Sunteți pe pagina 1din 95

Frontiers for

Innovative
Criminology
Education
S.E.C. Reg. PG200625662

Rommel K. Manwong, MPA, MSCrim

FACING THE FUTURE THROUGHINNOVATION!

REVIEW ON
POLICE INTELLIGENCE

Lecturer
ROMMEL K. MANWONG

Introduction
WHATEVER I SEE OR HEAR OF A CONFIDENTIAL NATURE
THAT IS CONFIDED TO ME IN MY OFFICIAL
CAPACITY WILL BE KEPT EVER SECRET UNLESS
REVELATION ISNECESSARY IN THE
PERFORMANCE OF MY DUTY
An Excerpt from the Law Enforcement Code

If you know the enemy and know yourself, you need not fear the
result of a hundred battles.
If you know yourself and not the enemy, for every victory, you are
a fool who will meet defeat in every battle
- SUN TZU
Against organized crime, internal affairs
in my defensive arm; Intelligence is my offensive arm. W. Parker
The old saying of Sun Tzu and the statement of William Parker
are true in military intelligence as well as in the field of law
enforcement and public safety. In other words, intelligence is
knowledge and knowledge is power. This, the need of
intelligence is increasingly important and apparent as the study
of history continues. - RKM

Definition of Terms
National Intelligence the total product of intelligence

developed by all governmental agencies that cover the broad


aspects of national policy and security.
Military Intelligence it is used in the preparation of military
policies, plans and programs. It includes the strategic and
combat intelligence.
Strategic Intelligence that knowledge pertaining to the
capabilities and probable courses of action of foreign nations.
Combat Intelligence is required by the commander in order to
determine the best use of his available firepower and maneuver
forces, to accomplish his mission, and to maintain the security of
his command.
Counter Intelligence an integral part of all intelligence
operations and as such cant be separated from combat and
strategic intelligence. Its objective is to safeguard information
against espionage, material and installations against sabotage,
and personnel against subversive

Order of Battle Intelligence concerns the manner in which military forces are
organized and disposed.

Technical Intelligence concerns foreign technical developments, which have


a practical military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.

Area of Operation those aspects of the operational environment exclusive of


the military forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment
of an area in which military operations are taking place or planned.

Capabilities form a military standpoint, enemy capabilities are courses of


action which the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader
national standpoint, capabilities of a nation are the available, workable, courses
of action to accomplish national objectives.

Vulnerabilities A nations vulnerabilities are the weaknesses, which make it


susceptible to any action, which reduces its war, potential, and or its will to fight.

HISTORICAL FEATURES
(Selected Concepts Only)
Biblical Setting
The earliest source of intelligence, in the age of belief is super
natural interventions in the affairs of men, were prophets, seers,
oracles, soothsayers and astrologers. Since God knew what
was going to happen ahead to time, having to some extent
ordained the outcome of events, it was logical to seek out divine
intentions in the inspiration of holy men in the riddles of oracles,
in the stars and often in dreams. The earliest recorded
instances of intelligence fathering can be found in the Holy Bible
(Numbers 13) When Moses was in the wilderness with the
children of Israel, he was directed by the Lord to send a ruler to
each of the tribes of Israel to spy out the Land of Canaan which
the Lord had designed as their home. They spent forty days on
their mission and thereafter reported back to Moses their
findings.

MOSES
One of the first recorded formalized intelligence efforts, with
format, can also be found in the Holy Bible Numbers 13:17
And Moses sent them to spy out the land of Canaan and said
unto them, get you up this way southward, and go up into the
mountain; and see the lands, what it is; and the people that
dwell therein, whether they are strong or weak, few or many;
and what the land they dwelt in, whether in tents, or in
strongholds; and what land is; whether it be fat or lean, whether
there be wood therein, or not. And be of good courage and bring
of the fruit of the land. The scriptures also named the twelve
intelligence agents whom the Lord directed Moses to sent into
the land of Canaan and records that all those men were heads
of the children of Israel.

THE 12 MEN SENT BY MOSES TO SPY CANAAN


SHAMMUA THE SON OF ZACCUR Tribe of Reuben
SHAPAT THE SON OF HORI Tribe of Simeon
CALEB THE SON OF JEPHUNNEH Tribe of Judah
IGAL THE SON OF JOSEPH Tribe of Issachar
HOSHEA THE SON OF NUN Tribe of Ephraim
PALTI THE SON OF RAPHU Tribe of Benjamin
GADDIEL THE SON OF SODI Tribe of Zebulun
GADDI THE SON OF SUSI Tribe of Joseph, that is from the Tribe of Manasseh
AMMIEL THE SON OF GEMALLI Tribe of Dan
SETHUR THE SON OF MICHAEL Tribe of Asher
NAHBI THE SON OF VOPSHI Tribe of Napthali
GEUEL THE SON OF MACHI Tribe of Gad

RAHAB
The Harlot of Jericho (Joshua 2:1-21) who
sheltered and concealed the agents of Israel,
made a covenant with the agents and duped
their pursuers. She was not only an
impromptu confederate of immense value for
the Jewish leader of that far distant day, but
also established a plot-pattern which is still of
periodic relief to motion picture producers.

DELILAH
The Philistine used her when she allowed
Philistine spies to hide in her house (Judges
16). Delilah was an impromptu intelligence
agent. Apart from her tonsorial specialty, she
also allowed sex to gain intelligence from a
powerful enemy. She achieved the largest
effective force of her employers adversaries
and contriving the stroke which put that force
out of action.

IMPORTANT EVENTS AND PERSONALITIES


IN THE WORLD OF INTELLIGENCE

Sun Tzu
A Chinese philosopher, creator of the The Art
of War
Information must be obtained from men who
knew the enemy situation.
Know thy enemy and know yourself, you
need not fear the results of a hundred battles
If you know yourself and not the enemy, for
every victory, you are a fool who will meet
defeat in every battle.

Alexander the Great


When Alexander the Great was marching to
Asia, were rumors of disaffection growing
among his allies and mercenaries, he sought
the truth, and got it by simplest expedient by
devising the first letter sorting and opening
to obtain information.

