Sunteți pe pagina 1din 145

POLICE INTELLIGENCE

QUEST REVIEW CENTER

GELBERT A. LLANTO

1
INTELLIGENCE

In Military Parlance, it is the end product


resulting from the collection, evaluation,
analysis, integration, and interpretation of all
available information which may have
immediate or potential significance to the
development and execution of plan, policies and
programs of the user.
 

2
Police intelligence
In Police Parlance, it is end product resulting
from the collection, evaluation, analysis,
integration and interpretation of all available
information regarding the activities of criminals
and other law violators for the purpose of
affecting their arrest, obtaining evidence, and
forestalling plan to commit crimes.

3
HISTORY OF INTELLIGENCE
Number 13:17-32 , Old
Testament (Holy Bible) = Moses
sent twelve (12) scouts to the land
of Canaan where he detected
directed them to spy the land, the
people and their location and the
nature of their cities.

4
Rahab – known as the “Harlot
of Jericho” who sheltered and
concealed the agents of Israel.
Made a covenant with the
agents and duped their
pursuers.

5
Delilah – an impromptu philistine
agent. Used her sex to gain
information that lead to the location
of the largest effective forces of the
enemy.

6
Sun Tzu – a Chinese
philosopher takes a more
practical view in intelligence
history. According to him, what
is called foreknowledge cannot
be elicited from spirits, nor
from gods. It must be obtained
from men who knew the enemy
situation. Sun–tzu wrote a book
entitled “the Art of War” which
is the favorite book of the late
Communist leader Mao Tse
7
Tung.
Alexander the Great –
when Alexander the Great
was marching to Asia, there
were rumors of disaffection
growing among his allies and
mercenaries. He sought the
truth and got it by simplest
expedient. He devised the
first letter sorting and
opening to obtain
information. (modern day
mail censorship)
8
General Romano Sertorius
– (Quintus Sertorius of
Rome) The Roman
commander in Spain who
possessed a white fawn and
allowed it to become widely
known that he derived both
secrets and guidance from its
fawn. His allies also believed
that he can communicate
with animals.
9
Akbar – known as the
“Great Mogul” master of
Hindustan who employed
more than 4,000 agents
for the sole purpose of
bringing him the truth
that his throne might rest
upon it.

third Mughal emperor of


India (1556-1605),
generally considered the
true founder of the Mughal 10
Genghis Khan – known as
the “Great Mongol”. A leader
of the so-called “Mongol
Conquererors” who used
effective propaganda
machine by spreading
rumors of mongol terror.
The Leaders usually
disguise as Merchants

11
The Renaissance Period
Sir Francis Walsingham – protector of
Queen Elizabeth I. he utilizes students
as his agents. He gave the England its
first National Secret Service. Regarded
as the First Great Spymaster.
He employed spies on the staff of
the Spanish army and able to obtain
information regarding Spanish army as
to their strength and weaknesses.
Walsingham created an effective
intelligence system by employing agents
in foreign courts.
12
 The most notable plot he discovered was the
plan to assassinate Elizabeth, initiated by the
English conspirator Anthony Babington and
authorized by Mary, Queen of Scots. The
evidence by Walsingham led to the execution
of Mary in 1587.

13
Armand Jean du Plessis (Richelieu) –
became a Cardinal and Chief or prime
minister of King Louis XIII. Cardinal Richelieu
became the most powerful in France.
  he found a footing in political life and soon won the
favor of the queen mother of France, Marie de Médicis.
Louis XIV – systematized political policy,
continuous surveillance, postal censorship
and military intelligence organization.
king of France (1643-1715), known as the Sun King.
Louis, third monarch of the Bourbon family, ruled for
72 years, the longest reign in European history
14
Napoleon Bonaparte – “one spy in
the right place is worth 20,000 men
in the field”. Organized two bureaus.
 
1. The bureau of intelligence –
consolidate all incoming information
regarding the enemy to obtain
information.
2. The topographical bureau –
maintains a large map, which covers
the latest information regarding both
enemy and friendly forces. 15
Frederick the Great –
known as the father of
organized military
espionage.
He divided his agents
into four classes:
1.Common spies –
recruited among poor folk,
glad to earn small sum or to
accommodate a military
officer.
16
2. Double spies – the law enforcers and
unreliable renegades of value. Chiefly in
spreading false information to the enemy.

3.Spies of consequences – couriers and


noblemen, invariable requiring a substantial
bribes or bait.

