Documente Academic
Documente Profesional
Documente Cultură
GELBERT A. LLANTO
1
INTELLIGENCE
2
Police intelligence
In Police Parlance, it is end product resulting
from the collection, evaluation, analysis,
integration and interpretation of all available
information regarding the activities of criminals
and other law violators for the purpose of
affecting their arrest, obtaining evidence, and
forestalling plan to commit crimes.
3
HISTORY OF INTELLIGENCE
Number 13:17-32 , Old
Testament (Holy Bible) = Moses
sent twelve (12) scouts to the land
of Canaan where he detected
directed them to spy the land, the
people and their location and the
nature of their cities.
4
Rahab – known as the “Harlot
of Jericho” who sheltered and
concealed the agents of Israel.
Made a covenant with the
agents and duped their
pursuers.
5
Delilah – an impromptu philistine
agent. Used her sex to gain
information that lead to the location
of the largest effective forces of the
enemy.
6
Sun Tzu – a Chinese
philosopher takes a more
practical view in intelligence
history. According to him, what
is called foreknowledge cannot
be elicited from spirits, nor
from gods. It must be obtained
from men who knew the enemy
situation. Sun–tzu wrote a book
entitled “the Art of War” which
is the favorite book of the late
Communist leader Mao Tse
7
Tung.
Alexander the Great –
when Alexander the Great
was marching to Asia, there
were rumors of disaffection
growing among his allies and
mercenaries. He sought the
truth and got it by simplest
expedient. He devised the
first letter sorting and
opening to obtain
information. (modern day
mail censorship)
8
General Romano Sertorius
– (Quintus Sertorius of
Rome) The Roman
commander in Spain who
possessed a white fawn and
allowed it to become widely
known that he derived both
secrets and guidance from its
fawn. His allies also believed
that he can communicate
with animals.
9
Akbar – known as the
“Great Mogul” master of
Hindustan who employed
more than 4,000 agents
for the sole purpose of
bringing him the truth
that his throne might rest
upon it.
11
The Renaissance Period
Sir Francis Walsingham – protector of
Queen Elizabeth I. he utilizes students
as his agents. He gave the England its
first National Secret Service. Regarded
as the First Great Spymaster.
He employed spies on the staff of
the Spanish army and able to obtain
information regarding Spanish army as
to their strength and weaknesses.
Walsingham created an effective
intelligence system by employing agents
in foreign courts.
12
The most notable plot he discovered was the
plan to assassinate Elizabeth, initiated by the
English conspirator Anthony Babington and
authorized by Mary, Queen of Scots. The
evidence by Walsingham led to the execution
of Mary in 1587.
13
Armand Jean du Plessis (Richelieu) –
became a Cardinal and Chief or prime
minister of King Louis XIII. Cardinal Richelieu
became the most powerful in France.
he found a footing in political life and soon won the
favor of the queen mother of France, Marie de Médicis.
Louis XIV – systematized political policy,
continuous surveillance, postal censorship
and military intelligence organization.
king of France (1643-1715), known as the Sun King.
Louis, third monarch of the Bourbon family, ruled for
72 years, the longest reign in European history
14
Napoleon Bonaparte – “one spy in
the right place is worth 20,000 men
in the field”. Organized two bureaus.
1. The bureau of intelligence –
consolidate all incoming information
regarding the enemy to obtain
information.
2. The topographical bureau –
maintains a large map, which covers
the latest information regarding both
enemy and friendly forces. 15
Frederick the Great –
known as the father of
organized military
espionage.
He divided his agents
into four classes:
1.Common spies –
recruited among poor folk,
glad to earn small sum or to
accommodate a military
officer.
16
2. Double spies – the law enforcers and
unreliable renegades of value. Chiefly in
spreading false information to the enemy.
17
Hannibal – considered one
of the brilliant military
strategies in history. He
had developed an effective
intelligence system for 15
years in Rome, and he
usually roam around the city
often disguised as a beggar
to gather first-hand
information.
18
Julius Caesar – during his
time, his staff of each
legion includes ten
“speculators” who served
as an information
collecting agency. The
speculators were the first
intelligence personnel to
appear definitely in a
military organization.
