Documente Academic
Documente Profesional
Documente Cultură
Innovative
Criminology
Education
S.E.C. Reg. PG200625662
REVIEW ON
POLICE INTELLIGENCE
Lecturer
ROMMEL K. MANWONG
Introduction
WHATEVER I SEE OR HEAR OF A CONFIDENTIAL NATURE
THAT IS CONFIDED TO ME IN MY OFFICIAL
CAPACITY WILL BE KEPT EVER SECRET UNLESS
REVELATION ISNECESSARY IN THE
PERFORMANCE OF MY DUTY
An Excerpt from the Law Enforcement Code
If you know the enemy and know yourself, you need not fear the
result of a hundred battles.
If you know yourself and not the enemy, for every victory, you are
a fool who will meet defeat in every battle
- SUN TZU
Against organized crime, internal affairs
in my defensive arm; Intelligence is my offensive arm. W. Parker
The old saying of Sun Tzu and the statement of William Parker
are true in military intelligence as well as in the field of law
enforcement and public safety. In other words, intelligence is
knowledge and knowledge is power. This, the need of
intelligence is increasingly important and apparent as the study
of history continues. - RKM
Definition of Terms
National Intelligence the total product of intelligence
Order of Battle Intelligence concerns the manner in which military forces are
organized and disposed.
HISTORICAL FEATURES
(Selected Concepts Only)
Biblical Setting
The earliest source of intelligence, in the age of belief is super
natural interventions in the affairs of men, were prophets, seers,
oracles, soothsayers and astrologers. Since God knew what
was going to happen ahead to time, having to some extent
ordained the outcome of events, it was logical to seek out divine
intentions in the inspiration of holy men in the riddles of oracles,
in the stars and often in dreams. The earliest recorded
instances of intelligence fathering can be found in the Holy Bible
(Numbers 13) When Moses was in the wilderness with the
children of Israel, he was directed by the Lord to send a ruler to
each of the tribes of Israel to spy out the Land of Canaan which
the Lord had designed as their home. They spent forty days on
their mission and thereafter reported back to Moses their
findings.
MOSES
One of the first recorded formalized intelligence efforts, with
format, can also be found in the Holy Bible Numbers 13:17
And Moses sent them to spy out the land of Canaan and said
unto them, get you up this way southward, and go up into the
mountain; and see the lands, what it is; and the people that
dwell therein, whether they are strong or weak, few or many;
and what the land they dwelt in, whether in tents, or in
strongholds; and what land is; whether it be fat or lean, whether
there be wood therein, or not. And be of good courage and bring
of the fruit of the land. The scriptures also named the twelve
intelligence agents whom the Lord directed Moses to sent into
the land of Canaan and records that all those men were heads
of the children of Israel.
RAHAB
The Harlot of Jericho (Joshua 2:1-21) who
sheltered and concealed the agents of Israel,
made a covenant with the agents and duped
their pursuers. She was not only an
impromptu confederate of immense value for
the Jewish leader of that far distant day, but
also established a plot-pattern which is still of
periodic relief to motion picture producers.
DELILAH
The Philistine used her when she allowed
Philistine spies to hide in her house (Judges
16). Delilah was an impromptu intelligence
agent. Apart from her tonsorial specialty, she
also allowed sex to gain intelligence from a
powerful enemy. She achieved the largest
effective force of her employers adversaries
and contriving the stroke which put that force
out of action.
Sun Tzu
A Chinese philosopher, creator of the The Art
of War
Information must be obtained from men who
knew the enemy situation.
Know thy enemy and know yourself, you
need not fear the results of a hundred battles
If you know yourself and not the enemy, for
every victory, you are a fool who will meet
defeat in every battle.
Sertorius
He was the Roman Commander in Spain who possessed a
White Fawn and allowed it to become widely known - that he
derived secrets and guidance from the fawn. His intelligence
agents credited their information to the supernatural power of
animals.
Akbar
He was known to be the sagacious master of the Hindustan. He
employed more than 4,000 agents for the sole purpose of
bringing him the truth that his throne might rest upon it.
Genghis Khan
He was known The Great Mongol, who used
intelligence to conquer China and invade Cathay. He
instructed his Generals to send out spies and used
prisoners as sources of information. The leader of the
so-called MONGOL CONQUERORS - made use of
effective propaganda machine by spreading rumors
of Mongol Terror, they collected information on
weaknesses and rivalries of Europe. The leaders
usually disguised as merchants.
RENAISSANCE PERIOD
Hannibal
He was considered one of the brilliant military strategists in the
history of military intelligence. He had developed an effective
intelligence system for 15 years in Rome. He usually roam
around the city often disguise himself as a beggar to gather first
hand information.