4.Persons who are forced to undertake


espionage against his will

17
Hannibal – considered one
of the brilliant military
strategies in history. He
had developed an effective
intelligence system for 15
years in Rome, and he
usually roam around the city
often disguised as a beggar
to gather first-hand
information.

18
Julius Caesar – during his
time, his staff of each
legion includes ten
“speculators” who served
as an information
collecting agency. The
speculators were the first
intelligence personnel to
appear definitely in a
military organization.

19
George Washington –
served as the Grand
Master in intelligence
who mobilized the free
masons of the colonies at
the outbreak of the
American war of
independence.

20
Karl Schulmeister – Renowned as "Napoleon's
Eye". He was credited for establishing counter
intelligence conducted against spies. He is a master
of deceit who used black mail to obtain vital
information pertaining to the personality and
identify of the enemies of Napoleon during the
18th Century.

21
Alfred Redl – brilliant intelligence agent although
a homosexual. Become chief of the Austro
Hungarian Secret Service, but in fact a double
agent of Russia. In 1913, his treason was
discovered and he was forced to commit suicide.
His treason lead to the death of 500,000 agents
and soldiers combine in 13 years of espionage
service.

22
Wilhelm Johann Karl Eduard
Steiber – Known as the Prussia's
"King of Sleuthhounds" as minister
of police he studied the use of
propaganda and censorship as well as
utilizing statistical intelligence
accounting. Steiber's thorough
organization and ruthless, his sinister
innovations and cold, calculating
manipulation of human weakness
made him the spymaster who most
shape the course of the 20th century
23
espionage.
The Brahma Kautlya – in
ancient india, he overthrew
the NANDA dynasty and
established the first
MAYURYAN king in the
Indian throne.
 

24
Mayuryan Spy System – rivaled the modern Soviets
and had the following tasks:
 
a. Shadow the king’s ministers and officials and attempt
to determine their very thoughts
b. Report wrong doings of the people
c. Operate secretly in foreign countries
d. Spread unrest
e. Commit act of sabotage
f. Assassinate political and military leaders
g. Official envoys were instructed to make friends with
officials of the enemy to compare their military strengths
25
with their own
William "Wild Bill" Donovan –
Headed the Office of Strategic
Service (OSS), the immediate
forerunner of the Central Intelligence
Agency, a lawyer and millionaire
Republican, Donovan enjoyed
Roosevelt's trust, friendship, and most
crucial of all direct access to the inner
sanctums of the White House. His
jovial outgoing personality and his
upper class social background played
a considerable part in setting overall
26
tone and style of "THE COMPANY"
Herbert Yardley – Head of
MI-8, The forerunner of the
Top Secret National
Security Administration
a.k.a Black Chamber, a
Cryptanalytic Organization.

27
Battle of Midway – In June
1442, the turning point of
the Naval in the Pacific, the
victory gained by the
Americans was due to the
disrupted messages from
the Imperial Japanese Navy.

28
Admiral Isoroku Yamamoto
– April 1943, the
Cryptoanalyst of the U.S.
Navy Communications
Intelligence intercepted a top
secret signal relaying the
travel of the Admiral.
En route ha was
intercepted and crashed in the
Jungles of Bougainville.

29
King Edward I – King of
England in 1725 organized a
systematic police system so
called Witch and Ward. By
Royal proclamation, the
profession “State Informer”
was created in 1734 enjoining
all informers to expose
criminal activities and be
compensated.

30
Joseph Fouche – The French
statesman (1759-1820) served
as minister of police under
Napoleon and was influential
in the return of Louis XVIII
to the throne in 1815.
He rose to become the
most feared and respected
intelligence director in
French history. He founded
the system spying against spy
which later know as counter- 31
espionage
JOSEPH PETROSINO – member of the New
York Police Department in early 1900, he was the
head of the Italian Squad. Through extensive
intelligence network, he is credited to smash the
Black Society.

Frey Tomas de Toquemada – Master Planner.


Conducted espionage during the 15th century
under the inquisition wherein purging and
ecclesiastical cleansing was undertaken to fortify
and solidify the church
32
Sir Samuel Luke
Chief Scout of Oliver Cromwell who was able
to dethrone King Charles I in British Civil War of
1640's. Sir Samuel Luke was said to be
industrious in snooping on the enemy.
 
