Documente Academic
Documente Profesional
Documente Cultură
DEFINTION OF TERMS
AND HISTORICAL SETTING
This Chapter present the important operation definition of terminologies used in the
context of this subject and the historical development of intelligence and secret service. It is in
this chapter that the reader can be able to trace and understand the importance of intelligence in
nation building and security in both peace and wartime
Military Intelligence-it is use in the preparation of military policies, plans and programs. It
includes the strategic and combat intelligence.
Strategic Intelligence- that knowledge pertaining ti the capabilities and probable courses of
action of foreign natons.
Combat Intelligence-is required by the commander in order to determine the best use of his
available firepower and maneuver forces, to accomplish his mission, and to maintain the security
of his command
Counter Intelligence- an integral part of all intelligence operations and as such can’t be
separated from combat and strategic intelligence. Its objective is to safeguard information against
espionage, material and installation against sabotage personnel against subversive.
Technical Intelligence – concerns foreign technical developments, which- have practical
military application and the physical characteristic, performance, capabilities, and the physical
characteristics, performance, capabilities, and limitations of material and installation, used by
and for foreign
Capabilities- form a military standpoint, enemy capability and which if adopted,will influenced
the accomplishment of the friendly mission, either favorable or not
HISTORICAL SETTING
The desire for advance information is no doubt a manifestation of our instinct for survival.
A ruler may ask himself: “What will happen next? What course of action should I take? How
strong are my enemies? What are they planning against me?
From the beginning, we noted that such inquiries are made not solely about the situation and
prospect of the single individual but about those of the group- the tribe, the kingdom, and the
nation.The following are some of the important events and personalities in the world intelligence
work application:
Biblical Beginnings
The earliest sources of intelligence, in the age of belief are supernatural interventions in the
affairs of men, were prophets, seers, oracles, soothsayer and astrologers. Since the God knew
what was going to happen ahead to time, having to some extent ordained the outcome of events,
it was logical to seek out divine intentions in the inspiration if holy men in the riddles of oracles
in the stairs and often in dreams.The earliest recorded instance of intelligence fathering can be
found in the Holy Bible (Num.13)
‘When Moses was in the wilderness with the children of Israel, he was directed by the lord to
send a ruler to each of the tribes of Israel to spy out the Land of Canaan which the Lord had
designed as their home. They spent forty days on their mission and thereafter reported back to
Moses their findings.”
MOSES
RAHAB
The Harlot of Jericho(Joshua 2:1-21)” who sheltered and
concealed the agents of Israel, made a covenant with agents of
Israel, made a covenant with the agents and duped their
pursuers. She was not only an impromptu confederate of
immense value for the Jewish leader of that far distant day, but
also established a plot- pattern which is still of periodic relief to
motion picture producers.
DELILAH
The East was ahead of the West in the raft of intelligence in 400 B.C rejecting the oracles and the
seers. Sun –Tzu, a Chinese philosopher takes a more practical view according to him, what is
called foreknowledge cannot be elicited from spirits, nor from gods nor from/ analogy with past
events nor from calculations. He wrote, “it must be obtained from mean who knew the enemy
situation.” It is no wonder that Sun-Tzu’s book entitled. “The Art of War” is the favorite readinof
the late Mao Tsetung and is a required reading material for the Chinese Communist Tacticians.
He further wrote the saying in which most people in the intelligence service believe became a
parlance in the world of intelligence:
“If you know thy enemy and know yourself, you need not fear the results of a hundred battles.”
“If you know yourself and not the enemy, for every victory you suffer defeat”
“If you know neither yourself not the enemy you are a fool who will meet defeat in every battle.”
When Alexander the Great was marching to Asia, were rumors of disaffection growing among
his allies and mercenaries.He sought the truth and got it by simpliestexpedient.He Devised the
first “letter sorting” and opening to obtain information.
AKBAR
GENGHIS KHAN
RENAISSANCE PERIOD
In England SIR FRANCIS WALSINGHAM, Under Queen Elizabeth, organized the first
Nation Intelligence Service. He employed spies on the staff of the Admiral in Command of the
Spanish Army and able to obtain information regarding Spanish Army and able to obtain
information regarding Spanish Army as to their Ships, equipment, forces and stores. He
protected Queen Elizabeth I from countless assasins.
NAPOLEON BONAPARTE
“One spy in the right place is worth 20,00 men in the field” He organized two Bureau of Interest:
BUREAU OF INTELLIGENCE- Consolidate all incoming information regarding the enemy for
presentation to the emperor and to obtain information as desired. TOPOGRAPHIC BUREAU-
maintains a large map, which covers the latest information regarding both enemy and friendly
forces
He maintained Military Intelligence and Secret Political Police Service all over Europe. Spy
against was of high proportion during his time wherein counterespionage came into popular
usage
agents into four classes
HANNIBAL
Considered one of the brilliant military strategies in his
history . He had developed an effective intelligence
system for 15 years in Rome, and he usually roam
around the City often disguise as a beggar to gather first
hand information.
JULIUS CEASAR
During his time the staff of each legion includes “
speculators” who served as an information-collecting
agency. The “speculators” were the first intelligence
personnel to appear definitely in military
organization.Military success of the romans was aided by
communication system. Made use of carrier pigeons, which made possible the amazing speed
with which intelligence of Imperial Rome was transmitted: They also employed ciphers to ensure
secrecy of communications.
GEORGE WASHINGTON
Conspirator under oath abounds in the history of every nation.George Washington as Grand
Master Mobilized the free masons of the colonies at the
outbreak of the American war ofIndependence
KARL SCHULMEISTER
Karl Schulmeister, Napoleon’s eye, Napoleon’s military secret, was born on August 5, 1770. He
began his career in offensive espionage. Under a cover role, he was able to infiltrate the Austrian
General Staff.
ALFRED REDL
One of the most brilliant intelligent agent, though a homosexual. Become chief of the Austro-
Hungarian Secret Service, but in face a double agent of Russia. In 1913, his treason was
discovered and he was force to commit suicide
His treason lead to the death of 500,000 agents and soldiers combine in his 13years espionage
episode.
Wilhelm Johann Carl Eduard Stieber( (1818- January 29,1882)was Bismarch’s master
spy,director of the Bureaus. Stieber was both an agent of domestic surveillance and an external
agent. However, he worked in reality for the Tsar’s Ochrana. Along with Joseph Fouche, he
invented modern information gathering
Incorporated intelligence in the General Staff Support System. He further device military
censorhip and organized military propaganda. He work as a
census taker and developed an informal in the gathering of
data.
Intrigues and spies- Winning over enemy’s people- Siege and assault- Before beginning
military operation, a conqueror should know the comparative strength and weaknesses of himself
and his enemy. No war should be undertaken without careful examination of all factors reported
by king’s spies
MAYURYAN SPY SYSTEM- rivaled the modern Soviets and had the following task: Shadow
the king’s ministers and officials and attempt to determine their very thoughts –Report Wrong
doings of the people – Operative secretly in foreign countries- Spread unrest- Commit act of
sabotage- Assassinate political and military leaders- Official envoys were instructed to make
friends with officials of the enemy to compare their military strengths with their own.
William Donovan- Major General, organizer of the OSS (Office of the Strategic Service,US),
builder of a central intelligence system. The OSS whose exploits become legendary in World
War II.
Herbert Yardley- Head of the MI-8 The Forerunner of the Top Secret National Security
Adminitrationa.k.a Black Chamber, a Crypanalaytic Organization
Battle of Midway- In june 1442, the turning point of the Naval in the Pacific, the victory gained
by the americans was due to the disrupted messages from the
Imperial Japanese Navy.
JOSEPH FOUCHE
The French Statesman Joseph Fouche (1759-1820) served as minister of police under Napoleon
and was influential in the return of Louis XVIII to the throne in 1815.
Bonaparte’s Head of Internal Security. He created a network of agent. His assistance founded the
modern system of spying on spies which later was known as counter espionage.