Sertorius
He was the Roman Commander in Spain who possessed a
White Fawn and allowed it to become widely known - that he
derived secrets and guidance from the fawn. His intelligence
agents credited their information to the supernatural power of
animals.
Akbar
He was known to be the sagacious master of the Hindustan. He
employed more than 4,000 agents for the sole purpose of
bringing him the truth that his throne might rest upon it.

Genghis Khan
He was known The Great Mongol, who used
intelligence to conquer China and invade Cathay. He
instructed his Generals to send out spies and used
prisoners as sources of information. The leader of the
so-called MONGOL CONQUERORS - made use of
effective propaganda machine by spreading rumors
of Mongol Terror, they collected information on
weaknesses and rivalries of Europe. The leaders
usually disguised as merchants.

RENAISSANCE PERIOD

With the rise of Nationalism and development of modern armies,


intelligence became apparent to large states. In England, Sir Francis
Walsingham, under Queen Elizabeth, organized the first National
Intelligence Service. He employed spies on the staff of the Admiral in
Command of the Spanish Army and able to obtain information
regarding Spanish Army as to their ships, equipment, forces and stores.
He protected Queen Elizabeth I from countless assassins.
In France, Richlieu introduced the network of covert collectors who
transmitted prompt and accurate information to Paris regarding the
activities of the rebels and dissidents of the kingdom.
Louis XIV systematized political policy, continuous surveillance,
postal censorship and military intelligence organization were his
contributions.

The French Intelligence System continued since 15th Century.


Napoleon Bonaparte once said, One Spy in the right place is
worth 20,000 men in the field. He organized two Bureaus of
Interest: Bureau of Intelligence which consolidate all
incoming information regarding the enemy for presentation to
the emperor and to obtain information as desired, and
Topographic Bureau which maintains a large map which
covers the latest information regarding both enemy and friendly
forces. He maintained Military Intelligence and Secret Political
Police Service all over Europe. His main arm was Spy against
spy concept.

Frederick the Great


He was known as the Father of Organized Military
Espionage. He has divided his agents into four classes:

Common spies those recruited among poor folk, glad to earn


a small sum or to accommodate as military officer.
Double spies are unreliable renegades, chiefly involved in
spreading false information to the enemy.
Spies of Consequences couriers and noblemen, staff
officers, and kindred conspirators, requiring a substantial bribe
or bait,
Persons who were forced to undertake espionage against
their own will.

Hannibal
He was considered one of the brilliant military strategists in the
history of military intelligence. He had developed an effective
intelligence system for 15 years in Rome. He usually roam
around the city often disguise himself as a beggar to gather first
hand information.
Julius Caesar
During his time, the staff of each Roman Legion includes ten
speculators who served as an information-collecting agency.
The speculators were the first intelligence personnel to appear
definitely in a military organization. Military success of the
Romans was aided by communication system. Made use of
carrier pigeons, which made possible the amazing speed with
which intelligence of Imperial Rome was transmitted. They also
employed ciphers to ensure secrecy of communications.

George Washington
Conspirator under oath abounds in the history of every nation. George Washington was
grand master in intelligence. He mobilized the Free Masons of the colonies at the outbreak
of the American war of Independence.

Karl Schulmeister
He was Napoleons eye, Napoleons military secret, born on August 5, 1770. He began his
career in offensive espionage under a cover role. He was able to infiltrate the Austrian
General Staff.

Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further device military
censorship and organized military propaganda. He introduced military censorship and
organized military propaganda. He works as a census taker and developed informal
gathering of data.

Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he became Chief
of the Austro Hungarian Secret Service. He became a double agent of Russia. In 1913, his
treason was discovered and he was forced to commit suicide. His treason also led to the
death of almost 500,000 agents and soldiers combined in his 13 years espionage episode.

Brahma Kautilya
In Ancient India, he overthrew the Nanda Dynasty and
established the first MAYURYAN king in the Indian throne. He
recommended to his king that for the ruler to succeed, the ruler
should strike at his enemys weak points by means of spies. He
proposed the following means to conquer enemys stronghold:
Intrigues and spies - Winning over enemys people - Siege and
assault - Before beginning military operation, a conqueror
should know the comparative strength and weaknesses of
himself and his enemy. No war should be undertaken without
careful examination of all factors reported by the kings spies.

Maj. General Donovan

He was the organizer of the OSS, builder of a central intelligence


system - OSS whose exploits become legendary in World War II.
V2 Rackets - OSS agents working in conjunction with the British
Intelligence, through penetration and technical intelligence discovered
Punemundo which was the V2 guide missile research project of Nazi
Germany. It resulted to its destruction and heavy bombing.
Battle of Midway
In June 1442, the turning point of the Naval in the Pacific, the victory
gained by the Americans was due to the disrupted messages from the
Imperial Japanese Navy.
Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of the U.S. Navy
Communications Intelligence intercepted a top-secret signal relaying
the travel of the Admiral. En route, he was intercepted and crashed in
the Jungles of Baungainville.

State Informer

Edward I, King of England in 1725 organized a systematic


police system so called Witch and Ward. By Royal proclamation,
the profession State Informer was created in 1734 enjoining all
informers to expose criminal activities and be compensated.
Fouche of France
A Frenchman born in 1759, rose to become the most feared and
respected intelligence director in French history. He created a
network of agent. His assistance founded the modern system of
spying on spies, which later was known as counter espionage.
Joseph Petrosino
He was member of the New York Police Department in early
1900, he was the head of the Italian Squad. Through extensive
intelligence network, he was credited to smash and
neutralization of the Black Society.

Federal Bureau of Investigation


First established in 1908 as an investigative arm of the U.S. Department of Justice and
became what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On
September 6, 1939 by a presidential directive, it came to its responsibility the task of a
domestic intelligence.

Central Intelligence Agency


The agency was created under the US National Security Act of 1947. It was the Central
Intelligence group established during the time of President Truman in January 1946. The
CIA was under the National Security Council.

Committee for State Security


Russia - The Intelligence agency known as the KGB - Komitet Gosudarstvennoy
Bezopasnosti (KGB)

British Secret Service Great Britain

Mossad Israel

Britain: Scotland Yard, London Metropolitan Police Force


It was established by Sir Robert Peel in 1829 which signaled the beginning of a colorful
legendary police force and considered one of the most efficient in the world today.