John Churchill
first Duke of Marlborough, told critics of his
enormous expenditure on espionage, that " No
war can be conducted successfully without
early and good intelligence, and such advices
cannot be had but a very great expense". 33
Sir Arthur Wellesly – Duke of Wellington, who
defeated Napoleon's at Waterloo in 1815.
Regarded as the "Greatest Military Spymaster
of All Time". He live by the motto; "All the
business of war is to find out what you don’t
know by what you do." He always studied the
enemy in depth, finding out not only where the
opposing army was and how strong it was, but the
character of it's commander, the spirit and training
of its troops, their battle experience, and how they
were supplied with arms and rations. He also
studied and mapped the roads, rivers and
34
topography of the war theatre.
William Stephenson – A film mogul in England
who founded the British Security Coordination in
New York to cooperate with American spy
agencies on secret orders from Winston Churchill
in coordination with Franklin D. Roosevelt.
Stephenson commented that "Battles were
won because of advance knowledge of enemy
plans could influence those plans, and could
anticipate enemy actions by methods
heretofore concealed.”

35
V2 Rackets – OSS agents working in conjunction
with the British Intelligence, through penetration
and technical intelligence discovered Pneumundo,
which was the V2 guide missile research project
of Nazi Germany.

36
The Central Intelligence Agency (CIA) – The
agency was created under the US National
Security Act of 1947 a.k.a. Public Law 110
established by the late President Truman in January
1946.The CIA is under the National Security
Council. The First Director of the Agency was
Rear Admiral Roscoe Hillenkoetter. It is called
THE COMPANY.

37
The Federal Bureau of Investigation (FBI) –
First established in 1908 as an investigative arm
of the U.S. Department of Justice. It becomes
what is known as the F.B.I. under its first
director John Edgar Hoover in 1942.

38
The Committee for State Security – Russia –
The intelligence agency known as the KGB –
Komitet Gosudarstvennoy Bezopasnosti (KGB)

The British Secret Service (BSS – MI5/MI6) –


established in 1909 as an internal departments
under the control of Secret Service Bureau. It is
now known as Secret Intelligence Service (SIS)

39
The Mossad – (Ha-mosad le modiin u-letafquidim
meyuhadim) – The agency’s motto is found in
“Proverbs XI, 14” Where no counsel is, the people
fall, but in the multitude of counselors there is
safety. Mossad has two branches namely:
1. Aman – Military Intelligence (Israels Defense
Forces)
2. Shabak – General Security Service (Internal
Security
Shabak is from the word “shin bet” that means a
defender who shall not be seen. Reuven Shiloah
was the First Director of MOSSAD. 40
NATIONAL INTELLIGENCE COORDINATING
AGENCY (PHILIPPINES) – the intelligence
agency in the Philippines under the Office of
the National Security Adviser

41
IINFORMATION

Refers to all evaluated materials of every


description including those derived from
observation, reports, rumors, imagery, and other
sources from which intelligence is produced.

42
Two General Classifications of Sources of
Information:
1. Open Sources – 99% of the information
collected are coming from open sources.
 Enemy Activities
 POW
 Captured Documents
 Map
 Weather Forecast, Studies, Reports
 Agencies

43
Close Sources – 1% of information from close
sources.
2. Close/Covert Method
a. Surveillance
b. Casing
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means
f. Bugging and Tapping Devices
g. Tactical Interrogation
h. Observation and Description
44
PERSONS AS SOURCES OF INTELLIGENCE
Informant Net – a controlled group of people
who work through the direction of the agent
handler

Informant – persons who give information to


the police voluntarily

Informer – persons who give information for


reward or price

45
TYPES OF INFORMANTS
1. Criminal Informant – an informant who gives
information to the police pertaining to the
underworld about organized criminals with the
understanding that his identity will be protected.
 
2. Confidential Informant – is similar to the
former but he gives information of the violation of
the law to includes crimes and criminals.

46
3. Voluntary Informant – a type of informant who
give information freely and willfully as a witness
to a certain act.
 
4. Special Informant – those who gives
information concerning specialized cases only and
it is regarded a special treatment by the operatives
(ex. Teachers, businessman)

47
5. Anonymous Informant – those who gives
information through telephone with the hope that
the informant cannot be identified.

