct subparts:

 Heterosexual Compromise
 Homosexual Compromise
 Nonsexual Compromise

The theory behind the use of sex in espionage is based mostly on Freudian theory, the idea
that the sex drive is basic, so basic in fact, that it is the basis of all other drives, a generalized
drive, if you will. Additionally, the sex drive is compulsive or addictive. It cuts across
various degrees of mental intellect. There are several known incidents in which powerful and
intelligent people have jeopardized their careers to satisfy a sexual urge or craving. The use
of beautiful women in baited situations is known as planting a “honey trap”, or more
formally “entrapment,” but sometimes a good-looking man (or romeo) is planted. The Arab
countries are said to known everything about NATO activities and plans because it has been
so efficiently penetrated by Arab romeos. A rather interesting part of spy history involves the
use of HOMOSEXUAL agents. Some of the most notorious spies in history have been
homosexual (the Cambridge Spy Ring) or sexual deviants (the KGB agent Geoffrey Prime).
Most sexual deviants don’t succeed in the spy business, but homosexual apparently do.
Instead of being called “honey traps,” a homosexual compromise situation is called a “drone-
traps.”

Recruits are also often enticed into various “deals” which expose them to blackmail by the
host country’s intelligence services.

Some techniques are:

1. Black-marketing – targets are threatened with exposure for buying contraband goods
and services on the black market.
2. Currency violations – targets are threatened with exposure for violating “no
trespassing” zones or being on government property of the host nation
3. Criminal Law violations – targets are threatened with prosecution for various
criminal offenses that they have been setup in.

Any refugee or war criminal makes excellent material for recruitment. The immigration
quota system may be used to threaten people. An applicant is converted into a spy by
promises of moving quickly on their visa application (permission to leave the country) in
return for agreeing to spy in their newly adopted countries. Some nations offer to pay all
tuition expenses if the student. Studying in the host country, agrees to engage in espionage.

Job titles come in many forms. At the top of the hierarchy are officers in the various
intelligence agencies. And intelligence officer positions is usually an executive position,
which means they get to stay at headquarters most of the rime. Underneath this career level
are junior officers who are known as legals or illegals. A legal junior officer is one sent
overseas under cover as a diplomat or attaché. Illegal junior officers have more deceptive
covers, usually as a business or sales person. Among the junior officers stationed abroad
serve as case officers, or controllers. They are expected to recruit and run agents who come
from the host country, setting up what is known as “assets,” or a spy ring. The people who
work in the various supporting capacities at the home office are called analysis.

The persons recruited in the host country to work as assets spies, or traitors are called agents. One of
the defining characteristics of all agents is that they’re expendable. There are different types.
 Penetration agents, or moles, who work under deep cover and are well-placed
 Double agents, who work for both sides;
 Cut-outs, who acts a s intermediaries or mercenaries;
 Feedback agents, who provide running commentary on political events, and may
consist of
 Stay-behinds, which are those left in place by retreating troops in wartime; and all-
purpose

Agents of influence, who are provided with little direction and operate fairly independently

Advocates of HUMINT (Human Intelligence) believe that, despite technological advances,


tradition espionage remains crucial in providing information known as the foreknowledge
before something takes place; i.e, information about intentions, political activity and
strategic concepts of an adversary’s leadership. Moreover, taking into consideration the
current threat the world is faced, terrorism where targets have gotten smaller, more mobile
and have gone underground the human intelligence platform becomes more important as
well

CHAPTER FIVE
INTELLIGENCE OPERATIONS

INTELLIGENCE OPERATION

It is the result of intelligence planning, planning is always ahead of operation although an


operation can be made without a plan, it is usually due to sudden and inevitable situations
buy definitely this is poor intelligence management.

Different Task involve in Police Intelligence Operation

1. Discovery and identification activity


2. Surveillance and Liaison Program
3. Informant Management
4. Clipping Services and Debriefing
5. Relevant Miscellaneous Activities
6. Casing

Utilization of Informant for planning and organization employment purposes.

THE 14 OPERATIONAL CYCLES


1. Mission and Target
Infiltration-the insertion of action agent inside the target organization
Penetration- recruitment of action agent inside the target organization
2. Planning
3. Spotting
4. Investigation-PBI/CBI
5. Recruitment-the only qualification of an agent is to have an access to the target
6. Training
7. Briefing
8. Dispatch
9. Communication-Technical- telephone/radio, Non-technical - personal meeting, live
drop/dead drop
10. Debriefing
11. Payments-depends upon the motivation
-Buy his life not his job
-Regulatory and dependability that counts no the amount
-Pay no bonuses
-Supplemental the agent income from regular sources enough to ease his financial
worries but not enough to cause him to live in style

12.Disposition- involve activity on rerouting, retraining, retesting, termination


13. Reporting
14. Operation Testing

COVERS AND UNDERCOVERS

Cover- the means by which an individual group of organization conceals the true nature
of its acts and or existence from the observer.

Cover story- a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation

Cover Support – an agent assigned in target areas with the primary mission in target areas
with the primary mission of supporting the cover story

Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have the need to know
3. Successful accomplishment of the mission

Types of Cover

1.Natural Cover- Using actual or true background


2. Artificial- Using biographical data adopted for the purpose
3. Cover with in a Cover- Justification of existence
4. Multiple Cover- any cover you wish

Hazards of Cover

1. Static or dormant opposition (ordinary citizen)


2. Unhostile active opposition (Political Security agencies)
3. Hostile active opposition (enemy intl. operatives)

Precautions in case of compromise

1. Move out immediately


2. Start new facility for operation and develop it
3. Build entirely new cover
4. Use circuitous routes and provide careful counter surveillance measure
5. Be specifically careful of former contacts with non-intelligence personnel
6. Be patient, slowly and careful

ORGANIZATION COVER- is an account consisting of biographical which when


adopted by an individual will assume the personality he wants to adopts

Objectives: To camouflage and protect operational personnel and their activities Protect
installation on which clandestine activities are base

Guidelines when Organization Cover is Compromise

1. Make physical move or relocation


2. Start new facility for the old operation and let it grow
3. Use new personnel
4. Let old personnel remain in place
5. Builder entirely new cover
6. When files are relocated use circuitous routes to avoid surveillance and other CI
7. Be specifically careful when making contacts with non-intelligence personnel
8. Be patient