JOSEPH PETROSINO
Joseph Petrosino- Member, New York Police Department in early 1900, he was the head of the
Italian Squad. Through extensive intelligence network, he is credited to smash the Black society.
The Federal Bureau of Investigation (FBI)- First established in 1980 as an investigative arm of
the U.S Department of Justice, It becomes what is known as the F.B.I. under its first director
John Edgar Hoover in 1924. On September 6,1939 by a presidential directive. It came to its
responsibility the task of a domestic intelligence.
The Central intelligence Agency (CIA)- The agency was created under the US National
Security Act of 1947 a.k.a Public Law 110 established by the late President Truman in January
1946. The CIA is under the Nation Security Council. The first Director of the Agency was Rear
Admiral Roscoe Hillenkoetter
The Committee for state security – Russia- The intelligence agency known as the KGB –
KomitetGosudarstvennoyBezopasnoti (KGB)
The Scotland Yard,the London Metropolitan Police Force Established by Sir Robert Peel in
1829, Thus the beginning of a colorful legendary police force and considered one of the most
efficient in the world today.
INTELLIGENCE AND THE WORLD WARS
WORLD WAR 1
1900- Europe powers developed modern staff systems and place intelligence on the same level
with personnel, operations and logistics. Intelligence then functioned in time of peace and war.
Intelligence during this period, concentrated on information about the armed forces of the enemy
and their capabilities
WIRELESS TELEGRAPH was used where in CODES AND CIPHERS were applied
“AGENT PROVOCATEUR”- was employed by the Russians for the purpose of internal
security and political repression. Spying was always the specialty of the Russians.
BRITISH INTELLIGENCE –succeeded greatly by means of censorship and its CODE ROOM
combined with skillful use of COVERT agents
GERMAN INTELLIGENCE – started the war with the world’s best organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
JAPANESE INTELLIGENCE- failed because it was not provided with sufficient number of
trained personnel to assemble and evaluate the mass of materials which were collected although
Japanese Intelligence was involved in short war and defensive in nature
BRITISH INTELLIGENCE- its achievement was the delay in the use of German V-BOMB
against them.
In 1942- a female special agent was able to transmit vital information concerning the activities
and installations of the main research station at Penemuenda.Its intelligence failed in the defeat
of GENERAL MONTGOMERY’S forces at ANNHEIM.
US JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the navy in
the collection and analysis of Strategic information and to be responsible for the planning and
operation of Special services.
US success in WWH was there personnel were drawn CIVILIAN POPULACE, BUSINESS
AND PROFESSIONAL MEN AND WOMEN.
CHINESE INTELLIGENCE – In 1932, TAI LI- organized the China’s Secret Police ( the BIS)
to conduct espionage and counterespionage against Japanese spies and Chinese communist.
SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union
SMERSH OR “DEATH TO SPIES” was organized during the war as counterintelligence
concerned with disaffection among Soviet Troops and anti-communism in any form. FIVE
MAJOR DIVISION: Administration, Operation, Investigation, Prosecution and Personnel.
SOVIET INTELLIGENCE SYSTEM- Described as omnipotent and omnipresent for its vast
intricate organization involving millions of people
KGB- Resumed the former function of the old MGB. It Is now the official secret police agency
of the Soviet Union, in charge of the state security (Commission of State Security) K-Omissija
G- Osudarstennoj B- Ezopasnosti or KomitetGosudarstvennoyBezopasnosti
The Failure of the Soviet Intelligence is due to / Internal Supervision Leader had little trust in
their operative whom they keep under surveillance.
GERMAN INTELLIGENCE
East Germany
RED GESTAPO- security service organized by East Germany to combat the Covert activities of
the West Germany Group when it was still divided by the Berlin Walls
STASI- Ministry for state security
West Germany
CHAPTER TWO
ESSENTIAL INTEREST IN INTELLIGENCE
INTELLIGENCE DEFINED
In certain context, it may also mean the network or the system for the collection, collation ,
interpretation, evaluation, processing and dissemination of information. “The term as used here
doesn’t include any police powers or authorities, any investigative function other that those
involve in the collection of information nor any function involved in the enforcement of laws,
orders, or regulation
Objective of Intelligence
The fundamental objective of intelligence is to ensure rational and timely decision-making
Today all counties have their intelligence services. They maybe different in their organization,
efficiency and method buy they all have the basic functions:
Principles of intelligence
General- “Principle” are fundamental guides to action, broad statements of truth from which
others are derived.
Criteria
It must be broad- truly a general rule. It should form the basis for a formulation of corollary and
subsidiary guides it must be a formulation of corollary and subsidiary guides.
It must be important, indeed essential, to intelligence – if a guide is truly important and essential
then its violations should bring its own immediate penalties
They must not be mutually exclusive; instead each should complement the other
Doctrine
There exist an essential unity between knowledge and action; that knowledge enhances the
effectiveness of action- and minimizes the chances of error
The principles
Objectivity – in Intelligence, only the well guided succeed. It Is a basic intelligence concept that
there be unity between knowledge and action. It follows therefore the intelligence should interact
and condition the decision; In intelligence must be adapted to the needs of the decision; it is both
giver and taker. Action or decision is planned by knowledge and guided by it at every step
Communication- Intelligence adequate to their needs must be communicated to all the decision
makers in manners that they will understand and form that will permit its most effective use.
Usefulness- Intelligence is useless if it remains in the minds, or in the files of its collector or its
producers. The story must be told and it must be told well. The story must be convincing and to
be convincing it must not only be plausible or factual but its significance must be shown.
Selection- In intelligence should be essential and pertinent to the purpose at hand. Intelligence
involves the plowing through a maze of information, the considering and innumerable number of
means or of picking the most promising of a multitude of leads The requirement of decision-
making covers very nearly the entire span of human knowledge. Unless there is selection of only
the most essential and the pertinent, intelligence will go off in all direction in one monumental
waste of effort
Timeliness- Intelligence must be communicated to the decision maker at the appropriate time to
permit its most effective use. This is one of the most important and most obvious, for
Intelligence that is too soon or too late are equally useless. Timeliness is one principle that
complements all the others.
Security- Security is achieved by the measures which intelligence takes to protect and preserve
the integrity of his activities if intelligence has no security, it might be as well beings run like a
newspaper
Strategic Intelligence-The intelligence information which primarily long range in nature with
little practical immediate operation value.
Line Intelligence-which is of an immediate nature and necessary for more effective police
planning and operation
Counter Intelligence- Phase of Intel covering the activity devoted in destroying the effectiveness
of hostile foreign activities and to the protection of info against espionage, subversion and
sabotage.
Undercover Work- is an investigative process in which disguises and pretext cover and deception
are used to gain the confidence of criminal suspects for the purpose of determining the nature
and extent of any criminal activities that maybe contemplating or perpetuating.
Internal Security Intelligence (INSINT)- refers to the knowledge essential to the maintenance of
peace and order.
Public Safety Intelligence (PUSINT)- refers to the knowledge essential to ensure the protection
of lives and properties
Forms of Intelligence
*Position of the Armed Forces Constitutional and legal basis of its creation and actual role
*Organizational structure and territorial disposition
*Military manpower recruitment.
*Order of Battle
Geographical Intelligence-Deal with the progress of research and development as it affects the
economic and military potential of a nation
LINE INTELLIGENCE – It is the kind of intelligence required by the commander to provide for
planning and conduct tactical and administrative operation in counter insurgency. This pertains
to knowledge of People, Weather, Enemy and Terrain (PWET) used in planning and conducting
tactical and administrative operation in a courier insurgency.
. PEOPLE – Living condition of the people, Sources of income, Education of the people,
Government livelihood projects, Extent of enemy influence to the people
. ENEMY – Location of the enemy, Strength of the enemy, Disposition, Tactical capability,
Enemy vulnerability
.TERRAIN – Relief and drainage system, Vegetation , Surface material, Man-made features
. Obstacle
. Avenues of Approach
This kind of intelligence covers the activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of info against espionage, subversion and sabotage.
