REPUBLIC OF THE PHILIPPINES
CAGAYAN STATE UNIVERSITY
CARIG CAMPUS
Carig Sur, Tuguegarao City, Cagayan
FUNDAMENTALS OF CRIMINAL INVESTIGATION with
INTELLIGENCE
INTELLIGENCE AGENCIES, PRINCIPLES AND INTELLIGENCE CYCLE
POLICE INTELLIGENCE
Concerns one or more aspects of police operations and which is potentially significant to police
planning and operations.
A. World’s Notable Intelligence Agencies
1. Central Intelligence Agency, USA
Headquarters: Langley, Virginia
Founded on: September 18, 1947
CIA is one of the oldest and greatest intelligence agency that belongs to the federal government of the
US. It collects information from overseas that might threaten the nation and deals with it. It also handles
counterintelligence, cyber warfare and also carry out para-military operations.
2. Research and Analysis Wing, India
Headquarters: New Delhi
Founded on: September 21, 1968
One of most capable intelligence agencies in the world, RAW came into being after Indian faced two
wars in a decade, Sino-India war 1962 and Indo-Pak war 1965. It mainly works to gather foreign
information, counterterrorism, advising policymakers and also contributed in the foreign strategic
decisions.
3. Mossad, Israel
Headquarters: Tel Aviv-Yafo, Israel
Founded on: December 13, 1949
The third branch of the Israeli Intelligence Community after Shin Bet and Aman, the Institute for
Intelligence and Special Operations popularly called Mossad deals with foreign Intelligence, gathering
information and run covert operations. One of the main aims of it is to protect Jews and their interests.
4. Inter-Services Intelligence, Pakistan
Headquarters: Islamabad
Founded on: January 1, 1948
The premier intelligence agency of Pakistan, ISI works to secure necessary information regarding
internal and external security which influences Pakistan’s strategic interests.
5. Secret Intelligence Service, UK
Headquarters: London
Founded on: July 4, 1909
The intelligence agency of UK, popularly known as MI6, deals with external affairs and intelligence to
maintain the well-being of the country. It primarily deals with information related to terrorism, nuclear
weapons, drug trafficking, organized crime and others.
6. Main Intelligence Agency, Russia
Headquarters: Moscow
Founded on: May 7, 1992
The Main Intelligence Directorate of Russia, popularly known as GRU is Russia’s largest Intelligence
Agency which maintains its own Special Forces unit to deal with the information regarding national
security and foreign threats.
7. Ministry of State Security, China
Headquarters: Beijing
Founded on: July 1, 1983
The civilian Intelligence, security and secret police agency of China, MSS is responsible to censor
internet, cut the population from outside world, handle internal opposition, economic spying and mainly
ensure political security.
8. Canadian Security Intelligence Service
Headquarters: Ottawa, Ontario
Founded on: 21 June 1984
One of the safest intelligence agency of the world, CSIS collects intelligence, runs covert operations,
and advises the government on potential security threats. It takes action against any issue that might
pose a threat to the national security and sometimes act too aggressively.
9. Australian Secret Intelligence Service, Australia
Headquarters: Canberra
Founded on: 13 May 1952
Another strong agency to make it in the top intelligence agencies list is ASIS which deals with
international or foreign intelligence. It is an important component of the Australian Intelligence
Community and is responsible for counter-intelligence and liaising with other similar agencies.
10. Directorate-General for External Security, France
Headquarters: 141 Boulevard Mortier, Paris XX
Founded on: 2 April 1982
The French intelligence agency works like every other intelligence industry and deals with foreign
intelligence and issues that affect national security under a veil of secrecy. Every country has a
number of intelligence agencies which are safe, strong and capable and work in a confidential manner.
They ensure our safety and not even take credit for it, yes they are cool.
B. Historical Background
WHO ARE THE PEOPLE WHO CONTRIBUTE TO POLICE INTELLIGENCE
1. Delaila
An impromptu intelligence agent of Philistines. She swallowed (accept) philistines’ spies to hide in
her house (judges 16:9) and used her sex to gain intelligence from a powerful enemy.
2. Sun Tzu
The east was a head of the west in the craft of intelligence in 100BC rejecting the oracles and the
seers, Sun-Tsu, A Chinese philosopher takes a more practical view for according to him, what is called
fore knowledge cannot be elicited from spirit, nor from Gods, nor from analogy with past event, nor from
calculation. He wrote “it must be obtained from men who knew the enemy situation.” Sun Tzu’s book
entitled “THE ART OF WAR” is the favorite reading of the late MAO TSE TUNG and is required reading
materials for Chinese Communist tacticians- it is in the book where the intelligence parlance was derived.