48
SUB-TYPE OF INFORMANT

1. Incidental Informant – person who casually


imparts information to an officer with no
intention of providing subsequent information

2. Recruited Informant – person selected,


cultivated and developed into a continuous
source of information

49
CATEGORIES OF INFORMANT

1. Spontaneous Informant – informant who by


reason of his position or work has certain
legal, moral or ethical responsibilities to report
an info to the police. Also known as Automatic
Informant

50
2. Ordinary (Out-of-Their-Will) Informant –
informant that is under the compulsion to
repot the info to the police

3. Special Employee – informant who is of a


specific operational value

51
Functional Classifications Of Police Intelligence

1. Criminal Intelligence – refers to the knowledge


essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.

52
2. Internal Security Intelligence – refers to the
knowledge essential to the maintenance of peace
and order.

3. Public Safety Intelligence – refers to the


knowledge essential to ensure the protection of
lives and properties.

53
Principles Of Intelligence
1. Intelligence and operation are interdependent –
separate and distinct activities but compliment each
other.
2. Intelligence requires continuous security
measures – deny unauthorized personnel
information about operation and intelligence
product.
3. Intelligence must be useful – must serve the
commander’s need and requirements

54
4. Intelligence must be timely – must reach the
user in time to serve as basis for appropriate action.

5. Intelligence must be flexible – based on reason


and sound judgment

6. Intelligence requires imagination and foresight –


agents must be given the leeway to be resourceful
to obtain more than what is normally acquired

55
Broad Categories of Intelligence

1. National Intelligence – integrated product of


intelligence developed by all government
departments concerning the broad aspect of
national policy and national security.

56
a. National Policy – specific courses of action
to achieve the national objectives.

b. National Security – this relate to the


protection and preservation of military, economic
and a productive strength of a country including
the security of the government and domestics and
foreign affairs against espionage, sabotage and
subversion.

57
2. Department of Intelligence – the intelligence
required by department or agencies of the
government to execute its mission and discharge its
responsibilities.

3. Military Intelligence – used in the preparation


and execution of tactical plans.

58
Fields of Police Intelligence

1. Strategic Intelligence – knowledge pertaining


to the capabilities and vulnerabilities of a foreign
nation, which is required by the National Planners
for the formulation of an adequate National
Defense in peace and forms the basis for, projected
military operations in time of war.

59
Components of Strategic Intelligence
a. Political Intelligence – deals with Domestic and
Foreign affairs and relation of government
operations;
1. Basic Principles of the Government
2. Government Structures
3. Public Order and Safety
4. Subversion
5. Intelligence and Security Organization

60
b. Economic Intelligence – deals with the extent
and utilization of Natural and Human resources to
the industrial potential of the Nations.

c. Transportation and Telecommunication


Intelligence – concerned with the operations and
facilities not only the Military but also the
Civilians.

61
d. Sociological Intelligence – deals with the
demographic and psychological aspects of groups
of people.
1. Population and Manpower
2. Characteristics of the People
3. Public Opinion – attitudes of the majority of
the people towards matters of public policy.
4. Education – based on literacy rate

62
e. Biographical Intelligence – deals with
individual personalities who have actual possession
of power.
f. Armed Forces Intelligence – deals with the
armed forces of the Nation.
1. Position of the Armed Forces – constitutional and
legal basis of its creation and actual role.
2. Organization and structure and territorial
disposition
3. Military Manpower Recruitment
4. Order of Battle
63
g. Geographical Intelligence – deals with the
natural as well as man made features of the
physical environment of man considered from the
point in view of military operations.
1. Location – military and economic
importance
2. Size – measurement of which a nation can
exchange space or time during war.
3. Shape
4. Weather and Climate

64
h. Scientific Intelligence – deals with the progress
of the research and development as it affects the
economic and military potential of a nation.

65
2. Line Intelligence (Tactical and Combat) – is
the intelligence required by the commander to
provide for planning and conduct of tactical
operation.

- Knowledge of the People, Weather, Enemy,


and Terrain (PWET) – used in planning and
conducting tactical and administrative operation in
a counter insurgency.

66
What are the Intelligence Information to be
Determined in Line Intelligence?
 People
living condition of the people
sources of income
education of the people
government livelihood of the people
extent of enemy influence to the people

67
 Weather

visibility
cloudy
temperature
precipitation(rain)
wind

68
 Enemy

location of the enemy


strength of the enemy
disposition
tactical capability
enemy vulnerability

69
 Terrain

relief and drainage system


vegetation
surface material
man made features

70
3. Counterintelligence – phase of intelligence
covering the activity devoted in destroying the
effectiveness of hostile foreign activities and the
protection of information against espionage,
subversion and sabotage.