Three Activity of CI
Passive Measure – are those measures, which seek to conceal info from the enemy.
Active Measure – are those measures, which seek actively block the enemy’s efforts to gain info
or engage in espionage, subversion or sabotage
1. Security Intelligence – means that the total sum of efforts to counsel the national
policies, diplomatic decisions, military data, and any other information of a secret
nature affecting the deny information to unauthorized persons. Its effort is to deny
information to unauthorized persons by restricting to those who are explicitly
authorized to posses it.
2. Counter Intelligence – is the organized effort to protect specific data that might be of
value to the opponent’s own intelligence organization.
. It aims to prevent the dissemination of any information that might aid an opponent
. Surveillance of suspects
.Infiltration of the enemy intelligence organized to procure information about its method,
personal, specific operation and interest.
According to Sir Bassil Thomson – former chief of Scotland Yard Criminal Investigation
Division:
“A basis requirement of the secret agent is disguise himself and his mission. Much of his
training and basic skill is dedicated to concealment. He is supposed to be supplied with a
foolproof cover story and good documents. He must be a man of exception ability or else he
would not be chosen for this intricate job. The trapping of the dark intruder is a formidable talk.”
The aim of Counter-Espionage is to locate the enemy, to identify the enemy, and to neutralize the
enemy.
Examples are:
Secrecy discipline
2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for CI control at point of entry and departure, international
borders or boundaries
Examples are:
Security screening and control of frontier Security control of merchants, seaman and crew of
commercial aircraft, Security control of frontier crossing point, Security control of seaports
3. Civil Security – it encompasses active and passive CI measures affecting the non-military
nationals permanently or temporarily residing in an area under military jurisdiction,
Examples are :
4. Censorship – it is the control and examination of the Civil, National, Armed forces, Field
press, the POWs.
5. Special Operations – counter subversion, sabotage and espionage.
What is CI Operation?
CI operation is also called CI Investigation. It is an activity that constitutes that value of the CI
workload, worldwide and includes specific investigation of individual and incidence which for
the most part are conducted in an overt but discreet manner.
Deception Measures – Ruse – use of escape and evasion, Dummy position, Fabricated info
CI MISSION
Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use human
sources to collect information or to conduct sabotage and subversion which includes CI Special
Operations, Liaison, Counter Security, CI Screening, CI Screening
Counter Imagery Intel (IMINT) – includes action taken to determine enemy SIGINT and
related EW capabilities and activities. These actions include surveillance radar, photo thermal
And infrared systems. Successful; counter – IMINT operations rely heavily on pattern and
movements analysis and evaluation.
Counter Signal Intel (SIGINT) – determine enemy SIGNINT and related EW capabilities
and activities, access friendly operations to identify patterns, profiles and develop, recommend
and analyze counter measures.
Functions of CI Personnel
CHAPTER THREE
THE INTELLIGENCE CYCLE
Intelligence is different from mere information-processing. It’s not the sort of brain
intelligence, or small-letter i intelligence that psychologist study.Intelligence is “secret
knowledge of an enemy, the king of knowledge which stands independently of the means
by which it is obtained and the process by which it is distilled”.
Intelligence is also a social science, since it tries to analyze and predict political,
economic, and social behavior. Social Science is value-free, and intelligence is somewhat
similar in trying not to be completely partisan or political. Like criminology, intelligence
tries to be policy-relevant to a government’s formulation and implementation of policy to
further its national security interest and to deal with threats from actual or potential
adversaries”.
Evaluation based on the existing situation-current domestic and foreign situations, national
objectives; there is no exact formula; judgment and experience are necessary.
IR-Information Requirement regarding the enemy and its environment, which needs to be
collected and processed in order to meet the PIR of a Chief or Head.
Categories of Intelligence Requirements
In relation to use
2.Contributory- the intelligence required to complete the staff process – make staff plans
and estimates that contribute to the decision and policy making.
3.Operational- additional intelligence required in planning and carrying out effectively the
decision or policy and carrying out effectively the decision or policy announce. Decisions
and policy require implementation.
By type
1. Basic-general reference materials for use in the planning regarding the enemies, area of
operations, capabilities- static comprehensive
2.Current-temporary in nature and narrower in scope. Info required to scope with the current
objectives.
3.Estimative Intel-determines the future courses of action; required by the executives to plan
future military operations and policies
It is necessary to decide which items of information are more important –a system of priority
is need; critical importance and lesser importance” EEI- highest priority Intel requirements:
indicates the Intel requirements essential to planning.
Collecting Agencies
1.Government Agencies/ Offices-variety information
2.Intelligence units/ agencies
3. Organizations
Trade crafts
1.Photography
2.Investigations/ Elicitation/ Interrogation
3. Surveillance
4.Sound Equipment
5.Surreptitous Entry- keys and locks
6. Use of an artist
7.Communication
1.Collation-Organization of raw data and information into usable form; grouping similar
items of information so that they will be readily accessible.
2.Recording-is the reduction of info into writing or some other form of graphical
representation and the arranging of this info into writing or some form of graphical
representation and the arranging of this into groups of related ites.
-Police log book and Journal
-Intel-work sheet- Intel Fiels
-Situation Maps-Rouges Gallery
-MO Files
Evaluation of Reliability
A.COMPLETELY RELIABLE
B.USUALLY RELIABLE
C.FAIRLY RELIABLE
D.NOT USUALLY RELIABLE
E.UNRELIABLE
F.RELIABILITY cannot be juidged
Methods of Dissemination
1.Fragmentary orders from top to bottom of the command
2.Memorandum,circulars,special orders
3.Operation order, oral or written
4.Conference-staff members
5. Other report and intelligence documents
6. Personal Contact
INFORMATION
All evaluate materials of every description including those derive fro observation, reports,
rumors, imagery, and other sources from which intelligence in produced,
Overt Intelligence- is the gathering of information or documents procured openly without regard
as to whether the subject or target become knowledgeable of the purpose.
Covert Intelligence- is the secret procurement of information, which is obtained without the
knowledge of the person or persons. Safeguarding vital intelligence interest.
Informant Net- It is a controlled group of people who worked through the direction of the agent
handle. The informants, principal or cutouts supply the agent handler directly or indirectly with
Intel information
Types of Informants
1.Criminal Informant- an informant who give information to the police pertaining to the
underworld about organized criminals with the understanding that his identity will be protected
2.Confidential Informant-is similar to the former but he gives information of the law to includes
crimes and criminals
3.Voluntary Informant- a type of informant who give information freely and willfully as a
witness to a certain act
4.Special Informant- those who gives information concerning specialized cases only and it is
regard a special treatment by the operatives (ex:teachers, businessmen)
5.Anonymous Informant-those who gives information through telephone with the hope that the
informant can not be identified
Sub-type of Informant
1.Incidental Informant-a person who casually imparts information to an officer with no intention
of providing subsequent information
2.Recruited Informant- a person who is selected cultivated and developed in to a continuous
source of info.
2. Investigation- the investigation of the potential informants that has tentatively identified as a
“probable” must be as thorough as possible. It must establish possible existing motives as to this
person might assist the police intel community. Failure to do so will deny this office who must
perform the approach and persuasion phase with little more that a guess. If necessary,conduct
complete background investigation(CBI)
3. Approach- approach must be done in a setting from which might include pleasant
surroundings, perhaps a confidential apartment, completely free form any probability of
compromise, preferably in an adjacent city or a remote area foreign to the informants living
pattern.
4.Testing-the testing program should begin,of course, with the limited assignment, with a gradual
integration into the more important areas. The occasional testing of an informant should continue
through the entire affiliation
Information is endless in terms of quantity, but is most exploitable when there is some
“schema” which organizing “categories of interest” by the kinds of things which can lend
themselves either to patterns, series or trends ( which can be easily , data analyzed ) or detailed
specifics like names, numbers, or addresses (which make the data amenable to line analysis)
Identification is important, as one often runs into the problems of stolen identities, aliases and
false IDS In intelligence work. Accuracy in numbers is also important, as,for example, in the
assessment of property value, smuggled quantities, costs of crime, as well as addresses.