19
George Washington –
served as the Grand
Master in intelligence
who mobilized the free
masons of the colonies at
the outbreak of the
American war of
independence.
20
Karl Schulmeister – Renowned as "Napoleon's
Eye". He was credited for establishing counter
intelligence conducted against spies. He is a master
of deceit who used black mail to obtain vital
information pertaining to the personality and
identify of the enemies of Napoleon during the
18th Century.
21
Alfred Redl – brilliant intelligence agent although
a homosexual. Become chief of the Austro
Hungarian Secret Service, but in fact a double
agent of Russia. In 1913, his treason was
discovered and he was forced to commit suicide.
His treason lead to the death of 500,000 agents
and soldiers combine in 13 years of espionage
service.
22
Wilhelm Johann Karl Eduard
Steiber – Known as the Prussia's
"King of Sleuthhounds" as minister
of police he studied the use of
propaganda and censorship as well as
utilizing statistical intelligence
accounting. Steiber's thorough
organization and ruthless, his sinister
innovations and cold, calculating
manipulation of human weakness
made him the spymaster who most
shape the course of the 20th century
23
espionage.
The Brahma Kautlya – in
ancient india, he overthrew
the NANDA dynasty and
established the first
MAYURYAN king in the
Indian throne.
24
Mayuryan Spy System – rivaled the modern Soviets
and had the following tasks:
a. Shadow the king’s ministers and officials and attempt
to determine their very thoughts
b. Report wrong doings of the people
c. Operate secretly in foreign countries
d. Spread unrest
e. Commit act of sabotage
f. Assassinate political and military leaders
g. Official envoys were instructed to make friends with
officials of the enemy to compare their military strengths
25
with their own
William "Wild Bill" Donovan –
Headed the Office of Strategic
Service (OSS), the immediate
forerunner of the Central Intelligence
Agency, a lawyer and millionaire
Republican, Donovan enjoyed
Roosevelt's trust, friendship, and most
crucial of all direct access to the inner
sanctums of the White House. His
jovial outgoing personality and his
upper class social background played
a considerable part in setting overall
26
tone and style of "THE COMPANY"
Herbert Yardley – Head of
MI-8, The forerunner of the
Top Secret National
Security Administration
a.k.a Black Chamber, a
Cryptanalytic Organization.
27
Battle of Midway – In June
1442, the turning point of
the Naval in the Pacific, the
victory gained by the
Americans was due to the
disrupted messages from
the Imperial Japanese Navy.
28
Admiral Isoroku Yamamoto
– April 1943, the
Cryptoanalyst of the U.S.
Navy Communications
Intelligence intercepted a top
secret signal relaying the
travel of the Admiral.
En route ha was
intercepted and crashed in the
Jungles of Bougainville.
29
King Edward I – King of
England in 1725 organized a
systematic police system so
called Witch and Ward. By
Royal proclamation, the
profession “State Informer”
was created in 1734 enjoining
all informers to expose
criminal activities and be
compensated.
30
Joseph Fouche – The French
statesman (1759-1820) served
as minister of police under
Napoleon and was influential
in the return of Louis XVIII
to the throne in 1815.
He rose to become the
most feared and respected
intelligence director in
French history. He founded
the system spying against spy
which later know as counter- 31
espionage
JOSEPH PETROSINO – member of the New
York Police Department in early 1900, he was the
head of the Italian Squad. Through extensive
intelligence network, he is credited to smash the
Black Society.
35
V2 Rackets – OSS agents working in conjunction
with the British Intelligence, through penetration
and technical intelligence discovered Pneumundo,
which was the V2 guide missile research project
of Nazi Germany.
36
The Central Intelligence Agency (CIA) – The
agency was created under the US National
Security Act of 1947 a.k.a. Public Law 110
established by the late President Truman in January
1946.The CIA is under the National Security
Council. The First Director of the Agency was
Rear Admiral Roscoe Hillenkoetter. It is called
THE COMPANY.
37
The Federal Bureau of Investigation (FBI) –
First established in 1908 as an investigative arm
of the U.S. Department of Justice. It becomes
what is known as the F.B.I. under its first
director John Edgar Hoover in 1942.