Three Activity of Counterintelligence


1. Protection of information against espionage
2. Protection of personnel against subversion
3. Protection of installations and materials against
sabotage
71
Two General Types of Counterintelligence

1. Passive Measures – are those measures, which


seek to conceal information from the enemy.

2. Active Measures – are those measures, which


seek actively to block the enemies’ effort to gain
information or engage in espionage, subversion,
and sabotage.

72
Five Categories of Counterintelligence
Operation

1. Military Security – it encompasses the


measures taken by a command to protect itself
against espionage, enemy operation, sabotage,
subversion or surprise.
2. Port Frontier and Travel Security – has to do
with the application of both military and civil
security measures for counterintelligence control at
point of entry and departure, international borders
and boundaries. 73
3. Civil Security – it encompasses active and
passive counterintelligence measures affecting the
non-military nationals permanently or temporarily
residing in an area under military jurisdiction.
4. Censorship – it is the control and examination
of the following;
a. civil
b. national
c. armed forces
d. field press
e. POW
74
Counterintelligence Investigation – is an activity,
which constitute the value of the
counterintelligence workload, worldwide and
includes specific investigation of individual and
incidence, which for the most part are conducted in
an overt but discreet manner.

75
Three Categories of Counterintelligence
Measures

1. Denial Measures – secrecy discipline,


document security, camouflage and concealment,
communication security, military censorship,
counter reconnaissance effort

76
2. Detection Measures – secuiry tag or pass card,
challenge or password, reconnaissance

3. Deception Measures – ruse – use of escape and


evasion, dummy position, fabricated information

77
THE INTELLIGENCE CYCLE

Intelligence Cycle – the process through which


intelligence is obtained, produced and made
available to users.

PHASE I – Planning the Collection Effort – it


involves the determination of the requirements
of intelligence operation

78
1. Determination of Requirements
a. Enemy capabilities, including time, place,
strength, or other details
b. Enemy vulnerabilities, including nature,
extent, performance and other details
c. Enemy order of battle and factors
d. Terrain, including natural and artificial
obstacles
e. Weather
f. Information desired by higher, lower or
adjacent headquarters
79
2. Determination of the Essential Elements of
Information

Essential Element of Information – an item of


information of the characteristics of the area of
operations and the enemy which the
commander feels he needs before he can
reasonably arrive at a decision.

80
3. Establishment of Priorities

Priorities – reflect the criticality of the need for the


particular information. No formula exists which
can automatically determine priorities. Such
determination is a matter of judgment.

81
PHASE II – Collection of Information
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or technique in collection
e. Ensure timely collection

82
Factors in Choosing Collection Agents

1. Capability – agents placement or access to other


target
2. Multiplicity – more agents
3. Balance – the number of agents needed in the
operation

83
PHASE III – Processing the Collected
Information
1. Recording – is the reduction of information into
writing or some other form of graphical
representation and the arranging of this
information into groups related items.
2. Evaluation – is the determination of the
pertinence of the information to the operation,
reliability of the source of or agency and the
accuracy of the information.

84
Evaluation to Determine

a. Pertinence – does it holds some value to current


operation
is it needed immediately
b. Reliability – judging the source of information
or agency
c. Credibility – truth of information

85
Judging Credibility

a. It is possible for the reported fact or event to


have taken place?
b. Is the report consistent within itself?
c. Is the report confirmed or corroborated by
information from different sources or agencies?
d. If the report does not agree with information
from other sources which one is more likely to be
true?

86
3. Interpretation – it is the determination of the
meaning and significance of the information
relative to the information and intelligence already
known and drawing deductions about probable
meaning of the evaluated information.

a. Assessment – shifting and isolating those


elements the have significance in the light of the
mission or objective

87
b. Integration – combining the elements
isolated in analysis and known information to
form a logical picture or theory

c. Deduction – the formulation of


conclusions from the theory developed, tested
and considered valid in determination of effort
and meaning of the information

88
Reliability of
Information Accuracy of Information Sources
A – Completely 1 – Confirmed By Other T-Direct observation by a
Reliable Sources commander of a unit
B – Usually Reliable 2 – Probably True U-Report by a
penetration or resident
agent
C - Fairly Reliable 3 – Possibly True V-Report by an AFP
trooper or PNP
personnel in encounter
or operation
D – Not Usually 4 – Doubtfully True W-Interrogation of a
Reliable captured enemy agent or
foreigner

E – Unreliable 5 – Improbable X-Observation by a


government or civilian
employee or official

F – Reliability 6 – Truth Cannot Be Y-Observation by a


Cannot Be Judged Judged member of populace
Z-Documentary
89
PHASE IV – Dissemination and Use of
Information

1. Timeliness – intelligence must reach the


users on time to be of value.

