THE CRIMINAL INTELLIGENCE FUNCTION
Introduction
Information is the greatest tool used by criminal investigators and it helps them in
making arrests and solving crime. The intelligence collective process is the collection of
information on people and places associated with criminal activity before there is
sufficient probable cause for arrest.
The process for learning criminal information typically includes overt and covert
collection methods.
Learning Outcome
At the end of this module you must have:
1. Understood the role of Criminal Intelligence;
2. Determined about the various kind of intelligence and;
3. Distinguished the role of the police and military
Intelligence is said to be crucial to internal security because it provide us with
advance warning of insurgency activity. It can provide with detailed knowledge of the
insurgent organization, its personnel, plans, and tactics. It is essential to all operations
because internal defense operations directed against armed insurgent, their
underground organization, and their support system including its human and material
resources. It is also said to be a responsibility of all government agencies because
much of the information required for intelligence purposes could best be provided by
civilian governmental agencies, which are primarily concerned with public administrative
activities. The military and police intelligence activities must be integrated within the
overall intelligence program of the government in much the same manner that police
operations, civic actions, and psychological operations must be integrated within overall
government program.
Intelligence of the government must be superior to the of the enemy because
the struggle between a subversive insurgent's organization and the constituted
government of the nation has sometimes been called an intelligence war. The
government must also retain positive intelligence concerning the insurgent organization
and all factions within the population in order to identify and locate subversive elements.
DEFINATION OF TERMS:
Intelligence has been defined as the end product resulting from the collection, collation,
evaluation, analysis, integration, and interpretation of all available information.
Information Is an unprocessed material of every descriptions including those derived
from observation, communications, reports, rumors, imagery, and other sources from
which intelligence is produced.
Intelligence Information It is an information gathered or received which is of
intelligence interest
Intelligence Community Integrated and nearby organized entity composed of units or
agencies, which have intelligence interest, functions and responsibilities
Informer One who gives information for a reward or price
Informant Anyone who can furnish information.
Essential Interests in Intelligence
Intelligence Defined
Webster defines intelligence as the capacity for understanding and for other
forms of adaptive intellect of behavior, the mind in operation; the power of meeting any
situation, especially a novel situation, successfully by proper behavior adjustments; the
ability to apprehend the interrelationships of presented facts in such a way as to guide
action towards one’s knowledge of an event, circumstances, etc., received or imparted;
the gathering or distribution of information: the staff of persons engaged in obtaining
such information:
Base on Psychology Intelligence is the capacity of a person to adjust to new
situations through the use of what has been previously learned.
According to Government Commission Task Force It means the collection,
processing, collation, interpretation, evaluation and dissemination of information, with
references to national security. In certain context, it may also mean the network or the
system for the collection, collation, interpretation, evaluation, processing, and
dissemination of information. "The term as used here doesn't t include any police
powers or authorities, any investigative function other than those involve in the
collection of information nor any function involved in the enforcement of laws, orders, or
regulation.
According to Military Terminologies Intelligence is the end product resulting
from the collection, evaluation, analysis, integration and interpretation of all available
information which may have immediate or potential significance to the development and
execution of plans, policies and programs of the users.
According to Police Parlance-The end product resulting from the collection,
evaluation, analysis, integration and interpretation of all available information regarding
the activities of criminal and other law violators for the purpose of affecting criminals
and other law violators for the purpose of affecting their arrest, obtaining evidence, and
forestalling plan to commit crime.
Functions of Intelligence in General
Today all counties have their intelligence services. They may be different in their
organization, efficiency and method but they all have the basic functions such as:
1. The collection or procurement of information
2. The evaluation of the information which then become intelligence
3. The dissemination of intelligence to those who need it.
4. Counter intelligence or negative intelligence, which is dedicated to the concealment
and protection of one's own information from the adversary intelligence operation. It is a
defensive function of intelligence.
CATEGORIES OF INTELLIGENCE
1. Tactical Intelligence Concerned with the effects of the enemy, weather or terrain on
the enemy and friendly forces. It deals with capabilities rather than intentions. It offers
the tactical commander the answer to questions concerning the capabilities and
conditions Focuses directly t operation.
2. Strategic Intelligence- Deals with political, economic and military capabilities and
vulnerability of all nations
3. Counter Intelligence - Aspect of intelligence which comprises civil and police/military
measures to counter the enemy or to prevent sabotage or subversive activities
RELATIONSHIP BETWEEN STRATEGIC AND TACTICAL
INTELLIGENCE
- Both are concerned with significant information pertaining actual or potential enemy
operations/activities
- Distinctive is in the scope, perspective and level of use,
INTELLINCE AXIOMS (Facts/Rules)
Axioms are facts that require no proof because truth of these statements is obvious.
I- Intelligence is crucial to internal security
II- Intelligence is essential all types of operation
III- Intelligence is the responsibility of all agencies.
IV Intelligence of the government must be superior to that the enemy.
BASIC PRINCIPLE OF INTELLIGENCE OPERATIONS
Intelligence is continue - All intelligence activities follow a simple continue intelligence
cycle. At the same time that new information is being collected in response to direction,
is being processed and intelligence is being used.
Intelligence Operations and Tactical Operations are inter dependent - Intelligence
operation is an integral part of the operation of all units. Success of the mission is
dependent on the quality and effectiveness of intelligence. Tactical and strategy are the
cause of intelligence operation
Intelligence must be useful - useful intelligence enhances understanding of the
problem to be solved and result in assisting the commander's problem is essential to to
determine what intelligence is useful.
