100% found this document useful (1 vote)
332 views63 pages

Chapter Iii: Modes, Methods, Types, and Techniques of Gathering, Collecting, Preserving, AND Processing OF Information

INTELLIGENCE, SOURCES OF INFORMATION, UNDERCOVER, BACKGROUND INVESTIGATION, CYBER INTELLIGENCE CODES AND CIPHERS; CLASSIFICATION OF INFORMATION, AND SOURCES SECURITY AND CLASSIFICATION AND ACCESS OF DOCUMENT/INFORMATION

Uploaded by

fja748724
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
332 views63 pages

Chapter Iii: Modes, Methods, Types, and Techniques of Gathering, Collecting, Preserving, AND Processing OF Information

INTELLIGENCE, SOURCES OF INFORMATION, UNDERCOVER, BACKGROUND INVESTIGATION, CYBER INTELLIGENCE CODES AND CIPHERS; CLASSIFICATION OF INFORMATION, AND SOURCES SECURITY AND CLASSIFICATION AND ACCESS OF DOCUMENT/INFORMATION

Uploaded by

fja748724
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 63

CHAPTER III: MODES, METHODS, TYPES, AND

TECHNIQUES OF GATHERING, COLLECTING,


PRESERVING, AND PROCESSING OF
INFORMATION

Learning Outcomes:

At the end of this chapter, the students should be able to:

1. Display understanding of types and process of intelligence;


2. Recognize the methods and techniques of gathering information; 3. Identify
the classify and access of information

INTELLIGENCE, SOURCES OF INFORMATION, UNDERCOVER, BACKGROUND


INVESTIGATION, CYBER INTELLIGENCE CODES AND CIPHERS; CLASSIFICATION OF
INFORMATION, AND SOURCES SECURITY AND CLASSIFICATION AND ACCESS OF
DOCUMENT/INFORMATION

Introduction

The word intelligence describes the manner of interpreting information to generate


meaning It is also used to refer to or describe a group or a department which gathers such
information or the product itself of such activity. Simply put, intelligence is processed
information. When narrowed down to law enforcement use, “intelligence” could be described
as information that is acquired, exploited and protected by the activities of law enforcement
institutions to decide decide upon and support criminal investigations (United Nations Office on
Drugs and Crime [UNODC), 2011).

Intelligence always involves a certain degree of interpretation which may inevitably lead
to speculation and risk. The amount of speculation and risk is dependent upon the quality and
quantity of information. Intelligence is usually divided in two main areas:

a. Strategic intelligence: This focuses on the long-term aims of law enforcement agencies.
It includes reviewing current and emerging trends reviewing in the crime environment,
threats to public safety and order, opportunities for controlling action, and the
development of counter programs and avenues that will lead to changes in policies,
programs, and legislation.
b. Operational intelligence: This type of intelligence provides the investigative team with
hypotheses and inferences on specific elements of illegal operations of any sort. These
include hypotheses and inferences about specific criminal networks, individuals or
groups involved in unlawful activities, discussing their methods, capabilities,
vulnerabilities, limitations, and intentions, that could be instrumental in effective law
enforcement.

Sufficient knowledge of operational intelligence is a prerequisite to develop strategic


intelligence capability The development of operational intelligence will provide an important
source perspective. Of intelligence from om a strategie

It is important to note that the state’s national legislation dictates the way intelligence is
used for law enforcement purposes. The process of intelligence gathering, in relation to a
specific investigation, is typically prelude to any evidence gathering phase. Legislation will al will
also dictate whether intelligence material gathered during the course of an investigation is
protected from disclosure in criminal proceedings (UNODC, 2011)..

Examples of Intelligence Units:

1. Central Intelligence Agency (CIA)- The military Intelligence agency of United States of
America And is engaged in many undercover activities Throughout the world.
2. Komitet Gusodarstevenoy Bezopasnosti (KGB)- KGB is the intelligence agency of Russia.
3. Mossad Merkazi Le-Modiin U-Letafridim M-eyudim (MOSSAD)- The “Central Institute for
Intelligence and Security” in Israel.
4. Secret Intelligence Service (SIS)- Great Britain’s intelligence agency and known by its
wartime designation, “M16.” This is equivalent to US’s CIA which is in-charged of
gathering information overseas and providing strategic services ranging from foreign
espionage to covert political intervention.
5. Secret de Documentation Exterieure et Contre Espionage (SDECE)- The intellegence
agency of France.
6. Social Affairs Department (SAD)- The intelligence agency of China.
7. Federal Bureau of Investigation (FBI)- The agency whose primary role is counter
intelligence which is limited to internal security within the United States of America.
8. “MI-5” Great Britain’s civilian intelligence agency for internal counter intelligence, this is
equivalent of US’ FBI and equivalent to Internal Security Section of Russia’s KGB.
9. National Intelligence Coordinating Agency (NICA) – The intelligence agency in the
Philippines.

Definitions of Intelligence

Intelligence is the product of the collection, evaluation, analysis, integration, and


interpretation of all available information which may have immediate or potential significance
to the development and execution of plan, policies, and programs of the user (Pagud- Moster,
n.d.).

According to Merriam-Webster Dictionary intelligence is:

1. The capacity to understand and for other forms of adaptive intellect of behavior. The
minds in operation.
2. Knowledge of an event, circumstances, etc. that is received or imparted. The gathering
or distribution of information; the staff of persons engaged in obtaining such
information.

Police Intelligence

Police intelligence is the product of the collection, evaluation, analysis, integration, and
interpretation of all available information regarding the activities of criminals and other law
violators. This is done for the purpose of affecting the arrest of criminals and law violators,
obtaining evidence, and forestalling plan to commit crimes.

What is Information?

Information pertains to any evaluated materials of every description, which includes


those derived from observation, reports, rumors, imagery, and other sources from which
intelligence is produced.

General Classifications of Sources of Information

1. Open Sources (Overt Source) 99% of the information collected are coming from
opes sources.
a. Enemy Activities
b. POW
c. Captured Documents
d. Map
e. Weather Forecast, Studies, Reports
f. Agencies
2. Close Sources (Covert/Close Source) – 1% of information from close sources. a.
Surveillance
b. Casing
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means such as Bugging and Tapping Devices
f. Tactical Interrogation
g. Observation and Description

Functional Classifications of Police Intelligence

Criminal Intelligence- This refers to the essential knowledge in the prevention of crimes and the
investigation, arrest, and prosecution of criminal offenders.

Internal Security Intelligence- This refers to the essential knowledge to maintain peace and
order.

Public Safety Intelligence – This refers to the essential knowledge that will ensure the
protection of lives and properties.

Four I’S of Intelligence

1. Interest
2. Ingenuity
3. Integrity
4. Intelligence

Principles of Intelligence

1. Intelligence and operation are interdependent, These are separate and distinct activities
but complement each other.
2. Intelligence requires continuous security measures. It denies unauthorized personnel
information about operation and intelligence product.
3. Intelligence must be useful. It must serve the commander’s need and requirements.
4. Intelligence must be timely. It must reach the user in time to serve as basis for
appropriate action.
5. Intelligence must be flexible.
6. Intelligence requires imagination and foresight (Pagud-Moster, n.d.).

Broad Categories of Intelligence

1. National Intelligence – It refers to the integrated product of intelligence developed by all


government departments regarding the broad aspect of national policy and national
security.

National Policy – It refers to the specific courses of action to achieve the national objectives.

National Security – This relates to the protection and preservation of military, economic and a
productive strength of a country including the security of the government and domestics and
foreign affairs against espionage, sabotage, and subversion.

2. Department of Intelligence - This the intelligence required by government departments


or agencies to execute its mission and discharge its responsibilities.
3. Military Intelligence - This is used in the preparation and execution of tactical plans.

Fields of Police Intelligence

1. Strategic Intelligence It comprises knowledge which relates to the capabilities and


vulnerabilities of a foreign nation. This is required by national planners to formulate
adequate national defense in peace and to form the basis military operations in time of
war. Components of Strategic Intelligence are:
a. Political Intelligence – It deals with domestic and foreign affairs and relations of
the government operations;
1. Basic principles of the government
2. Government structures
3. Public order and safety
4. Subversion
5. Intelligence and security organization
b. Economic Intelligence - It deals with the extent and utilization of all resoucres
including natural and human relative to the industrial potential of the nation.
c. Transportation and Telecommunication Intelligence - Concerned with the
operations and facilities not only that of the military but also of the civilians.
d. Sociological Intelligence - It deals with the Demographic and psychological
aspects of groups of people.
1. Population and manpower
2. Characteristics of the people
3. Public opinion and public attitude towards matters of public policy
4. Education based on literacy rate.
e. Biographical Intelligence - It deals with Individual personalities who have actual
possession of power.
f. Armed Forces Intelligence -It deals with the armed forces of the nation.
1. Position of the Armed Forces the constitutional and legal basis of its creation and
actual role.
2. Organization, structure, and territorial disposition
3. Military manpower recruitment
4. Order of battle
g. Geographical Intelligence - It deals with the natural and man-made features of the
physical environment from the perspectives of military operations.
1. Location-Military and economic importance
2. Size Measurement of which a nation can exchange space or time during war.
3. Shape
4. Weather and climate
h. Scientific Intelligence - It deals with the progress of the research and development as it
affects the economic and military potential of a nation.
2. Line Intelligence (Tactical and Combat) – The intelligence required by the commander used
for planning and conduct of tactical operation. This refers to knowledge of people, weather,
enemy, and terrain (PWET) used in planning and conducting tactical and administrative
operation in a counter insurgency.

What intelligence information are determined?