38
The Committee for State Security – Russia –
The intelligence agency known as the KGB –
Komitet Gosudarstvennoy Bezopasnosti (KGB)
39
The Mossad – (Ha-mosad le modiin u-letafquidim
meyuhadim) – The agency’s motto is found in
“Proverbs XI, 14” Where no counsel is, the people
fall, but in the multitude of counselors there is
safety. Mossad has two branches namely:
1. Aman – Military Intelligence (Israels Defense
Forces)
2. Shabak – General Security Service (Internal
Security
Shabak is from the word “shin bet” that means a
defender who shall not be seen. Reuven Shiloah
was the First Director of MOSSAD. 40
NATIONAL INTELLIGENCE COORDINATING
AGENCY (PHILIPPINES) – the intelligence
agency in the Philippines under the Office of
the National Security Adviser
41
IINFORMATION
42
Two General Classifications of Sources of
Information:
1. Open Sources – 99% of the information
collected are coming from open sources.
Enemy Activities
POW
Captured Documents
Map
Weather Forecast, Studies, Reports
Agencies
43
Close Sources – 1% of information from close
sources.
2. Close/Covert Method
a. Surveillance
b. Casing
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means
f. Bugging and Tapping Devices
g. Tactical Interrogation
h. Observation and Description
44
PERSONS AS SOURCES OF INTELLIGENCE
Informant Net – a controlled group of people
who work through the direction of the agent
handler
45
TYPES OF INFORMANTS
1. Criminal Informant – an informant who gives
information to the police pertaining to the
underworld about organized criminals with the
understanding that his identity will be protected.
2. Confidential Informant – is similar to the
former but he gives information of the violation of
the law to includes crimes and criminals.
46
3. Voluntary Informant – a type of informant who
give information freely and willfully as a witness
to a certain act.
4. Special Informant – those who gives
information concerning specialized cases only and
it is regarded a special treatment by the operatives
(ex. Teachers, businessman)
47
5. Anonymous Informant – those who gives
information through telephone with the hope that
the informant cannot be identified.
48
SUB-TYPE OF INFORMANT
49
CATEGORIES OF INFORMANT
50
2. Ordinary (Out-of-Their-Will) Informant –
informant that is under the compulsion to
repot the info to the police
51
Functional Classifications Of Police Intelligence
52
2. Internal Security Intelligence – refers to the
knowledge essential to the maintenance of peace
and order.
53
Principles Of Intelligence
1. Intelligence and operation are interdependent –
separate and distinct activities but compliment each
other.
2. Intelligence requires continuous security
measures – deny unauthorized personnel
information about operation and intelligence
product.
3. Intelligence must be useful – must serve the
commander’s need and requirements
54
4. Intelligence must be timely – must reach the
user in time to serve as basis for appropriate action.
55
Broad Categories of Intelligence
56
a. National Policy – specific courses of action
to achieve the national objectives.
57
2. Department of Intelligence – the intelligence
required by department or agencies of the
government to execute its mission and discharge its
responsibilities.
58
Fields of Police Intelligence
59
Components of Strategic Intelligence
a. Political Intelligence – deals with Domestic and
Foreign affairs and relation of government
operations;
1. Basic Principles of the Government
2. Government Structures
3. Public Order and Safety
4. Subversion
5. Intelligence and Security Organization
60
b. Economic Intelligence – deals with the extent
and utilization of Natural and Human resources to
the industrial potential of the Nations.
61
d. Sociological Intelligence – deals with the
demographic and psychological aspects of groups
of people.
1. Population and Manpower
2. Characteristics of the People
3. Public Opinion – attitudes of the majority of
the people towards matters of public policy.
4. Education – based on literacy rate
62
e. Biographical Intelligence – deals with
individual personalities who have actual possession
of power.
f. Armed Forces Intelligence – deals with the
armed forces of the Nation.
1. Position of the Armed Forces – constitutional and
legal basis of its creation and actual role.
2. Organization and structure and territorial
disposition
3. Military Manpower Recruitment
4. Order of Battle
63
g. Geographical Intelligence – deals with the
natural as well as man made features of the
physical environment of man considered from the
point in view of military operations.
1. Location – military and economic
importance
2. Size – measurement of which a nation can
exchange space or time during war.
3. Shape
4. Weather and Climate
64
h. Scientific Intelligence – deals with the progress
of the research and development as it affects the
economic and military potential of a nation.