Intelligence must be timely - best intelligence is worthless if it does not reach the user
in time for appropriate consideration or action.
Intelligence operation must be flexible - intelligence operation are based reason and
sound judgement and procedures adapt to given situation.
Intelligence operations require imagination and foresight - Policies and procedures
with limit imagination of initiative are avoided, acceptance and satisfaction with
continuance of the current situation can lead to disaster.
Intelligence requires constant security measures - Security measures are necessary
to insure that unauthorized personnel are denied of information and intelligence
produced Secrecy count to hide form of covered information or intelligence Security
measures must not deter dossier of information or intelligence to persons who "NEED
TO KNOW
Uses of Police Intelligence
Police covert and overt intelligence operation maybe used to:
1. Check the condition of the he community relating to crime, vice, juvenile delinquency
and indications of subversion and insurgency.
2. Determine through counter intelligence applicant matters pertaining to personnel
security, physical security and document security of the police organization.
3. Determine the follow-up leads that helps in the solution of individual criminal cases.
4. Identity criminal elements and other law breakers as well as their associates.
5. Assist in the arrest of wanted criminals and those wanted under RA 1700 otherwise
known as the Anti- Subversion Law.
6. Check on the quality and effectiveness of the operation of the police forces.
7. Check on the security conditions of police personnel, funds, equipment and materials.
Help in crime control prevention.
8. Serve as a tool of management for planning and organizational employment purpose
Immediate Area and Interest in Police Intelligence
In a specific setting, the police organization is more interested in the following
immediate concerns:
1. Crime prone community relating to vices, juvenile delinquency, Crime an indication of
subversion and insurgency.
2. All matters pertaining to personnel security, physical security, and classified
documents.
3. Cases under follow-up
4. Personalities directly or indirectly involved in criminal activities.
5. Personalities, places, events involved in insurgency and subversion
6. Police operation regarding its effectiveness and quality
7. Police personnel, its equipment, funds and materials
8. Aspect of crime prevention and control
9. Aspect of management for planning and organization improvement purposes.
10. And other as directed by higher authorities:
General Activities in Police Intelligence
1. Strategic Intelligence it is an intelligence activity which is primarily long range in
nature with little practical immediate operation value.
2. Line Intelligence it is an intelligence activity that has the immediate nature and
value necessary for more effective police planning and operation.
3. National Intelligence it is the integrated product of intelligence developed by all the
governmental branches, departments concerning the broad aspect of
national security and policy. It is concerned to more than one department or
agency and it is not produced by single entity. It is used to coordinate all the
activities of the government in developing and executing integrated and national
policies and plans.
4. Counter-Intelligence phase of intelligence covering the activity devoted in
destroying the effectiveness of hostile foreign activities and to the protection of
into against espionage, subversion and sabotage.
5. Undercover Work is an investigative process in which disguises and pretext cover
and deception are used to gain the confidence of criminal suspects for the
purpose of determining the nature and extent of any criminal activities that
maybe contemplating or perpetuating
Functional Classification of Police Intelligence.
1 Criminal Intelligence-refers to the knowledge essential to the prevention of crimes
and the investigation. arrest, and prosecution of criminal offenders.
2. Internal Security Intelligence maintenance of peace and order.
3. Public Safety, Intelligence refers to the knowledge essential to ensure the protection
of lives and properties
Kinds of Intelligence
1. Strategic Intelligence as defined earlier, it is an intelligence data that are not
of an immediate value. It is usually descriptive in nature, accumulation of physical
description of personalities, modus operandi. It does not have immediate operational
value but rather long range that may become relevant to future police operations
2. Line Intelligence It is the kind of intelligence required by the commander to
provide for planning and conduct tactical and administrative operation in counter
insurgency. This pertains to knowledge of People, Weather, Enemy and Terrain
(PWET) used in planning and conducting tactical and administrative operation in a
counter insurgency.
Intelligence information to be determined in Line Intelligence are:
People - living condition of the people, sources of income, education of the people,
government livelihood projects extent of enemy influence to the people
Weather - visibility, cloudy, temperature, precipitation train), wind
Enemy - location of the enemy strength of the cu disposition, tactical capability, enemy
vulnerability
Terrain - relief and drainage system, vegetation, surface material, man-made features.
There are military aspects of terrain, which includes cover and Concealment,
obstacle critical key terrain features, observation and fields of fire and avenues of
approach
3. Counter Intelligence (CI) this kind of intelligence covers the activity devoted
in destroying the effectiveness of hostile foreign activities and to the protection of love
against espionage, subversion and sabotage. Hence, the three activities of Cl are:
protection of information against espionage, protection of personnel against subversion,
and protection of installations and material against sabotage.
Measures in CI must be both passive and active. Passive measures are those
measures which seek to conceal info from the enemy while active measures are those
which seeks actively to block the enemy's efforts to gain into or engage in espionage,
subversion or sabotage.
Counter intelligence is also known as Negative Intelligence generic term meaning
tree different things.
Security Intelligence means that the total sum of efforts to counsel the national policies,
diplomatic decisions, military data, and any other information of a secret nature affecting
the security of the form unauthorized persons. It is an effect to deny information to
unauthorized persons by restricting to those who are explicitly authorized to possess it
Counter Intelligence
Counter intelligence is the organized effort to protect specific data that might be of value
to the opponent's own intelligence organization, Some of its functions are:
Censorship - of the following: correspondence, broadcast telecast, telephone
conversations, telegrams and cables, etc., prevention of the dissemination of any
information that might aid an opponent; maintenance of files of suspect, surveillance of
suspects, mail reading, wiretapping and recording: infiltration of the enemy intelligence
organized to procure information about its method, personal, specific operations and
interest.