Intelligence and the World Wars


WORLD WAR 1

1900 Europe powers developed modern staff systems and place intelligence on the same
level with personnel, operations and logistics. Intelligence then functioned in time of peace
and war. Intelligence during this period, concentrated on information about the armed
forces of the enemy and their capabilities. AIRCRAFT was introduced as a method of
conducting aerial reconnaissance. WIRELESS TELEGRAPH was used wherein CODES
AND CIPHERS were applied. ARMY INTELLIGENCE rapidly expanded during this period.

GERMAN INTELLIGENCE gained a high reputation for offensive effectiveness


throughout Europe but declined at the outset of the war.

BRITISH INTELLIGENCE succeeded greatly by means of censorship and its CODE


ROOM combined with skillful use of COVERT agents.

US expanded their NAVAL INTELLIGENCE wherein DOMESTIC


COUNTERINTELLIGENCE became a principal activity. At this time US created three
branches of its Intelligence System: POSITIVE BRANCH function of collecting evaluating
and disseminating intelligence. Prepare situation estimate and translate documents;
NEGATIVE BRANCH it is the counterintelligence functions which involve in investigating
disloyalty and sedition, investigate enemy activities, investigate graft and fraud in
organization; GEOGRAPHIC BRANCH Produces maps, photographs, and terrain studies.
SECTIONS - Administration, Collection by attaches and troops, Codes and ciphers

WORLD WAR II

GERMAN INTELLIGENCE started the war with the worlds best organized
intelligence service through advance preparation of intelligence accompanied by
troop movements. GERMAN INTELLIGENCE WEAKENED by the attitude of the
Officer Group wherein they subordinated intelligence to operation and did not
regard intelligence assignment worthy of a soldier.

JAPANESE INTELLIGENCE failed because it was not provided with sufficient


number of trained personnel to assemble and evaluate the mass of materials
which were collected although Japanese Intelligence was involved in short war
and defensive in nature.

BRITISH INTELLIGENCE the delay in the use of German V-BOMB against


them was their main achievement during this time.

In 1942 a female special agent was able to transmit vital information


concerning the activities and installations of the main research station at
Penemuenda. Its intelligence failed in the defeat of GENERAL
MONTGOMERYS forces at ANNHEIM.

US INTELLIGENCE In 1941, The US Strategic Service was established to research and


analyze military, political and economic information as it affected the security of the country.
US JOINT CHIEFS OF STAFFS was organized to act in support of the army and the navy
in the collection and analysis of strategic information and to be responsible for the planning
and operation of special services. US greatest contribution to intelligence was the
development of the AMPHIBIOUS WARFARE where coordination of many types of
intelligence activities was required to provide adequate knowledge of the successful
operation of a complex military force transported over water with the objective of
establishing itself on an enemy held shore against opposition. US successes in WW II
were based on personnel drawn from CIVILIAN POPULACE, BUSINESS AND
PROFESSIONAL MEN AND WOMEN.

CHINESE INTELLIGENCE In 1932, TAI LI organized the Chinas Secret Police to


conduct espionage and counterespionage against Japanese Spies and Chinese
communist.

SOVIET INTELLIGENCE AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union.

SMERSH or DEATH TO SPIES was organized during the war as counterintelligence


concerned with disaffection among Soviet troops and anti-communism in any form. Its five
major divisions are: Administration, Operation, Investigation, Prosecution, and Personnel.

POST WAR PERIOD: The superpowers

Soviet Intelligence System


It was described as omnipotent and omnipresent for its vast intricate organization involving
millions of people. SOVIET COUNTERINTELLIGENCE known as IRON CURTAIN
signified that no one may cross the borders of the USSR without being detected. This
means that all communications are rigidly controlled. Its contribution to modern intelligence
was the dissemination of false information designed to mislead and confuse opponents and
prospective victims. The MGB MILITARY INTELLIGENCE AND THE MINISTRY OF
STATE SECURITY formerly NKGB was concerned on political espionage and propaganda
abroad and for the control of espionage activities of foreign communist countries. The KGB
resumed the former function of the old MGB. It is now the official secret police agency of
the Soviet Union, in charge of the state security KGB means (Commission of State
Security) K- Omissija G- Osudarstyennoj B Ezopasnosti or Komitet Gosudarstvennoy
Bezopasnosti

British Intelligence System


It is composed of several intelligence agencies such as the BRITISH MILITARY
INTELLIGENCE DIVISION (MID) which is divided into 20 different departments. The M15
devoted to counterespionage and security. It is the special branch of the SCOTLAND YARD
charged with guarding the Royal Family and important British officials and Visiting Foreign
Dignitaries.

French Intelligence System


The SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE
ESPIONAGE (SDECE-FOREIGN Intelligence and counterintelligence Service)
was under the office of the Prime Minister. GENERAL CHARLES DE GAULLE
set up the Bureau Central de Renseignements et d Action (BCRA Central Office
for Intelligence and Action in London in 1940. It is an expansion of the Service
De Reassignments (SR-Intelligence Service which is a part of the Old Renzieme
Bureau (Second Bureau) of the French General Staff. SDECE concerned on
Strategic and Counterintelligence while SURETE NATIONALE became part of
French Intelligence Service.

German Intelligence System


The RED GESTAPO which serves as security service organized by East
Germany to combat the covert activities of West Germany Group when
Germany was still divided by the Berlin Walls.

United States Intelligence System


The CIA and the FBI the CIA is one among the biggest in the world in terms of
intelligence networking. CIA and the FBI and the other state/ federal units of
intelligence services were US main intelligence agencies.

Agents of Betrayal
Intelligence is sometimes described as a world of deceit and
betrayal. Some of the high personalities which evidence this
description are:
JUDITH COPLON, a political analyst of a Department of Justice,

was accused of taking unlawful possession of government


documents and spying for a foreign power.
DR. EMIL JULIUS KLAUS FUCHS was accused of releasing
American Atomic Secrets to the Soviet in 1945 and to the British
in 1947. He detailed knowledge of the construction of atomic
bombs.
ERNST HILDING ANDERSON was a Royal Swedish Navy who
provided military secrets to a foreign power and was found guilty
and sentences to life imprisonment in 1951.