Suspicious incidents are a challenging category one must learn to master with greater
consideration than is ordinarily given to such things. Given these challenges, then it is no wonder
that modern intelligence gather is usually an and human face, and it has to be a bit
overboard,shall we say,because the gathering or collection of intelligence is nothing more than
stealing someone’s secret which they are closely guarding. It is done strategically, which means
according to some direction, your opponents and allies are also most likely doing it and it is done
non-transparently, or in a secret. The policymaking process which is informed by intelligence
may be transparent, but the intelligence gathering or collection process rarely is disclosed. The
first requirement is that your target must have something worth stealing. If they don’t have
anything worth stealing, then all you’re doing is snooping or doing research. In business, this is
known as the difference between competitive intelligence and market research.
The military takes intelligence gathering rather seriously, as it is almost always collected for
the purpose of assessing risks and hazards in preparation for the order of battle (IPB, or
Intelligence Preparation of Battlespace). The most important thing to remember is that there is no
such thing as intelligence for intelligence sake. The who purpose of gathering information about
other’s secret and processing. it into intelligence is to provide your leaders or policymaker with
options to make policy more effective and efficient. There is no point in tasking, collecting,
analyzing, and distributing intelligence products if there’s no policy, issue , or anticipated issue
on the table.
IMINT- Imagery Intelligence: the collection, mapping, and interpretation of photographs from
aerial units or satellites Sometimes this speciality is also called PHOTINT
Sometimes the term COMINT is used and treated as a subset of SIGNIT for Communication
Intelligence when the enemy simply passes unsecure information via radio, wire, or other
electromagnetic means, but there may be some processing of encrypted information, however
transmitted. There are a lot of job titles involved in the whole process. For example, interception
comprises teams for search, intercept, operator identification signal analysis, traffic analysis,
crypto analysis, decryption, study of plaintext, and the fusion of these processes and the
reporting of results. Different agencies divide up the interception tasks differently, as they do
with the processing of unencrypted written communications, press and propaganda broadcasts. If
something is unencrypted, then COMSEC, or Communications Security (like OPSEC), comes
into play; which involves measures to deny persons information derived from the national
security or any authenticity of a communications. ELINT since 2001 is generally only involved
when something is encrypted (consistent with the Unified Cryptological Architecture and NSA’s
mission detection of emissions emanating from atomic detonation or radioactive sources.
FININT, or financial intelligence, is a hard to-classify, newly emerging discipline, practiced
primarily by a Treasury Department agency that should most probably be considered a subset of
SIGNIT.
People are the most important source of information especially in a worldwide scale of
intelligence collection.
Spies are the basic collection platform for any well-rounded intelligence system. Much of
intelligence gathering at the clandestine level is a lot like undercover police work. Like the
policeman’s attitude toward the “stool pidgeon” or “snitch,” it’s important to note that to
intelligence professionals (case officers or case handlers), an “agent” is a foreign national, an
informant, someone committed to treason and “spying” on his or her own country. The theory
behind working undercover is that it removes any impediments to acquiring information, and
allows a number of activities such as surveillance, eavesdropping, use of informants, and
espionage. It typically involves an assumed identity for a derined and considerable amount of
time.
Undercover work allows someone to circulate in areas where they are not ordinarily welcome.
The jobof anyone working undercover is to “make cases,” or in other words, to gather enough
information to enable a successful outcome, remembering that the goal is to be a hunter, not a
gatherer. The first rule of clandestine intelligence gathering is to go after the big game. You want
to payoff to be big. You want the largest impact impossible because you’ve maximized your
gathering operations as dangerously as possible. A distinction is usually made between agents
who are undercover and those who are under deep cover. This is sometimes referred to as “legal
v illegals” although more common terminology distinguishes between “official” and “unofficial”
cover. Official cover refers to disguising an intelligence officer as an attaché or liaison officer at
an embassy or overseas post. Nonofficial cover refers to someone in deeper disguise who is
acting like a businessman, journalist, tourist, or college professor on an exchange program.
Those people on nonofficial cover make up what is called the “NOC list”(for Nonofficial Cover),
and the NOC list is a closely guarded secret because NOCs are either high level principal agents
or staff employees under a variety of covers. There is usually little to no cover working out of an
embassy because everyone knows embassies are a hub of espionage. If a case officer under
official cover works out of an embassy, they can expect extensive surveillance of their every
move, so usually such officers restrict their recruitment activities hand, NOCs often have dual
nationality, and require handling by an inside case officer, and emply covers that distinguisher a
“cover for status” (the legitimacy to live and work in a particular country) and “cover for action”
(the aliases or identifies which allow operations to be carried out).
THE EARLY STAGES- A typical pattern is to bring someone in as the girlfriend or boyfriend of
an infiltrator, and then distance themselves from the infiltrator. Once it’s clear to all the parties
involved that the undercover agent is single again, another undercover agent is brought in as the
boyfriend or girlfriend of the first undercover agent. This allows the gathering unit to work as a
team, which is better for safety. The initial targets are usually the big leaders of a group that has
been infiltrated, but often the undercover operatives have settle for going after the small fries
accumulating information and case material as they go. A supervisor or case officer usually
makes the decision about whether enough important information has been accumulated to decide
if and when the operation should be terminated, and a system will have usually been put in place
for the operative to turn over evidence on a systematic basis at one time
THE MIDDLE STAGES- some agents are allowed to create their own cover stories or legend,
and this will depend upon the type of behavior involved
(drugs,contraband,gambling,”subversive” groups terrorism). The need maybe arise for false
documents or computer records for such agents. This is not ordinarily done with minor cases.
The need may also arise for creating various kind of setup situations in which the agent “proves”
their criminality or loyalty by engaging in a staged showdown with police or a brush with the
law. The staged encounter may also be an opportunity to supervise the agent. Since supervision
and continued surveillance becomes more difficult as the operation progresses over time, agents
are sometimes busted to give a progress report and let management know if they need more or
less supervision.
THE LATE STAGES- some deep cover agents lose perspective and go native so agencies have
policies in place to help avoid this. Most agencies will call someone in who has been doing this
kind of work too long so that they can salvage their usefulness as a regular employee. Danger,
temptation, and paranoia play roles in the late stages, and it is always possible the person
becomes a rogue agent where one of the hallmarks of this is that they arrange their own private
surveillance and protection.
Recruiting Infiltrators
The smartest and safest way to steal anything is to recruit someone who can steal it for you and
who never knows your true identity. This works for just about anything you want to do that’s
illegal and you don’t want to get caught for it. One may balk at the ethical implications of this,
but once someone is properly recruited, you can use them for just about anything . They can be
used for sabotage, deception, covert operations, assassination, or just about anything.
Many intelligence operations are build on lies, deception, and using people, generally foolish
people. Using people generally follows a pattern.
Employees of Intelligence services don’t consider themselves spies; they consider themselves
recruiters of spies . Sometimes, they sneak into foreign countries and do spy work themselves,
but they still primarily think of themselves as case officers, supervisors, or handlers. In actual
practice, there is a vast bureaucracy of people backing up the spy and their handler, or case
officer. In any clandestine operation, the upper echelon of a spy bureaucracy consist of
1. A regional desk officer, who oversees all HUMINT operations in that region of the world;
2. Watch officers, who staff a 24hour crisis center;
3. A counterintelligence officer, who oversees clandestine meetings between officer and agents;
and
4. A report officer, who acts as a liaison between officers in the field and analysis at headquarters
The spies themselves are mostly considered traitor or fools and tools come in an amazing
variety of forms:
Spies are usually classified as PRIMARY or ACCESS agents. A primary agent is someone
with actual access to the information you need. An access agent knows somebody who’s is
more important, and serves as a gateway or portal to others. Recruiting spies is all about
deception. Case officers regularly deceive spies as much as spies deceive the people they spy
on. Those who recruit and manage spies. However, must always come off as honest and
sincere friends, and tell believable lies. Much of tradecraft is the pursuit of skill at lying.