Counter Espionage
In counter-espionage, negative intelligence becomes a dynamic and active effort.
Its purpose is to investigate actual or theoretical violation of espionage laws, to enforce
those laws and to apprehend any violators. It is a job to catch spies. It is basically a
police function. According to Sir Bassil Thomson former chief of Scotland Yard Criminal
Investigation Division:
"A basic requirement of the secret agent is disguise himself and his mission
Much of his training and basic skill is dedicated to concealment. He is supposed to be
supplied with a foolproof cover story and good documents He must be a man of
exception ability or else he would not be chosen for this intricate job) The trapping of the
dark intruder is a formidable talk."
Counter espionage is simple aimed at locating the enemy, to identifying the
enemy, and neutralizing the enemy.
Five Categories of CI Operation
1. Military Security it encompasses the measures taken by a command to protect
itself against espionage, enemy operation, sabotage, subversion or surprise.
Examples are:
Secrecy discipline Special safeguarding of classified information, Security of
troop movement, Special handling of weather & escapes Counter subversion with in the
armed forces Tactical measures in combat area.
2. Port Frontier and Travel Security has to do with the application of both military and
civil security measures for Cl control at point of entry and departure, international
borders or boundaries.
Examples are:
Security screening and control of frontier Security control of merchants, seaman
and crew of commercial aircraft, Security control of frontier crossing point
Security control of seaports
3 Civil Security it encompasses active and passive Cl measures affecting the non-
military nationals permanently or temporarily residing in an area under military
jurisdiction. diction
Examples are:
Systematic registration of civilians and aliens. Control of circulation, Curfew,
Surveillance of suspected political organizations Security screening of labor,
Issuance Of passes and permits Control of internal Commerce
4. Censorship it is the control and examination of civil, national, armed forces, field
press, and POWs
5. Special Operations counter subversion, sabotage and espionage
Counter Intelligence (CI) Operation
Cl operation is an activity that constitutes the value of the Cl workload worldwide
and includes specific investigation of individual and incidence which for the most part
are conducted in an overt but discreet manner.
Three Categories of CI Measure
1. Denial Measure-secrecy discipline, document security. camouflage and
concealment, communication security, military censorship. counter
reconnaissance
2. Detection Measure- PSI, security tag or pass card. challenge or password
reconnaissance
3. Deception Measures-ruse use of escape and evasion dummy position,
fabricated information
Categories of CI Operation
1. Counter Human Intel (HUMINT) seeks to overcome enemy attempts to use human
sources to collect information or to conduct sabotage and subversion which includes Cl
special operations, liaison, counter security, and Cl screening
2. Counter Imagery Intel (IMINT) Includes action takes to determine enemy and
related enemy weaknesses, capabilities and activities. These actions include
surveillance radar, photo thermal and infrared systems.
3. Successful counter IMINT operations rely heavily on pattern and movement
analysis and evaluation of the enemy.
4. Counter Signal Intel (SIGINTI determine enemy SIGINT and related enemy
Weaknesses capabilities and activities, assess friendly operations to identity patterns,
profiles and develop, recommend and analyze counter measures
THE INTELLIGENCE CYCLE
Introduction
The single most important part of intelligence activities is the understanding of
the intelligence cycle because mission which is the core of the cycle serves as the
foundation of all intelligence operations. That every operation must therefore put into
mind the phases of the cycle.
Learning Outcomes
At that end of this module you must have;
1. Identified the intelligence cycle
2. Comprehended the different types of criminal activity focused on in the
intelligence
3. Determined the methods of covert intelligence
PHASE 1
PLANNING THE COLLECTION EFFORT
This phase of the cycle involve the determination of the requirements of
intelligence. It is concerned with identifying the so called Essential Element of
Information (EEl) an item of intelligence or information of the characteristics of the are of
operations and the enemy, which he commander feels he needs before he can
reasonably arrive at a decision.
With this, the intelligence officer must have a though knowledge of the available
sources of information, the collecting agencies and type of into the latter can particular
Intel required for success. He must have a thorough knowledge of the tactics,
organizations, and characteristics of the enemy and be especially competent in the
fields of acquisition of operations
Categories of Intelligence Requirements In Relation to Use:
1. Executive are those information required by execution, governmental and military
commanders; the executive requirements are the basis for decisions and national policy
making
2. Contributory information required to complete the staff process- make staff plans and
estimates that contribute to the decision and policy making.
3. Operational additional intelligence required in planning and carrying out effectively
the decision or policy announced. Decisions and policy require implementation.
4. Collateral higher or adjacent echelons of the government or military establishment
may require info.
In Relation to Type:
1. Basic are general reference materials for use in the planning regarding the enemies,
area or operations. capabilities-static comprehensive.
2 Current are information which are temporary in nature and narrower in scope.
3. Estimative are those that determine the future courses of action, required by the
executives to plan future military operations and policies.
Formulation of Intelligence Requirements
1. What are their capabilities and vulnerabilities?
2. What are the physical characteristics of the probable area of operation?
3. What major policies, plans and decisions must be made in the near future?
4. What step must be taken to preserve the security of the nation?
5. What is the information required by the higher, lower or adjacent echelons within the
government or armed forces?
Determination of the Priority
In the formulation of intelligence requirements determination of priority becomes
necessary. This is in order to decide which items or information are more important a
system of priority is needed, critical importance and lesser importance. The EEI is the
highest priority intelligence requirements because it indicates the intelligence
requirements essential to planning
PHASE 2
COLLECTION OF INFORMATION
This phase of the cycle is concerned with identification of the collecting agency,
the formulation of procedures on the manner or collecting the information in conjunction
with the plans as achieved in phase one.