He further asserted that if you know thy enemy and know thyself, you need not fear the results of a
Hundred of Battles.
3. Alexander the Great
He devised the first letter sorting and opening to obtain information. He was the king of
Macedonia, conqueror of the Persian Empire, and one of the greatest military geniuses of all times.
4. Sir Francis Walshingham
He protected Queen Elizabeth I from countless assassins. Walshingham’s best agents were
English students residing in Italy. He gave England’s first “national secret service” and created an
effective Intelligence system by employing agents in foreign courts. The most notable plot he discovered
was the plan to assassinate Elizabeth, initiated by the English conspirator Anthony Babington and
authorized by Mary, Queen of Scouts. The evidence by Walsingham led to the execution of Mary in 1587.
5. Napoleon Bonaparte
Emperor of the French whose imperial dictatorship ended the French Revolution (1789-1799)
while consolidating the reforms it had brought about. One of the greatest military commanders of all time.
Napoleon Bonaparte was the greatest military genius of the 19th century.
6. Who is Frederick the Great
The father of organized military espionage. He established rules for obtaining and using every
grade of spy or intelligence. He divided his agents into four classes:
1. Common spies
2. Double spies
3. Spies of consequences
4. Persons who are forced to undertake espionage against his will
7. Hannibal
Carthaginians general. He was considered as one of the brilliant military strategists in history. He
developed an effective intelligence system for 15 years in Rome, he usually roaming around the city often
disguise as beggar to gather first-hand information. His famous feat was at the out break of the second
Punic war when he marched an army which included was elephants from Iberia to northern Italy. Military
historians consider Hannibal as the “the father of strategy” because his greatest enemy, Rome, came
to adopt the elements of his military
C. Aspects of Intelligence
1. Learning from experience
2. Adapting to new situations
3. Understanding and handling abstract concepts
4. Using knowledge to manipulate one’s environment
5. Abstract reasoning
D. Counter Intelligence Measures
Counterintelligence measures should have the objectives of deterring, detecting, preventing,
reducing, and eliminating every threat that can compromise or corrupt intelligence and can cause loss
events to the organization. This means hostile intelligence activities are discouraged to the fullest extent
possible and overall protection is optimized.
E. Functional Classification of Police Intelligence
1. Criminal Intelligence (CRIMINT) - Production of intelligence essential to the prevention of
crimes and the investigation, arrests and prosecution of criminal offenders.
2. Internal security Intelligence (INSINT) - refers to the knowledge essential to the maintenance
of peace and order. Keeping peace within the borders of a sovereign state or other self-governing
territories, generally by upholding the national law and defending against internal security threats
3. Public safety intelligence (PUSINT) – refers to the knowledge essential to ensure the
protection of lives and properties.
4. Police Strategic Intelligence- is processed information which is long ranged in nature. It is
used to describe and define criminals and their activities as well as provide insight of their modus
operandi.
5. Police Line Intelligence- and intelligence that is immediate in nature. Such information must
be updated to provide effective aid in police operations.
6. Police Counter intelligence-It is an activity which is intended to build an organization against
the enemy by ensuring loyalty of its members through stringent background Investigation. It also seeks to
deny the enemy of any information consisting of passive and active intelligence measures. This is also
known as negative intelligence.
7. National Intelligence- it is the integrated product of intelligence developed by all governmental
branches and departments concerning the broad aspect of national security and policy. It is used to
coordinate all the activities of the government in developing and executing integrated and national policies
and plans.
8. Under Cover Works- is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of determining the nature
and extent of any criminal activities that maybe contemplating or perpetuating
Cons of Intelligence
1. Privacy Concerns: Intelligence gathering often involves collecting information on individuals,
and there is a risk of infringing on privacy rights. Balancing the need for security with individual privacy is
a constant challenge.
2. Misuse of Information: Intelligence can be misused for political purposes or to target
individuals or groups unfairly. The potential for abuse of power exists, and safeguards must be in place to
prevent such misuse.
3. Lack of Oversight: In some cases, intelligence agencies operate with a high level of secrecy,
which can lead to a lack of transparency and accountability. Proper oversight mechanisms are essential
to prevent abuses of power and ensure lawful and ethical conduct.