Julius Caesar
During his time, the staff of each Roman Legion includes ten
speculators who served as an information-collecting agency.
The speculators were the first intelligence personnel to appear
definitely in a military organization. Military success of the
Romans was aided by communication system. Made use of
carrier pigeons, which made possible the amazing speed with
which intelligence of Imperial Rome was transmitted. They also
employed ciphers to ensure secrecy of communications.
George Washington
Conspirator under oath abounds in the history of every nation. George Washington was
grand master in intelligence. He mobilized the Free Masons of the colonies at the outbreak
of the American war of Independence.
Karl Schulmeister
He was Napoleons eye, Napoleons military secret, born on August 5, 1770. He began his
career in offensive espionage under a cover role. He was able to infiltrate the Austrian
General Staff.
Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further device military
censorship and organized military propaganda. He introduced military censorship and
organized military propaganda. He works as a census taker and developed informal
gathering of data.
Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he became Chief
of the Austro Hungarian Secret Service. He became a double agent of Russia. In 1913, his
treason was discovered and he was forced to commit suicide. His treason also led to the
death of almost 500,000 agents and soldiers combined in his 13 years espionage episode.
Brahma Kautilya
In Ancient India, he overthrew the Nanda Dynasty and
established the first MAYURYAN king in the Indian throne. He
recommended to his king that for the ruler to succeed, the ruler
should strike at his enemys weak points by means of spies. He
proposed the following means to conquer enemys stronghold:
Intrigues and spies - Winning over enemys people - Siege and
assault - Before beginning military operation, a conqueror
should know the comparative strength and weaknesses of
himself and his enemy. No war should be undertaken without
careful examination of all factors reported by the kings spies.
State Informer
Mossad Israel
1900 Europe powers developed modern staff systems and place intelligence on the same
level with personnel, operations and logistics. Intelligence then functioned in time of peace
and war. Intelligence during this period, concentrated on information about the armed
forces of the enemy and their capabilities. AIRCRAFT was introduced as a method of
conducting aerial reconnaissance. WIRELESS TELEGRAPH was used wherein CODES
AND CIPHERS were applied. ARMY INTELLIGENCE rapidly expanded during this period.
WORLD WAR II
GERMAN INTELLIGENCE started the war with the worlds best organized
intelligence service through advance preparation of intelligence accompanied by
troop movements. GERMAN INTELLIGENCE WEAKENED by the attitude of the
Officer Group wherein they subordinated intelligence to operation and did not
regard intelligence assignment worthy of a soldier.
SOVIET INTELLIGENCE AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union.
Agents of Betrayal
Intelligence is sometimes described as a world of deceit and
betrayal. Some of the high personalities which evidence this
description are:
JUDITH COPLON, a political analyst of a Department of Justice,
ESSENTIAL INTERESTS IN
INTELLIGENCE
Intelligence Defined
Webster defines intelligence as the capacity for understanding and for other forms
of adaptive intellect of behavior; the mind in operation; the power of meeting any
situation, especially a novel situation, successfully by proper behavior adjustments;
the ability to apprehend the interrelationships of presented facts in such a way as
to guide action towards goal; knowledge of an event, circumstances, etc., received
or imparted; the gathering or distribution of information; the staff of persons
engaged in obtaining such information.
Principles of Intelligence
Objectivity - in intelligence, only the well guided succeed. It is a basic
files of its collectors or its producers. The story must be told and it must
be told well. The story must be convincing and to be convincing it must
not only be plausible or factual but its significance must be shown.
General Activities
in Police Intelligence
Line Intelligence it is an intelligence activity that has the immediate nature and value
necessary for more effective police planning and operation.
Undercover Work is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of
determining the nature and extent of any criminal activities that maybe contemplating or
perpetuating.
Functional Classification
of Police Intelligence
Forms of Intelligence
Armed Force Intelligence deals with the armed forces of the nation. It
includes the position of the armed forces, the constitutional and legal basis of
its creation and actual role, the organizational structure and territorial
disposition, and the military manpower recruitment and Order of Battle
Counter Intelligence is also known as Negative Intelligence - a generic term meaning three
different things;
Security Intelligence means that the total sum of efforts to counsel the national policies,
diplomatic decisions, military data, and any other information of a secret nature affecting
the security of the nation form unauthorized persons. It is an effort to deny information to
unauthorized persons by restricting to those who are explicitly authorized to possess it.
Five
Categories of CI Operation
espionage
Categories of CI Operation
PHASE 2
COLLECTION OF
INFORMATION
PHASE 4
MISSION
PHASE 3
PROCESSING THE
COLLECTED INFORMATION
PHASE 1
Planning the Collection Effort
This phase of the cycle involve the
determination of the requirements of
intelligence. It is concerned with identifying
the so called Essential Element of
Information (EEI) - an item of intelligence or
information of the characteristics of the area
of operations and the enemy, which the
commander feels he needs before he needs
before he can reasonably arrive at a decision.