A. People
- Living condition of the people
- Sources of income
- Education of the people
- Government livelihood of the people
- Extent of enemy influence to the people

B. Weather
- Visibility
- Cloudy
- Temperature
- Precipitation (rain)
- Wind

C. Enemy
- Location of the enemy
- Strength of the enemy
- Disposition
- Tactical capability
- Enemy vulnerability

D. Terrain
- Relief and drainage system
- Vegetation
- Surface material
- Man-made features

Five Military Aspects of Terrain

1. Cover and concealment


2. Obstacle
3. Critical key terrain features
4. Observation and fields of fire
5. Avenue of approach
3. Counterintelligence-It is the phase of intelligence which covers the activity dedicated in
destroying the effectiveness of hostile foreign activities and the protection of information
against espionage, subversion, and sabotage.

Three Activities of Counterintelligence are:

a. Protection of information against espionage


b. Protection of personnel against subversion
c. Protection of installations and materials against sabotage

The Two General Types of Counterintelligence are:

1. Passive Measures – The measures which seek to conceal information from the enemy.
2. Active Measures - The measures which actively seek to block the enemies’ effort to gain
information or engage in espionage, Subversion, and sabotage.

Five Importance of Effective Counterintelligence

1. Denies information to the enemy;


2. Reduces the risk of a command;
3. Aids in achieving surprises;
4. Increases the security of the command; and
5. Decreases the enemy’s ability to create information about the forces.

Five Categories Operation of Counterintelligence

1. Military Security - It covers the measures taken by a command to protect itself against
espionage, enemy operation, sabotage, subversion, or surprise.

Ex.

- Secrecy discipline
- Special safeguarding of classified information
- Security of troop movement
- Special handling of weather and escapees counter subversion within the
armed
- Forces tactical measures in combat area
2. Port Frontier and Travel Security -The application of military and civil security measures for
counterintelligence control at point of entry and departure, int borders, and boundaries.
International

Ex.

- Security control of merchants, seamen and crew of commercial aircraft


- Security screening and control of frontier
- Security control of seaports
- Security control of frontier/border crossing point

3. Civil Security - It encompasses active and passive counterintelligence measures affecting


the non-military nationals permanently or temporarily residing in an area under military
jurisdiction.

Ex.

- Systematic registration of civilians and aliens


- Control of circulation
- Curfew
- Surveillance of suspected political
- Organization
- Scty. Screening of labor
- Issuance of passes and permits
- Control of internal commerce

4. Censorship – The control and examination of the following:

- Civil
- National
- Armed forces
- Field press
- POW
5. Special Operations - The operations conducted to counter subversion, sabotage, and
espionage.

Eight Basic Principles of Counterintelligence Operations

1. Conformity to mission
2. Avoidance of publicity
3. Objectivity
4. Confirmation
5. Offense
6. Flexibility
7. Continuity
8. Coordination

What is counterintelligence investigation?

Counterintelligence Investigation is an activity comprising the value of the


counterintelligence workload, worldwide and includes specific investigation of individual and
incidence, which is conducted in an overt but discreet manner.

Three Categories of Counterintelligence Measures

1. Denial Measures
a. Secrecy discipline
b. Document scty.
c. Camouflage and concealment
d. Communication scty.
e. Military censorship
f. Counter reconnaissance effort

2. Detection Measures
a. PSI
b. Scty. Tag or pass card
c. Challenge or password
d. Reconnaissance

3. Deception Measures
a. Ruse (use of escape and evasion)
b. Dummy position
c. Fabricated information

The Intelligence Cycle

Planning and Supervision of the Collection Effort

1. The intelligence officer must have a comprehensive knowledge of the available sources
of information, the collecting agencies, and type of information the latter can provide.
2. The officer must understand the command operations to provide the required
intelligence to succeed.
3. He must have a thorough knowledge of the tactics, organizations, and characteristics of
the enemy.
4. He must be competent and skilled in the fields of surveillance, reconnaissance, counter-
reconnaissance, and acquisition of operations.
5. He should understand the weather elements and their influence upon personnel,
material, and terrain.

Phases of Intelligence Cycle

A. Directing the Collection Efforts


1. Determination of requirements.

- Enemy capabilities, including time, place, strength, or other details.


- Enemy vulnerabilities, including nature, extent, performance and other
details.
- Enemy order of battle and factors
- Terrain, including natural and artificial obstacles.
- Weather
- Information desired by higher, lower, or adjacent headquarters.

2. Determination of the essential elements of information.


- An intelligence or information of the characteristics of the area of operations
and the enemy, which the commander feels he needs before he can
reasonably decide.

3. Establishment of priorities
- Priorities reflect the criticality of the need for the information. No formula
exists which can automatically determine priorities. Such determination is a
matter of judgment.

B. Collection of Information
1. Determine collecting agency;
2. Send orders or request;
3. Supervise collection efforts;
4. Use tools or technique in collection; and
5. Ensure timely collection.

Factors in Choosing Collection Agents are:

1. Capability The agents’ placement or access to other target


2. Multiplicity The number of agents.

C. Processing the Collected Information


1. Recording - The information is synthesized using writing or graphical representation. The
information is also grouped into related items.
2. Evaluation - The determination of the information’s relevance to the operation,
reliability of the source or the agency, and the information’s accuracy.

Evaluation is used to determine the:

a. Pertinence The value to current operation and if the need is immediate.


b. Reliability The trustworthiness of the source of information or agency.
c. Credibility information. The truth or integrity of the
In judging credibility, these questions should be considered:

1. Is there a possibility that the reported fact or event took place?


2. Is the report consistent?
3. Is the report confirmed or corroborated by information from different sources or
agencies?
4. If the report does not agree with information from other sources, which one is
more likely to be true?

Interpretation of information is conducted to determine:

a. Meaning; and
b. Significance.

3. Analysis - It involves determining the information’s significance relative to the known


information and intelligence. Further, it involves drawing deductions about the probable
meaning of the information evaluated.

The two distinct phases of analysis are:

a. Assessment –
b. Integration - Combining the elements in the assessment with other information
or intelligence to form a logical feature or hypothesis of the activities of the
enemy. It also includes information on the characteristics of the operational area
of the command mission.

D. Dissemination and Use

Processed information is disseminated through:

- Annexes
- Estimates
- Reports
- Overlays/cover
- Briefing
- Message
- Situations
- Summaries

Evaluation Guide
Reliability of Information Accuracy of Information

A- Completely Reliable 1-Confirmed By Other Sources

B- Usually Reliable 2-Probably True

C-Fairly Reliable 3-Possibly True

D-Not Usually Reliable 4- Doubtfully True

E-Unreliable 5- Improbable

F-Reliability Cannot Be Judged] 6-Truth Cannot Be Judged

Sources of Information

S-Signal Intercept

T- Direct Observation by Commander/Chief of a Unit

U-Report by Penetration Agent or Resident Agent

V – Report by PNP/AFP Troops Involved in Encounter

W-Interrogation of Captured Enemy Agent/Foreigner X – Observation of Government/Civilian


Employee or Officials

Y – Observation by a Member of the Populace

Z- Documentary

Cyber Intelligence
• Cyber intelligence is the collection, processing, and analysis of information or data on
cybercrime from various sources which include public, private and open sources
(European Union Agency for Law Enforcement Cooperation (Europol), 2021).
• “Cyber intelligence is the acquisition and analysis of information to identify, track, and
predict cyber capabilities, intentions, and activities to offer courses of action that
enhance decision making” (Europol, 2021).

The objective of cyber intelligence is to enrich and expand the storage and management
of law enforcement data, thus making the fight against cybercrime effective.

Cyber-intelligence products include:

• Cyber Bits Short intelligence notifications on cyber-related topics


• The Open-Source Intelligence (OSINT) Dashboard, Captures the most important events
from the passing week in a broadly understood cyber domain
• The Common Taxonomy for the National Network of Computer Security Incident
Response Teams

Types of Cyber Intelligence

Cyber intelligence can be a result of the following combination:

1. Open Source Intelligence (OSINT)


2. Signal Intelligence (SIGINT)
3. Geospatial Intelligence (GEOINT)
4. Social Media Intelligence (SOCMINT), and
5. Human Intelligence (HUMINT)

Strategic Cyber Intelligence

• Used to inform organizational or national strategy and policy development that will
direct enterprise over the long term.
• Collected broadly within sector to which organization belongs and likely includes
complementary sectors.
• Focused broadly on threat vectors and adversaries and on contextual political, economic,
and social trends. Includes understanding of state and non- state threat actors’ interests,
policies, doctrines, and concepts of operations.
• Generally nontechnical in nature, focused on trend analysis across and between sectors,
stated and unstated objectives of state and non-state actors, and other strategic
indicators.

Operational Cyber Intelligence

• Used to inform risk-based decisions about resource allocation and activity to maintain
business continuity and prevent disruption.
• Collected with an emphasis on enterprises’ operations, to include partners, suppliers,
competitors, customers, and other trusted relationships.
• Focus on targeted, opportunistic, and persistent threat vectors that pose greatest risk to
business continuity.
• Blends technical and nontechnical collection to explore and prioritize threats, the
mechanisms and signatures of potential attacks, and organizational vulnerabilities.

Tactical Cyber Intelligence

• Produced for incident response teams.


• Used to restore operations quickly and collect cyber forensic evidence following a
cyberattack Or intrusion.
• Collected with internal emphasis on organization, including personnel, assets, and
networks.
• Focused on understanding and analyzing an adversary’s use of technical/logical tactics,
techniques, and procedures (TTP) to target the organization.
• Generally, more technical in nature (Cyber Intelligence Task Force, 2015).
POLICE INTELLIGENCE OPERATION
Intelligence Operation - Refers to the outcomes of intelligence planning which is done ahead of
an operation. However, there are instances when an operation takes without a plan due to
unexpected circumstances. Such situation is an example of poor intelligence management.