Selection of Collecting Agencies
1. List all available sources. exploit the collecting agencies
2. Collection will be assigned in accordance with capabilities.
3. Collection directives prepared once the proper collecting agency has been selected
to exploit a particular source.
4. Collection directives do not limit the activities of the collecting agency.
5. Criteria for the selection of collecting agency suitability, capability, confirmation,
timeliness and balance
Purpose of the Collection Plan
1. To insure logical and orderly analysis of the intelligence
2. To establish a workable collection scheme based on the analysis of the intelligence
requirement.
3. To provide definite and precise directives to collecting agencies
4. To avoid possibility of omission, conflict or unnecessary dedication of collection
effort.
Helps in Developing Collection Plan
1. Last the requirements in the order of priority.
2. Break the requirements into indication any evidence of actual or potential enemy
activity or characteristic of an area of operation enemy activity or characteristic of
an area of operation, habitual activities-need
3. Fit those indications into existing situations - critical clues, security measures, attack,
defense, etc.
4. Basis for development for specific collection directive designated to exploit to the
fullest the collection directive guide doesn’t limit.
5. Selection of Collecting Agency criteria for selection suitability, capability,
confirmation, timeliness and balance Designation of particular time and place that
the required Information is to be reported.
Factors in Choosing Collection Agent.
ln choosing collection agents, they must be selected according to their capability
agent's placements or access me the lugged multiplicity more agents, and balance the
number of agents, needed per operation.
Methods of Collection - collection of information can be done through overt method or
open system) or covert method re/clandestine)
Collecting Agencies,- depending on the type of operation, the collecting agency could
be Government Agencies, Intelligence Units or Organizations.
Trade Crafts - includes the use of photography, Investigations, elicitation
interrogation, surveillance, sound equipment surreptitious entry keys and locks, use of
an artist communication.
PHASE 3
PROCESSING THE COLLECTED INFORMATION
This phase of the cycle is concerned with the examination and collation of all
collected information
Steps in Processing Raw Information
1. Collection - organization of raw data and information into usable form, grouping
similar terms of information so that they will be readily accessible.
2. Recording - is the reduction of info sto waiting of some other form of graphical
representation and the arranging or this info into writing or some form of graphical
representation and the arranging of this into groups of related items.
Police log book and Journal
Intel-work Sheet Intel Files
Situation Maps Rouges Gallery
Modus Operandi Files
3. Evaluation - pertinence of the information, reliability of the source and agency, and
its credibility of truth of information. Evaluation is the determination of the pertinence of
the info to the operation, reliability of the source of or agency and the accuracy of the
info Evaluation determines the following:
Pertinence does it hold some value to current operation? Is it needed immediately?
Reliability judging the source of into of agency
Credibility truth of info is it possible for the reported fact or event to have taken place
Is the report consistent within itself? Is the report confirmed or corroborated by info
from different sources or agencies? It the report does not agree with info from other
sources which one is more likely to be truce
The Evaluation Guide
Accuracy of Information Reliability of Information Source of Information
A. Confirmed by other 1. Complete Reliable T. Direct Observation by
sources Comdr/Chf of Unit
B. Probably True 2. Usually Reliable U. Report by DPA or
Resident Agent
C. Possibly True 3. Fairly Reliable V Report by: PNP AFP
Troops
D. Doubtfully True 4. Not Usually Reliable [Link] of Captured
Enemies
E. Improbable 5. Unreliable X. Observation of
govt/civilian employee
F. Truth cannot be judged 6. Reliability cannot be Y/Z -Documentary
judged
4. Interpretation it is establishing the meaning and significance of the information It
involves the following activities:
Analysis shifting and isolating those elements that have significance in light of
mission of national objective
Integration combining the elements isolated in analysis and known information
to form a logical picture or theory
Deduction the formulation of conclusions from the theory developed, tested and
considered valid determination of effort and meaning of the information.
PHASE 4
DISSEMINATION AND USE OF INFORMATION
This phase of the cycle refers to the activities of transferring the processed
information to the proper users, most particularly the authority that requires the activity.
Processed information can be disseminated through annexes, estimates, briefing.
Message, reports, overlays, and or summaries
The criteria that must be observed in dissemination are:
Timeless must reach the users on time to be of value. It must be disseminated in
accordance with the urgency and must reach the user in sufficient time to be use.
Propriety the message must be clear, concise and complete, as well as in the
proper form for the receiver to readily understand its Contents. It must be disseminated
to the correct user, presented in a form that lends itself to immediate use and distributed
by the most effective means appropriate to both time and security requirements.
Methods of Dissemination
1. Fragmentary orders from top to bottom of the command
2. Memorandum, circulars, special orders
3. Operations order, oral or written
4. Conference staff members
5. Other report and intelligence documents
6. Personal Contact
Who are the users of intelligence?
1. National leaders and military commander's formulation and implementation of
national policies.
2. Advisors and Staff preparations of plans and estimates
3. Friendly nations or other branches of the armed forces
4. Processor basis for evaluation and interpretation.
5. Head/chairman of an organization
6. Any person with authority for purposes of planning
Information and Its Sources
Information
Information refers to all evaluated materials of every description including those
derived from observation, reports. rumors, imagery, and other sources from which
intelligence in produced. Information is a communicated knowledge by others obtaining
by personal study, investigation, research, analysis, observation.