UNDERCOVER ASSIGNMENT- is an investigative techniques in which agent conceal


his official identity an obtain information from that organization

Planning Undercover Assignment

1. Determine level on which investigation is intended


2. Develop appropriate cover and cover story
3. Selection of qualified personnel
4. Consideration of all operational details to include documentation, contract reporting,
housing and convergence
5. Briefing-coaching and rehearsals

Uses of Undercover Assignment

1. Use independently to get first hand info about the subject of investigation
Ex:
a. security evaluation of every installation
b. Gain confidence of suspended persons
c. Agent penetration
d. Verify info form human resources
e. Undercover concealed identity

2. Supplement other investigative techniques like:

a. Playing ground works for raids and searches by going entry


b. To assist in locating evidence
c. To install, maintain investigative equipments by undercover assignment

Types of undercover Assignment

1. Dwelling
2. Work
3. Social
4. Jurisdictional assignment
5. Combinational assignment
6. Rope job- striking up friendship with the subject

UNDERCOVER AGENT

Special qualifications. Knowledge of the language, Area background regarding


events, Knowledge about the custom and habits, Physical appearance an artist
Factors Considered in Selecting Cover Story

1. Mutual point of Interest


2. Justification of presents
3. Previous and permanent address
4. Efficiency of role
5. Freedom from the movement
6. Means of communication
7. Social and financial status
8.Optional alternate plan
9.Safe departure

Selecting Action Agents

1. Placement- location of prospective agent with respect to the target


2. Access- it is the capability of a prospective agent to obtain the desired info for the Intel
organization or to perform to Intel collection mission in the area.

Primary access- it is the access to the desired info


Secondary access- it is the access to the desired info through a principal source where the latter
has the direct access
Outside Access- the agent is employed outside the target and merely monitor info from a third
person who is monitoring info in the area

Motivating Agents

1. Ideology- Believes in the principle of lives


2. Patriotism
3. Remuneration
4. Career development
5. Fear

Nature of Agent Handling

1. Sharing a secret purpose


2. Agent handler controls the agent operationally and administratively
3. Rapport with each other
4. Respect with each other
Basic Principles in Agent Management

1. Agent handler must be in charge of he operation


2. The act ensure the agent adherence
3. Good rapport must be established between the agent handle and their agent
4. The agent handler must constantly reinforce the agent motivation

CONTROL- authority to direct the agent to carryout task of requirement on behalf of the
clandestine organization in an acceptable manner and security

Two Categories of Control

1. Positive Control- is characterized by professionalism rapport


-Agent motivation
- Psychological control
2. Negative control- characterized by blackmail and threat
-Disciplinary action- includes verbal reprimand for poor performance or insecure actions
withholding certain material rewards, reduction of agents salary or in extreme situation the threat
of terminating professional relationship
-Escrow account- control of an agent by putting high salary in a bank to be withdrawn only after
a fulfillment of a condition
- Blackmail

Key Elements in Agent Management

1. Direction and control


a. Leadership
b. Action
c. Personal example

2. Natural weaknesses
a. Inability to keep secret
b. Need for recognition
c. Stain and dual experience
d. Experience

3. Agent Training
4. Agent testing
5. Agent termination

Agent termination
Problems involve:

1. Amount of knowledge the agent has in the operation and personnel


2. His inclination to use knowledge to the disadvantages of the intelligence service
3. Moral obligation to the agent- the causes of loss incurred by him as a result of his connection
with Intel service

The Task of Procurement and Collection of Information

Procurement represents the collection of information from over sources such as:

1. Newspapers
2. Magazines
3. Radio Intercepts
4. Public and Private library
5. Public and Private establishment
6. General Public
7. And other similar in nature

Procurement as use in intelligence parlance is the aggressive effort to acquire certain specific
information that may not be readily available. To this end a number of means may be used theres
are:

1. The classical Intelligence such as and which utilize human being to gather information
2. The modern or technical intelligence which employs machine human such as satellites,
electronic gadgets to gather information.

Procuring Agents

1. Agent in Place- an agent who has been recruited by an intelligence service within a highly
sensitive target, who is just beginning a career or have been long or (outside ) insider

2. Double agent- an enemy agent who has been captured. Turned around and sent back where he
came from as an agent of his captors

3. Expandable Agent- an agent though whom false information is leaked to the enemy.
4. Penetration Agent- an agent who has such reached the enemy get information and would
manage to get back alives agent of influence- an agent who uses influence to gain information
6. Agent provocation
Theory and Practice of Double-Cross System
(Double Agent system)

1. To control the enemy system, or as much of it as we could get our hands on


2. To catch fresh spies when they appeared
3. To gain knowledge other personalities and methods of the enemies’ intelligence service
4. To obtain information about the codes and cipher work of the enemy
5. To get evidence of enemy plans and intentions from the questions asked from them.
6. To influence enemy plans by the answers sent to the enemy
7. To deceive the enemy about our plans and intentions

Some methods used in acquiring Information (Foreign Agents)

1. Stealing or purchasing information from employees.


2. Getting information from records or other sources.
3. Using various methods of reproducing documents, equipments, or models
4. Using “Front” as commercial concerns, travel agencies, associates business groups and other
organization to obtain confidential information or data, which can be of value to the use
5 Using various forms of threats to obtain information
6. Using Blackmail technique (homosexual,adultery,etc)
7. Using various means to extract information from members of the family or close friends of the
employee.
8. Picking information by personal observation of production, operation, test runs, shipment of
finished products or confidential product or papers
9. Picking Information in social and other gatherings.
10. Attempting Subversion by offers of money or using the emotions such as love, hatred, desire
for powers and others.
11. Penetration and operation tactics.

CHAPTER SIX
METHODS OF CONVER INTELLIGENCE

SURVEILLANCE

A form of clandestine investigation which consist of keeping person, place or other targets
under physical observation in order to obtain evidence or information pertinent to an
investigation.

General Objectives And Purposes

1. To confirm or deny allegations


2. To identify persons involved in certain activites
3. Provides background info for undercover assignment
4. Develop leads to vital information
5. To obtain needs upon which to duct additional investigation
6. To check on source of information
7. Locate addresses, or places frequented by subject as well as his associates
8. To obtain detailed information about the nature, scope of subject activities
9. To secure basis for securing search warrant
10. To provide protection

Considerations in surveillance Planning

- Pre –Surveillance Conference – a conference held among the team members, the police
intelligence unit before surveillance is conducted.

Surveillance Plan- The plan must established the required type of personnel, the general and
specific instructions for surveillance. Ensure that the overall objective of the surveillance is
understood. All participating personnel will have commons understanding of the operational
limitations, signal and special instruction which have been improved.