Different Tasks involved in police intelligence operation

1. Discovery and identification activity


2. Surveillance
3. Liaison program
4. Informant management
5. Clipping services
6. Debriefing
7. Relevant miscellaneous activity
8. Casing
9. Utilization of informant

Operational Cycle

1. Mission and target is carried out through:


a) Infiltration The insertion of action agent inside the target organization.
b) Penetration – The recruitment of action agent inside the target organization.
2. Planning
3. Spotting
4. Investigation – PBI /CBI
5. Recruitment - The most preferred qualification of an agent is his/her access to the
target.
6. Training
7. Briefing
8. Dispatching
9. Communication
- Technical telephone or radio
- Non-technical – Personal meeting
10. Debriefing
- Let your agent talk all he encountered during The operation.
- Don’t interrupt your agent while he is talking.
- Never postpone or pause and set for another time for the briefing

11. Payment (Depends upon the motivation) - Buy his life not his job.
- Regularity and dependability that counts not the amount.
- Pay no bonuses.
- Supplement the agent income from regular sources enough to ease his financial
worries but not enough to cause him to live in style.

12. Disposition
- Reroute
- Retraining
- Retesting
- Termination

13. Reporting
14. Operational Testing

COVER AND UNDERCOVER

Cover – The manner used by a group or organizations conceal the true nature of its acts and or
existence from the observer.

Cover Story – This refers to the fictitious biographical data used by an agent as a cover up. This
can also refer to any fictitious scenario.

Cover Support - An agent assigned in target areas whose primary mission is to support the
cover story.
Essentials of cover:

1. Secrecy of operation against enemy intelligence.


2. Secrecy of operation against friendly agencies that do not have the need to know.
3. Successful accomplishment of the mission.

Four Types of Cover:


1. Natural Cover – Using actual or true background.
2. Artificial Cover- Using biographical data adopted for the purpose.
3. Cover within a Cover – Justifies the existence of the agent.
4. Multiple Cover- Any cover the agent wishes to use.

Hazards to Cover:

1. Static or dormant opposition (ordinary citizens)


2. Unhostile active opposition (political security agencies)
3. Hostile active opposition (enemy international operatives)

Precautions or guidelines in case of compromise:

1. Move out immediately.


2. Start new facility for the operation and develop it.
3. Built entirely new cover.
4. Use circuitous routes and provide careful counter surveillance measure.
5. Be specifically careful of former contacts with non-intelligence personnel.
6. Be patient, act slow, and be careful.

Organization Cover – It refers to an account consisting of biographical data, which when


adopted by an individual will assume the personality he wants to adopt.

Objectives of Organizational Cover

1. To camouflage and protect operational personnel and their activities.


2. To protect the installation where clandestine activities are based.

Guidelines when Compromised: organizational cover is

1. Make a physical move or relocation.


2. Start a new facility for the old operation and let it grow.
3. Use new personnel.
4. Let old personnel remain in place.
5. Build entirely new cover.
6. When files are relocated, use circuitous route to avoid surveillance and other
counterintelligence.
7. Be careful in making contacts with non- intelligence personnel.
8. Be patient.

Undercover Assignment - This is an investigative technique used when anagent conceals his
official identity and obtains information from the target organization.

Planning an Undercover Assignment?

1. Determine the level in which the investigation is intended;


2. Develop appropriate cover and cover story;
3. Select qualified personnel;
4. Consider all operational details which include documentation, contact reporting,
housing, and convergence; and
5. Conduct briefing, coaching, and rehearsal.

Two Uses of Undercover

1. Interdependently used to get firsthand information about the subject of investigation.


Ex.
a. Security evaluation of every installation
b. Gain confidence of suspected persons
c. Agent penetration
d. Verify information from human resources
e. Undercover concealed identity
2. Supplement other investigative techniques such as:
a. Playing ground works for raids and searches by going entry
b. Assisting in locating evidence
c. Installing and maintaining investigative equipment of undercover assignment

Types of Undercover Assignments:

1. Dwelling
2. Work
3. Social
4. Jurisdictional assignment
5. Combination assignment
6. Rope job or buildingfriendship with the subject

Social Qualifications of Undercover Agent:

1. Knowledge of the language


2. Area background regarding events
3. Knowledge about the customs and habits
4. Physical appearance

Factors to be considered in Selecting Cover Story:

1. Mutual point of interest


2. Justification of presence
3. Previous and permanent address.
4. Efficient in his role
5. Freedom for movement
6. Means of communication
7. Social and financial status
8. Optional alternate plan
9. Safe departure

INFORMANT vs. INFORMER

Informant – It refers to a person who gives voluntary information to the police without any
consideration.

Informer - It refers to an individual who gives information in exchange for a price or reward.

Types of Informants

1. Anonymous informant - One who gives information through telephone or letters with
the hope that he or she will not be identified.
2. Confidential informant - A person who provides the investigator with confidential
information concerning a past or projected crime and does not wish to be identified as
the source of the information. The investigator should take a special precaution to
protect the identity of the informant because of his value as a source on the disclosure
of crimes and the criminal.
3. Criminal informant - A type of informant who gives information to the police pertaining
to the underworld and the organized crimes with the understanding that his identity will
be protected and in exchange for a certain consideration.
4. Voluntary informant- The informant who gives information freely as a witness to a
certain act.
5. Special informant- The informant who gives information concerning specialized cases
only and is given special treatment by the operatives.
6. Accidental informant- The informant who casually imparts information to an officer with
no intention of providing subsequent information.
7. Rival- Elimination informant- The informat who is usually anonymous. His purpose in
providing information is to eliminate rival or competition.
8. False informant - The informant who provides information with no relevance to the
crime or stuff concocted of thin air. This is done to appear that he is on the side of the
law and to divert the suspicion from himself, his gang, or his associates.
9. Frightened informant - The informant who is prodded because of fear or self-interest.
He maybe one of the “little men” who runs to the police when he sees that his
confederates are about to be involved in a dangerous situation and gives information as
a protective device and as a means of sustaining his own feeling of self- importance. He
is the “weakest link” in the criminal chain.
10. Self-aggrandizing informant- Hangs on the fringes of the underworld and delights in
surprising the police with information. In certain circumstances, his information may be
of value.
11. Mercenary informants- The type of informant who has something to sell. He may be a
valuable source. Sometimes there is a revenge motive present. He may have thought
himself to have been double-crossed or given a “dirty deal” and seeks revenge as well as
profit in the telling.
12. Double crosser informant- The type of informant who uses his desire to give information
as an excuse to talk to the police to get more information from them that he gives. It
entails feeding the informat false information to catch him

Sub-Types of Informants:
1. Incidental informant- A person who casually imparts information to an officer with no
intention of providing subsequent information.
2. Recruited informant – A person who is selected, cultivated, and developed into a
continuous source of information regarding police targets.

Categories of Recruited Informants

1. Spontaneous of automatic informant - Informants who, by the nature of their work or


position in the society, have a certain legal, moral, and ethical responsibilities to report
information to law enforcement agencies.
2. Ordinary run-of-the-mill informant-Informants who are not obligated to report the
information to the police.
3. Special employee Informants who are of a specific operational nature.

Motives of Informants

1. Reward
2. Revenge
3. Fear
4. Patriotism
5. Friendship

Phases or Steps of Informant Recruitment

1. Selection - It is desired being able to identify and recruit an informant who has access to
many criminal in-groups or subversive organizations. Extensive access is probably the
single most important feature in the consideration of recruiting potential informant.
2. Investigation – The investigation of the potential informants who have been identified as
“probable” must be as thorough as possible. The possible motives why they assist the
police intelligence community must be established. If necessary, a complete background
investigation (CBI) should be conducted.
3. Approach – Approaching the probable informant must be done in pleasant
surroundings. Such as a confidential apartment completely free of any probable
compromise, preferably in an adjacent city or a remote area foreign to the informants’
living pattern.
4. Testing - The testing program should begin with limited assignments, followed with
gradual integration into more important or sensitive areas. The occasional testing of an
informant should continue throughout the entire affiliation.

Factors Considered in Informant Recruitment

1. Access
2. Health
3. Built
4. Ability
5. Age
6. Education
7. Personality
8. Sex

General Treatment of Informants

1. Avoid the use of derogatory terms in referring to informants of any type.


2. Avoid disclosing the identity of the informant, which, in most cases, ruins his potential.
3. Protect the interest of the informant. The investigator is usually just as good as his
source of information.
4. Consider all information from known and unknown informants as valuable until proven
otherwise.
5. Be noncommittal on the value of the information received.
6. Express appreciation of all information received regardless of its value.
7. Be punctual during appointment, eventhough the informant is not.
8. Do not be overanxious. Be patient. Take your time.
9. Have control of the investigation.
10. Keep what you know to yourself, do not become the informant’s informant.

Important rule that a handler or civilian agent or informant must follow:

“Never love your agent”

An agent handler must be able to determine when to “terminate” the agent. That is to
cut off the agent from a project when it has reached a particular stage. “That is why when you
fall in love with an agent, it becomes difficult to terminate’ him or her.” In extreme cases, like
when agents commit serious acts of betrayal, to terminate means physical elimination.
Information net – This is a controlled group Who work through the direction of the agent
handler. The informants, ts, principal, or cutouts supply the agent handler directly or indirectly
with intelligence information.

Factors in the Selection of Action Agent

1. Placement - The location of prospective agent with respect to the target.


2. Access- The capability or ability of a prospective agent to obtain the desired information
for the intelligence organization or to perform the intelligence’s collection mission in the
area.
➢ Primary Access -Direct access to the desired information.
➢ Secondary Access -The access to the desired information through a principal source,
where the latter has the direct access. Access-The agent is employed outside

➤ Outside the target and merely monitors information from a third person who is
monitoring the information in the area.