ESSENTIAL INTERESTS IN
INTELLIGENCE
Intelligence Defined

Webster defines intelligence as the capacity for understanding and for other forms
of adaptive intellect of behavior; the mind in operation; the power of meeting any
situation, especially a novel situation, successfully by proper behavior adjustments;
the ability to apprehend the interrelationships of presented facts in such a way as
to guide action towards goal; knowledge of an event, circumstances, etc., received
or imparted; the gathering or distribution of information; the staff of persons
engaged in obtaining such information.

Base on Psychology- Intelligence is the capacity of a person to adjust to new


situations through the use of what has been previously learned.

According to Government - Commission Task Force - It means the collection,


processing, collation, interpretation, evaluation and dissemination of information,
with references to national security. In certain context, it may also mean the
network or the system for the collection, collation, interpretation, evaluation,
processing, and dissemination of information. The term as used here doesnt
include any police powers or authorities, any investigative function other than those
involve in the collection of information nor any function involved in the enforcement
of laws, orders, or regulation.

According to Military Terminologies - Intelligence is the end

product resulting from the collection, evaluation, analysis,


integration and interpretation of all available information which
my have immediate or potential significance to the development
and execution of plans, policies and programs of the users.

According to Police Parlance - The end product resulting from

the collection, evaluation, analysis, integration and interpretation


of al available information regarding the activities of criminal and
other law violators for the purpose of affecting criminals and
other law violators for the purpose of affecting their arrest,
obtaining evidence, and forestalling plan to commit crime.

The Principal Areas of Interest in Intelligence

Military offensive and defensive tactics, war plans, strategic


concepts and tactical principles, organizations, installations,
industrial lease, armed forces, command structure, command
personnel, material, tactics, morale,
General topographical and hydrographic characteristics,
historical backgrounds
Diplomatic foreign policies, alliances, diplomatic
establishment, foreign service personnel, technique of
conducting foreign relations
Political ideology, traditions, institutions, personalities, area
of friction
Communications and Transportation telephones,
telegraphs, wireless, railways, shipping, automobiles and
trucks, highways, aviation, ownership, policies, organization,
personnel

Social nationality structure, classes and caste, historical factors,


census, personal aspects, characteristics and mentality of people
forces, social legislation, radio, television, press, motion picture

Intelligence organizations, methods and personnel of competing


intelligence system

Economic - On economics, the areas are on:


Financial Monetary policies, Currency structure, Transactions,
Institutions, Personalities
Commercial trade policies, markets, trading methods, price policies,
personalities
Industrial structure of Capacity, manufacturing plants and processes, raw
material, energy rotations, labor relations, personalities
Mining Mineral Resources, Production method, Output
Agriculture policies, crop structure, cultivation method, mechanization,
financing, specific characteristics of rural population

Principles of Intelligence
Objectivity - in intelligence, only the well guided succeed. It is a basic

intelligence concept that there must be unity between knowledge and


action. It follows therefore that intelligence should interact and condition
the decision. Intelligence must be adapted to the needs of the decision;
it is both giver and taker. Action or decision is planned by knowledge
and guided by it at every step.

Interdependence - Intelligence is artificially subdivided into component

elements to insure complete coverage, eliminate duplication and to


reduce the overall task or manageable sizes. Nevertheless, each
subdivision remains as essential part of unity; contributes
proportionately to the end result; possesses a precise interrelationship;
and interacts with each other so as to achieve a balanced and
harmonious whole.

Continuity - Intelligence must be continuous. It is necessary that

coverage be continuous so that the shape of what happens today could


be studied in the light of what happened before, which in turn would
enable us to predict the shape of things to come.

Communication - Intelligence adequate to their needs must be

communicated to all the decision makers in manner that they will


understand and form that will permit its most effective use.

Usefulness - Intelligence is useless if it remains in the minds, or in the

files of its collectors or its producers. The story must be told and it must
be told well. The story must be convincing and to be convincing it must
not only be plausible or factual but its significance must be shown.

Selection - Intelligence should be essential and pertinent to the purpose

at hand. Intelligence involves the plowing through a maze of


information, considering innumerable number of means or of picking
the most promising of a multitude of leads. The requirement of
decision-making covers very nearly the entire span of human
knowledge. Unless there is selection of only the most essential and the
pertinent, intelligence will go off in all directions in one monumental
waste of effort.

Timeliness - Intelligence must be communicated to

the decision maker at the appropriate time to permit


its most effective use. This is one of the most
important and most obvious, for Intelligence that is
too soon or too late are equally useless. Timeliness is
one principle that complements all the others.

Security - Security is achieved by the measures

which intelligence takes to protect and preserve the


integrity of its activities. If intelligence has no security,
it might be as well being run like a newspaper to
which it is similar.

General Activities
in Police Intelligence

Strategic Intelligence it is an intelligence activity which is primarily long range in


nature with little practical immediate operation value.

Line Intelligence it is an intelligence activity that has the immediate nature and value
necessary for more effective police planning and operation.

National Intelligence - it is the integrated product of intelligence developed by all the


governmental branches, departments concerning the broad aspect of national security
and policy. It is concerned to more than one department or agency and it is not produced
by single entity. It is used to coordinate all the activities of the government in developing
and executing integrated and national policies and plans.

Counter-Intelligence phase of intelligence covering the activity devoted in destroying


the effectiveness of hostile foreign activities and to the protection of info against
espionage, subversion and sabotage.

Undercover Work is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of
determining the nature and extent of any criminal activities that maybe contemplating or
perpetuating.

Functional Classification
of Police Intelligence

Criminal Intelligence refers to the knowledge


essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.
Internal Security Intelligence refers to the
knowledge essential to the maintenance of peace
and order.
Public Safety Intelligence refers to the
knowledge essential to ensure the protection of
lives and properties.

Forms of Intelligence

Sociological Intelligence deals with the demographic and psychological


aspects of groups of people. It includes the population and manpower and the
characteristics of the people, public opinion attitude of the majority of the
people towards matter of public policy and education.

Biographical Intelligence deals with individuals personalities who have


actual possession of power.