Two General classifications of sources of information
1. Open Sources 99% of the information collected are coming from open sources,
2. Close Sources 1% of information are collected from close sources.
Overt Intelligence is the gathering of information or cuments procured openly without
hout regard as to whether the subject or target become knowledgeable of the purpose.
Open Sources: Includes information taken from
Enemy activity
POW and Civilians
Captured documents
Map weather, forecast, studies, report Agencies
Covert Intelligence is the secret procurement of information, which is obtained without
the knowledge of the person or persons safeguarding vital intelligence interest.
Close Sources: Include information which may be taken through:
Surveillance
Casing and
Elicitation
Surreptitious entry
Employment of technical means (Bugging and Tapping device)
Tactical Interrogation Observation and Description (ODEX)
Other sources of Information. Overt and Covert
Routine patrol and Criminal investigation
Use of informants and Interrogations
Search and seizures and Cordon and scratch
Checkpoints and Police public relations activines
Coordination with law enforcement agencies
Inmates of various city jails, national penitentiaty. military stockade.
Statistics
PERSONS AS SOURCES OF INFORMATION
Informant Net - It is a controlled group of people who worked through the direction of
the agent handler. The informants. principle or cut outs supply the agent handler directly
indirectly with Intel information
Informants (Asset) - people selected as sources of information, which could be
voluntary, or in consideration of a price
Informant- refers to a person who gives information to th police voluntarily or
involuntarily without any consideration
Informer those who give information to the police for price or reward
Types of Informants
1 Criminal informant an informant who give information to the police pertaining to the
underworld about organized criminals with the understanding that he will be protected.
2. Confidential informant is similar to the former but he new information that violate
the law to includes crimes and criminals
3 Voluntary informant a type of informant who gives information freely and willfully as
a witness to a certain act.
4 Special informant those who gives information concerning specialized cases only
and it is regarded a special treatment by the operatives (Ex teachers businessmen
5. Anonymous Informant those who gives information through telephone win the hope
that the informant cannot be identified.
Sub-type of Informant
1. Incidental Informant a person who casually imparts information to an officer with no
intention of providing subsequent information.
2. Recruited Informant a person who is selected cultivated and developed as a
continuous sources of information
Categories of Recruited Informants:
1. Spontaneous or Automatic Informant informants who by the nature of their work or
position in society have a certain legal, moral or ethical responsibility to report into to the
police.
2. Ordinary (out-of-their-will) Informants informants that are under the compulsion to
report information to the police
3. Special Employee informants who are of a specific operational nature
Other Classification of Informants
Other terms related to people who give information are Automatic Informant
Penetrating Agent, Infiltrating Agent, Full time Information, Rival- Elimination Informant,
False Informant, Frightened Information, Self-aggrandizing Imormant, Mercenary
Informant, Double Crosser Informant Woman Informant, Legitimate Informant
Common Motives of Informant
People give information to the police due to various reasons. Their motives
include reward, revenge, fear and avoidance of punishment, friendship, patriotism,
vanity civic-mindedness, repentance. motives and other competition, an
Intelligence Operations
Intelligence Operations is the result of intelligence planning planning is always
ahead of operation although an operation an operation can be made without a plan, it is
usually due to sudden and inevitable situations but definitely this ifs poor intelligence
management.
Different Tasks involved in Police Intelligence Operation
1. Discovery and identification activity
2. Surveillance and Liaison Program
3. Informant Management
4. Clipping Services and Debriefing
5. Casing and other relevant miscellaneous activities
6. Utilization of informant for planning and organizational employment purposes.
Cover and Undercover Activities
Cover the means by which an individual group of organization conceals the true nature
of its acts and or existence from the observer.
Cover story a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation
Cover Support an agent assigned in target areas with the primary mission of
supporting the cover story
Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have the need to know
3. Successful accomplishment of the mission
Types of Cover
1. Natural Cover using actual or true background
2. Artificial-using biographical data adopted for the purpose
3. Cover within a cover justification of existence
4. Multiple Cover-any cover you wish.
Hazards of Cover
1. Static or dormant opposition (ordinary citizen)
2. Unhostile active opposition (Political Security)
3. Hostile active opposition (enemy intl. operatives)
Precautions in case of Compromise
1. Move out immediately
2. Start new facility for operation and develop it
3. Build entirely new cover
4. Use circuitous routes and provide careful counter surveillance measures
5. Be specifically careful of former contacts with non- intelligence personnel
6. Be patient, slowly and careful
Procuring Different Type of Agents
1. Agent in Place an agent who has been recruited by an intelligence service within a
highly sensitive target, who is just beginning a career or have been long or
(outside) insider.
2. Double Agent an enemy agent who was has been captured, turned around and sent
back where he came from as an agent of his captors.
3. Expandable Agent an agent whom false information is leaked to the enemy
4. Penetration Agent an agent who has such reached the enemy gets information and
would manage to get back alive
5. Agent of Influence an agent who uses influence to gain information.
6. Agent Provocation give information one who provoke the enemy to
Theory and Practice of Double Cross System (Double Agent System)
1. Control the enemy system
2 Catch fresh spies when they appeared
3. Gain knowledge of other personalities and methods of the enemies intelligence
service.
4. Obtain information about the codes and cipher work of the enemy
5. Give evidence of enemy plans and intentions from the question asked from them
6. Influence enemy plans by the answer sent to the
7. Deceive the enemy about our plans and intentions.
Methods of Convert Intelligence
Surveillance
Surveillance is a form of clandestine investigation which consists of keeping
persons, place or other targets under physical observation in order to obtain evidence or
information pertinent to an investigation Surveillance of persons is called Tailing or
Shadowing, Surveillance of place is called Casing or Reconnaissance, and Surveillance
of other things, events and activities is called Roping.