Motivations of an Agent

1. Ideology-Belief or principle in life.


2. Patriotism
3. Remuneration
4. Career Development
5. Fear

General Nature of an Agent Handler

1. Sharing a secret purpose


2. Agent handler controls the agent operationally and administratively
3. Rapport with each other
4. Respect with each other

Basic Agent Management Principle

1. Agent handler must oversee the operation.


2. The act ensures the agent’s adherence.
3. Good rapport must be established between the agent handler and the agent.
4. The agent handler must constantly reinforce the agent’s motivation.

Control - This refers to the authority to direct the agent to carry out the task or requirement on
behalf of the clandestine organization in an acceptable and secured manner.

Two Categories of Control

1. Positive Control - It is characterized by professionalism and rapport.

Types of Positive Control

a. Agent motivation
b. Psychological control

2. Negative Control – The use of blackmails and threat.

Types of Negative Control

a. Disciplinary Action – This includes verbal reprimand for poor performance or


insecure actions withholding certain material rewards, reduction of agent’s
salary, or, in extreme situation, the threat of terminating professional
relationship.
b. Escrow Account- The control of an agent by putting his salary in a bank to be
withdrawn only after a fulfillment of a condition.
c. Blackmail

Key Elements of Agent Management

1. Direction and control


a. Leadership
b. Action
c. Personal example

2. Natural weaknesses
a. Inability to keep secret
b. Need for recognition
c. Strain of dual experience
d. Experience

3. Agent training

4. Agent testing
5. Agent termination

Problems encountered in the termination of agent:

1. The agent’s amount of knowledge in the operation and personnel.


2. The agent’s inclination to use knowledge to the disadvantage of the intelligence service.

The organization’s moral obligation to the agent. The loss incurred by the agent because of
his connection with the intelligence service.

OBSERVATION AND DESCRIPTION

Observation – The complete and accurate observation of one’s surroundings. It encompasses


the use of all the senses to register and recognized its operational or intelligence significance.

Description - The actual and factual reporting of one’s observation or the reported sensory
experience recounted by another.

Psychologists estimate that approximately:

a. 85% of your knowledge is gathered through sight.


b. 13% is gathered through your hearing.
c. 2% is gathered through the other three senses.

Psychological Process for Accurate Observation

1. Attention – Consists of the psychological process involved to becomeaware of an


existence of fact.
Types of Attention

1. Involuntary One has no control and requires no effort.


2. Voluntary It is more reliable but not dependable.
3. Habitual-It requires little effort with maximum of control.

2. Perception Involves in the understanding of these facts or awareness.

Factors Involved in the Perception

1. Mental capability
2. Educational background
3. Occupational background
4. Empirical background through experience. This is acquired

3. Report - Involves in identifying the name in one’s own mind and some facts, which has
been perceived, narrated and identified.

Factors Governing Report

1. Vocabulary The words which an individual uses to express himself.


2. Time Log-Accurate reporting depends entirely on timeliness. Also included in the
factors are the delays in reporting the results and the unconscious omission of
details.
3. Recurrence of similar incidents.

ELICITATION

Elicitation - A process valued intellegent or plan in obtaining information intercommunication. In


this process, using direct one or more of the parties is unaware of the specific purpose of the
conversation.

Three Phases of Elicitation

1. Determination of the mission


2. Selection of the subject
3. Accomplishment of the mission
Techniques in the Conduct of Elicitation

1. Approach - It refers to the process of setting people to start talking.

Types of Approach:

1. Flattery Approach - Bank on people’s are susceptibility to praises.

Variants:
a. Teacher-Pupil Approach
- The subject is treated as an authority. Request him to enlighten us and solicit his
viewpoints and opinions.
b. Kindred Sole Approach
- The subject is placed in a pedestal as someone who has specialized qualities
or knowledge. He is flattered through display of concern for his welfare and
special attention to his enjoyment.

c. Good Samaritan Approach


- Sincere and valid offers to help and assist are made to the subject.

d. Partial-Disagreement Approach
- Seeks to illicit talking using the phrase “I not am sure if I fully agree.”

2. Provocative Approach - Using a wide range of conversational gambits.

Variants:

a. Teaser Bait Approach


o The elicitor accumulates the sources of knowledge about a particular subject.
b. Manhattan from Missouri Approach o The elicitor adopts an unbelievable
attitude about anything. He questions all statements and oppositions.
c. Joe Blow Approach o Using the “I know the answer to everything” approach.
The elicitor adopts the attitude of being approachable of any field.
d. National Pride Approach
o The natural propensity of all persons to defend their country and its policies.

3. Probe - The approach where the people are encouraged to talk incessantly.
Types of Probes

1. Completion Probe - This is effective when used in connection with the teacher
pupil approach.
2. Clarity Probe – This is used to elicit additional information in an area where the
response is clear.
3. High Pressure Probe - This is used to pin down a subject in a specific area or to
point out contradictions in what the subject had said.
4. Hypothetical Probe - This is used by presenting a hypothetical situation to get
the subject to react to the given situation.

Four Purposes of Elicitation

1. To acquire information that is unachievable through other channels.


2. To obtain information, which, although unclassified is not publicly known.
3. Toprovideoperationalinformation and background data on potential information.
4. To assist various individuals.

Planning and Preparation

1. What information is necessary and essential.


2. Who has access to the information.
3. What are his vulnerabilities.
4. How susceptible is he to elicitation.
5. Outline elicitation points prior to meeting and prepare specific questions and know your
subject well.

CASING

Casing- This refers to the investigation or or surveillance of a building, place, or area to


determine its suitability for intelligence use or its vulnerability in operations.

This process is necessary in planning an operation as it provides essential information on


the area of opration. Such knowledge or information assists the agent handler in assuring and
instilling confidence among his agents during briefing phase because he knows the area of
operation. Casing is also a security measure because it offers some degree of protection to
those operating in an unfamiliar area.
Types or Forms of Casing

1. Surveillance – The act of gathering specific or detailed information of a particular area,


which may take a long period of time. Surveillance is continuous whilst reconnaissance is
intermittent or sporadic (mission or operation).
2. Reconnaissance The act of gathering general information in a wider area, which requires
short time frame. Reconnaissance is done with specific objectives in mind, while
surveillance is guided by general objectives.

The general principles of casing are:

1. Identify the best route to take to the area.


2. Identify how to conduct oneself without attracting attention.
3. Identify security hazards are in the area and how it can be avoided or minimized.
4. Identify the best route to extricate from the area.

Methods in Casing:

1. Personal reconnaissance- This is the most effective method and will provide the most
information since twhat is being looked for has been identified or known.
2. Map reconnaissance – This may not be sufficient, but it can result to a certain amount of
usable information.
3. Research -There is a bulk of information which can be acquired through research.
4. Prior information – This may be accessed in your unit as well as in other units through
file reports which may be also be a source of information.
5. Hearsay - The information gained by operating in the area and performing a casing job.

The desired information in casing are:

1. Area condition and habit-This provides information and description of the locality as to
whether the place is residential, commercial, highly urbanized, or rural. Also included in
the information are the living condition, income of population, operational data (time
where the area seemed to be useful closing time). It includes description of the area
during different weather conditions. In addition, the types of available transportation in
the area and the amount of fare are included. Habits refer to the routine activities of the
people in the area, the dialect, and the different beliefs.
2. Active opposition - This refers to organs of every activity system whose task is to prevent
intelligence activity in each area. This includes hot only the enemy, but also the effort of
the neutral or allied countries to discover and neutree our intelligence activities and
learn its objectives. Remember that a country which is either neutral or ally at present
may, anytime in the future, become the opposition’s ally.

3. Disposal plan – The disposal of the information and materials in cases of possible
compromise.
4. Escape and evasion plan - The plan in cases of emergencies, from immediate focal point,
which includes the general area and completely from the area.

Five Fundamental Principles of Casing

1. To gain contact as soon as possible and maintain continuously.


2. Maneuver freely in conformity with operations (dry run).
3. To fight only when necessary.
4. To report all items of information.
5. To develop the situation.

Steps or Guide in the Conduct of Casing

1. Preparation of general location map.


2. Sketch of the adjoining establishment and prominent features.
3. Specific sketch or floor plan of main target.
4. Detailed features of inner portion of the target and its description.
5. Photograph of the casing target (from general to specific points).

SURVEILLANCE
Surveillance - This refers to a form of clandestine investigation which involves keeping a person,
place or other targets under physical observation in order to obtain evidence or information
pertinent to the investigation.
Surveillance Report Format

HEADING

MEMORANDUM

FOR :

FROM :

SUBJECT :

DATE:

I. Authority

A. Duration
B. Composition of surveillance team
C. Identity of the person under surveillance
D. Type of surveillance used
E. General and specific locations involved.

II. Description of the Subject


A. Personal details
B. Photographs
C. Others
III. Chronological Account of Activities IV. Description of Each Contact
IV. Description of Each Building
V. Comments
VI. Recommendations

Objectives of Surveillance

1. To confirm or deny allegations.


2. To identify persons involved in certain activities.
3. To provide background information for undercover assignment.
4. To develop leads to vital information.
5. To obtain upon which to conduct additional investigation.
6. To check on sources of information.
7. To locate addresses, or places frequently by subject as well as his associates.
8. To obtain detailed information about the nature, scope of subject’s activities.
9. To secure basis for securing search warrant.
10. To provide protection.

Related Terms:

Pre-surveillance conference - A conference held among the team members or the police
intelligence unit before the conduct of surveillance.