65
2. Line Intelligence (Tactical and Combat) – is
the intelligence required by the commander to
provide for planning and conduct of tactical
operation.
66
What are the Intelligence Information to be
Determined in Line Intelligence?
People
living condition of the people
sources of income
education of the people
government livelihood of the people
extent of enemy influence to the people
67
Weather
visibility
cloudy
temperature
precipitation(rain)
wind
68
Enemy
69
Terrain
70
3. Counterintelligence – phase of intelligence
covering the activity devoted in destroying the
effectiveness of hostile foreign activities and the
protection of information against espionage,
subversion and sabotage.
72
Five Categories of Counterintelligence
Operation
75
Three Categories of Counterintelligence
Measures
76
2. Detection Measures – secuiry tag or pass card,
challenge or password, reconnaissance
77
THE INTELLIGENCE CYCLE
78
1. Determination of Requirements
a. Enemy capabilities, including time, place,
strength, or other details
b. Enemy vulnerabilities, including nature,
extent, performance and other details
c. Enemy order of battle and factors
d. Terrain, including natural and artificial
obstacles
e. Weather
f. Information desired by higher, lower or
adjacent headquarters
79
2. Determination of the Essential Elements of
Information
80
3. Establishment of Priorities
81
PHASE II – Collection of Information
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or technique in collection
e. Ensure timely collection
82
Factors in Choosing Collection Agents
83
PHASE III – Processing the Collected
Information
1. Recording – is the reduction of information into
writing or some other form of graphical
representation and the arranging of this
information into groups related items.
2. Evaluation – is the determination of the
pertinence of the information to the operation,
reliability of the source of or agency and the
accuracy of the information.
84
Evaluation to Determine
85
Judging Credibility
86
3. Interpretation – it is the determination of the
meaning and significance of the information
relative to the information and intelligence already
known and drawing deductions about probable
meaning of the evaluated information.
87
b. Integration – combining the elements
isolated in analysis and known information to
form a logical picture or theory
88
Reliability of
Information Accuracy of Information Sources
A – Completely 1 – Confirmed By Other T-Direct observation by a
Reliable Sources commander of a unit
B – Usually Reliable 2 – Probably True U-Report by a
penetration or resident
agent
C - Fairly Reliable 3 – Possibly True V-Report by an AFP
trooper or PNP
personnel in encounter
or operation
D – Not Usually 4 – Doubtfully True W-Interrogation of a
Reliable captured enemy agent or
foreigner
90
TOOLS FOR RECORDING INFORMATION
1. Intelligence Journal – permanent official
chronological record of the operations of the
intelligence section, unit or agency. Includes all
incoming and outgoing messages
91
3. Situation Map – graphic representation of
the current enemy situation
92
COVER AND UNDERCOVER OPERATIONS
Cover – the means by which an individual, goup
or organization conceals the true nature of its
acts and/or existence from the observer
93
TYPES OF COVER
1. Natural Cover – using actual or true
background
2. Artificial Cover – cover using biographical
data adopted for such purpose
3. Cover Within a Cover – use of secondary
cover in case of compromise for justification of
existence
4. Multiple Cover – any cover wished
94
FUNCTIONS OF COVER
95
Organizational Cover – an account consisting
of biographical data which when adopted by an
individual will assume the personality he wants
to adopt
96
HAZARDS TO COVER
1. Static or Dormant Opposition
97
GUIDELINES WHEN COVER IS COMPROMISE
1. Move out immediately
2. Start new facility for operations and develop it
3. Build entirely new cover
4. Use circuitous route and provide careful
counter-surveillance
5. Be patient, build slowly and carefully
98
GUIDELINES WHEN ORGANIZATIONAL COVER
IS COMPROMISE
1. Make a physical move or relocate
2. Start new facility and let it grow
3. Use new personnel
4. Let old personnel remain in place
5. Build entirely new cover identity
99
UNDERCOVER OPERATION – an investigative
technique in which the agent conceal his official
identity to obtain information from the target
organization.