Area Target study- All available information about the areas should be collected and analyzed

Surveillant- a person who conducts surveillance with includes only observations

Stakeout or Plant- is the observation of places or areas from a fix point.

Tailing or Shadowing- it is the observation of a person’s movement.

Undercover Man- it refers to a person trained to observer and penetrate certain organization
suspected of illegal activities and later reports the observation and information’s that proper
operational active can be made

Liason Program- this is the assignment of trained intelligence personnel to other agencies in
order to obtain information of police intelligence value. (Agencies like the press, credit agencies,
labor unions, tel Companies)

Safehouse- is a place, building., enclosed mobile, or an apartment, where police undercover men
meet for debriefing or reporting purposes

Drop- any person is a convenient, secure and unsuspecting place where police undercover men
meet his action agent for debriefing or reporting purposes.
Convoy- an accomplice or associate of the subject used to avoid or elude surveillant

Contact-ant persons whom the subject picks or deals with while he is under observation and
identifies the observer.

Made- when subject under surveillance becomes aware that he is under observation and
identifies the observer

Lost- When the surveillantdoest not know the whereabouts of his subject or the subject had
eluded the surveillance

TYPES OF SURVEILLANCE

According to Intensity and Sensitivity

1. Discreet- subject person to be watch is unaware that he is under observation


2. Close- subject is aware that he is under observation varied on each occasions.
3. Loose- applied frequently or infrequently, period observation varied on each occasion

According to Methods

1. Stationary- this is observation of place usually a bookie stall a gambling, joint a residence
where illegal activities are going on (fixed position)
2. Moving- Surveillance follow the subject from the place for place to maintain continuos watch
of his activities
3. Technical- this is a surveillance by the use of communications and electronic hardware’s
gadgets, system and equipment

Considerations in the Selection of Personnel

1. Inconspicuous physical character


2. Ability to remain unnoticed
3. Resourcefulness
4. Patience and physical stamina
5. Keep sensory perception and good memory
6. Driving ability
7. Personal courage
8. Area knowledge
9. Security consciousness
10. Administrative and Logistics: Communication and control
Do’s and Don’ts in Surveillance

1. Do not make abrupt or unnatural movements


2. Do not make use of disguise that will attract attention
3. Never stare at the subject
4. Do not attempt to appear to innocent when assisted by the subject
5. Never speak to another surveillant unless absolutely necessary to accomplish the mission
6. Plan ahead and be aware on changes of action
7. Take down notes safety
8. Make use of street furniture ( Telephone booth, sidewalk , vendors, waiting shades) Don’t
drink while working undercover
9. Don’t tale a woman on an undercover assignment and don’t claim to be a “big shot”
10. Don’t fail to provide a person in place who can vouch for the operative
11. Don’t spend money to much

The Place of Surveillance

Careful survey of the surrounding area should be made. The character of the neighborhood, the
residents and the transients should be noted. The observation points should be selected. Two
types of place of surveillance are

1. Using a room in a nearby house or business establishment and remaining undercover


2. Remaining outdoors and posing who would normally conduct his business in such an area, i.e
laborer, carpenter street vendor, etc

Special Equipment ( Technical Supports)

1. Camera with telephoto lens


2. Moving Picture camera
3. Binoculars
4. Tape Recording apparatus
5. Wire taping Device
6. Other instrument- miniaturized one-way radio

Method available to employ

1. Surveillance of Place
2. Tailing or shadowing (1-2-3 man shadow)
3. Undercover Investigation
Special methods use in surveillance

1.Wire tapping
2. Concealed Microphones
3. Tape recorded
4. Television
5. Electric Gadgets

Main Objectives

1. To detect criminal activities


2. To discover the identities of person who frequently at the establishment and to the
determination of their relationship
3. To discover the habits of a person who lives in or frequently the place
4. To obtain evidence of a crime or to prevent the commission of a crime
5. Basis for search warrant of ASSO
6. To apprehend person in the commission of an offense.

Essential Requirements and Appearnace

1. Be of average size, built and general appearance


2. Have no noticeable peculiarities in appearance.
3. Should not wear inconspicuous jewelry on clothing.
4. Have nothing about him to attract attention.
5. Have perseverance and able to wait for hours.
6. Always be alert
7. Be resourceful, versatile and quick-witted
8. Be a good talker, able to talk his way out of embarrassing presence in the area

Basic Preparations

A. Study of the subject

Name- address- Description- family- and Relatives- Associates – Character and Temperaments-
Vice – Hobbies – Education – Others

B. Knowledge of the area and terrain

Maps- National and religious backgrounds Transportation- Public Utilities


C. Subversive Organization

History and Background- Biography of the Official Identity and Background of members and
former and members- method of identification employed by the members – Files and records,
nature , location and accessibility- Meeting

D. Cover story

Factors to Consider in Fix Surveillance

1. Determine base of operation


2. Maintain a thorough, cautious reconnaissance of the area
3. Obtain necessary equipments
4. Assignments of specific duties to each member of the team
5. Prepare alternative course of action
6. Provide for relief teams
7. Arrange for communication signals
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel of the base
of operation.

Counter Surveillance

1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corner
4. Getting out immediately on public conveyances
5. Retracting
6. Entering mobile housing.

Difference between Surveillance and Reconnaissance

1. Surveillance is continues while Reconnaissance is intermittent (mission or operation)


2. Reconnaissance has specific objectives while surveillance has general objective

CASING

It is reconnaissance or surveillance of a building place or area to determine its suitability for


Intel use or its vulnerability in operations.

It aids in the planning of an operation by providing needed information. It assists the agent
handler to install confidence in his agent during briefing phase by being able to speak knowingly
about the area of operation. Casing is also considered a security measure because it offers some
degree of protection for those operating in an area unfamiliar to them

General Principles in Casing

1. Know the best route to take get there


2. Know how to to conduct yourself without attracting attention
3. Know what security hazards are in the area and how can they avoided or minimized
4. Know the best route to extricated from the area

Method of Casing

a. Personal Reconnaissance- the most effective method and will produced the most info since
you know just what you’re look for.
b. Map recon- it may not sufficient but it can produce a certain amount of usable info
c. Research- much info can be acquired through research
d. Prior info- your unit and of the unit will have file report that they may provide you with info
e. Hearsay- info usually gain by the person operating in the area and performing casing job