Subject/rabbit- It refers to the subject which is either person or place.

Surveillant - A person who conducts a surveillance which includes observations only.

Stakeout or plant - The observation of places or areas from a fixed point.

Tailing or shadowing – The observation of a person’s movement.

Undercover man -A person trained to observe and penetrate a certain illegal activities and
organization suspected of reports the observations and information forproper operational
action. Safehouse – A place, building, enclosed mobile, or an apartment, where police
undercover man meets his action agent for debriefing or reporting purposes.
Drop – A convenient, secure, and unsuspecting place where a police undercover man, informer,
or informant, by a pre-arrangement, leaves a note, a small package, an envelope or item for the
action agent, supervisor, or another agent.

Convoy – An accomplice or associate of the subject.

Decoy-A person or object, almost like the subject, which is used to avoid or elude the
surveillant.

Contact - A person whom the subject picks or deals whit while he is under surveillance.

Made or burnout - It refers to the subject under surveillance who becomes aware that he is
under observation and identifies the observer.

Lost - When the surveillant does not know the whereabouts of his subject or the subject had
eluded the surveillant.

Finger man - An individual who can positively point the subject.

Put to bed - When the subject, under surveillance, returns to the quarter to retire for the night.

Types of Surveillance

A. According to intensity and sensitivity


1. Discreet - Subject to be watched is unaware that he is under observation.
2. Close - Subject is aware that he is under observation.
3. Loose – Applied frequently or infrequently, the period of observation which varies
for each occasion.

B. According to methods
1. Stationary - The observation of place, usually a bookie stall, a gambling joint, or a
residence where illegal activities are happening ( fixed location).
2. Moving – The surveillant follows the subject from place to place to maintain
continuous watch of his activities.
3. Technical - A surveillant hardware, telecommunication systems, and equipment.
Uses gadgets, system, and equipment.

Preparation of Surveillance
A. Area and target study – All available information about the areas should be collected
and analyzed.
B. Surveillance plan - The plan should establish the required type of personnel, as well
as the general and specific instructions for surveillant. The pplan ensures that the
overall objective of the surveillance is understood and all participating personnel will
have a common understanding of the operational limitations, signals, and special
instructions.

C. Selection of Personnel
1. Inconspicuous physical character
2. Ability to remain unnoticed
3. Resourcefulness
4. Patience and physical stamina
5. Keen sensory perception and retentive memory
6. Driving ability
7. Personal courage
8. Area knowledge
9. Security consciousness

D. Administrative and Logistics


1. Communication and control
2. The conduct of surveillance

Equipment in Surveillance:

1. Camera with telephoto lens


2. Voice recorder
3. Mini-video camera and others

Surveillance Precautions:

1. Do not make abrupt or unnatural movement.


2. Do not make use of disguise that will attract attention.
3. Never stare at the subject.
4. Do not attempt to appear too innocent when accessed by the subject.
5. Never speak to another surveillant unless absolutely necessary to accomplish the
mission.
6. Maintain distance.
7. Plan ahead.
8. Be aware on the changes of action.
9. Note taking should be done in safe areas.
10. Make use of street furniture (telephone booth, sidewalks, waiting shades, vendors).

Factors to Consider in Fix Surveillance:

1. Determine base of operation.


2. Maintain a thorough, cautious reconnaissance of the area.
3. Obtain necessary equipment.
4. Assign specific duties to each member of the team.
5. Prepare alternative course of action.
6. Provide for relief team.
7. Arrange for communication signals
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel on
the base of operation.

What to avoid in surveillance:

1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corners
4. Getting out immediately on public conveyance
5. Retracing
6. Entering mobile housing

Required Appearance of a Surveillant:

1. Be of average size, built, and general appearance.


2. Have no noticeable peculiarities in appearance or mannerisms.
3. Wears inconspicuous, unnoticeable, or ordinary jewelry or clothing.
4. Have nothing about him to attract attention or fix him in the mind of a person.
5. Have perseverance and be able to wait for hours at a time without showing any sign of
impatience or irritation, since this attracts attention.
6. Always gives the appearances of attending strictly to his own business and of not being
interested in what anyone else is doing.
7. 7. Resourceful, versatile, and quick witted, so that he can readily conceive reasons or
excuses for being in any given place.
8. Be a good talker, able to talk his way out of embarrassing situations without arousing
suspicion.
9. Have one or two good standard “line” such as canvassing for the city directory or a trade
publication or selling brushes or other articles.
10. Carries a cap and glasses to effect such changes including wig or mustache, if necessary.
Kinds of Surveillance

a. Stake out or surveillance of


places Two types of place
surveillance:
1. Using a room in a nearby house or business establishment and remaining
undercover.
2. Remaining outdoors and posing as a person who would normally conduct his
business in such an area, ex, a laborer, carpenter, street vendor, etc.

b. Tailing or shadowing Don’ts in


shadowing:
1. Do not make abrupt or unnatural movements.
2. Do not make use of disguise that will attract attention.
3. Do not meet the subject’s eye. Doing so tends to fix the shadower in the mind of the
subject. If the subject turns and it seems as if a face to face encounter will result, the
shadower must look anywhere except the subject’s face.
4. Do not adopt a slinking, sleuthing, creeping, peeking manner. Do not slink in and out
of doorways, sleuth behind the subject, creep from around parked cars, peek for
around corners, it is unnecessary, ineffectual and above all attract attention.
5. Do not wear story book disguises. False whiskers, artificial noses, simulated
deformities and the like, these disguises maybe good in theaters but not on the
street.
6. Do not carry briefcases, notebooks, papers, or other noticeable objects.
7. Do not greet or never speak to fellow officers or allow them to greet you. It must be
an established policy that other officer in or out of uniform do not greet each other
on the streets if there is any possibility that one may be on a job.
8. Do not make notations or entries ostensibly. Strangely enough sometimes, the more
experienced shadower fails to observe this precaution. This is to avoid suspicion of
his mission.
9. Do not bring bulging concealed weapons.
10. Do not attempt to appear too innocent if accosted by the subject.
11. Maintain distance.
12. Note taking should be done in safe areas.

Methods of Shadowing

A. Foot Surveillance
1. One man shadow
2. Two man shadow
3. Three- man shadow or the ABC method

Techniques in shadowing using foot surveillance:

1. Turning corner- If the subject turns a corner, the surveillant should not hurry. If the
subject is lost, the nature of the neighborhood will determine the subsequent
procedure. In most cases, it is preferable to lose the suspect than to alert him to the tail.
2. Entering a building - If the building is a store, the surveillant should wait until the subject
comes out. In buildings having several exits, it is necessary to follow him inside. If the
subject enters an elevator, the surveillant should board the same elevator. The
surveillant may tell the elevator boy that his destination is the same floor as the subject,
or he may proceed to the top floor, if there are more than one surveillant, one should
alight at the subject’s floor and should proceed in a different direction then the latter can
return to the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and on
the same side. If he misses the bus, he should hire a taxi and board the bus at a point
ahead.
4. Taking a taxi - When the subject takes a cab, the surveillant records the time, place, and
taxi’s company and license. He should endeavor to follow in another taxi. If this results in
failure, he should trace the taxi by means of recorded information and ascertain the
destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant should
endeavor to get in line behind him with one person intervening. If he hears the
destination requested by the subject, he may buy a similar ticket. If he is unable to hear
the destination, he should merely request for a timetable.
6. In a restaurant – The surveillant should allow a few minutes to elapse before following
the subject into a restaurant. He should then take an obscure seat and arrange to finish
his meal at the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he registered,
the surveillant can take the adjoining room.
8. In a telephone booth- The surveillant should either go the next booth or stand near
enough to hear. He should note the telephone book use and the page at which it was left
open.
9. In the theater- The surveillant should sit behind the subject and take note of the various
available exits.

Risks constantly incurred by a shadower:

1. The risk of being recognized as a shadower of the subject.


2. The risk of being “lost” or eluded by the subject.
3. Test for Tailing- The common trick of the suspect when he becomes conscious that he is
being “tailed” is to board a public conveyance, such as bus, street car, or subway train,
and then jumping off the vehicle. The subject then looks about quickly to determine if
any other person jumped off. If the shadower alights too, the suspect will study him
closely to facilitate future recognition. On finding himself in this predicament, the
surveillant’s best tactic is to remain on the vehicle until the next stop, alight, and board
the next car or train.
4. The Convoy- Sometimes, the suspect is being guarded against shadowers. The convoy is
usually at the rear of the subject. It may be necessary for the surveillant to keep a look
out behind him to guard against this. If the subject has a follower or convoy, the
shadower must get behind the convoy and follow him instead of the subject
B. Automobile Surveillance

This entails careful preparation, where the shadowers must use a vehicle, if the subject
uses a vehicle. The vehicle used by the shadowers must be non-descript and preferably rented
vehicles since they can be changed often. The license plates must be anonymous, if the car used
in shadowing is an official or a government vehicle. The “tail” car may be changed several times
a day to lessen the chances of being detected or noticed. It is preferred that there are three
men in shadow car. Number one man is the driver, number two watches for a convoy, number
three takes notes.

The notation should include every place, act, and contact of the subject's vehicle and its
passengers. Complete descriptions should be made of all the persons contacted by the subject if
their identities are unknown. If number two catches a convoy, then the tail job is switched to
the convoy car. The driver should avoid attracting attention by driving at normal speed in a
reasonable manner. He should avoid unnecessary turning, twisting, stating, stopping, and other
maneuvers. If the subject leaves his vehicle, number two and three should alight the shadow
car, then take up the surveillance on foot. Number one remains in the car.