General Objectives and Purposes
1. To confirm or deny allegations
2. To identify person involved in certain activities
3. Provides background info for undercover assignment
4. Develop leads to vital information
5. To obtain needs upon which to conduct additional investigation
6. To check on source of information
7. Locate addresses, or places frequented by subject as well as his associates
8. To obtain detailed information about the nature scope of subject activities
9. To secure basis for securing search warrant
10. To provide protection
Considerations in Surveillance Planning
1. Pre-Surveillance Conference - a conference held among the team members the
police intelligence unit before surveillance is conducted.
2. Surveillance Plan a plan established as required according to type of personnel, and
the general and specific instructions for surveillance.
3. Area Target Study-refers to the area of operation of surveillance activities.
4. Surveillant a person who conducts surveillance which includes only observations
5. Shakeout or Plant is the observation of places or areas from a fixed point.
6. Tailing or Shadowing It is the observation of a person's movement.
7. Undercover Man- It refers to a person trained to observe and penetrate certain
organization suspected of illegal activities and later reports the observation and
information's that proper operation can be made.
8. Liaison Program-the assignment of trained intelligence personnel to other agencies
in order to obtain information of police intelligence value. (Agencies like the
press, credit agencies, labor unions, telephone companies)
9. Safe house is a place, building, enclosed mobile, or an apartment, where police
undercover men meet for debriefing or reporting purposes.
10. Drop any person is a convenient, secure and unsuspecting place where police
undercover men get his action agent for debriefing or reporting purposes
11. Convoy an accomplice or associate of the subject used to avoid or elude
surveillance
12. Decoy a cover supporting the surveillance who can become a convoy whenever
surveillant is burned
13. Contact any person whom the subject picks or deals with while he is under
observation and identifies the observer.
14. Made when subject under surveillance becomes aware that he is under observation
and identifies the observer.
15. Lost when the sunveillant does not know the whereabouts of his subject or the
Subject had eluded the surveillance.
Types Of Surveillance
According to Intensity and Sensitivity
1. Discreet subject person to be watch is unaware that he is under observation
2. Close subject is aware that he is under observation varied on each occasions
3. Loose applied frequently or infrequently, period of observation varied on each
occasion
According to Methods
1. Stationary this is observation of place usually a bookie stall, a gambling, joint, a
residence where illegal activities are going on (Fixed positron)
2. Moving surveillance follow the subject from the place to place to maintain
continuous watch of his activities
3. Technical this is a surveillance by the use of communications and electronic
hardware's, gadgets, com system and equipment.
Considerations in the Selection of Personnel
1. Inconspicuous physical character
2. Ability to remain unnoticed
3. Resourcefulness
4. Patience and physical stamina
5. Keep sensory perception and good memory
6. Driving ability
7. Personal courage
8. Area knowledge
9. Security consciousness
10. Administrative and Logistics
11. Communication and control
Some Do's and Don'ts in Surveillance
1. Do not make abrupt or unnatural movements
2. Do not make use of disguise that will attract attention
3. Never stare at the subject
4. Do not attempt to appear too innocent when assisted by the subject
5. Never speak to another surveillant unless absolutely necessary to accomplish the
mission
6. Plan ahead and be aware on changes of action
7. Take down notes safely
8. Make use of street furniture (telephone booth, sidewalk, vendors, waiting shades)
Don't drink while working undercover
9. Don't take a woman on an undercover assignment and don't claim to be a "big shot"
10. Don't spend money too much
The Place of Surveillance
Careful survey of the surrounding area an made The character of the
neighborhood, the residents and the transients should be noted. The observation point
should be selected. The following be considered.
1. Using a room in a nearby house or business establishment and remaining
undercover.
2. Remaining outdoors and posing who would normally conduct his business in
such an area i. e. laborer, carpenter, street vendor, etc
Special Equipment (Technical Supports)
1. Camera with telephoto lens
2. Moving Picture camera
3. Binoculars
4. Tape recording apparatus
5. Wire taping device
6. Other instrument miniaturized one way radio
Methods Available to Employ in Surveillance
Ordinarily, the methods are surveillance of place tailing or shadowing (1-2-3 man
shadow) undercover investigation, special methods includes wire taping concealed
microphone tape recorder television electric gadgets
Essential Requirements and Appearance in Surveillance
In the actual process operation, the agent is adored to be of general appearance,
has no noticeable peculiarities in appearance. Agent should not wear or clothing,
nothing about him to attract attention. He must have perseverance and able to wait for
hours resourcefulness, and being versatile and quick willed are his weapons
Basic Preparations in Surveillance
1. Study the Subject name address, description family and relatives associates,
character and temperament, vice hobbies, education, others,
2. Knowledge of the area and terrain-maps, national and religious backgrounds,
transportation, public utilities.
3. Subversive Organization history and background. biography of the official identity and
background of members and former members, method of identification employed
by the members, files and records, nature, location and accessibility, meeting.
4. Cover Story the scenario must be appropriate to cover up operation and avoidance of
identification of mission.
Factors considered in Fixed Surveillance
1. Determine base of operation
2. Maintain a thorough, cautious reconnaissance of the area
3. Obtain necessary equipment
4. Assignments of specific duties to each member of the team
5. Prepare alternative course of action
6. Provide for relief teams
7. Arrange for communication signals
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel of
the base of operation.