4. Risk of Intelligence Failures: Intelligence is not always accurate, and there is a risk of
intelligence failures. Misinterpretation of data, reliance on unreliable sources, or inadequate analysis can
lead to incorrect conclusions, potentially impacting decision-making.
5. Resource Allocation: Intelligence activities require significant resources, both human and
financial. Balancing the allocation of resources between intelligence efforts and other essential services
can be a challenge for governments.
6. Limited Human Intelligence: Human intelligence gathering (HUMINT) relies on human
sources, and the credibility and reliability of these sources can be variable. Dependence on human
sources introduces an element of uncertainty into intelligence assessments.
7. Potential for Espionage and Sabotage: Intelligence agencies are vulnerable to infiltration by
foreign agents or hostile entities. Espionage and sabotage pose real threats to the effectiveness of
intelligence operations.
8. National Security vs. Civil Liberties: There is an ongoing tension between the need for
robust intelligence to ensure national security and the protection of civil liberties. Striking the right balance
is a complex task that requires careful consideration.
Kinds of intelligence
1. Human Intelligence (HUMINT): Information gathered from human sources. This could include
informants, undercover agents, or interviews with individuals who have relevant information.
2. Signals Intelligence (SIGINT): Involves the interception and analysis of communication
signals, such as electronic or radio communications. This type of intelligence is crucial for monitoring and
understanding the activities of potential threats.
3. Imagery Intelligence (IMINT): Obtained through the analysis of visual images, whether from
satellite imagery, aerial reconnaissance, or other visual sources. IMINT provides a visual understanding of
an area or target.
4. Open-Source Intelligence (OSINT): Information collected from publicly available sources,
such as newspapers, social media, and other open platforms. OSINT is valuable for obtaining information
that is not classified.
5. Measurement and Signature Intelligence (MASINT): Involves the collection and analysis of
data that reveals distinctive features of specific objects or environments. This could include things like
infrared signatures or nuclear radiation measurements.
6. Counterintelligence (CI): Intelligence activities designed to prevent or thwart espionage and
other intelligence activities conducted by foreign entities. It involves protecting one's own intelligence
activities and uncovering and disrupting the activities of foreign intelligence services, criminal
investigation, intelligence is often used to gather information related to criminal activities, suspects, and
organizations. The goal is to support law enforcement efforts and enhance the understanding of criminal
threats. This involves collecting, analyzing, and disseminating information to aid in the prevention and
resolution of criminal cases.
4 CATEGORIES OF CLASSIFY MATTERS
1. Top Secret (Green Color Code) – Is any information and materials, the unauthorized disclosure of it
would cause exceptionally grave damage to the nation, politically, economically and military operation.
Examples: Political negotiations, military defense, war strategic plans, etc.
2. Secret (Red Color Code) – Is any information and material. The unauthorized disclosure of it would
endanger national security, causes serious injury to the interest and prestige of the nation of any
government activity, or of great advantage toa foreign country.
Examples: info about intelligence operations, troop movements, order of battle, etc.
3. Confidential (Blue Color Code) – Is any information or material, the unauthorized disclosure of it
would be prejudicial to the interest and prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to and be advantage to a foreign country.
Examples: plans of government projects, routine intelligence reports
4. Restricted (White or No Color) – Is any information and material which requires special protection
other than those determines confidential, secret and top secret.
Examples: blotters, daily logbook file, etc.
F. Intelligence Cycle
It is a repetitive used to produce intelligence from information
The single most important part of intelligence activity is the understanding the intelligence cycle
because of MISSION, which is the core of the cycle, serves as the foundation of all intelligence
operations. Every operative must therefore place into mind the following phases of the cycle.
INTELLIGENCE CYCLE (PCPD)
1. Planning the Collection Effort
2. Collection of Information
3. Processing the Collected Information
4. Dissemination and Use of Information
Phase 1: Planning the Collection Effort
This phase of the cycle involve the determination of the requirement of intelligence. It is
concerned with identifying the so-called Essential Element of Information (EEI) - an item of intelligence
or information of the characteristics of the area of information and the enemy, which the commander feels
he needs before he can reasonably arrive at a decision.
With this, the Intelligence Officer must have a thorough knowledge of the available sources of
information, the collecting agencies and type of info the latter can provide. He must understand the
operations of the command in order to provide the particular Intel required for success. He must have a
thorough knowledge of the tactics, organization, and characteristics of the enemy and be especially
competent in the fields of acquisition of operations.