In automobile surveillance, the vehicle used should conform to the same characteristics as the
investigation or surveillance. The make and model of the car should not be eye catchingor
readily unidentifiable, and should not carry any distinctive license plates.

Disguising the Car

The following must be observed in disguising the car:

a. License Plate - A popular type of black color car should be used, and care must be taken
that the license plates are not identified. This can be remedied by the following:
1. Use of security plates.
2. Use of “colorum cars or drive-it-yourself rented cars.”
3. Borrowing cars from friends.

b. Appearance - Various devices may be used to change the appearance of a car. Placing and
removing stickers, wind shield adornments, shifting head lights from dim to bright, re-
arranging the seats of occupants, changing the occupants clothing, changing or removing
hats, changing the number of occupants, etc.

Precautions to be observed in tailing using automobile:


1. Do not park in the same spot too long.
2. Do not sit behind the steering wheel for an extended period.
3. It is preferable to sit in the passenger’s seat.
4. Do not seat both surveillants in the front seat for an extended time.
5. Do not approach the parking position in a manner that may arouse suspicion.
6. Da not park in a prohibited zone, since such a location attracts attention and frequently
lead to police conferences.
7. Do not t be mysterious about leaving or returning to your car.
8. Do not use credit cards in the vicinity of the surveillance. If the car has some
identification marks or equipment, care should be exercised in the selection of a
servicing station.
9. Do not ot operate in short wave radio with excessive volume.
10. Do not hold a general conference or “board meeting” with the relieving team.
11. Do not fail to give the relieving team the pertinent data that have developed.
12. Do not use telephone repeatedly from the same store or filing station.
13. Do not be too unconcerned in appearance. In some instances, it is better to appear to be
impatiently waiting.
14. Do not stand around a lobby reading newspaper.
15. Do not look away if the subject approaches. Be normal and look at him briefly.
UNDERCOVER INVESTIGATION (CI)/ASSIGNMENT (CA) OR “ROPING”
What is undercover investigation?

It is a form of investigation where the investigator assumes a different ent and and
unofficial identity to obtain information. The police agent assumes a different identity
appropriate with the situation to be explored so that he can obtain information from that
organization.

Importance of Undercover Investigation

In law enforcement agencies, members of organized crime, local gambling operators,


and prostitutes make it their business to get to know the faces of as many members of the
police department as possible. For this reason, rookie officers are always in demand for
undercover assignments in the vice and narcotics units.

In business and industry, most undercover agents are found in here, not in law
enforcement. They are employed directly by corporations or employed by private agencies for
internal investigation. Their importance in business and industry is the prevention and control of
employee theft.

Types of undercover according to time frame:

1. Long range - This type of operations can provide reliable, accurate, and continuing access
to information which would attainable in short-range. Not be otherwise
2. Short-range – The duration of short undercover activity may vary considerably, form
one- time interview to a series of separate but related actions over an extended period.

Selection of Undercover Worker

The ideal undercover agent is a combination of an actor and a good investigator. The
selection shall be made in consideration of the following elements:

1. Background – A good undercover have the ability to fit in the environment of


assignment. The speech and line of thinking must suit that of his associates. His
educational and technical background must rise to the required level and stratum that is
navigated, which also include conversation and knowledge of hobbies, sports, and
general information

2. Temperament - A calm, affable, and enduring personality is required. It is necessary that


the agent’s self-confidence is established so that it will carry him through the more
trying moments. In addition, resourcefulness is also necessary to adjust to change of
plans or situations.
3. Intellect - The undercover agent must, above all, be intelligent. He should have a clear
understanding of the objective of the mission, the knowledge of the over-all strategy, a
retentive memory, and a keen imagination must be employed to accomplish the mission.
Finally, he should be an excellent observer and a person of sound judgment.

Special Qualifications

1. Knowledge of the language


2. Area background regarding events
3. Knowledge about the customs and habits
4. Physical appearance is appropriate
Preparation of Undercover Assignments

a. Study of the subject


1. Name
2. Address
3. Description
4. Family and relatives
5. Associates
6. Character and temperament
7. Drug
8. Hobbies
9. Education
10. Occupation and specialty

b. Knowledge of the Area


1. Maps
2. National and Religious Background
3. Transportation
4. Public utilities

Knowledge of Subversive Organizations

1. History and background of organization and biography of the officials.


2. Identity and background of members and former members.
3. Method of identification employed by members.
4. Files and records of nature, location, and its accessibility.
5. Meeting schedule and the meeting place.

Cover - The means used by an individual group or organization to conceal the true nature of its
acts and existence from the observer.

Code Name - The alias or symbolic designations used by intelligence officer, informants, and
even criminals for security.

Cover Story - It refers to any made up scenario to cover up the operation. It may include:
1. A biographical data which is fictional, which will portray the personality of the agent and
the assumed scenario to cover up the operation.
2. A prepared fictitious background and history for the new character of the investigation
which includes the names, addresses, and description Of the assumed places of
education, employment, associates, neighborhoods, trades, and travels. The
investigator’s background story should not be wholly fictitious. It is advisable for the
investigator to maintain his reputation that he is from a city wherein he has lived and
which he is acquainted of. He should avoid the hometown of the subjects by not
selecting it as the origin of the investigation.

Cover support- An agent assigned in target areas with the primary mission of supporting the
cover story.

Physical Details - Personal possessions should be obtained for the undercover investigator,
which is appropriate to the character assumed in quality, price, age, fit, and degree of
cleanliness.. Personal possessions may include clothes, a pocket book, a watch, a ring, a
suitcase, stubs of tickets form amusement places, and letters, certificates, and amount of
money. The undercover investigator must not possess any article which will suggest or reveal his
identity. Badges and credentials must never be found on his person. A firearm may only be
carried when compatible with the investigator’s background story.

Hazards to cover:

1. Passive opposition- It refers to people who are not directly involved in security and ČI
activities.
2. Friendly or not hostile opposition- It refers to friendly organizations that may hinder the
operations.
3. Unfriendly or hostile active opposition It refers to the enemy intelligence operations that
may compromise the undercover.

Precautions or Guidelines in Case of Compromise

1. Move out immediately.


2. Start new facilities for operation and develop it.
3. Build entirely new cover.
4. Use circuitous routes and provide counter surveillance measures.
5. Be specifically careful of former contacts with non-intelligence personnel.
6. Be patient, build slowly, and carefully.

Golden Rules of an Undercover Agent:

1. Don’t drink while working as under cover. Liquor Bagreat tongue loosener. But it can be
used to get the subject.
2. Do not court women. Usually, the less contact the agent has with women, the greater is
the chance of success. The investigator cannot afford to incur the enmity or jealousy of a
subject who might think that the investigator is “making time with his girlfriend.
3. Do not take a woman on an undercover assignment. The subject may become
interested in the woman. If this happens, the subject’s attention is diverted from those
things where the investigator’s interests lie. The woman may be placed in an
embarrassing or impossible situation in which extrication may disclose the identity of the
undercover investigator.
4. Do not claim to be a “big shot”. It is too easy to identify a big shot. It will cause more
inquiries in the place being surveyed. It is better to assume a character of average status
or less.
5. Do not fail to provide or install persons in the place who can vouch for the investigator.
6. Do not spend too much money. Expenditures should be appropriate for the part being
played. If not, suspicion is aroused. Many agents have given themselves away by
spending more money than the amount justified.

Conduct of undercover work agent and assignment:

1. Demeanor – The undercover must, in all aspect, live the part which he plays. His
appearance language, attitude, opinions, interests, and recreations must support the
assumed role. He should speak little, but let his actions carry conviction. Bragging or
showings up too much knowledge may invite unwanted attention.
2. Approach - This is the making of contacts with the subject or subjects, who normally
makes the first talk with the investigator. In this instance, the undercover should create a
situation which makes the subject or subjects interested in approaching him thinking he
is what he purposes to be. Many subjects has become interested in an undercover who
lived in the same rooming house.
3. Entrapment - It is against public policy for an officer of the law to incite or participate in
the commission of the crime. The investigator may agree with the plan, but he should
never take part or make any suggestions or plan, or render any real assistance with
regards to the perpetration of the crime.
4. Women Associates - Of all the criminals, they are frequently emotional and jealous. It is
best therefore to treat them with exceptional consideration. It may be necessary to avoid
their association. One of the criminals or women may become inquisitive.

Means of communications - Communication may be done through technical and non-


technical.

1. Technical Communications:
a. Telephone - Communication between headquarters and the undercover
investigator must be accomplished using a secret method. In calling the
headquarters by telephone, it is best to use a dial tone in a public booth not
connected with the local switch board operator. To lessen the possibility of
wiretapping, the investigator should use a different telephone for each call. b. Secret
Writings
c. Radio
d. Cellphone (SMS)

2. Non-technical

Three forms of non-technical communications:

1. Personal meetings:
a. Car pick-up
b. Hotel meeting
c. Safe house meeting
d. Restaurant meeting

3. Brief encounter - Personal meeting between agent handler and the agent not more than
60 seconds to pass an urgent message.
4. Written report- The written report may be addressed to a fictitious girlfriend at a pre-
arranged general delivery address which is under the control of officials from
headquarters. It is best not to put the undercover investigator’s return address in the
envelope as the post office department might return it to the investigator’s dwelling for
insufficient postage or other reasons, in which case, it might fall into improper hands.
Since criminals, usually have few correspondences, the investigators should not become
conspicuous by the posting of numerous letters. To preclude the possibility of the report
falling into improper hands before mailing, they may be written in the post office.
5. Brush pass - Passing of an object between two persons going in opposite directions.
6. MBU meeting - The use visual signals, verbal signals, and danger signals.
7. Cut-outs - A person or devices interpose between two persons or groups to provide
communication.