Armed Force Intelligence deals with the armed forces of the nation. It
includes the position of the armed forces, the constitutional and legal basis of
its creation and actual role, the organizational structure and territorial
disposition, and the military manpower recruitment and Order of Battle

Geographical Intelligence deals with the progress of research and


development as it affects the economic and military potential of a nation.

THREE KINDS OF INTELLIGENCE

Strategic Intelligence as defined earlier, it is an intelligence


data that are not of an immediate value. It is usually
descriptive in nature, accumulation of physical description of
personalities, modus operandi. It does not have immediate
operational value but rather long range that may become
relevant to future police operations.

Line Intelligence It is the kind of intelligence required by the


commander to provide for planning and conduct tactical and
administrative operation in counter insurgency. This pertains to
knowledge of People, Weather, Enemy and Terrain (PWET)
used in planning and conducting tactical and administrative
operation in a counter insurgency.

Intelligence information to be determined in Line Intelligence are:


People - living condition of the people, sources of income,

education of the people, government livelihood projects, extent


of enemy influence to the people
Weather visibility, cloudy, temperature, precipitation (rain),
wind
Enemy - location of the enemy, strength of the enemy,
disposition, tactical capability, enemy vulnerability
Terrain - relief and drainage system, vegetation, surface
material, man made features. There are military aspects of
terrain which includes cover and concealment, obstacle, critical
key terrain features, observation and fields of fire, and avenues
of approach.

Counter Intelligence (CI) - this kind of intelligence covers the

activity devoted in destroying the effectiveness of hostile foreign


activities and to the protection of info against espionage,
subversion and sabotage. Hence, the three activities of CI are:
protection of information against espionage; protection of
personnel against subversion; and protection of installations and
material against sabotage.
Measures in CI must be both passive and active. Passive
measures are those measures which seek to conceal info from
the enemy while active measures are those which seek actively
to block the enemys efforts to gain info or engage in espionage,
subversion or sabotage.

Counter Intelligence is also known as Negative Intelligence - a generic term meaning three
different things;

Security Intelligence means that the total sum of efforts to counsel the national policies,
diplomatic decisions, military data, and any other information of a secret nature affecting
the security of the nation form unauthorized persons. It is an effort to deny information to
unauthorized persons by restricting to those who are explicitly authorized to possess it.

Counter-Intelligence - counter intelligence is the organized effort to protect specific data


that might be of value to the opponents own intelligence organization. Some of its functions
are: Censorship of the following: correspondence, broadcast, telecast, telephone
conversations, telegrams and cables, etc., prevention of the dissemination of any
information that might aid an opponent; maintenance of files of suspect; surveillance of
suspects; mail reading, wire tapping and recording; infiltration of the enemy intelligence
organized to procure information about its method, personal, specific operations and
interest.

Counter-Espionage - In counter-espionage, negative intelligence becomes a dynamic and


active effort. Its purpose is to investigate actual or theoretical violation of espionage laws, to
enforce those laws and to apprehend any violators.

Five
Categories of CI Operation

Military Security it encompasses the measures taken by a


command to protect itself against espionage, enemy
operation, sabotage, subversion or surprise. Examples are:
Secrecy discipline - Special safeguarding of classified
information - Security of troop movement - Special handling of
weather & escapes - Counter subversion with in the armed
forces - Tactical measures in combat area

Port Frontier and Travel Security has to do with the


application of both military and civil security measures for CI
control at point of entry and departure, international borders or
boundaries. Examples are:Security screening and control of
frontier Security control of merchants, seaman and crew of
commercial aircraft, Security control of frontier crossing point
Security control of seaports

Civil Security it encompasses active and passive CI

measures affecting the non-military nationals permanently or


temporarily residing in an area under military jurisdiction.
Examples are: Systematic registration of civilians and aliens
Control of circulation, Curfew, Surveillance of suspected political
organizations, Security screening of labor, Issuance of passes
and permits, Control of internal commerce

Censorship it is the control and examination of the civil,

national, armed forces, field press, and POWs.

Special Operations counter subversion, sabotage and

espionage

Categories of CI Operation

Counter Human Intel (HUMINT) seeks to overcome enemy


attempts to use human sources to collect information or to
conduct sabotage and subversion which includes CI special
operations, liaison, counter security, and CI screening.

Counter Imagery Intel (IMINT) - includes action taken to


determine enemy SIGINT and related enemy weaknesses,
capabilities and activities. These actions include surveillance
radar, photo thermal and infrared systems. Successful counter
IMINT operations rely heavily on pattern and movement
analysis and evaluation of the enemy.

Counter Signal Intel (SIGINT) determine enemy SIGINT and


related enemy weaknesses, capabilities and activities, assess
friendly operations to identify patterns, profiles and develop,
recommend and analyze counter measures.

THE INTELLIGENCE CYCLE


PHASE 1
PLANNING THE COLLECTION
EFFORT

PHASE 2
COLLECTION OF
INFORMATION

PHASE 4

MISSION

DISSEMINATION AND USE


OF INFORMATION

PHASE 3
PROCESSING THE
COLLECTED INFORMATION

PHASE 1
Planning the Collection Effort
This phase of the cycle involve the
determination of the requirements of
intelligence. It is concerned with identifying
the so called Essential Element of
Information (EEI) - an item of intelligence or
information of the characteristics of the area
of operations and the enemy, which the
commander feels he needs before he needs
before he can reasonably arrive at a decision.

What are their capabilities and vulnerabilities?


What are the physical characteristics of the
probable area of operation?
What major policies, plans and decisions must be
made in the near future?
What step must be taken to preserve the security of
the nation?
What is the information required by the higher, lower
or adjacent echelons within the government or
armed forces?

PHASE 2
Collection of information

This phase of the cycle is concerned with identification of the


collecting agency, the formulation of procedures on the manner
of collecting the information in conjunction with the plans as
achieved in phase one.

Methods of Collection information can be collected through

overt method (open system) or covert method


(secret/clandestine).
Collecting Agencies depending on the type of operation, the
collecting agency could be Government Agencies, Intelligence
units, or Organizations
Trade Crafts includes the use of photography, investigations /
elicitation / interrogation, surveillance, sound equipment,
surreptitious entry keys and locks, use of an artist,
communication

PHASE 3
This phase of the cycle is concerned with the examination and collation of all
Processing
the Collected Information
collected information.