Counter Surveillance the conduct of operation is coupled with counter intelligence
measures such as window shopping, use of convoys and decoy, stopping immediately
on bind comes, getting out immediately on public conveyances, retracing, entering
mobile housing
Casing or Reconnaissance
Casing is the term use in the police organization while reconnaissance used in
military, casing or reconnaissance is the surveillance of a building place or area to
determine as suitability for Intel use or its vulnerability in operations, It is aids in the
planning of an operation by providing needed information. It assists the agent handler
to install confidence in his agent during briefing phase by being able to speak knowing
about the area of operation Casing is also considered a security measure because it
offers some degree of protection for those operating in an area unfamiliar to them
General Principles in Casing
1. Know the best route lo lake pet there
2. Know how to conduct yourself without attracting attention
3. Know what security hazards are in the area and how can they avoided or minimized
4. Know the best route to extricate from the area
Method of Casing
1. Personal Reconnaissance the most effective method and will produced the most info
since you know Just what you're looking for..
2. Map Reconnaissance it may not sufficient but it can produce's a certain amount of
usable information
3. Research-much info can be acquired through research
4. Prior Information your unit and of the unit will have file report that they may provide
you win information.
5. Hearsay information usually gained by the person operating in the area and
performing casing job
Information desired in Casing
1. Area condition and habit -a description of the locality as whether the place is a
residential, commercial, highly urbanized, rural, The living condition income of
population operational data(time where the area seemed to be useful close time)
It includes the (amount /fare) description of the area during the different weather
condition. What transportation is available in the area to include the amount /
fare? Habits refer to the routine activities of the people in the area, dialect and different
belief is considered.
2. Active Opposition means all organ of every security system whose task to prevent
intelligence activity in the given area. This also includes not only the
enemy but also the efforts of neutral or allied countries to discover and
observe our either neutral or ally may any time in the future become the ally of the
opposition.
3. Disposal Plan disposal of the information in case of possible compromise. Disposal of
information and materials.
4. Escape and Evasion the exit planning in case of emergencies, from immediate focal
point, the general area and completely from the area.
Guidelines in the Conduct of Casing
1. To gain contact as soon as possible and maintain continuously
2. Maneuver freely in conformity with operations (dry run)
3. To fight only when necessary
4. To report all item of info.
5. To develop the situation
Basic Procedures in the conduct of casing
1. Preparation of general location map
2. Sketch of the adjoining establishment and prominent features
3. Specific sketch of floor plan of main target
4. Detained features of inner portion of target and its description
5. Photograph of the casing target (from general to specific points)
Observation and Description A.K.A (ODEX)
Observation a complete and accurate observation by an individual of his surroundings
and encompasses the use of major sense to register and recognized its operational or
Intel significance.
Description the actual and factual reporting of one's Patton of the reported sensory
experience recounted by another.
Psychologist estimates that approximately 85% of our knowledge is gathered through
sense of sight, 13% from sense of hearing and only 2% through the three other senses.
Psychological Processes for Accurate Observation
1. Attention - consist of the psychological process involve to becoming aware of an
existence of fact.
2. Perception involved in the understanding fact of awareness
3. Report - involved in identifying name in one own mind and some fact which has
been perceive, narrated and identified.
Types of Attention
1. Involuntary you have no control and requires no effort
2. Voluntary this is more reliable but not dependable
3. Habitual-little effort with a maximum of control
Factors, involved on Perception
1. Mental capability and educational background
2. Occupational background and imperial background acquired though experience
Factors governing report on observation
1. Vocabulary the word which an individual uses to press himself
2. Time log accurate reporting depends entirely on timeless, delay in reporting results in
unconscious omission of details
3. Recurrence of similar incidents
Elicitation
It is a system or plan whereby information of intelligence value is obtained
through the process direct intercommunication in which one or more of the parties to the
common is unaware of the specific purpose of the conservation. The three phases are
determination of the mission, selection of the subject and accomplishment of the
mission.
Two Devices in the Elicitation
1. Approach - process of setting people to start talking
2. Probe - to keep the people taking incessantly
Types of Approach
1. Flattery - people are susceptible to praise so use this weakness as a way of
approaching the suspect for elicitation.
Variants:
a. Teacher- Pupil Approach the subject is treated as an authority then solicits his
view point and opinion on a subject matter.
b. Kindred Soul Approach the subject is placed in a pedestal having some
specialized quality then flatter him/her by showing enough concern
for his/her welfare to pay special attention to his enjoyment
c. Good Samaritan Approach is the sincere and valid offers of help and
assistance are made to the subject
d. Partial disagreement Approach seek to produce talking by the word "I'm sure if
fully agree
2. Provocative - Approach discover a wide range of conventional gambits
Variants:
a. Teaser Bait Approach - the elicitor accumulates the sources of knowledge
about a particular subject to tempt the subject to give his/her views.
b. Manhattan from Missouri Approach - the elicitor adopts an unbelievable
attitude above anything. He questions all statement and
oppositions.
c. Joe Blow Approach is "I" know the answer to everything "approach The
elicitor adopts the attitude of being approachable of any field.
d. National Pride Approach nature propensity of all persons to defend their
country and its policies.
Types to Probe
1. Competition Probe This is effective when used in connection with the teacher pupil
approach
2. Clarity Probe - used to elicit additional information in an area which the response is
clear
3. High Pressure Probe - It serves to point out contradictions in what the subject to
react to the hypothetical situations
Purposes of Elicitation
1. To acquire information which is unbelievable through other channel
2. To obtain information which although unclassified is not publicity known
3. To provide a source of information
4. To assist various individuals
Planning and Preparation
1. What information is necessary or essential
2. Who has access to the information
3. What are the vulnerabilities
4. How susceptible is he to elicitation
5. Outline elicitation points prior to meeting and prepare specific questions and known
you're your subject well.