Info Desired in Casing

A. area condition and habit – a description of the locality as whether the place is a residential,
commercial, highly urbanized, rural. The living condition, income of population, operation data (
time where the area seem to be useful-closing time). It includes the amount/ fare description of
the area during the different where condtion. What transportation is available in the area to
include the amount/fare? Habits refer to the routine activities of the people in the area dialect and
difference beliefs also considered

B. Active Opposition- means all organs of every security system whose task it to prevent
intelligence activity in a give area

This also includes not only the enemy but also the efforts of neutral or allied counties to discover
and observe our intelligence activities and learn its objectives. Remember that a country which
either neutral or ally today may anytime in the future become the ally of the opposition

c. Disposal Plan- disposal of the information n case of possible compromise. Disposal of


information and materials

D. Escape and Evasion- the exist planning in case of emergencies from immediate focal point,
the general area and completely from the area
Guidelines in the conduct of Casing

1. To gain contact as soon as possible and maintain continuously


2. Maneuver freely inconformity with operations (dry run)
3. To fight only when necessary
4. To report all items of info
5. To develop the situation

Basic Procedures in the Conduct of Casing

1. Preparation of general location map


2. Sketch of the adjoining establishment and prominent
3. Specific sketch or floor plan of main target
4. Detailed feature of inner portion of target and its description
5. Photograph of the casing target (from general to specific points)

OBSERVATION AND DECRIPTION(ODEX)

Observation – a complete and accurate observation by an individual of his surroundings an


encompasses the use of all the major sense to register and recognized its operational or
intelsignificance.

Description – the actual and factual reporing of one’s observation of he reported sensory
experience recounted by another.

Psychologist estimate that approximately

 85% of our knowledge is gathered through sight


 13% of your hearing
 2% through the three senses

Psychological Processes for accurate observation

 Attention – consist of the psychological process involve in becoming aware of an


existence of fact.
 Perception – involved in the understanding this fact of awareness
 Report – involved in identifying the name in one own mind and some fact which has
been perceive, narrated and identified.

Types of Attention
1. Involuntary - You have no control and requires no effort.
2. Voluntary - this is more reliable but not dependable.
3. Habitual – Little effort with a maximum of control

Factors Involved on Perception

1. Mental capability
2. Educational background
3. Occupational background
4. Imperial Background – acquired though experience

Factors Governing Report

1. Vocabulary – the word whick an individual uses to press himself.2


2. Time log – accurate reporting depends entirely on timeless,delay in reporting results in
unconscious ommisions of details
3. Recurrence of Similar incidents.

ELICITATION

It is a system or plan whereby info of intel value is obtained through the process direct
intercommunication in whick one or more of he parties to the common is unaware of the specific
purpose of the conservation. Effective elicitation is a difficult tools to master.It is, in essence, a
subtle form of interrogation and is often the only means to gain information from a human
source.

Elicitation is the gaining of information through direct communication and where one or more of
the involved parties is not aware of the specific purpose of the conversation.
There are basic assumptions considered:

 Elicitation requires good skills in both verbal and nonverbal communications.


 The elicitor must have a general understanding of individual and cultural
idiosyncrasies.The source will probably be operating under motivational forces to
conceal the desired information. Additionally , the source may have his/her own
elicitation skills and attempt to elicit information from the elicitor.

The traits on which elicitation is based:

 It is a natural tendency for people to talk about matters that may or may not concern
him directly.People also have a desire to correct the mistakes of others and to express
curiosity in things they are not totally familiar with. Another tendency is the desire to
gossip.
 There is a general inability to keep secrets.
 There is a need to recognized,particularly the lonely neglected,vain,and those with
feelings of inferiority.
 There is tendency to underestimate the importance of the information imparted.
 There are habits derived from certain occupations of advising, teaching
,correcting,substantiating and challenging.
 There is a tendency to be indiscrete when not in control of ones emotions
 There is a tendency for professionals to share confidence or show off expertise to
another of his/here profession.

Princiles/Characteristics of Elicitation

Two basic devices ( Approaches and Probes)

A. Approach – An approach is used to start a conversation, or to shift the direction of an


existing conversation.This allows the elicitor to control the topic. Approaches can be
either flattery or provocation.
1) Flattery approaches are effective because they appeal to the ego, self-esteem and
prominence of an individual to guide him/her into a conversation on the subject of
interest.A technique of flattery is insinuating that the source is an authority on a particular
topic.
 Teacher / Pupil : Make the person express topics about him/herself.Most people like
to talk about themselves
 Kindred Sole: ‘ Misery loves company.’ People express a need for recognition ,
particularly the lonely , the neglected , the vain and those with feelings of inferiority.
 Good Samaritan:Do good deeds or favors for the source
 Partial – Disagreement Approach – seeks to produce talking by the word ‘I’m not
sure if I fully agree.
2) Provocative : Theses approaches are designed to induce the source to defend a position,
state a creed , or correct a wrong impression.(NOTE:Be aware of the risk that you may
provoke an individual so much as to cause him/her to abruptly terminate the conversation).
 Teaser-bait: Make the source believe you know more than he/she about a topic.
 Joe blow:Purposely disagree with the source to induce anger.
 Manhattan from Missouri Approach – the elicitor adopts and unbelievable attitude
above anything. He questions all statements and opposition
 National Pride Approach – natural propensity of all persons to defend their country
and its policies
B. Probes: A probe is an attempt to obtain more information after the subject gives a vague,
incomplete general response. A probe is used with an approach in order to sustain aa
conversation. There are three types if probes: completion, hypothetical and clarity.

 Completion: By inserting bits of factual information on a particular topic, the source


may be influenced to confirm and further expand on the topic.
 Clarity: A request for additional information where the source’s response is unclear.
 Hypothetical: can be associated with a though or idea expressed by the source. Many
people who might not make a comment concerning an actual event may express an
opinion on a hypothetical situation
 High Pressure Probe-it serves to pin down a subject in a specific area or it maybe
used to point our contradictions in what the subject has said

Guideline to Conducting Elicitation:

a. Begin with a topic of mutual interest


b. Listen to the source and be PATIENT
c. Gradually steer the topics to the areas of interest.
d. Use approaches and probes when the opportuninty arises.
e. Exploit the topic until it begins to deteriorate
f. Switch to an innocent subject before departing or terminating the interview.
g. Leave an opening for future access.
h. Record information when security considerations allow

PORTAIT PARLE (P/P)

It is a means of using descriptive terms in relation to the personal features of an individual


and it can be briefly described as a world description or a spoken picture. (Anthropometry -
no two human beings has the same body measurement)