Here’s one of the most standard deceptions:
The False Flag- the case officer pretend to hold a nationality or be a person whom the target
expects to be friendly to the target’s own interest. Some example (1) a Chinese businessman
thinks he’s working: for the Republic of China when he is really spying for Taiwan; (2) a
student in Lima thinks he’s passing documents to Cuban intelligence when it’s actually the
CIA.
Three resources that a recruiter will need, and plenty of it are: money, drugs. And sex.
Money is generally used to attract a recruit’s attention and sooner or later, it’s all going to
come down the intelligence server; and at other times, activities will be self-financed. Drugs
are generally used to service or create an addiction which is then used for blackmail
purposes, if appropriate. Alcohol is the drug of choice, buy anything that will build rapport
and encourage talking is suitable. Sex almost never involves the case officer engaging in it
with the recruit. Instead, the case officer uses prostitutes paid to pretend being innocent
lovers, capitalizes on an ongoing affair, uses another recruit, or an innocent amateur.
SPOTTING means looking for people who have access. Handlers look for angry or desperate
people in mid-level management position. The best prospects are the ambitious and
disgruntled. Secondarily, handlers look for clerks, secretaries, or “invisible” people in the
organization. Often, they have personal problems or vice that can be worked as well as anger
and desperation. In many cases, the case officer will have to settle for an access agent who
can plant electronic surveillance devices
RECRUITING-takes the form of meeting and getting to know the target. A close, personal
relationship is cultivated, and trust is built. It starts with small, personal favors, an increase in
rewards and then the final step of asking someone to clearly betray their employer,
governments, coworker, lover, etc. Blackmail is used as a last resort if psychological ploys
fail.
In the advance second phase, TESTING means checking your informant’s information
against known facts. Regardless of the reason for error, if a spy doesn’t produce credible
information they should be threatened with termination at this point, or dropped as a source.
Spies are also often “fluttered” at this point, which means that they are given a polygraph
examination, or interrogated.
TRAINING- involves teaching the spy how to use specialized equipment and codes. One of
the other important things the spy will want training in is escape and evasion tactics. Training
should also involve coaching the person in how to spend money.
HANDLING- is a term short for “psychological handling” which usually involves the
passing of control from yourself to another, usually superior, case officer. The handing off of
spies is done for several reason: so they don’t get too close to their original recruiter; to make
them feel they are getting better protection; and to make them feel they are getting promoted.
Often, it has been your agency which has generated some fear, convincing the spy that their
mother or other relative need protection. Spies can be promoted all they way up to Admiral
or General since its only honorary rank.
TERMINATON-is always done by the agency. The most common reason given for
termination is budget problems. Usually, the person is allowed to immigrate and is given a
new identity, a desk job, and sometimes a pension. Other times, they are allowed to get
caught or killed. It’s important to break off all contacts with a terminated agent. They cannot
be allowed to quit or resign.
Case officers and their spies should work up a special communications code between them. It
may involve the type of clothing word, or a series of hand signals. Code words and nickname
are also usually involved. A code word generally refers to an intelligence document and has a
classified meaning; a nickname usually consists of two words and is assigned an unclassified
meaning. At a minimum, the following should be able to be communicated without words.
Spies have copied, photographed, or memorized things, which they then pass on their
contacts. Most intelligence services use what are called COURIERS to handle all such
exchanges and contacts. Sometimes, couriers are involved in the initial recruitment and
training of a spy; and other times, they’re unrelated to the case. Professional messenger and
postal services are also sometimes used. A traditional exchange is:
(The Dead Drop- The spy and their courier have arranged a place usually a dumpster or
public garbage can where material is discarded and later picked up.)
Sex is only one of several methods for turning someone into a traitor or spy. Almost all the
motives for becoming such a person are expressed in the acronym MICE (Money Ideology
Compromises, Ego). Sex falls under the Compromise category. The letter “C” (for
Compromise) can itself be subdivided into three (3) distinct subparts:
Heterosexual Compromise
Homosexual Compromise
Nonsexual Compromise
The theory behind the use of sex in espionage is based mostly on Freudian theory, the idea
that the sex drive is basic, so basic in fact, that it is the basis of all other drives, a generalized
drive, if you will. Additionally, the sex drive is compulsive or addictive. It cuts across
various degrees of mental intellect. There are several known incidents in which powerful and
intelligent people have jeopardized their careers to satisfy a sexual urge or craving. The use
of beautiful women in baited situations is known as planting a “honey trap”, or more
formally “entrapment,” but sometimes a good-looking man (or romeo) is planted. The Arab
countries are said to known everything about NATO activities and plans because it has been
so efficiently penetrated by Arab romeos. A rather interesting part of spy history involves the
use of HOMOSEXUAL agents. Some of the most notorious spies in history have been
homosexual (the Cambridge Spy Ring) or sexual deviants (the KGB agent Geoffrey Prime).
Most sexual deviants don’t succeed in the spy business, but homosexual apparently do.
Instead of being called “honey traps,” a homosexual compromise situation is called a “drone-
traps.”
Recruits are also often enticed into various “deals” which expose them to blackmail by the
host country’s intelligence services.
1. Black-marketing – targets are threatened with exposure for buying contraband goods
and services on the black market.
2. Currency violations – targets are threatened with exposure for violating “no
trespassing” zones or being on government property of the host nation
3. Criminal Law violations – targets are threatened with prosecution for various
criminal offenses that they have been setup in.
Any refugee or war criminal makes excellent material for recruitment. The immigration
quota system may be used to threaten people. An applicant is converted into a spy by
promises of moving quickly on their visa application (permission to leave the country) in
return for agreeing to spy in their newly adopted countries. Some nations offer to pay all
tuition expenses if the student. Studying in the host country, agrees to engage in espionage.
Job titles come in many forms. At the top of the hierarchy are officers in the various
intelligence agencies. And intelligence officer positions is usually an executive position,
which means they get to stay at headquarters most of the rime. Underneath this career level
are junior officers who are known as legals or illegals. A legal junior officer is one sent
overseas under cover as a diplomat or attaché. Illegal junior officers have more deceptive
covers, usually as a business or sales person. Among the junior officers stationed abroad
serve as case officers, or controllers. They are expected to recruit and run agents who come
from the host country, setting up what is known as “assets,” or a spy ring. The people who
work in the various supporting capacities at the home office are called analysis.
The persons recruited in the host country to work as assets spies, or traitors are called agents. One of
the defining characteristics of all agents is that they’re expendable. There are different types.
Penetration agents, or moles, who work under deep cover and are well-placed
Double agents, who work for both sides;
Cut-outs, who acts a s intermediaries or mercenaries;
Feedback agents, who provide running commentary on political events, and may
consist of
Stay-behinds, which are those left in place by retreating troops in wartime; and all-
purpose
Agents of influence, who are provided with little direction and operate fairly independently
CHAPTER FIVE
INTELLIGENCE OPERATIONS
INTELLIGENCE OPERATION
Cover- the means by which an individual group of organization conceals the true nature
of its acts and or existence from the observer.
Cover story- a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation
Cover Support – an agent assigned in target areas with the primary mission in target areas
with the primary mission of supporting the cover story
Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have the need to know
3. Successful accomplishment of the mission
Types of Cover
Hazards of Cover
Objectives: To camouflage and protect operational personnel and their activities Protect
installation on which clandestine activities are base
1. Use independently to get first hand info about the subject of investigation
Ex:
a. security evaluation of every installation
b. Gain confidence of suspended persons
c. Agent penetration
d. Verify info form human resources
e. Undercover concealed identity
1. Dwelling
2. Work
3. Social
4. Jurisdictional assignment
5. Combinational assignment
6. Rope job- striking up friendship with the subject
UNDERCOVER AGENT
Motivating Agents
CONTROL- authority to direct the agent to carryout task of requirement on behalf of the
clandestine organization in an acceptable manner and security
2. Natural weaknesses
a. Inability to keep secret
b. Need for recognition
c. Stain and dual experience
d. Experience
3. Agent Training
4. Agent testing
5. Agent termination
Agent termination
Problems involve:
Procurement represents the collection of information from over sources such as:
1. Newspapers
2. Magazines
3. Radio Intercepts
4. Public and Private library
5. Public and Private establishment
6. General Public
7. And other similar in nature
Procurement as use in intelligence parlance is the aggressive effort to acquire certain specific
information that may not be readily available. To this end a number of means may be used theres
are:
1. The classical Intelligence such as and which utilize human being to gather information
2. The modern or technical intelligence which employs machine human such as satellites,
electronic gadgets to gather information.