2. Propriety – the message must be clear,


concise and complete and must be in the proper
form for the receiver to be readily
understandable

90
TOOLS FOR RECORDING INFORMATION
1. Intelligence Journal – permanent official
chronological record of the operations of the
intelligence section, unit or agency. Includes all
incoming and outgoing messages

2. Intelligence Workbook – a device that


provides a means of systematic arrangement of
information by type or subject for particular
topic are group together

91
3. Situation Map – graphic representation of
the current enemy situation

92
COVER AND UNDERCOVER OPERATIONS
Cover – the means by which an individual, goup
or organization conceals the true nature of its
acts and/or existence from the observer

Cover Story – a biographic account, true or


fictitious that will portray the personality of the
agent he assumed, a scenario to cover up the
operation.

93
TYPES OF COVER
1. Natural Cover – using actual or true
background
2. Artificial Cover – cover using biographical
data adopted for such purpose
3. Cover Within a Cover – use of secondary
cover in case of compromise for justification of
existence
4. Multiple Cover – any cover wished

94
FUNCTIONS OF COVER

1. Offensive – gives access to the target and


facilitates the achievement of clandestine
objective

2. Defensive – serves to prevent detection

95
Organizational Cover – an account consisting
of biographical data which when adopted by an
individual will assume the personality he wants
to adopt

96
HAZARDS TO COVER
1. Static or Dormant Opposition

2. Inhostile Active Opposition

3. Hostile Active Opposition

97
GUIDELINES WHEN COVER IS COMPROMISE
1. Move out immediately
2. Start new facility for operations and develop it
3. Build entirely new cover
4. Use circuitous route and provide careful
counter-surveillance
5. Be patient, build slowly and carefully

98
GUIDELINES WHEN ORGANIZATIONAL COVER
IS COMPROMISE
1. Make a physical move or relocate
2. Start new facility and let it grow
3. Use new personnel
4. Let old personnel remain in place
5. Build entirely new cover identity

99
UNDERCOVER OPERATION – an investigative
technique in which the agent conceal his official
identity to obtain information from the target
organization.

100
TYPES OF UNDERCOVER ASSIGNMENT

1. Dwelling – one in which the agent establishes


residence in or near the dwelling which houses
the subject

2. Work Assignment – places the undercover


agent in a type of employment where he can
observe the activities of the target

101
3. Social Assignment – requires to frequent
places of entertainment and amusement known
to be habitually visited by the target

4. Multiple Assignment – agent is given the


task of covering two or more of the above
specific assignments simultaneously

5. Personal Contact Assignment or Rope Job –


agent is required to develop friendship and trust
with the target for purposes of obtaining
information or evidence 102
METHODS OF UNDERCOVER OPERATIONS

1. Direct – employment and utilization of


special agents

2. Indirect – employment and utilization of


controlled informants

103
SELCTING ACTION AGENTS
1. Placement – location of prospective agent
with respect to the target

2. Access – the capability of a prospective agent


to obtain the desired information

104
TYPES OF ACCESS
1. Primary Access – the physical access to the
desired information

2. Secondary Access – the access to the desired


information through a principal source where
the agent has direct access

3. Outside Access – agent employed outside


target and merely monitor information from a
third person who is monitoring info in the area
105
CONTROL – is the authority to direct the agent
to carry out task or requirement on behalf of the
clandestine organization in an acceptable
manner and security

TWO CATEGORIES OF CONTROL


1. Positive Control – characterized by
professionalism and rapport like agent
motivation or psychological control

106
2. Negative Control – characterized by threat
which includes:

a. Disciplinary Action – includes verbal


reprimand for poor performance or insecure
actions of withholding certain rewards,
reduction of agents, salary or threat of
terminating professional relationship

107
b. Escrow Account – control of agent by
putting his salary in a bank to be withdrawn
only after a fulfillment of a condition
c. Blackmail