Identification methods

1. Branding and mutilation


2. Identification parade system
3. Portrait parle
4. Fingerprint method

Several method of acquiring descriptive ability

1. Learns the meaning of the numerous words used in describing the various features of the
persons.
2. Study and practice the description of the features, such as the eyes, hair or the nose as hey
appear on several different person.
3. Learning a definite order of proceeding from one picture to another

Utilization of the P/P system

1. Obtain description of suspects from whom the agent interviews


2.Identity upon receipt or descriptive info form other investigative agencies
3. To sentour or disseminate info on person of CI interest

Methods of obtaining descriptive info

1. Close observation of the person and accurate recording of the terms describing the features
2. Info describing through interviews of witnesses
3. Examination of observation of photographs and sketches
4. Examination of records

BACKGROUND CHECKS AND INVESTIGATION


Background investigation maybe comprehensive or limited (simple depending on the
requirements of clients or the department. However, the following are the most common
information needed:

1. Domestic Background
2. Personal Habit
3. Business History
4. Social or Business Associates
5. Medical History
6. Educational Background
7. Family History

Tracing Victims, Witnesses, Informants, Others

1. Telephone Technique and home visit


2. Record of change of address
3. Mail Covers and Telegram Ruses

Tracing the Fugitive

The approach in tracing fugitive depends upon the characters of the subject. In case the
fugitive is exclusive, rather elusive discreet methods must be employed. With the
experienced criminal, a more direct approach is permissible. The Following are to be taken.

1. Routine Information

Full name and alias- Physical description- Modus operandi – Motive- associates, Past and
present including girlfriend- Habits, hang-outs, and resorts he is known to frequent- Criminal
Record, photographs and fingerprints – Residence , last known and previous employee-
Relatives, names and addresses- Driver’s license- SSS or GSIS number- Handwriting for
comparison

2. For Immediate Action, the following procedures should be adapted:


Transmission of the information to other law enforcing agency – Sending of police circular –
Notification of other agencies possessing informative records.

TACTICAL INTERROGATION
The need for obtaining information of information of highest degree of credibility on
the minimum of time. The objectives of interrogation varies and depend entirely on the
situation in which the interrogator finds himself. He must therefore be fully aware of the
objectives for each interrogation

Interrogation- the systematic asking of questions to elicit information in the minimum of


time

Interrogator- Person who does the questioning

Interrogee- Any person who is subjected to the interrogation process in any of its forms and
phases.

Suspect- any person believed to be associated with prohibited activity

Source – a person who for any reason submits information of intelligence interest usually on
a voluntary basis

Witness- any of person who has direct knowledge of facts concerning an event or activity

Provocateur- an individual from enemy forces who is deliberately introduce our custody
with a specific mission of cause some unfavorable action or reaction on our part.

Screening- initial examination of an interrogee to determine the extent of his knowledge of


person, places, things or events in which we are interested2

Formal Interrogation- the systematic attempt to exploit to an appropriate dept those are of
he interrogee’s knowledge which have been identified in the screening process

Debriefing- the interrogation of a friendly interrogee who has information as the direction of
or under the control of the friendly intelligence service.

Interview- similar to a debriefing although it is less formal and the interrogee is not
necessarily under the control or employment of he respective intelligence service.

Interrogation Report- an oral or written statement of information by the questioning if an


interrogee

Form of Interrogation
1. Direct- the subject is aware of the fact that he is being interrogated, but he may not learn
the true objectives of the interrogation. This is being used extensively at the tactical level
2. Indirect- the subject is not aware that he is being interrogated. This is used when time is
not so important

Types of Interrogation

1. Screening – usually accomplished as soon as after capture, apprehension or arrest of an


interrogee objective is to obtain background information about the interrogee and determine
his area of knowledge amd ability

2. Formal Interrogation(Detailed)- the systematic attempt to exploit to an appropriate depth


those areas of interrogee’s knowelege, which have been identified in the screening process.

3. Debriefing- a form of eliciting information, which is generally used when the area of
knowledgibility of the interrogee is known.

Maximum use of the narrative and not try to trap the person being debriefed with leading
question.

The debriefer/ interrogator must be familiar with the subject in which the interrogation is
being conducted.

4. Interview- the interviewer must be fully aware of the actual type of information desired
and alert on the interviewe’s moods and expressions

Must be tactual especially if the source (interviewee) is to remain unaware of the type of
information desired by the interviewer

5. Interrogation of Lay Personnel ( Specific Type) – the techniques used are the same as in
the interrogations, however, especial effort must be made to established a common frame of
reference between the interrogator and interrogee. The amount of information obtained from
this type will depend on the interrogator’s inequity in establishing common terminology on
the source can understand which will enable the interrogator to get the desired information

6. Technical Interrogation- the level of interrogation where the source has specific and such
detailed information that requires a trained expert in the subject matter to be explored.

It usually covers the specific subject and time is not as limited as during other interrogation

Phases of Interrogation
1. Planning and Preparation

a. Interrogator should keep himself abreast of current development


b. The interrogator must observer the interrogee without the latter knowledge to determine
his conditions, habits, emotional and person appearance
c. The interrogator must question/interview any guard, or any person available who has had
contract with the source to determine the interrogee’s attitudes, circumstances of capture
and how he has been treated
d. The interrogator must examine any document found on the source in order to determine
his particular area of knowledgibility

2. Approach ( Meeting the Interrogee)- the first meeting which the interogee is extremely
critical because the success or failure of interrogation may depend on the initial impression
created by the interrogator. The main objective is to develop rapport with the source in order
to gain his cooperation and induce him to question to obtain the desired information

3. Questioning- the questioning portion is the heart of the interrogation. The interrogator
asks question to obtained the desired information

4. Termination-termination of interrogation will depend on various factors of suchs as the


physical condition of the interrogee.

5. Recording- Interrogator should take notes of the interrogation in a cryptic if possible

The interrogator should not take notes of the interrogation unless rapport with interrogee has
been established

6. Reporting- the end product of an interrogation is the tactical interrogation report


containing the information gained. Report must be made orally or in writing depending on
the situation . Normally an oral report is followed by a written report

The interrogator must remain object in his report

The interrogator must state which information is factual and which is inferred as well as
differential between firsthand information and hearsay

INTERROGATION TECHNIQUES

Techniques of Approach- the purpose is to gain the cooperation of the source and induce
him to answer questioning which will follows

A. The “Open Techniques”- the interrogator is open and direct in his approach and makes no
attempts to conceal the purpose of the interrogator
It is the best employed when the interrogee is cooperative. It is frequently used at the tactical
level where time is a major interrogator

B. The “ Common interest” Technique- the interrogator must exert effort to impress the
interrogee of their common interest.