Steps in Processing Raw Information


Collection organization of raw data and information into usable form; grouping
similar items of information so that they will be readily accessible.
Recording is the reduction of info into writing or some other form of graphical
representation and the arranging or this info into writing or some form of
graphical representation and the arranging of this into groups of related items.
Police log book and Journal, Intel-work Sheet - Intel Files, Situation Maps Rouges Gallery, Modus Operandi Files Evaluation examination of raw
information to determine intelligence value, pertinence of the information,
reliability of the source and agency, and its credibility or truth of information.
Evaluation is the determination of the pertinence of the info to the operation,
reliability of the source of or agency and the accuracy of the info.

ACCURACY
A - Confirmed by other
B - Probably true
C - Possibly true
D - Doubtfully true
E - Improbable
F - Truth cannot be
judged

RELIABILITY
1 - Completely reliable
2 - Usually reliable
3 - Fairly reliable
4 - Not usually reliable
5 - Unreliable
6 - Reliability cannot
be judged

Source of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured Enemy
X- Observation of govt/civilian employee
Y/Z- Documentary

PHASE 4
Dissemination
Userefers
of Information
This phase of the&
cycle
to the activities
of transferring the processed information to
the proper users, most particularly the
authority that requires the activity. Processed
information can be disseminated through
annexes, estimates, briefing, message,
reports, overlays, and or summaries.

Methods of Dissemination
Fragmentary orders from top to bottom of the
command
Memorandum, circulars, special orders
Operations order, oral or written
Conference staff members
Other report and intelligence documents
Personal Contact

Who are the users of intelligence?


National leaders and military commanders
formulation and implementation of national policies.
Advisors and Staff preparations of plans and
estimates
Friendly nations or other branches of the armed
forces.
Processor basis for evaluation and interpretation.
Head / chairman of an organization
Any person with authority for purposes of planning.

INFORMATION
AND ITS SOURCES
INFORMATION IS THE LIFE-BLOOD OF
INTELLIGENCE
NO INFORMATION NO INTELLIGENCE

Information
Information refers to all evaluated materials of every
description including those derived from observation, reports,
rumors, imagery, and other sources from which intelligence in
produced. Information is a communicated knowledge by
others obtaining by personal study, investigation, research,
analysis, observation.
Two General classifications of sources of information:

Open Sources 99% of the information collected are coming


from open sources.
Close Sources 1% of information are collected from close
sources.

Overt Intelligence is the gathering of information or documents

procured openly without regard as to whether the subject or target


become knowledgeable of the purpose
Open Sources: Includes information taken from

Enemy activity
POW and Civilians
Captured documents
Map - Weather, forecast, studies, report - Agencies

Covert Intelligence is the secret procurement of information, which

is obtained without the knowledge of the person or persons


safeguarding vital intelligence interest.
Close Sources: Include information which maybe taken through:

Surveillance
Casing and Elicitation
Surreptitious entry
Employment of technical means (Bugging and Tapping device)
Tactical Interrogation
Observation and Description (ODEX)

PERSONS AS SOURCES OF
INFORMATION
Informant Net It is a controlled group of people
who worked through the direction of the agent
handler. The informants, principal or cutouts supply
the agent handler directly or indirectly with Intel
information
Informants (Asset) people selected as sources of
information, which could be voluntary, or in
consideration of a price.

Informant refers to a person who gives information


to the police voluntarily or involuntarily with out any
consideration
Informer those who give information to the police for
price or reward

Types of Informants

Criminal Informant an informant who give information to the


police pertaining to the underworld about organized criminals
with the understanding that his identity will be protected

Confidential Informant is similar to the former but he gives


information violate of the law to includes crimes and criminals

Voluntary Informant a type of informant who give information


freely and willfully as a witness to a certain act

Special Informant those who gives information concerning


specialized cases only and it is regarded a special treatment by
the operatives (ex. teachers, businessmen)

Anonymous Informant those who gives information through


telephone with the hope that the informant can not be identified

Sub-type of Informant

Incidental Informant a person who casually imparts


information to an officer with no intention of providing
subsequent information

Recruited Informant A person who is selected cultivated


and developed into a continuous source of info
Categories of Recruited Informants:

Spontaneous or Automatic Informant Informants who by


the nature of their work or position in society have a certain
legal, moral or ethical responsibilities to report info to the police

Ordinary (out-of-their-will) Informants those under the


compulsion to report info to the police

Special Employee informants who are of a specific


operational nature

Other Classification of Informant


Other terms related to people who gives
information are Automatic Informant,
Penetrating Agent , Infiltrating Agent , Full
time Informant , Rival Elimination Informant,
False Informant, Frightened Informant, Selfaggrandizing Informant, Mercenary
Informant , Double Crosser Informant ,
Woman Informant , Legitimate Informant.

Motives of Informants
People give information to the police due to
various reasons. Their motives include
reward, revenge, fear and avoidance of
punishment, friendship, patriotism, vanity,
civic-mindedness, repentance, competition,
and other motives.

INFROMANT RECRUITMENT
Selection it is particularly desirable to be able to identity and recruit

an informant who has access to many criminal in-group or subversive


organization. Wide access is probably the single most important feature
in the consideration of recruiting the potential informant
Investigation the investigation of the potential informants that has
tentatively identified as a probable must be as thorough as possible. It
must establish possible existing motives as to this person might assist
the police Intel community. Failure to do so will deny this office who
must perform the approach and persuasion phase with little more that a
guess. If necessary, conduct complete background investigation (CBI)
Approach must be done in a setting from which might include
pleasant surroundings, perhaps a confidential apartment, completely
free form any probability of compromise, preferably in an adjacent city
or a remote area foreign to the informants living pattern.
Testing the testing program should begin, of course, with the limited
assignment, with a gradual integration into the more important areas.
The occasional testing of an informant should continue through the
entire affiliation

INTELLIGENCE OPERATIONS
Intelligence Operations is the result of
intelligence planning, planning is always
ahead of operation although an operation can
be made without a plan, it is usually due to
sudden and inevitable situations but definitely
this is poor intelligence management