Procuring Agents
1. Agent in Place- an agent who has been recruited by an intelligence service within a highly
sensitive target, who is just beginning a career or have been long or (outside ) insider
2. Double agent- an enemy agent who has been captured. Turned around and sent back where he
came from as an agent of his captors
3. Expandable Agent- an agent though whom false information is leaked to the enemy.
4. Penetration Agent- an agent who has such reached the enemy get information and would
manage to get back alives agent of influence- an agent who uses influence to gain information
6. Agent provocation
Theory and Practice of Double-Cross System
(Double Agent system)
CHAPTER SIX
METHODS OF CONVER INTELLIGENCE
SURVEILLANCE
A form of clandestine investigation which consist of keeping person, place or other targets
under physical observation in order to obtain evidence or information pertinent to an
investigation.
- Pre –Surveillance Conference – a conference held among the team members, the police
intelligence unit before surveillance is conducted.
Surveillance Plan- The plan must established the required type of personnel, the general and
specific instructions for surveillance. Ensure that the overall objective of the surveillance is
understood. All participating personnel will have commons understanding of the operational
limitations, signal and special instruction which have been improved.
Area Target study- All available information about the areas should be collected and analyzed
Undercover Man- it refers to a person trained to observer and penetrate certain organization
suspected of illegal activities and later reports the observation and information’s that proper
operational active can be made
Liason Program- this is the assignment of trained intelligence personnel to other agencies in
order to obtain information of police intelligence value. (Agencies like the press, credit agencies,
labor unions, tel Companies)
Safehouse- is a place, building., enclosed mobile, or an apartment, where police undercover men
meet for debriefing or reporting purposes
Drop- any person is a convenient, secure and unsuspecting place where police undercover men
meet his action agent for debriefing or reporting purposes.
Convoy- an accomplice or associate of the subject used to avoid or elude surveillant
Contact-ant persons whom the subject picks or deals with while he is under observation and
identifies the observer.
Made- when subject under surveillance becomes aware that he is under observation and
identifies the observer
Lost- When the surveillantdoest not know the whereabouts of his subject or the subject had
eluded the surveillance
TYPES OF SURVEILLANCE
According to Methods
1. Stationary- this is observation of place usually a bookie stall a gambling, joint a residence
where illegal activities are going on (fixed position)
2. Moving- Surveillance follow the subject from the place for place to maintain continuos watch
of his activities
3. Technical- this is a surveillance by the use of communications and electronic hardware’s
gadgets, system and equipment
Careful survey of the surrounding area should be made. The character of the neighborhood, the
residents and the transients should be noted. The observation points should be selected. Two
types of place of surveillance are
1. Surveillance of Place
2. Tailing or shadowing (1-2-3 man shadow)
3. Undercover Investigation
Special methods use in surveillance
1.Wire tapping
2. Concealed Microphones
3. Tape recorded
4. Television
5. Electric Gadgets
Main Objectives
Basic Preparations
Name- address- Description- family- and Relatives- Associates – Character and Temperaments-
Vice – Hobbies – Education – Others
History and Background- Biography of the Official Identity and Background of members and
former and members- method of identification employed by the members – Files and records,
nature , location and accessibility- Meeting
D. Cover story
Counter Surveillance
1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corner
4. Getting out immediately on public conveyances
5. Retracting
6. Entering mobile housing.
CASING
It aids in the planning of an operation by providing needed information. It assists the agent
handler to install confidence in his agent during briefing phase by being able to speak knowingly
about the area of operation. Casing is also considered a security measure because it offers some
degree of protection for those operating in an area unfamiliar to them
Method of Casing
a. Personal Reconnaissance- the most effective method and will produced the most info since
you know just what you’re look for.
b. Map recon- it may not sufficient but it can produce a certain amount of usable info
c. Research- much info can be acquired through research
d. Prior info- your unit and of the unit will have file report that they may provide you with info
e. Hearsay- info usually gain by the person operating in the area and performing casing job
A. area condition and habit – a description of the locality as whether the place is a residential,
commercial, highly urbanized, rural. The living condition, income of population, operation data (
time where the area seem to be useful-closing time). It includes the amount/ fare description of
the area during the different where condtion. What transportation is available in the area to
include the amount/fare? Habits refer to the routine activities of the people in the area dialect and
difference beliefs also considered
B. Active Opposition- means all organs of every security system whose task it to prevent
intelligence activity in a give area
This also includes not only the enemy but also the efforts of neutral or allied counties to discover
and observe our intelligence activities and learn its objectives. Remember that a country which
either neutral or ally today may anytime in the future become the ally of the opposition
D. Escape and Evasion- the exist planning in case of emergencies from immediate focal point,
the general area and completely from the area
Guidelines in the conduct of Casing
Description – the actual and factual reporing of one’s observation of he reported sensory
experience recounted by another.
Types of Attention
1. Involuntary - You have no control and requires no effort.
2. Voluntary - this is more reliable but not dependable.
3. Habitual – Little effort with a maximum of control
1. Mental capability
2. Educational background
3. Occupational background
4. Imperial Background – acquired though experience
ELICITATION
It is a system or plan whereby info of intel value is obtained through the process direct
intercommunication in whick one or more of he parties to the common is unaware of the specific
purpose of the conservation. Effective elicitation is a difficult tools to master.It is, in essence, a
subtle form of interrogation and is often the only means to gain information from a human
source.
Elicitation is the gaining of information through direct communication and where one or more of
the involved parties is not aware of the specific purpose of the conversation.
There are basic assumptions considered:
It is a natural tendency for people to talk about matters that may or may not concern
him directly.People also have a desire to correct the mistakes of others and to express
curiosity in things they are not totally familiar with. Another tendency is the desire to
gossip.
There is a general inability to keep secrets.
There is a need to recognized,particularly the lonely neglected,vain,and those with
feelings of inferiority.
There is tendency to underestimate the importance of the information imparted.
There are habits derived from certain occupations of advising, teaching
,correcting,substantiating and challenging.
There is a tendency to be indiscrete when not in control of ones emotions
There is a tendency for professionals to share confidence or show off expertise to
another of his/here profession.
Princiles/Characteristics of Elicitation
Identification methods
1. Learns the meaning of the numerous words used in describing the various features of the
persons.
2. Study and practice the description of the features, such as the eyes, hair or the nose as hey
appear on several different person.
3. Learning a definite order of proceeding from one picture to another
1. Close observation of the person and accurate recording of the terms describing the features
2. Info describing through interviews of witnesses
3. Examination of observation of photographs and sketches
4. Examination of records
1. Domestic Background
2. Personal Habit
3. Business History
4. Social or Business Associates
5. Medical History
6. Educational Background
7. Family History
The approach in tracing fugitive depends upon the characters of the subject. In case the
fugitive is exclusive, rather elusive discreet methods must be employed. With the
experienced criminal, a more direct approach is permissible. The Following are to be taken.
1. Routine Information
Full name and alias- Physical description- Modus operandi – Motive- associates, Past and
present including girlfriend- Habits, hang-outs, and resorts he is known to frequent- Criminal
Record, photographs and fingerprints – Residence , last known and previous employee-
Relatives, names and addresses- Driver’s license- SSS or GSIS number- Handwriting for
comparison
TACTICAL INTERROGATION
The need for obtaining information of information of highest degree of credibility on
the minimum of time. The objectives of interrogation varies and depend entirely on the
situation in which the interrogator finds himself. He must therefore be fully aware of the
objectives for each interrogation
Interrogee- Any person who is subjected to the interrogation process in any of its forms and
phases.