CLANDESTINE OPERATION
What is clandestine operation?

It is a secret action undertaken by an intelligence /counterintelligence organization in


behalf of the government or other friendly forces.

Elements of Clandestine Operation

1. Sponsor - It refers to the organization or government that authorizes, approves, directs,


controls, and supports clandestine operational activities. It may be represented by the
following:
a. Project officer
b. Case officer
c. Agent handler

2. Target or Rabbit - A person, place, things, or activity against which the clandestine
organization or operational activity is directed.
3. Agent- A person who is aware that he/she is engaged in counter operational activity and
willingly accepts control and direction.

Classification of Clandestine Agents:


a. Principal agent or agent - handler A managerial agent and in most cases the leader of
the agent network.
b. Action agent - The doer of the clandestine task and further classified according to the
task that he is assigned.
c. Espionage (counter intel/intel agent)- The primary and most important human collector
agent.
d. Propagandist- An agent that undertakes action to mold the attitudes, opinions, and
actions of an individual, group, organization or nation.
e. Saboteur- An agent who undertakes positive action against unfriendly power or forces
resulting in the loss temporarily or permanently of an article, material or facilities which
are being used.
f. Guerilla - A member of a paramilitary group organized to harass the enemy.
g. Strong man/arm- A agent readily available to provide special protection during
dangerous phases of the clandestine operation.
h. Provocateur- An agent who induces an opponent to act on his own detriment by
discrediting himself or revealing his true purpose or identity.
i. Cover action agent - A fully recruited agent who is in a senior position usually within the
government and is enabled to exert influence from foreign government upon the
direction of the sponsor.
j. Support Agent- An agent who engages in activities which support the clandestine
operation. This agent performs all types of auxiliary services at the direction of the case
or project officer.

Categories of support agent are:

a. Surveillant - A support agent who observes persons and paces of operational


interests.
b. Investigator-A agent who provides information about persons or things of
operational interests.

c. Procurer of funds - A agent who obtains special currency when needed for
operational use.
d. Procurer of supplies - An agent who supplies or procures ordinary as well as critical
operational materials.
e. Safe housekeeper- A agent who manages and maintains the safe house for
operational use, such as for briefings, meetings, debriefings and safe haven and
training.
f. Manager of storage area- An agent who arranges the storage, distribution, or
transportation of operational supplies.
g. Communication agent (Commo. Agent) – An agent who facilitates communications.

Tactical Interrogation

This is conducted because there is a need to obtain information of the highest degree of
credibility with the minimum amount of time. The objectives of interrogation vary and depend
entirely on the situation.

The investigator must be fully aware of the objective for each interrogation.

Related Terms:

Interrogation – It Is the systematic asking of questions to elicit information in the minimum of


time.

Interrogator – This refers to the person who does the questioning.

Interrogee – It includes any person who is subjected to the interrogation process in any of its
forms and phases.

Suspect-It refers to any person believed to be associated with prohibited activity.

Source - It refers to persons ersons who for any reason submit information of intelligence
interest usually in a voluntary basis.

Witness - It denotes to any person who has direct knowledge of facts concerning an event or
activity.

Provocateur - An individual from an enemy force who is deliberately introduced in our custody
with a specific mission of causing some unfavorable action or reaction on our part.

Screening - Initial examination of an interrogee to determine the extent of his knowledge of


persons, places, things, or events in which we are interested.

Formal Interrogation - It refers to the systematic attempt to exploit to an appropriate depth


those areas of interrogee’s knowledge, which have been identified in the screening process.

Debriefing – It is the interrogation of at of a friendly interrogee who has information at the


direction of or under the control of the friendly intelligence service.
Interview – It is similar to debriefing although it is less formal, and the interrogee is not
necessarily under the control or employment of the respective intelligence service.

Interrogation Report – It is an oral or written statement of information by the questioning of an


interrogee.

Forms of Interrogation:

1. Direct - The subject knows he is being Interrogated, but he may not know the true
objective of the interrogation. This is being used extensively at the tactical level.
2. Indirect – The subject is unaware that he is being interrogated. This is used when the
time element is not so important.

Types of Interrogation:

1. Screening - Usually accomplished rightafter capture, apprehension, or arrest of an


interrogee.
2. Formal interrogation (detailed) – The systematic attempt to exploit to an appropriate
depth the interrogee’s knowledge, which has been identified in the screening process.
3. Debriefing – A form of eliciting information which is generally used when the area of
knowledge of the interrogee is known
- Maximum used of the narrative and not try to trap the person being debriefed with
leading questions.
- The debriefer or interrogator must be familiar with the subject in which the interrogation
is being conducted.
4. Interview - The interviewer must be fully aware of the actual type of information desired
and alert on the interviewee’s moods and expression.
- Must be tactful especially if the source (interviewee) is to remain unaware of the type of
information desired by the interviewer.

5. Interrogation of lay personnel (specific type)

- The techniques used are similar with other interrogations, however, especial effort must be
made to establish a common frame of reference between the interrogator and
interrogee. The amount of information obtained from this type will depend on the
interrogator’s ingenuity in establishing common the source can understand, to get the
desired Information.
5. Technical Interrogation - The level of interrogation where the source has specific and
detailed information that requires a trained expert in the subject matter to be explored.
- It usually covers the specific subject. The time is not limited compared during other
interrogation.

Phases of Interrogation:

1. Planning and Preparation


a. The interrogator should keep himself abreast of current developments.
b. The interrogator must observe the interrogee without the latter’s knowledge to
determine his conditions, habits, emotional, and personal appearance.
c. The interrogator must question/interview any any person available who has contact
with the source to determine the interrogee’s attitudes, circumstances of capture
and how he has been treated.
d. The interrogator must examine any document found on the source to determine
how to open the interrogation.
e. The interrogator must begin immediate screening of the interrogee to determine his
area of knowledge.
2. Approach (Meeting the Interrogee)
- The first meeting with the interrogee is extremely critical because the success or failure of
the interrogation may depend on the initial impression created by the interrogator. The
main objective is to develop rapport with the source to gain his cooperation and induce
him to answer the questions, ms, which will be asked.

3. Questioning
- The questioning is the heart of the interrogation.
- The interrogator asks questions to obtain the desired information.

4. Termination
- Termination of interrogation will depend on various factors such as the physical
condition of the interrogee.
- If there is enormous amount of information possessed by the interrogee, it will take
several sessions to complete the interrogation.
- Interrogation should be ended on a friendly basis leaving the interrogee the idea that he
may be further interrogated at later date.

5. Recording
- Interrogator should take note of the interrogation in a cryptic manner if possible.
- The interrogator should take notes of the interrogation unless rapport with the
interrogee has been established.
- It is desirable to record the interrogation with a tape-recording device without the
knowledge of the interrogee, especially if the latter refuses to talk with an interrogator
taking notes. The recorder must be tested before and after the interrogation.

6. Reporting
- The product of an interrogation is the tactical interrogation report containing the
information gained. Report must be made orally or in writing depending on the situation.
Normally, an oral report is followed by a written report.
- The interrogator must remain objective in his report.
- The interrogator must state information is factual and which is inferred which as well as
differentiate between first-hand information and hearsay.
- The interrogator must be able to evaluate the source as to his credibility.

Interrogation Techniques

Technique Approach - The purpose of the various approach is to earn the cooperation of the
source and induce him to answer questions that will follower

1. The Open Technique – The interrogator is open and direct in his approach and makes no
attempt to conceal the purpose of the interrogation.
- It is best employed when the interrogee is cooperative.
- It is frequently used at the tactical level where time is a major factor.

2. Common Interest Technique – The interrogator must exert effort to impress the
interrogee of their common interest.

- The interrogator must look for and point out the real advantages the interrogee will receive
if he cooperates.
3. Record File (We Know All) - The interrogator prepares a file on the source, listing all
known information (the record should be padded to make it appear to be very
extensive).
- The information must contain the life history of the interrogee to include his activities
and known associates (bio-data of the interrogee is important).
- The “we know all” is used in conjunction with the record file.
- During the approach, the interrogator may ask the interrogee ea about a subject, if he
refuse to, cooperate, the interrogator may provide the answer to impress him that the
interrogator knows him very well. Appro
- By these, the interrogee may develop a pessimistic attitude, he will, thus consider it
futile to resist because the interrogator has so much information concerning the subject.

4. Exasperation Technique (Harassment)- Effectively employed against hostile-type


interrogee. The interrogator must be alert because the interrogee may fabricate
information to gain relief from irritation.
- Subject the interrogee to a longer period of interrogation without rest or sleep. The
interrogator permits the source to go to sleep and subsequently be awakened for
another series of questioning (this is done repeatedly). After many repetitions, the
interrogee will be exasperated and will finally cooperate hoping that he will be allowed
to rest and sleep.
- Ask a question, listen to a reply, and then ask the same question repeatedly (record
question if possible).
- The purpose is to bore the interrogee thoroughly until he begins to answer questions
freely to end the harassment.

5. Opposite Personalities Technique - It is also known as the “Mutt and Jeff”; “Treat and
Rescue”; “Bad Guy Good Guy”; Sweet and Sour”; “Sugar – Vinegar”; and “Devil Angel”.
- Use of two interrogators playing opposite roles.

6. Egotist Technique (Pride and Ego) - Usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity.
- The interrogator states that if the source had not been stupid, he would never have been
captured the interrogee will be quick to retort that no one could have escape, then, he
may tell why. The why may reveal the desired information.

- You may reverse the technique by complimenting the interrogee in hopes of getting him
to admit certain information to gain credit.
- Describe him as the best.
- - Effective on the source whom his superiors or comrades have looked down upon.