108
PROCURING DIFFERENT TYPES OF AGENT
1. Agent in Place – agent who has been
recruited by an intelligence service within a
highly sensitive target, who is just beginning a
career or have been long or insider

2. Double Agent – an enemy agent who has


been captured, turned around as an agent of his
captor

109
3. Expandable agent – agent whom false
information is leaked to the enemy

4. Penetration Agent – agent who reached the


enemy gets information and manage to get back
alive

5. Agent of Influence – agent who uses


influence to gain information
6. Agent of Provocation – agent who provoke
the enemy to get information
110
SURVEILLANCE

It is a form of clandestine investigation which


consists of keeping persons, place or other
targets under physical observation in order to
obtain evidence or information pertinent to an
investigation

111
Surveillant – person conducting the surveillance

Subject – a party under observation or


surveillance

Stakeout – the surveillant remains in one or


fixed position or locale. Also called Plant or
Fixed Surveillanmce

Convoy – a countermeasure to detect or elude


surveillance
112
Decoy – a cover supporting the surveillant who
can become a convoy whenever surveillance is
burned out

Drop – any convenient, secure and unsuspecting


place where police undercover man meet his
action agent for debriefing or reporting
purposes

Contact – any person whom the subject picks or


deals with while he is under observation and
identifies the observer 113
Mustard plaster – the subject is followed so
closely that surveillant and subject are almost in
lock step.. It is tantamount to protective custody

Tailgaiting – open surveillance in which the


subeject’s vehicle is closely followed

114
Tailing or Shadowing – surveillance of person

Casing or Reconnaissance – surveillance of place

Roping – surveillance of events, activities or


other things

115
TYPES OF SURVEILLANCE
A. According to Intensity and Sensitivity
1. Loose or Discreet – a cautious surveillance
in which the subject is unaware that he is being
followed or observed
2. Open or Rough – a surveillance with little or
no attempt of concealment. The subject is most
likely aware that he is followed.
3. Close or Tight – the subject is kept under
constant surveillance. The aim is not to lose the
subject even at the risk of being detected.
116
B. According to Methods
1. Stationary – the surveillant is in fixed
position

2. Moving – the surveillant follow the subject


from place to place to maintain continuous
watch

3. Technical – surveillance with the use of


electronic gadgets, equipments or systems

117
CASING OR RECONNAISANCE

Casing is the term used in the police


organization while reconnaissance is the term
used in the military.
It is the visual inspection of an area,
installation or building to determine its
suitability for operational activities.

118
TWO TYPES OF CASING
1. Exterior Casing – observation of the whole
area, building or installation, possible exits and
approaches and the types vicinity

2. Interior – close observation of the layout of


the building. Includes item that can be observed
a building which are of intelligence value.

119
Methods of Casing

1. Personal Reconnaissance – the most


effective method and will produce the most
information
2. Map Reconnaissance – it may not be
sufficient but may produce a certain amount of
information
3. Research – sometimes additional info can be
gathered through research

120
4. Prior Information – information from
records of file

5. Hearsay – info usually gain by operating


personnel

121
TAILING METHODS

a. One-Man Tailing – most difficult method


which must be a close one otherwise the person
being followed will be lost

b. Leapfrog Method – one member of the team


maintains contact with the subject. The other
members of the team keep contact with those
immediately ahead of them.

122
c. Group Method – involves several men, each
man maintains contact with the subject. One
may be abreast of the subject and others in
similar position. In order not to prevent
discovery, such positions may be exchange
between members of the group.

123
OBSERVATION AND DESCRIPTION

Observation – encompasses the use of all the


major senses to register and recognize the
significance of given operation

Description – actual and factual reporting of


one’s observation
85% of knowledge gathered through sight
13% gathered through hearing
2% gathered through three other senses 124
Do’s and Don’ts in Surveillance
1. Do not make abrupt or unnatural movement
2. Do not make use of disguise that will attract
attention
3. Never stare at the subject
4. Never speak to other surveillant unless
absolutely necessary
5. Plan ahead and be aware on changes of action
6. Take down notes safely
7. Make use of street furniture
8. Retrace the step of the subject in case the latter
turn around during shadowing 125
ELICITATION
A system in which information of value is
obtained through the process of direct
communication in which one or more of the
parties is unaware of the specific purpose of the
conversation.

126
ORDER OF BATTLE INTELLIGENCE (ORBAT)
It is the identification of strength, command
structure and disposition of the personnel, units
and equipment of any threat force.