Source – a person who for any reason submits information of intelligence interest usually on
a voluntary basis
Witness- any of person who has direct knowledge of facts concerning an event or activity
Provocateur- an individual from enemy forces who is deliberately introduce our custody
with a specific mission of cause some unfavorable action or reaction on our part.
Formal Interrogation- the systematic attempt to exploit to an appropriate dept those are of
he interrogee’s knowledge which have been identified in the screening process
Debriefing- the interrogation of a friendly interrogee who has information as the direction of
or under the control of the friendly intelligence service.
Interview- similar to a debriefing although it is less formal and the interrogee is not
necessarily under the control or employment of he respective intelligence service.
Form of Interrogation
1. Direct- the subject is aware of the fact that he is being interrogated, but he may not learn
the true objectives of the interrogation. This is being used extensively at the tactical level
2. Indirect- the subject is not aware that he is being interrogated. This is used when time is
not so important
Types of Interrogation
3. Debriefing- a form of eliciting information, which is generally used when the area of
knowledgibility of the interrogee is known.
Maximum use of the narrative and not try to trap the person being debriefed with leading
question.
The debriefer/ interrogator must be familiar with the subject in which the interrogation is
being conducted.
4. Interview- the interviewer must be fully aware of the actual type of information desired
and alert on the interviewe’s moods and expressions
Must be tactual especially if the source (interviewee) is to remain unaware of the type of
information desired by the interviewer
5. Interrogation of Lay Personnel ( Specific Type) – the techniques used are the same as in
the interrogations, however, especial effort must be made to established a common frame of
reference between the interrogator and interrogee. The amount of information obtained from
this type will depend on the interrogator’s inequity in establishing common terminology on
the source can understand which will enable the interrogator to get the desired information
6. Technical Interrogation- the level of interrogation where the source has specific and such
detailed information that requires a trained expert in the subject matter to be explored.
It usually covers the specific subject and time is not as limited as during other interrogation
Phases of Interrogation
1. Planning and Preparation
2. Approach ( Meeting the Interrogee)- the first meeting which the interogee is extremely
critical because the success or failure of interrogation may depend on the initial impression
created by the interrogator. The main objective is to develop rapport with the source in order
to gain his cooperation and induce him to question to obtain the desired information
3. Questioning- the questioning portion is the heart of the interrogation. The interrogator
asks question to obtained the desired information
The interrogator should not take notes of the interrogation unless rapport with interrogee has
been established
The interrogator must state which information is factual and which is inferred as well as
differential between firsthand information and hearsay
INTERROGATION TECHNIQUES
Techniques of Approach- the purpose is to gain the cooperation of the source and induce
him to answer questioning which will follows
A. The “Open Techniques”- the interrogator is open and direct in his approach and makes no
attempts to conceal the purpose of the interrogator
It is the best employed when the interrogee is cooperative. It is frequently used at the tactical
level where time is a major interrogator
B. The “ Common interest” Technique- the interrogator must exert effort to impress the
interrogee of their common interest.
The interrogator must look for he point out the real advantage the interrogee will receive if he
cooperates
C. Record File ( we know all technique- the interrogator prepare a file on the source listing
all known information ( record should be padded to make ait appear to be very extensive
The information must contains the life history of he interrogee to include his activities and
known associates
The “we know all” used in conjunction with the record file.
During the approach, the interrogator may ask the interrogee about a subject, if he refuse to
cooperate, the interrogator may provide the answer in order to impress him that the
interrogator knows him very well ( all is known)
E. Opposite Personality Technique- also known as “ Mutt and Jeff”, “ Threat and Rescue” , “
Bud guy”- God guy’ “ Sweet and sour”, “Sugar and Vinegar” ,” Devil and Angel”
F. Egotist Techniquest ( Pride and Ego) – usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity
You may reverse the technique by complimenting the interrogee in hopes of getting him to
admit certain information to gain credit
CHAPTER SEVEN
INTELLIGENCE IN SECURITY OPERATION
ASPECTS OF SECURITY
SECURITY from a layman’s point of view refers to the security guards whose main
function is to protect an office, building, installation or equipment against trespass, theft,
arson and other inimical acts. However, from the intelligence viewpoint, security means
more. It includes the protection against unauthorized disclosures of classified information,
and the determination of a person’s suitability for access to said information. It is necessity
considered harsh and rigid but far-reaching and worthy of its effects.
In any department and instrumentality of our government the function internal security
cannot overemphasized in peacetime or at wartime. All efforts to insure and preserver the
capacity to perform the assigned mission of government are primarily directed toward the
safeguarding of our classified information, personnel and equipment as well as he protection
of our facilities and supplies from sabotage, espionage and subversive activities.
Protective Security- can be define as those measures take by an installation or unit to protect
itself against sabotage espionage or subversion and at the same time provide freedom of
action in order to provide the installation of the unit with necessary flexibility to accomplish
its mission. The three aspects of protective as it follow:
Physical Security- can be defined as those measures taken to prevent physical access or entry
to an installation or area by unauthorized personnel
Personnel security- Personnel security – Personnel security measure are those measures taken
to insure that only authorized personnel have access to classified documents or information.
Security of classified matter- Security classified matters are those measure taken to prevent
the unauthorized disclosures of classified matter
The subject of security, as applied to protection of classified information and defense
material, is a complicated one,
Physical security, personnel security, and document security cannot exist independently –
they are mutually supporting. They are in many respects overlapping. Physical security is
correlated to the other two parts, interwoven and one is essential to the other.
PHYSICAL SECURITY
Physical security maybe also defined as the safeguarding by physical means, such as
guard, fire protection measure, of plans, policies , programs, personnel, property , utilities,
trespass, sabotage, pilferage, embezzlement fraud, or other dishonest criminal act.
The security problem- The security problem is affected by the nature of material stored
thereat and the activity taking place within; the geographical economic and political
situations of the area; the potential enemy action; existing hazards; and the available
logistical support.
Human Barriers- these barriers are features constructed by men that ten to delay the intruder,
whether or not constructed with the specific purpose in mind. Example are walls, door, locks.
Fences, etc
Energy Barriers- usually electrical or electronic devices used to provide assistance to guard
personnel. Examples are protective lightning and anti-intrusion alarm devices
as has been mentioned previously, each office or unit is different Moreover, there is no
approved solution, in many cases, several solution could be used with comparable results.
Our purpose is to examine possibilities from the standpoint of what we may find in existence
as well as possibilities from standpoint of what we may find in existence as well as
possibilities for application to bring security to a desired level.
Designation of Restricted Area- A “restricted area is any area in which personnel or vehicles
are controlled for reason of security. Restricted area is established:
To provide security for installation or facilities.
To promote efficiency of security operations and economy in the use of security personnel
There are type of Restricted Areas- two types of restricted areas maybe established to permit
different degrees of security within the same installation or facilitiy, and to provide efficient
bases for the application of different degrees of access circulation and protection. There
restricted areas are termed EXCLUTION AREAS and LIMITED AREAS.
Exclusion area- an exclusion are is a restricted area which contains a security interest to TOP
SECRET importance, and which requires the highest degree of protection.
Limited Area Control- a limited area is restricted area in which a lesser degree of control is
required than in exclusion area but which the security interest would be compromised by
uncontrolled movement.
Interior Area Control- interior area control is generally effected in two ways. The first
method is the system which is initiated and terminated at the outer limits of the area to
determine the movements of a visitor within the area. A second somewhat less means of
accomplishing the same thing is time travel. This system provides for checking the actual
time used by the visitor against known time requirements for what the visitor is to
accomplish.
Key Control- A system of controlling keys shall be advised and regulations covering the
disposal, storage or withdrawals shall be issued and imposed.