THE 14 OPERATIONAL CYCLES

Mission and Target


Infiltration the insertion of action agent inside the target organization
Penetration recruitment of action agent inside the target organization
Planning
Spotting
Partial Background Investigation (PBI) or Complete Background Investigation
Recruitment - the only qualification of an agent is to have an access to the target
Training
Briefing
Dispatch
Communication - technical method like telephone/radio, non-technical method like
personal meeting, live drop or dead drop
Debriefing
Payments depends upon the motivation of informant
Disposition involve activity on rerouting, retraining, retesting, termination
Reporting
Operational Testing

COVER AND UNDERCOVER


Cover - the means by which an individual

group of organization conceals the true


nature of its acts and or existence from the
observer.
Cover story a biographical data through
fictional that will portray the personality of the
agent he assumed, a scenario to cover up the
operation
Cover Support an agent assigned in target
areas with the primary mission of supporting
the cover story.

Undercover Assignment is an investigative technique in which agent conceal


his official identity an obtain information from that organization
Uses of Undercover Assignment
Use independently to get first hand info about the subject of investigation like:
a) Security evaluation of every installation
b) Gain confidence of suspended persons
c) Agent penetration
d) Verify info from human resources
e) Uncover concealed identity
Supplement other investigative techniques like:
a) Playing ground works for raids and searches by going entry
b) To assist in locating evidence
c) To install, maintain investigative equipments of undercover assignment

THE UNDECOVER AGENT


Special qualifications include knowledge of the language, area
background regarding events, knowledge about the custom and
habits, physical appearance, and must be an artist.
Factors considered in Selecting Cover Story
Mutual Point of Interest
Justification of presents
Previous and permanent address
Efficiency of role and freedom from the movement
Means of communication
Social and financial status
Optional alternate plan
Safe departure

Selecting Action Agents


Placement location of prospective agent with

respect to the target


Access it is the capability of a prospective agent to
obtain the desired info for the Intel organization or to
perform to Intel collection mission in the area.

Primary Access it is the access to the desired info


Secondary Access it is the access to the desired
info through a principal source where the latter has the
direct access
Outside Access the agent is employed outside the
target and merely monitor info from a third person who
is monitoring info n the area

CONTROL authority to direct the agent to carryout task or requirement


on behalf of the clandestine organization in an acceptable manner
and security
Two Categories of Control

Positive Control is characterized by professionalism and rapport like


Agent motivation and Psychological control

Negative Control characterized by threat and it include the


following:

Disciplinary Action includes verbal reprimand for poor performance


or insecure actions withholding certain material rewards, reduction of
agents salary or in extreme situation the threat of terminating
professional relationship
Escrow Account control of an agent by putting hi salary in a bank to
be withdrawn only after a fulfillment of a condition
Blackmail

Procuring Different Type of Agents

Agent in Place an agent who has been recruited by an


intelligence service within a highly sensitive target, who is just
beginning a career or have been long or (outside) insider.
Double Agent an enemy agent who has been captured,
turned around and sent back where he came from as an agent
of his captors
Expandable Agent an agent whom false information is leaked
to the enemy.
Penetration Agent an agent who has such reached the
enemy gets information and would manage to get back alive.
Agent of Influence an agent who uses influence to gain
information
Agent of Provocation one who provoke the enemy to give
information

METHODS OF COVERT
INTELLIGENCE
Surveillance
Surveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an
investigation. Surveillance of persons is called
Tailing or Shadowing, Surveillance of place is
called Casing or Reconnaissance, and
Surveillance of other things, events, and activities is
called Roping.

In Surveillance, the following are considered:

Pre-Surveillance Conference a conference held


among the team members, the police intelligence
unit before surveillance is conducted.
Surveillance Plan a plan established the as
required according to type of personnel, and the
general and specific instructions for surveillance.
Area Target Study refers to the area of operation
of surveillance activities.

Surveillant a person who conducts surveillance with includes only


observations.
Stakeout or Plant is the observation of places or areas from a
fixed point.
Tailing or Shadowing it is the observation of a persons
movement.
Undercover Man it refers to a person trained to observe and
penetrate certain organization suspected of illegal activities and
later reports the observation and informations that proper
operational action can be made
Liason Program the assignment of trained intelligence personnel
to other agencies in order to obtain information of police intelligence
value. (Agencies like the press, credit agencies, labor unions,
telephone companies)
Safehouse is a place, building, enclosed mobile, or an apartment,
where police undercover men meet for debriefing or reporting
purposes.

Drop any person is a convenient, secure and


unsuspecting place where police undercover men meet his
action agent for debriefing or reporting purposes.
Convoy an accomplice or associate of the subject used to
avoid or elude surveillant.
Decoy a cover supporting the surveillant who can become
a convoy whenever surveillant is burned.
Contact any persons whom the subject picks or deals
with while he is under observation and identifies the
observer.
Made when subject under surveillance becomes aware
that he is under observation and identifies the observer.
Lost when the surveillant does not know the whereabouts
of his subject or the subject had eluded the surveillance.

TYPES OF SURVEILLANCE

According to Intensity and Sensitivity

Discreet subject person to be watch is unaware that he is under


observation
Close subject is aware that he is under observation varied on each
occasions
Loose applied frequently or infrequently, period of observation varied
on each occasion

According to Methods

Stationary this is observation of place usually a bookie stall, a


gambling, joint, a residence where illegal activities are going on (fixed
position)
Moving surveillance follow the subject from the place to place to
maintain continuous watch of his activities
Technical this is a surveillance by the use of communications and
electronic hardwares, gadgets, system and equipment

Special Equipment (Technical Supports)


Camera with telephoto lens
Moving Picture camera
Binoculars
Tape recording apparatus
Wire taping device
Other instrument miniaturized one-way radio
Methods available to employ in Surveillance
Ordinarily, the methods are surveillance of place, tailing or
shadowing (1-2-3 man shadow), undercover investigation,
special methods includes: wire tapping - concealed
microphones - tape recorder -television - electric gadgets

Counter Surveillance the conduct of


operation is coupled with counter intelligence
measures such as window shopping, use of
convoys and decoys, stopping immediately
on blind corners, getting out immediately on
public conveyances, retracing, entering
mobile housing

CASING OR RECONNAISSANCE
Casing is the term use in the police organization
while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a
building place or area to determine its suitability for
Intel use or its vulnerability in operations. It aids in the
planning of an operation by providing needed
information. It assists the agent handler to install
confidence in his agent during briefing phase by
being able to speak knowingly about the area of
operation.
Casing is also considered a security measure
because it offers some degree of protection for those
operating in an area unfamiliar to them.