Categories of Intel Requirements:
In relation to use;
a. Executive- are those information required by executive, governmental and military commanders
the executive requirements are the basis for decision and national policy making.
b. Contributory- information required to complete the staff process- make staff plans and
estimates that contribute to the decision and policy making
In relation to type;
a. Basic- are general reference materials for use in the planning regarding the enemies, area of
operations, capabilities-static comprehensive
b. Current-are information which are temporary in nature and narrower in scope.
c. Estimative- are those that determine the future courses of actions; required by the
executives to plan future and military operations and policies.
Phase 2: Collection of Information
This phase of the cycle is concerned with identification of the collecting agency, the formulation of
procedures on the manner of collecting the information in conjunction with the plans as achieved in phase
one.
Selection of Collecting Agencies
a. List all available sources; exploit the collecting agencies.
b. Collection will be assigned in accordance with capabilities.
c. Collection directives prepared once the proper collecting agency has been selected to
exploit a particular source.
d. Collection directives do not limit the activities of the collecting agencies.
e. Criteria for the selection of collecting agency; suitability, capability, confirmation, timeliness
and balance.
Factors in Choosing Collection Agent
In choosing collection agents, they must be selected according to their capability- agents’
placements or access to the target, multiplicity- more agents; and balance- the number of agents
needed per operation.
a. Methods of Collection- collection of information can be through overt method (open system)
or covert methods (secret/clandestine).
b. Collecting Agencies- depending on the type of operation, the collecting agency could be
Government Agencies, Intelligence Units and Organizations.
c. Trade Crafts- includes the use of photography, investigation/elicitation/interrogation,
surveillance, sound equipment, surreptitious entry- key and locks, use of an artist,
communication.
Phase 3: Processing the Collected Information
Steps in Processing the Raw Information
a. Collection- organization of raw data and information into usable form; grouping similar
items of information so that they will readily accessible.
b. Recording- is the reduction of information into writing or some other form of graphical
representation and the arranging of his information into groups related items.
Police Log Book and Journal
Intel-work Sheet- Intel Files
Situation Maps-Rouges Gallery
Modus Operandi Files
c. Evaluation- is the determination of the pertinence of the information to the operation
reliability of the source of or agency and the accuracy of the information.
Evaluation is Used to Determine the; (PRC)
Pertinence-does it hold some value to current position? Is it needed immediately?
Reliability-judging the source of info of agency
Credibility-truth of info
The Evaluation Guide
Accuracy of Information
Reliability of Information
Source of Information
1. Confirmed by other sources A- Complete Reliable T-Direct observation by a
Commander/Chief of Unit
2. Probably True B-Usually Reliable U-Report by DPA or resident agent
3. Possibly True C-Fairly Reliable V-Report by PNP/AFP Troops
4. Doubtfully True D- Not Usually Reliable W-Interrogation of Captured Enemy
5. Improbable E-Unreliable X-Observation of gov’t/civilian employee
6. Truth cannot be judged F-Reliability cannot be judged Y/Z-Documentary
d. Interpretation- it is establishing the meaning and significance of the information. It
involves the following activities;
Analysis- shifting and isolating those elements that have significance in the light of
the mission or national objective.
Integration-combining the elements isolated in analysis and known information to
form a logical picture or theory.
Deduction-the formulation of conclusions from the theory developed, tested and
considered valid-determination of effort and meaning of information.
Phase 4: Dissemination and Use of Information
This phase of the cycle refers to the activities of transferring the possessed information to
the proper users, most particularly the authority that requires the activity. Processed information
can be disseminated through annexes, estimates, briefing, message, reports, overlays, and/or
summaries.
The criteria that must be observed in dissemination are;
1. Timeless- must reach the users on time to be of value. It must be disseminated in
accordance with the urgency and must reach the user in sufficient time to be use.
2. Propriety- the message must be clear, concise and complete as well as in the proper form
for the receiver to readily understand its content.
Methods of Dissemination
Fragmentary from top to bottom of the command
Memorandum, circulars, special orders
Operations order, oral or written
Conference-staff members
Other report and intelligence documents
Personal contact
Intelligence data are disseminated to end users
Two principles preclude the release on intelligence
1. “Need to Know”
2. Compartmentation
Processed information is disseminated through;
Annexes
Estimates
Reports
Overlays/cover
Briefing
Message
Situations
Summaries
Common methods of disseminating Intel data are;
Conferences-person to person exchange
Briefing