The interrogator must look for he point out the real advantage the interrogee will receive if he
cooperates

C. Record File ( we know all technique- the interrogator prepare a file on the source listing
all known information ( record should be padded to make ait appear to be very extensive

The information must contains the life history of he interrogee to include his activities and
known associates

The “we know all” used in conjunction with the record file.

During the approach, the interrogator may ask the interrogee about a subject, if he refuse to
cooperate, the interrogator may provide the answer in order to impress him that the
interrogator knows him very well ( all is known)

D. Exasperation- Techniques ( Harrassment) – effectively employed against hostile type


interrogee. The interrogator must be alert because the interrogee may fabricate information to
gain relief from irritation(monotype)

E. Opposite Personality Technique- also known as “ Mutt and Jeff”, “ Threat and Rescue” , “
Bud guy”- God guy’ “ Sweet and sour”, “Sugar and Vinegar” ,” Devil and Angel”

Use of two(2) interrogators playing opposite roles

F. Egotist Techniquest ( Pride and Ego) – usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity

You may reverse the technique by complimenting the interrogee in hopes of getting him to
admit certain information to gain credit

G. “Silent” Technique-employed against nervous or the confident type of interrogee.


Look our the interrogee squarely in the eye with sarcastic smile ( force him to break eye
contact first) He may ask question but the interrogator must not answer. Patience he may do
so with a quietly and non-cholantly asked a question that the interrogee is sure of being a part
of the subject

H. ‘Question Barrage” Technique ( Rapid Fire Questioning)


- intended to confuse the interrogee and put him into a defensive position. The interrogee
become frustrated and confused, he will likely reveal more than he intended, this creating
opening for further questioning.

CHAPTER SEVEN
INTELLIGENCE IN SECURITY OPERATION

ASPECTS OF SECURITY

SECURITY from a layman’s point of view refers to the security guards whose main
function is to protect an office, building, installation or equipment against trespass, theft,
arson and other inimical acts. However, from the intelligence viewpoint, security means
more. It includes the protection against unauthorized disclosures of classified information,
and the determination of a person’s suitability for access to said information. It is necessity
considered harsh and rigid but far-reaching and worthy of its effects.

In any department and instrumentality of our government the function internal security
cannot overemphasized in peacetime or at wartime. All efforts to insure and preserver the
capacity to perform the assigned mission of government are primarily directed toward the
safeguarding of our classified information, personnel and equipment as well as he protection
of our facilities and supplies from sabotage, espionage and subversive activities.

Protective Security- can be define as those measures take by an installation or unit to protect
itself against sabotage espionage or subversion and at the same time provide freedom of
action in order to provide the installation of the unit with necessary flexibility to accomplish
its mission. The three aspects of protective as it follow:

Physical Security- can be defined as those measures taken to prevent physical access or entry
to an installation or area by unauthorized personnel

Personnel security- Personnel security – Personnel security measure are those measures taken
to insure that only authorized personnel have access to classified documents or information.

Security of classified matter- Security classified matters are those measure taken to prevent
the unauthorized disclosures of classified matter
The subject of security, as applied to protection of classified information and defense
material, is a complicated one,

Physical security, personnel security, and document security cannot exist independently –
they are mutually supporting. They are in many respects overlapping. Physical security is
correlated to the other two parts, interwoven and one is essential to the other.

PHYSICAL SECURITY

Physical security maybe also defined as the safeguarding by physical means, such as
guard, fire protection measure, of plans, policies , programs, personnel, property , utilities,
trespass, sabotage, pilferage, embezzlement fraud, or other dishonest criminal act.

General security consideration

The security problem- The security problem is affected by the nature of material stored
thereat and the activity taking place within; the geographical economic and political
situations of the area; the potential enemy action; existing hazards; and the available
logistical support.

Human Barriers- these barriers are features constructed by men that ten to delay the intruder,
whether or not constructed with the specific purpose in mind. Example are walls, door, locks.
Fences, etc

Animal barrier ex: dogs trained and used as guards

Energy Barriers- usually electrical or electronic devices used to provide assistance to guard
personnel. Examples are protective lightning and anti-intrusion alarm devices

Physical Security Procedures

as has been mentioned previously, each office or unit is different Moreover, there is no
approved solution, in many cases, several solution could be used with comparable results.
Our purpose is to examine possibilities from the standpoint of what we may find in existence
as well as possibilities from standpoint of what we may find in existence as well as
possibilities for application to bring security to a desired level.

Designation of Restricted Area- A “restricted area is any area in which personnel or vehicles
are controlled for reason of security. Restricted area is established:
To provide security for installation or facilities.
To promote efficiency of security operations and economy in the use of security personnel

There are type of Restricted Areas- two types of restricted areas maybe established to permit
different degrees of security within the same installation or facilitiy, and to provide efficient
bases for the application of different degrees of access circulation and protection. There
restricted areas are termed EXCLUTION AREAS and LIMITED AREAS.

Exclusion area- an exclusion are is a restricted area which contains a security interest to TOP
SECRET importance, and which requires the highest degree of protection.

Limited Area Control- a limited area is restricted area in which a lesser degree of control is
required than in exclusion area but which the security interest would be compromised by
uncontrolled movement.

Limited Area Control Includes the following

Interior Area Control- interior area control is generally effected in two ways. The first
method is the system which is initiated and terminated at the outer limits of the area to
determine the movements of a visitor within the area. A second somewhat less means of
accomplishing the same thing is time travel. This system provides for checking the actual
time used by the visitor against known time requirements for what the visitor is to
accomplish.

Visitor Identification and Movements Control- Processing and control of movements of


visitor shall be included in the PASS SYSTEM. The Control of movements of visitor will
depend on the installation. A visitor register shall be maintained to include the name of the
visitors, date of visit , purpose of visit, which may be filed for the future reference

Key Control- A system of controlling keys shall be advised and regulations covering the
disposal, storage or withdrawals shall be issued and imposed.

Fire Prevention- Fire is so potentially destructive without human assistance, with assistance
it can be cause to devastate those things you are attempting to secure and, professionally
accomplished, often in a way that does not leave recognizable evidence of sabotage

DOCUMENT AND INFROMATION SECURITY

SECURITY of information is base on the premises that the government has the right
and duty to protect official papers from unwarranted and indiscriminate disclosure. In answer
to this problem, Malacanang, Manila dated August 14,1964 entitled “ promulgating rules
governing security of classified matters in Government Officers” was “ Promulgating rules
Governing security of classified Matters in Government offices” was promulgated in order to
safeguard our secrets as secrets.