PHASE 2
Collection of information
PHASE 3
This phase of the cycle is concerned with the examination and collation of all
Processing
the Collected Information
collected information.
ACCURACY
A - Confirmed by other
B - Probably true
C - Possibly true
D - Doubtfully true
E - Improbable
F - Truth cannot be
judged
RELIABILITY
1 - Completely reliable
2 - Usually reliable
3 - Fairly reliable
4 - Not usually reliable
5 - Unreliable
6 - Reliability cannot
be judged
Source of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured Enemy
X- Observation of govt/civilian employee
Y/Z- Documentary
PHASE 4
Dissemination
Userefers
of Information
This phase of the&
cycle
to the activities
of transferring the processed information to
the proper users, most particularly the
authority that requires the activity. Processed
information can be disseminated through
annexes, estimates, briefing, message,
reports, overlays, and or summaries.
Methods of Dissemination
Fragmentary orders from top to bottom of the
command
Memorandum, circulars, special orders
Operations order, oral or written
Conference staff members
Other report and intelligence documents
Personal Contact
INFORMATION
AND ITS SOURCES
INFORMATION IS THE LIFE-BLOOD OF
INTELLIGENCE
NO INFORMATION NO INTELLIGENCE
Information
Information refers to all evaluated materials of every
description including those derived from observation, reports,
rumors, imagery, and other sources from which intelligence in
produced. Information is a communicated knowledge by
others obtaining by personal study, investigation, research,
analysis, observation.
Two General classifications of sources of information:
Enemy activity
POW and Civilians
Captured documents
Map - Weather, forecast, studies, report - Agencies
Surveillance
Casing and Elicitation
Surreptitious entry
Employment of technical means (Bugging and Tapping device)
Tactical Interrogation
Observation and Description (ODEX)
PERSONS AS SOURCES OF
INFORMATION
Informant Net It is a controlled group of people
who worked through the direction of the agent
handler. The informants, principal or cutouts supply
the agent handler directly or indirectly with Intel
information
Informants (Asset) people selected as sources of
information, which could be voluntary, or in
consideration of a price.
Types of Informants
Sub-type of Informant
Motives of Informants
People give information to the police due to
various reasons. Their motives include
reward, revenge, fear and avoidance of
punishment, friendship, patriotism, vanity,
civic-mindedness, repentance, competition,
and other motives.
INFROMANT RECRUITMENT
Selection it is particularly desirable to be able to identity and recruit
INTELLIGENCE OPERATIONS
Intelligence Operations is the result of
intelligence planning, planning is always
ahead of operation although an operation can
be made without a plan, it is usually due to
sudden and inevitable situations but definitely
this is poor intelligence management
METHODS OF COVERT
INTELLIGENCE
Surveillance
Surveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an
investigation. Surveillance of persons is called
Tailing or Shadowing, Surveillance of place is
called Casing or Reconnaissance, and
Surveillance of other things, events, and activities is
called Roping.
TYPES OF SURVEILLANCE
According to Methods
CASING OR RECONNAISSANCE
Casing is the term use in the police organization
while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a
building place or area to determine its suitability for
Intel use or its vulnerability in operations. It aids in the
planning of an operation by providing needed
information. It assists the agent handler to install
confidence in his agent during briefing phase by
being able to speak knowingly about the area of
operation.
Casing is also considered a security measure
because it offers some degree of protection for those
operating in an area unfamiliar to them.
Method of Casing
ELICITATION
It is a system or plan whereby information of
intelligence value is obtained through the process
direct intercommunication in which one or more of he
parties to the common is unaware of the specific
purpose of the conservation. The three phases are
determination of the mission, selection of the subject,
and accomplishment of the mission.
Two Devices in the conduct of Elicitation
Approach process of setting people to start talking
Probe to keep the people taking incessantly
Example of Approach:
Teacher Pupil Approach the subject is
treated as an authority then solicit his view
point and opinion on a subject matter.
Good Samaritan Approach is the sincere
and valid offers of help and assistance are
made to the subject
TACTICAL INTERROGATION
The need for obtaining information of the
highest degree of credibility taken on the
minimum of time can be through interrogation
which varies and dependent entirely on the
situation.
Types of Interrogation
Phases of Interrogation
INTERROGATION TECHNIQUES:
Opposite Personality Technique also known as Mutt and Jeff, Threat and
Rescue, Bud Guy God Guy, Sweet and Sour, Sugar and Vinegar, Devil
and Angel. Use of two (2) interrogators playing opposite roles.