Identification Methods
1. Branding and mutilation
2. Parade system with portrait parle
3. Fingerprint methods
Methods Of Obtaining Descriptive Information
1. Close observation of the person and accurate recording of the terms describing the
features
2. Information describing through interviews of witnesses
3. Examination of Observation of photographs and sketches
4. Examination of records
Background Checks and Investigation
Information needed:
1. Domestic Background
2. Personal Habit
3. Business History
4. Social or Business Associates
5. Medical History
6. Educational Background
7. Family History
Data Collation and Analysis
The third phase in the procedure is the information collation process Webster
defines collation as "the process of comparing texts carefully "to clarify or give meaning
to information. One example of collation is taking a deck of playing cards and arranging
them into four piles, one pile for each suit, and in numerical order. Many different
techniques are used by intelligence analysts to accomplish this function. These include
link data charts, different types of flowcharts, frequency distribution charts, and so on.
Many of these are discussed later in the chapter. Following the collation of raw
information is the analysis chase. This is the heart of any intelligence system. This is the
procedure in which meaning is given to all of the otherwise fragmented parts of data
collected. The analytical process involves data integration and clarification, inference
development, inference testing. and finalizing inferences that are relevant and
meaningful to the user (the intelligence product)
Dissemination
The dissemination stage of the intelligence process is the final stage, in which
the process most commonly breaks down. As one intelligence analyst once remarked:
"Possessing good intelligence information is like possessing.
The Role of the Intelligence Analyst
To guide data collection
To suggest operational recommendations
To provide information to decision markers
To assume a position of non- involvement in policy formation
Gold nuggets because everybody wants as they can get nobody wants to share
what they have" Unless intelligence is shared through the enforcement community in an
inter agency fashion, all of the effort expense of collecting it could become meaningless.
Most law enforcement agencies have strict guidelines, however to control the release of
information.
Analyzing the information
The purpose of analysis is to make fragmented information flow in a logical
sequence to make it purposeful to the user, such as taking a group of surveillance
reports and arranging them in the order in when they occurred determine primary
suspects, locations most frequented, vehicles driven. Intelligence gathering can be
problematic in and of itself. For example when officers are working with the large
amounts of information regarding individuals and organizations, the sources of that
information may varied unorganized and can include confidential informants,
surveillance reports, investigative reports and so on.
Link Analysis
To make sense out of the multitudes of information, a process known as
description and integration is used. Accordingly, one of the most common methods of
data description and integration is link analysis. Link analysis charting techniques
designed to show relationship between individuals and organization graphic visual
design (Figure 6.3) it is used to show graphically action or relationship that are too
large and confusing for one to as similar through the reading of reports.
Link analysis is a technique designed to show relationship between individuals
and organizations using a graphic visual design. There are several writing to illustrate
this type of collection technique suitably. In all cases investigation must follow certain
mechanical rule for the structure of the diagram
1. Assembly of raw data(usually from a report)
2. Selection of certain data points, such as names of individuals or organizations
3. Construction of a collation matrix showing the data points
4. Entry of the association points on the matrix
5. Tabulation of the number of associate points on the matrix
6. Designation of the types of relationships by drawing different types of lines
from one association point to another (usually accomplished by drawing dotted lines,
solid lines, etc.)
7. Relationship of individuals to organizations by constructing(s) circles for
individuals and boxes for businesses
8. Examination of final diagram and recommendation(s) regarding a course of
action.
Flow Charting
Flow charting is another common technique used in the data description and
integration phase. Unlike the "frozen" nature of the link analysis diagram, flowchart
demonstrates a chain of events or activities over a period. Although use of flowcharts is
not as common as link analysis, two types of flowcharts have emerged as most useful in
criminal intelligence collection. The type's flow charting are event flow analysis and
commodity flow analysis. Both types' analysis give investigators a graphic display of a
series of events that might too complex if read in a report. There are no hard and fact
rules regarding construction of flowchart, therefore, the analyst should try to maintain
degree of consistency throughout the chart regarding the symbols used.
Event Flow Analysis
Event flow analysis is usually conducted early in an investigation. Example flow
analysis include charting a brief description of an event enclosed in symbolic area such
as a circle or rectangle As different events documented, they are connected by arrows
to indicate the direction of sequence. Consider the following scenario and observe how
the information from a reliable informant can best be portrayed by using the event
flowchart. Kevin Johnson is a local businessman in town and owns three small
businesses. On August 12, Johnson's Deli burned to the ground and another of his
show the Barbecue Shack, was vandalized. Later that night Johnson's convenience
store was bombed Although Johnson couldn't say for sure who the perpetrator might be,
he noted that he had recently fired a 34 years old part time employee who had
threatened Johnson as he left the property. This firing took place one week prior to the
problems with stores.
Commodity Flow Analysis
Commodity flow analysis may greatly simplify the investigation process by
starting the logical flow of such commodities as drugs, money, and illegal arms
shipment. For example in a drug distribution network, if money can traced from its
original to certain key individuals, an investigation will probably result in an arrest and
conviction. This is particularly useful when the main drug kingpins don't typically
possess the drugs themselves.
The structure of a commodity flowchart is generally the same as that of the event
flowchart except that rather than descriptions of events being placed on circles or
rectangle, persons or business are used. A scenario follows in which commodity flow
charting might best be used. Study this information from investigation report and
observe how the resulting flowchart illustrate and clarifies the facts and circumstances
of the case.