There are various laws likewise effecting, security of officials papers of the government,
namely appropriate articles of the Revised Penal code as amended and commonwealth Act
616 as Circular No.78 shall be dealt administrative proceeding without prejudice to offense
under provisions soft and cited penal statutes. Be deemed a violation of Memorandum
Circular No.78 by the parties responsible thereof.

The authority and responsibility for the preparation and classification of classified matter
rest exclusively with the originating office.

Classified matter should be classified according to their content and not to the file in which
they are held or of another document to which they refer, except radiograms or telegrams
referring to previously classified radiograms or telegram

Classification should be made as soon as possible by placing the appropriate marks of the
matter to be classified

Each individual whose duties allow access to classified matter, or each individual who
possesses knowledge of classified natter while it is in his possession and shall insure that
dissemination of such classified matter is on the “need-to-know” basis and to property
cleared persons only

Documents Security- that aspects of security which involves the application of security
measures for the proper protection and

Classification Categories- Official matter which requires protection in the interest of


national security shall be limited to four categories of classification which in descending
order of importance, shall carry one of the following designations:

TOP SECRET
SECRET
CONFIDENTIAL
RESTRICTED

Matter includes everything, regardless of it physical character, or in which information is


recorded or embodied documents, equipment, project, books, reports, articles, notes, letters.
Drawings. Drawings, sketches, plans, photographs, recordings, machinery. Models.
Apparatus devices and all other products or substances fall within the general term’ matter’
information, which is transmitted orally. Is considered “ matter” for purposes of security

Security clearance is the clearance is the certification by a responsible authority that the
person describe is cleared for access to classified matter the appropriate level.

Need to know is the principle whereby access to classified matter may only be only give to
those person to whom it is necessary for the fulfillment of their duties. Person are not entitled
to have access to classified matter solely by virtue of their status or office

It is a requirement that the dissemination of classified matters be limited strictly to person


whose official duty requires knowledge or possession thereof

Certificated of Destruction is the certification by a witnessing officer that the classified


matters describe therein has been disposed of in his presence, approved destruction methods

Classified- to assign information by one of the four classification categories

Security Clearance – administrative determination that an individual is eligible for access to


classified matter.

Compromise- lose of security. Which results from an authorized person obtaining


knowledge of classified matter

Compartmentation- the grant of access to classified matter only to properly cleaved person
in the performance of their official duties.

Declassify- removal of security classification from classified matter

Reclassify/Regrading – act of changing the assigned classification of matter

Up grading- act of assigning to a matter of higher classification to classified document

TOP SECRET MATTER

Information and material(matter), the unauthorized disclosure of which would cause


exceptionally grave damage to the nation, politically, economically or from a security aspect.
This category is reserve for the nation’s closest secrets and is to be used with great reserve,

Classification Authority
Original Classification authority for assignment of TOP SECRET classification reset
exclusively with the head of the department. This power may however, be delegated to
authorized offices in instances when the necessity for such arises.

Derivative classification authority for TOP SECRET classification(authority for) may be


granted those officers who are required to give comments or responses to a communication
that necessitates TOP- SECRETS response

Examples of Top Secret Documents

1. Very important political documents regarding negotiation for major alliances


2. Major Governmental projects such as proposal to adjust the nation’s economy
3. Military-Police defense class/plans
4.Capabilities of major successes of Intel services.
5. Compilations of data individually classified as secret or lower but which collectively
should be in higher grade
6. Strategies plan documenting overall conduct of war
7. Intel documents revealing major intel production effort permitting an evaluation by
recipients of the success and capabilities of intel agencies
8. Major government project like drastic proposals

SECRET MATTER

Information and material (matter), the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be of great advantage to a foreign nation

A. SECRET grading is justified if :

1. It materially influence a major aspect of military tacts:

2. It involves a novel principle applicable to existing important projects;


3. It is sufficiently revolutionary to result in a major advance in existing techniques or in the
performance of existing secret weapon;
4. It is liable to compromise some other projects so already graded.

Classification Authority- Same as TOP SECRET matter

Example of Secret Documents


1. Those that jeopardize or endanger Intel Relations of a nation
2. Those that compromise defense plans, scientific or technological development
3. Those that reveal important intelligence operations
4. War plans or complete plans for future war operations not included in top secret.
5. Documents showing disposition of forces
6. New designs of aircraft projections, tanks , radar and other devices
7. Troop movement to operational areas
8. Hotel plans and estimates
9. Order of battle info

CONFIDENTIAL MATTER

Information and material ( matter) the unauthorized disclosure of which while not endangering
the nation security would be prejudicial to the interest or prestige of the nation or any
governmental activity, or would cause administrative embarrassment or unwarranted injury to un
individual or would be of advantage to a foreign nation

CONFIDENTIAL grading is justified if:

1. It is a more than a routine modification or logical improvement of existing materials and is


sufficiently advanced to result in substantial improvement in the performance of existing
CONFIDENTIAL weapons
2. It is sufficiently important potentially to make it desirable to postpone knowledge of its value
reaching a foreign nation
3. It is liable to compromise some other project already so graded.

Classification Authority- any officer is authorized to assign CONFIDENTIAL classification to


any matter in the performance of his duties

Examples of Confidential Documents

1. Plans of government projects such as roads, bridges, building , etc


2. Routine service reports like operations and exercise of foreign power
3.Routine intelligence reports

RESTRICTED MATTER

Information and material (matter) which requires special protection other than that determined
to be TOP SECRET, SECRET, or CONFIDENTIAL
Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is
authorized. Transmission shall be through the normal dissemination system. Destruction shall be
the same as for the CONFIDENTIAL matter

CONTROL OF CLASSIFIED MATTER

Custody and accounting of classified matter- Heads of departments handling classified matter
shall issue orders designating their respective custodians of classified matter custodian shall

Store all classified matter

1. Maintain a registry of classified matter showing all classified matter received and to whom
transmitted
2. Maintain current roster of person authorized access to classified matter for each classification
in the office
3. Insure physical security for classified matter.
4. Conduct an inventory of all TOP SECRET maters as specified in paragraph 7 (Memo Cir
78/196)
5. Upon his relief account for all TOP SECRET and SECRET matter by inventory and transmit
the same to his successor

Unauthorized keeping of private records- All government personnel are prohibited from keeping
private records, diaries, or papers containing statement of facts or opinions, either official or
personal, concerning matters which are related to or which affects national interest or security.
Also prohibited are the collecting of souvenirs or obtaining for personal use whatsoever any
matter classified in the interest of national security.