Fire Prevention- Fire is so potentially destructive without human assistance, with assistance
it can be cause to devastate those things you are attempting to secure and, professionally
accomplished, often in a way that does not leave recognizable evidence of sabotage
SECURITY of information is base on the premises that the government has the right
and duty to protect official papers from unwarranted and indiscriminate disclosure. In answer
to this problem, Malacanang, Manila dated August 14,1964 entitled “ promulgating rules
governing security of classified matters in Government Officers” was “ Promulgating rules
Governing security of classified Matters in Government offices” was promulgated in order to
safeguard our secrets as secrets.
There are various laws likewise effecting, security of officials papers of the government,
namely appropriate articles of the Revised Penal code as amended and commonwealth Act
616 as Circular No.78 shall be dealt administrative proceeding without prejudice to offense
under provisions soft and cited penal statutes. Be deemed a violation of Memorandum
Circular No.78 by the parties responsible thereof.
The authority and responsibility for the preparation and classification of classified matter
rest exclusively with the originating office.
Classified matter should be classified according to their content and not to the file in which
they are held or of another document to which they refer, except radiograms or telegrams
referring to previously classified radiograms or telegram
Classification should be made as soon as possible by placing the appropriate marks of the
matter to be classified
Each individual whose duties allow access to classified matter, or each individual who
possesses knowledge of classified natter while it is in his possession and shall insure that
dissemination of such classified matter is on the “need-to-know” basis and to property
cleared persons only
Documents Security- that aspects of security which involves the application of security
measures for the proper protection and
TOP SECRET
SECRET
CONFIDENTIAL
RESTRICTED
Security clearance is the clearance is the certification by a responsible authority that the
person describe is cleared for access to classified matter the appropriate level.
Need to know is the principle whereby access to classified matter may only be only give to
those person to whom it is necessary for the fulfillment of their duties. Person are not entitled
to have access to classified matter solely by virtue of their status or office
Compartmentation- the grant of access to classified matter only to properly cleaved person
in the performance of their official duties.
Classification Authority
Original Classification authority for assignment of TOP SECRET classification reset
exclusively with the head of the department. This power may however, be delegated to
authorized offices in instances when the necessity for such arises.
SECRET MATTER
Information and material (matter), the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be of great advantage to a foreign nation
CONFIDENTIAL MATTER
Information and material ( matter) the unauthorized disclosure of which while not endangering
the nation security would be prejudicial to the interest or prestige of the nation or any
governmental activity, or would cause administrative embarrassment or unwarranted injury to un
individual or would be of advantage to a foreign nation
RESTRICTED MATTER
Information and material (matter) which requires special protection other than that determined
to be TOP SECRET, SECRET, or CONFIDENTIAL
Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is
authorized. Transmission shall be through the normal dissemination system. Destruction shall be
the same as for the CONFIDENTIAL matter
Custody and accounting of classified matter- Heads of departments handling classified matter
shall issue orders designating their respective custodians of classified matter custodian shall
1. Maintain a registry of classified matter showing all classified matter received and to whom
transmitted
2. Maintain current roster of person authorized access to classified matter for each classification
in the office
3. Insure physical security for classified matter.
4. Conduct an inventory of all TOP SECRET maters as specified in paragraph 7 (Memo Cir
78/196)
5. Upon his relief account for all TOP SECRET and SECRET matter by inventory and transmit
the same to his successor
Unauthorized keeping of private records- All government personnel are prohibited from keeping
private records, diaries, or papers containing statement of facts or opinions, either official or
personal, concerning matters which are related to or which affects national interest or security.
Also prohibited are the collecting of souvenirs or obtaining for personal use whatsoever any
matter classified in the interest of national security.
Classified matter originating from another department shall not be disseminated to other
departments without the consent of the originating department.
General Policy- No person in the government shall convey orally visually or by written
communication any classified matter outside. His own department unless such disclosures has
been processed and cleared by the department head or his authorized representative
Government personnel, when giving oral testimony before Congressional Committee involving
classified matter, shall advice the Committee of the classification thereof. Government personnel
called upon to testify shall obtain necessary and prior instruction from his department head
concerning disclosure.
When Congressional members visit government offices, department heads are authorized to
released classified matter which is deemed and adequate response to an inquiry provide that it is
required in the performance of official functions>
1. Its use shall be solely for the purpose for which the classified matter is requested
2. It shall be treated or handled in accordance with the classified categories of the originating
office.
3. Handling shall be made by security- cleared personnel
4. Reproduction and dissemination shall not be made without the consent of the department head.
Classified matter shall be released for public consumption only upon the consent of the
department head or his authorized representative. However, in instances where there is a demand
or need for releasing classified information, extreme caution must be exercised to analyze in
detail contents of the classified matter before release. Normally all information are released
through Public information Officers. Public information Officers should be assisted in the
analysis of classified information by the Security Officer
Disclosure through conferences or meetings
Disclosure of classified matter in conferences and other gatherings which include personnel
outside the department shall be in accordance with the general policy- clearance by respective
department heads including conference involving classified information, the following data
should be requested from each participant:
COMMUNICATION SECURITY
Rules- Governing communications security do not in themselves guarantee security, and they do
not attempt to meet every conceivable situation. Communication security rules are a mean, not
an end in themselves.
Departments heads- are the responsible for the maintenance of communication security and for
the promulgation of additional directives as may be necessary to insure proper communication
security control within their jurisdiction
A properly trained and cleared Communication Security Officer shall be appointed in every
department of the Government handling cryptographic communication.
TRANSMISSION SECURITY
Transmission Security is that component of communication security which results from all
measures designed to protect transmission form interception, traffic analysis and imitative
deception.
Communication personnel shall select the means most appropriate to accomplish the delivery
of message in accordance with the specified precedence and security requirements
Radio operators shall adhere to the use of correct procedures, circuit discipline and
authentication system as a security measures against traffic analysis, imitative deception and
radio direction finding.
CRYPTOGRAPHIC SECURITY
Cryptographic Security is that component of communication security which results from the
provisions of technically sound crypto- system and their proper use.
PERSONNEL SECURITY
Principle- Just any/ other control technique, security must start from a given foundation or basis
shall be referred to as the principles of security. Security principles are normally disseminated by
regulations or directives to insure uniformity of purpose, logical and similar methods of
operation and appropriate and continuous place of responsibility.
The Security “chain”- Personal/ Personnel Security is the “weakest link” in the security “ chain”
This weakness can best be minimized or eliminated by making init personnel security conscious
through good training program. Security depends upon the action of individuals.
The Superior must instruct his subordinates so that they will know exactly what security
measures to take in every instances, A safe will not lock itself. An individual must be properly
instructed and must do the locking:
Access to “restricted areas” can be partially controlled by fences, gates and other physical
means, but the individual working in the area is the key to the bringing out of classified matter to
unauthorized personnel. Written information does not have the power of speech. Only the
individual has knowledge of this written information can pass it to an unauthorized personnel if
he unguardedly talks about information.
It is the individual responsibility to insure that he knows security procedures and safeguards,
and it is the commander’s responsibility to motivate each individual to insure that he complied
with this procedures and safeguards. Instructions on security procedures principles and concepts
are valueless unless one impresses upon each individual having access to classified information
the necessity of practicing the “need-to-know” concept
Personnel Security includes all the security measures designed to prevent unsuitable
individuals or person of doubtfully loyalty to the Philippine Government, from gaining access to
classified matter or to any security facility, and to prevent appointment, or retention as
employees of such individuals
Scope and purpose- Personnel security generally embraces such security measures as
personnel security investigations security orientation and indoctrination and security education as
will ensure the prevention of unsuitable individuals or persons of doubtful loyalty to the
Philippine Government from gaining access to classified matter or being appointed, employed or
retained as employees.
1. To provide the standards and procedures necessary to insure the appointment, employment of
retention of suitable and loyal individuals in government service
2. To develop the necessary and proper security discipline among the applicants and employee in
the government service as well as protect and preserve the security interest of the Philippine
Government.
3. Inculcate the desirable security attitudes and habits among the applicants and employees of the
government as well as promote the efficiency of the service