Method of Casing

Personal Reconnaissance the most effective


method and will produced the most info since you
know just what youre looking for.
Map Reconnaissance it may not sufficient but it can
produce a certain amount of usable information
Research - much info can be acquired through
research
Prior Information your unit and of the unit will have
file report that they may provide you with info
Hearsay info usually gain by the person operating in
the area and performing casing job

OBSERVATION AND DECRIPTION (ODEX)


Observation a complete and accurate
observation by an individual of his surroundings
an encompasses the use of all the major sense to
register and recognized its operational or Intel
significance
Description the actual and factual reporting of
ones observation of he reported sensory
experience recounted by another

ELICITATION
It is a system or plan whereby information of
intelligence value is obtained through the process
direct intercommunication in which one or more of he
parties to the common is unaware of the specific
purpose of the conservation. The three phases are
determination of the mission, selection of the subject,
and accomplishment of the mission.
Two Devices in the conduct of Elicitation
Approach process of setting people to start talking
Probe to keep the people taking incessantly

Example of Approach:
Teacher Pupil Approach the subject is
treated as an authority then solicit his view
point and opinion on a subject matter.
Good Samaritan Approach is the sincere
and valid offers of help and assistance are
made to the subject

PORTRAIT PARLE (P/P)


It is a means of using descriptive terms in
relation to the personal features of an
individual and it can be briefly described as a
world description or a spoken picture.
(Anthropometry - no two human beings has
the same body measurement)

BACKGROUND CHECKS AND INVESTIGATION


(BI- PSI or CBI)
Information needed:
Domestic Background
Personal Habit
Business History
Social or Business Associates
Medical History
Educational Background
Family History

TACTICAL INTERROGATION
The need for obtaining information of the
highest degree of credibility taken on the
minimum of time can be through interrogation
which varies and dependent entirely on the
situation.

Types of Interrogation

Screening - usually accomplished as soon as after capture,


apprehension or arrest of an interrogee. The objective is to
obtain background information about the interrogee and
determine his area of knowledge and ability.
Formal Interrogation (Detailed) the systematic attempt to
exploit to an appropriate depth those areas of the interrogees
knowledge, which have been identified in the screening
process.
Debriefing a form of eliciting information, which is generally
used when the area of intellectual capability of the interrogee
is known. Maximum use of the narrative and not try to trap the
person being debriefed with leading question. The
debriefer/interrogator must be familiar with the subject in
which the interrogation is being conducted.

Interrogation of Lay Personnel (Specific Type) the

techniques used are the same as in the interrogations, however,


especial effort must be made to established a common frame of
reference between the interrogator and the interrogee. The
amount of information obtained from this type will depend on the
interrogators inequity in establishing common terminology on
the source can understand which will enable the interrogator to
get the desired information.

Technical Interrogation the level of interrogation where the

source has specific and such detailed information that requires


a trained expert in the subject matter to be explored. It usually
covers the specific subject and time is not as limited as during
other interrogation.

Phases of Interrogation

Planning and Preparation


Approach (Meeting the Interrogee)
Questioning
Termination
Recording Reporting

INTERROGATION TECHNIQUES:

Techniques of Approach the purpose is to gain the cooperation of the


source and induce him to answer questions which will follows.
The Open Techniques the interrogator is open and direct in his approach
and makes no attempts to conceal the purpose of the interrogator. It is best
employed when the interrogee is cooperative. It is frequently used at the
tactical level where time is a major interrogator.
The Common Interest Technique the interrogator must exert effort to
impress the interrogee of their common interest. The interrogator must look for
he point out the real advantages the interrogee will receive if he cooperates
Record File (we know all technique) the interrogator prepare a file on the
source listing all known information (record should be padded to make it
appear to be very extensive). The information must contain the life history of
he interrogee to include his activities and known associates (Party- bio-data of
the interrogee is important). The we know all s used in conjunction with the
record file. During the approach, the interrogator may ask the interrogee about
a subject, if he refuses to cooperate, the interrogator may provide the answer
in order to impress him that the interrogator knows him very well (all is known).

Exasperation Techniques (Harassment) effectively employed against hostile


type interrogee. The interrogator must be alert because the interrogee may
fabricate information to gain relief from irritation (monotype). Subject Interrogee
is placed in a longer period of interrogation without rest or sleep. The
interrogator permits the source to go to sleep and subsequently awaken for
another series of questioning (this is done repeatedly). After many repetitions,
the interrogee will be exasperated and will finally cooperate hoping that he can
be allowed to rest or sleep. Ask a question, listen to a reply and then ask the
same question repeatedly (use a tape recorder if possible). The purpose is to
bore the interrogee thoroughly until he begins to answer questions freely to end
the harassment.

Opposite Personality Technique also known as Mutt and Jeff, Threat and
Rescue, Bud Guy God Guy, Sweet and Sour, Sugar and Vinegar, Devil
and Angel. Use of two (2) interrogators playing opposite roles.

Egotist Techniques (Pride and Ego) usually successful when employed


against an interrogee who has displayed a weakness or a feeling of insecurity.
You may reverse the technique by complimenting the interrogee in hopes of
getting him to admit certain information to gain credit. Described him as the best
person, superior or comrade.

Silent Technique employed against nervous or

the confident type of interrogee. Look out the


interrogee squarely in the eye with sarcastic smile
(force him to break eye contact first). He may ask
questions but the interrogator must not answer.
Patience is needed until the interrogator is ready to
break silence.

Question Barrage Technique (Rapid Fire

Questioning) intended to confuse the interrogee


and put him into a defensive position. The interrogee
become frustrated and confused, he will likely reveal
more than he intended, thus creating opening for
further questioning.

S-ar putea să vă placă și