Dissemination- Dissemination of classified matter shall be restricted to properly cleared persons


whose official duties required knowledge or possession thereof. Responsibility for the
determination of “need to know” rest upon both each individual, information involve, and the
recipient

Discussion involving classified matter.


1. Indiscreet discussion or conversation involving classified matter shall not be engaged in within
the presence of or with unauthorized persons.
2. When a lecture address or informal talk to a group includes classified matter, the speaker shall
announce the classification at the beginning and end of the period
3. All personnel leaving the government service shall be warned against unlawful disclosures of
classified matter.
Disclosures to other departments of classified information originating from another
department.

Classified matter originating from another department shall not be disseminated to other
departments without the consent of the originating department.

Release of classified matter outside a department

General Policy- No person in the government shall convey orally visually or by written
communication any classified matter outside. His own department unless such disclosures has
been processed and cleared by the department head or his authorized representative

Release of classified matter to Congress

Government personnel, when giving oral testimony before Congressional Committee involving
classified matter, shall advice the Committee of the classification thereof. Government personnel
called upon to testify shall obtain necessary and prior instruction from his department head
concerning disclosure.

When Congressional members visit government offices, department heads are authorized to
released classified matter which is deemed and adequate response to an inquiry provide that it is
required in the performance of official functions>

Disclosure to Foreign Government or Nationals

1. Its use shall be solely for the purpose for which the classified matter is requested
2. It shall be treated or handled in accordance with the classified categories of the originating
office.
3. Handling shall be made by security- cleared personnel
4. Reproduction and dissemination shall not be made without the consent of the department head.

Disclosure of classified matter for publication

Classified matter shall be released for public consumption only upon the consent of the
department head or his authorized representative. However, in instances where there is a demand
or need for releasing classified information, extreme caution must be exercised to analyze in
detail contents of the classified matter before release. Normally all information are released
through Public information Officers. Public information Officers should be assisted in the
analysis of classified information by the Security Officer
Disclosure through conferences or meetings

Disclosure of classified matter in conferences and other gatherings which include personnel
outside the department shall be in accordance with the general policy- clearance by respective
department heads including conference involving classified information, the following data
should be requested from each participant:

1.Name and designation or position of participant


2. Address and signature of participant
3. Physical security of the conference room should be assured
4. Sponsoring agencies
5. Arrangements for admission of those person authorized to attend. All individuals must
produce positive identification.
6. Arrangements for protection of classified matter handle during the meeting
7. Control of signal equipments notes and memoranda.

COMMUNICATION SECURITY

Communication security is the protection resulting from the application of various


measures which prevent or delay the enemy or unauthorized persons in gaining information
through our communications. It includes Transmission, Cryptographic and Physical security.

Rules- Governing communications security do not in themselves guarantee security, and they do
not attempt to meet every conceivable situation. Communication security rules are a mean, not
an end in themselves.

Departments heads- are the responsible for the maintenance of communication security and for
the promulgation of additional directives as may be necessary to insure proper communication
security control within their jurisdiction

All communication personnel should have an appreciation of the basic principles of


communication security may result in compromise.

Communication Security Officer

A properly trained and cleared Communication Security Officer shall be appointed in every
department of the Government handling cryptographic communication.

TRANSMISSION SECURITY
Transmission Security is that component of communication security which results from all
measures designed to protect transmission form interception, traffic analysis and imitative
deception.

Communication personnel shall select the means most appropriate to accomplish the delivery
of message in accordance with the specified precedence and security requirements

Radio operators shall adhere to the use of correct procedures, circuit discipline and
authentication system as a security measures against traffic analysis, imitative deception and
radio direction finding.

CRYPTOGRAPHIC SECURITY

Cryptographic Security is that component of communication security which results from the
provisions of technically sound crypto- system and their proper use.

PERSONNEL SECURITY

Principle- Just any/ other control technique, security must start from a given foundation or basis
shall be referred to as the principles of security. Security principles are normally disseminated by
regulations or directives to insure uniformity of purpose, logical and similar methods of
operation and appropriate and continuous place of responsibility.

The Security “chain”- Personal/ Personnel Security is the “weakest link” in the security “ chain”
This weakness can best be minimized or eliminated by making init personnel security conscious
through good training program. Security depends upon the action of individuals.

The Superior must instruct his subordinates so that they will know exactly what security
measures to take in every instances, A safe will not lock itself. An individual must be properly
instructed and must do the locking:

Access to “restricted areas” can be partially controlled by fences, gates and other physical
means, but the individual working in the area is the key to the bringing out of classified matter to
unauthorized personnel. Written information does not have the power of speech. Only the
individual has knowledge of this written information can pass it to an unauthorized personnel if
he unguardedly talks about information.

It is the individual responsibility to insure that he knows security procedures and safeguards,
and it is the commander’s responsibility to motivate each individual to insure that he complied
with this procedures and safeguards. Instructions on security procedures principles and concepts
are valueless unless one impresses upon each individual having access to classified information
the necessity of practicing the “need-to-know” concept

-No person is entitled to knowledge or possession of classified to knowledge or possession of


classified information solely by his rank office, or position. Such matter is entrusted only to
individuals whose official duties requires knowledge or possession. “ Responsibility for
determining whether a person’s official duties require access to items to classified information
rest upon each individual who has knowledge, possession, or command control of the
information involved and not upon the prospective recipient

Personnel Security includes all the security measures designed to prevent unsuitable
individuals or person of doubtfully loyalty to the Philippine Government, from gaining access to
classified matter or to any security facility, and to prevent appointment, or retention as
employees of such individuals

Scope and purpose- Personnel security generally embraces such security measures as
personnel security investigations security orientation and indoctrination and security education as
will ensure the prevention of unsuitable individuals or persons of doubtful loyalty to the
Philippine Government from gaining access to classified matter or being appointed, employed or
retained as employees.

Objectives of personnel security

1. To provide the standards and procedures necessary to insure the appointment, employment of
retention of suitable and loyal individuals in government service
2. To develop the necessary and proper security discipline among the applicants and employee in
the government service as well as protect and preserve the security interest of the Philippine
Government.
3. Inculcate the desirable security attitudes and habits among the applicants and employees of the
government as well as promote the efficiency of the service

S-ar putea să vă placă și