127
PHYSICAL SECURITY

The system of placing barrier between the


potential intruder and the material being
protected

COMMUNICATION SECURITY
The protection resulting from the application
of measures to deny unauthorized persons from
gaining access from information of value.

128
DOCUMENT SECURITY

Document is any recorded information


regardless of its physical form or characteristics.

Classified Matter – information or matter in


any form or nature, the safeguarding of which is
necessary in the interest of national security.

129
Compartmentalization – granting of access to
classified document or information only to
properly cleared persons when such classified
document or info is required in the performance
of their official duties and restricting it to
specific physical confines when feasible

Need-To-Know – the term given to the


requirement that the dissemination of classified
matters be limited strictly to those persons
whose official duty requires possession theroff.
130
Compromise – lose of security resulting to
unauthorized person obtaining knowledge on
classified matter

Classify – the assigning of information or


material to one or of the four security
classification categories.

Upgrading – the changing of classified matter to


a categories higher than the previously assigned
to it
131
Reclassify – act of changing the assigned
classification of a document or material

Declassify – removal of the security


classification from document or material.

132
CATEGORIES OF CLASSIFIED MATTERS
1. Top Secret Document – record containing
information and material, the unauthorized
disclosure of which would caused exceptionally
grave damage to the nation, politically,
economically or from the point of national security.
This category is reserved for the nation’s closest
secrets and is to be used with great reserve. It is
covered with legal size bond paper lined with a
1/2-inch green border.

133
2. Secret Document – record containing
information or material, the unauthorized
disclosure of which would endanger national
security, cause serious injury to the interest and
prestige of the nation or any governmental activity
or would be of great advantage to other nation. It is
covered with legal size bond paper lined with a ½-
inch red border.

134
3. Confidential Document – containing
information or materials, the unauthorized
disclosure of which would be prejudicial to the
interest or prestige of the nation or any government
activity or would cause administrative
embarrassment or unwarranted injury to the honor
and dignity of an individual or would be of
advantage to foreign nation. Covered with legal
size bond paper lined with a ½-inch blue border.

135
4. Restricted Record – Information and material
which requires special protection other than that
determined to be top secret, secret or confidential.
Cover sheet is not necessary, what is important is a
bold RESTRICTED word at the top and at the
bottom of the bond paper.

136
PERSONNEL SECURITY INVESTIGATION
It is an inquiry into the character, reputation,
discretion and loyalty of an individual in order
to determine a person’s suitability or access to
classified matters prior to the granting of
security clearance

137
TYPES OF PERSONNEL SECURITY
INVESTIGATION

1. National Agency Check (NAC) –


investigation of an individual made on the basis
of written information supplied buy him in
response to an official inquiry. It is simply a
check no the files and records of national
agencies

138
2. Local Agency Check (LAC) – inquiry sent to
local government agencies, former employers,
character references and schools where the
subject attended.

3. Background Investigation – more


comprehensive that LAC or NAC.

139
TWO TYPES OF B.I.

1. Complete Background Investigation (CBI)


– it consists of the thorough and complete
investigation of the background of the subject
including all the circumstances of his life.

2. Partial Background Investigation (PBI) –


investigation of the background of the subject
but limited only to circumstances of his personal
life which are deemed pertinent to an
investigation. 140
Security Clearance – administrative
determination from a security standpoint that
an individual is eligible for access to classified
matter

141
TYPES OF CLEARANCE

1. Security Clearance – a certification issued by


the proper authority that the person described
has an access to classified matter at the
appropriate level.

2. Directed Clearance – a clearance granted for


a specific purpose upon completion of
prescribed records check or background check

142
CRYPTOGRAPHY– the art and science of code
and ciphers. It is done through the use of
telephone scrambler or technically speaking,
Speech Inverter where speech frequencies are
divided to produce a scrambling speech when
intercepted.

Cryptographer – person skilled in converting


messages from clear to unintelligible forms by
the use of codes and ciphers. Also known as
Coder, Encrypter or Code Clerk.
143
Crypto-Analyst – one who break intercepted
codes

Coding – changing of message from plain clear


text to unintelligible form. Also known as
Encrypting.

Decoding – transforming of coded message into


plain text. Also known as Decrypting.

144
THANK YOU
and
GOODLUCK !!

By: Gelbert A. Llanto


Dean: College of Criminal
Justice 145

S-ar putea să vă placă și