100
TYPES OF UNDERCOVER ASSIGNMENT
101
3. Social Assignment – requires to frequent
places of entertainment and amusement known
to be habitually visited by the target
103
SELCTING ACTION AGENTS
1. Placement – location of prospective agent
with respect to the target
104
TYPES OF ACCESS
1. Primary Access – the physical access to the
desired information
106
2. Negative Control – characterized by threat
which includes:
107
b. Escrow Account – control of agent by
putting his salary in a bank to be withdrawn
only after a fulfillment of a condition
c. Blackmail
108
PROCURING DIFFERENT TYPES OF AGENT
1. Agent in Place – agent who has been
recruited by an intelligence service within a
highly sensitive target, who is just beginning a
career or have been long or insider
109
3. Expandable agent – agent whom false
information is leaked to the enemy
111
Surveillant – person conducting the surveillance
114
Tailing or Shadowing – surveillance of person
115
TYPES OF SURVEILLANCE
A. According to Intensity and Sensitivity
1. Loose or Discreet – a cautious surveillance
in which the subject is unaware that he is being
followed or observed
2. Open or Rough – a surveillance with little or
no attempt of concealment. The subject is most
likely aware that he is followed.
3. Close or Tight – the subject is kept under
constant surveillance. The aim is not to lose the
subject even at the risk of being detected.
116
B. According to Methods
1. Stationary – the surveillant is in fixed
position
117
CASING OR RECONNAISANCE
118
TWO TYPES OF CASING
1. Exterior Casing – observation of the whole
area, building or installation, possible exits and
approaches and the types vicinity
119
Methods of Casing
120
4. Prior Information – information from
records of file
121
TAILING METHODS
122
c. Group Method – involves several men, each
man maintains contact with the subject. One
may be abreast of the subject and others in
similar position. In order not to prevent
discovery, such positions may be exchange
between members of the group.
123
OBSERVATION AND DESCRIPTION
126
ORDER OF BATTLE INTELLIGENCE (ORBAT)
It is the identification of strength, command
structure and disposition of the personnel, units
and equipment of any threat force.
127
PHYSICAL SECURITY
COMMUNICATION SECURITY
The protection resulting from the application
of measures to deny unauthorized persons from
gaining access from information of value.
128
DOCUMENT SECURITY
129
Compartmentalization – granting of access to
classified document or information only to
properly cleared persons when such classified
document or info is required in the performance
of their official duties and restricting it to
specific physical confines when feasible
132
CATEGORIES OF CLASSIFIED MATTERS
1. Top Secret Document – record containing
information and material, the unauthorized
disclosure of which would caused exceptionally
grave damage to the nation, politically,
economically or from the point of national security.
This category is reserved for the nation’s closest
secrets and is to be used with great reserve. It is
covered with legal size bond paper lined with a
1/2-inch green border.
133
2. Secret Document – record containing
information or material, the unauthorized
disclosure of which would endanger national
security, cause serious injury to the interest and
prestige of the nation or any governmental activity
or would be of great advantage to other nation. It is
covered with legal size bond paper lined with a ½-
inch red border.
134
3. Confidential Document – containing
information or materials, the unauthorized
disclosure of which would be prejudicial to the
interest or prestige of the nation or any government
activity or would cause administrative
embarrassment or unwarranted injury to the honor
and dignity of an individual or would be of
advantage to foreign nation. Covered with legal
size bond paper lined with a ½-inch blue border.
135
4. Restricted Record – Information and material
which requires special protection other than that
determined to be top secret, secret or confidential.
Cover sheet is not necessary, what is important is a
bold RESTRICTED word at the top and at the
bottom of the bond paper.
136
PERSONNEL SECURITY INVESTIGATION
It is an inquiry into the character, reputation,
discretion and loyalty of an individual in order
to determine a person’s suitability or access to
classified matters prior to the granting of
security clearance
137
TYPES OF PERSONNEL SECURITY
INVESTIGATION
138
2. Local Agency Check (LAC) – inquiry sent to
local government agencies, former employers,
character references and schools where the
subject attended.
139
TWO TYPES OF B.I.
141
TYPES OF CLEARANCE
142
CRYPTOGRAPHY– the art and science of code
and ciphers. It is done through the use of
telephone scrambler or technically speaking,
Speech Inverter where speech frequencies are
divided to produce a scrambling speech when
intercepted.
144
THANK YOU
and
GOODLUCK !!