7. Silent Technique – Employed against nervous or the confident type of interrogee.


- Look at the interrogee squarely on the eye with a sarcastic smile (forced him to break
eye contact first). He may ask questions, but the interrogator must not answer. Patience
is needed.
- When the interrogator is ready to break silence, he may do so by quietly asking a
question that the interrogee is sure of being a part of the subject.

8. Question Barrage Technique (Rapid Fire Questioning)- This is intended to confuse the
interrogee and put him into a defensive position. The interrogee becomes frustrated and
confused, he will likely reveal more than he intended, thus creating openings for further
questioning.

SECURITY AND ACCESS OF INFORMATION AND DOCUMENTS


Definition of Terms

Document - Any recorded information, regardless of physical forms or characteristics, and may
include but not limited to the following:

a. Written matters, whether handwritten, printed, or typed;


b. All painted, drawn, or engraved matter;
c. All sound and voice recording;
d. All printed photographs and exposed or printed film, still or moving and
e. All reproductions of the foregoing by whatever purposes.

Classify - Assigning information or material using one of the four security classification
categories after determining that the information requires special protection as stated in the
regulations.

Classified matters - Information or materials in any form or of any nature which requires
safeguarding for the interest of national security. The term classified Military information
include all information concerning the documents, cryptographic devices, development projects
and materials falling in the categories secret, secret, confidential or restricted. Of top
Security clearance - An administrative manner of determining if an individual is eligible, from a
security standpoint, to access classified matter of specific category.

Compromise - A loss of security which results from unauthorized persons obtaining knowledge
of classified matters. As used in this manner, the term unauthorized to have access to classified
matters.

Compartmentalization - The grant of access to classified matter only to properly cleared


persons. This is granted when such classified information is required in the performance of their
official duties and restricting it to specified physical confines.

Need-to-know - The term given to the dissemination of classified matters be limited strictly to
those persons whose official military or other governmental duties requires knowledge of
possession thereof.

Damage to national security - The prejudice, embarrassment, or injury to the Republic of the
Philippines resulting from any act or omission.

Declassify - The removal of security classification from the classified matter. Notification of
interested commands is part of the process.

Reclassify or regrading - The act of changing the assigned classification. Notification of unaware
authorities is part of the process.

Upgrading – The Act of assigning to a matter of higher classification than that previously
assigned to it. Notification of interested command is part of the process.

Security awareness - States of mind and implies understanding of security principles, security
procedures, and security objectives.

Objectives of Document Security

Document security prescribes the policies and establishes the standard basic procedures
which govern the classification and security of official matters in the interest of national security

Responsibilities of Document Security for Protection

1. Security is a command responsibility. It is the duty of all commanders to ensure the


integrity and loyalty of all personnel in their units. Effective security is dependent on the
character and loyalty of the personnel having access to classified matters.
2. The security of classified matters should be the primary concern of everyone in the
government service. It should be emphasized that it is the duty of all personnel to be
discreet in the use and handling of any information obtained in an official capacity.

General Principles

1. The authority and responsibility for the classification of classified matters rest exclusively
with the originating office.
2. Classified matters should be organized according to content and not the classification of
the file in which they are held or of another document to which they refer; except
radiogram or telegram referring to the previously classified radiogram or telegram.
3. Classification should be made as soon as possible by placing the appropriate marks on
the matter to be classified.
4. Everyone, whose duty allows access to classified matter, is responsible for the protection
of the classified matter while it is in his possession and shall ensure that the
dissemination of such classified matter is on the need-to-know basis and to properly
cleared persons only.

Security of Classified Matter

Official matter, which requires a protection in the interest of national security, is


categories into top secret, secret, confidential, and restricted. Details of each category are
discussed below:

Categories Of Classified Matter

1. Top secret- Pertains to the information and materials where the unauthorized disclosure
of which would cause exceptionally grave damage to the nation, politically, economically,
or militarily.

Examples:

a. Very important documents dealing with such negotiations regarding major


alliance;
b. Major governmental projects such as proposal to adjust the nation’s economy; c.
Military defense plan;
d. Strategic plan documenting the overall conduct of war; and
e. Intelligence documents which reveal major intelligence production effort of the
Philippines, which would permit an evaluation by recipients of success and
capabilities of the Philippine Intelligence Agencies.
Authority to Classify Top Secret

1. Head of office, identified authorized officers, and action officers


2. Secretary of National Defense
3. Chief of Staff, AFP or Chief of PNP
4. Major Service Commanders
5. Area and Unified Commanders of PA, PAF, and PN.

The original classification authority for assignment of Top-Secret classification rests


exclusively with the head of the department. However, this can be delegated to authorize
Officers when necessity arises (Memorandum Circular No. 78, s1964).

Reproduction of Top-Secret Matter

This is prohibited unless expressly authorized, or under the following conditions:

1. Top secret matter may be copied, extracted, or reproduced only when classifying
authority has authorized such action.
2. When so authorized, the reproduction of Top-Secret matter shall be carried out under
the supervision of an authorized officer (Memorandum Circular No. 78, s.1964).

Inventory of Top-Secret Matter

The inventory to Top Secret matter shall be conducted annually, every 01 January and 01
June or semi-annually.

Transmission of Top-Secret Matter

1. Top Secret matter shall be transmitted using the following:


a. By direct contact of officer concern;
b. By official courier; and
c. Through the Department of Foreign Affairs Diplomatic pouch.

2. Top Secret matter shall not be transmitted by mail, express, or electrical means unless in
cryptographic form.
- Double envelope with the mandatory. Receipt

Storage of Top-Secret Matter

Storage shall be in safe, steel file cabinet or other steel container equipped with built-in
three position, dial type combination lock of such weight, size, and construction to minimize
the possibility of physical theft or damage by fire.

Destruction of Top-Secret Matter

1. Destruction shall be done through burning by the custodian in the presence of the
witness cleared for Top-Secret.

2. A certification of destruction shall be prepared and forwarded to the originating


office.

2. Secret - Pertains to the information or material, the unauthorized disclosure of which would
endanger national security, cause serious injury to the interest or prestige of the nation or of
any governmental activity or would be of great advantage to a foreign nation.

Examples:

a. Jeopardize international relations of the Philippines;

b. Compromise defense plans, scientific or technological development important to the national


defense;

c. Reveal important intelligence operations;

d. War plans or complete plans for future operations of war not included under Top- Secret;

e. Documents showing disposition of our forces;

f. Intelligence plans and estimates; and

g. Order of battle information.

Authority to Classify Secret Matter

1. Persons authorized to classify secret matter are enumerated under Top- Secret
2. Commanders of Infantry Divisions

3. Special and Personal Staff

4. General and Special Staff of Major Services Areas and Unified Commanders
5. Superintendent, PMA/PNPA

6. Commanders of Posts, Depots, Stations, or Separate Units

7. Chief of Military Mission or Group

8. Commandants of Service School

Reproduction of Secret Matter Reproduction is the same as Top-Secret.

Storage of Secret Matter

Storage is the same as Top-Secret.

Transmission of Secret Matter

1. Direct contact of officers concerned;


2. Official couriers; and
3. Electrical means in cryptographic form;

Destruction of Secret Matter

Destruction is the same as Top-Secret matter, except that there is no need to prepare
Certification of Destruction. Instead a record of destruction is prepared, and the witnessing
officer need to have Secret clearance.

3. Confidential - Pertains to the information and material, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the nation or government activity or would
cause administrative embarrassment or unwarranted injury to an individual or would be an
advantage to a foreign nation.

Examples:

1. Plans of government projects such as roads, building, or development of area;


2. Routine service reports such as operations and exercise of foreign powers;
3. Routine intelligence report;
4. Certain personal records and staff matters;
5. Compilation of data which individually maybe classified restricted, but which its
aggregation enhance their security value; and
6. Matters, investigations, and documents of desirable to personnel and that, which is
disciplinary in nature, the knowledge of which safeguard for administrative reasons.

Authority to Classify Confidential Matter

Persons authorized to assign confidential classification in the performance of his duties is


any commissioned officers in the active service.

Reproduction of Confidential Matter

The copying, extracting, or reproduction of confidential matter is authorized unless the


originator or higher authority has specifically denied such authority.

Transmission of Confidential Matter

Transmission is the same with secret or using a single enveloped with receipt as required.

Destruction of Confidential Matter

Destruction is the same with secret. However, there is no need to prepare record of
destruction and without any witnessing officer.

4. Restricted - Pertains to the information and material that requires special protection other
than that determined to be confidential, secret, and top-secret.

Examples:

1. Departmental books of instruction and training and technical documents intended for
official use only or not intended for public release;
2. Routine information relating to the supply and procurement of military stores; and 3.
Minor modifications of data or items, which individually maybe classified unclassified in
which the aggregate warrants higher classification.

Introduction to National Security

National Interest
Every nation, regardless of creed or form, has their national interests. People from each
nation would willingly go to war to succeed or perish for this national interest.

What is National Interest?

National interest has several definitions. For this purpose, national interest means the
general and continuing end for which a nation acts.

“National interest” refers to the general concept of national security and well-being.
National are what the decision-making body in the government determines, which beliefs,
matters, or dictates of conscience are important to the maintenance of the nation. To secure or
support national interests, certain objectives may be set by a nation.

And what are the Philippines national interests? Our national interests include
selfpreservation, freedom and independence, territorial integrity, political stability, and
socioeconomic welfare. This is enshrined in the Preamble of our Constitution.

National Principles and Policies

From the national interests, national principles and policies are derived. These are:

1. That our country shall be a Republican State.


2. That the defense of the state shall be the concern of all citizens.
3. That we, as the people, renounce war to further our national interest.
4. That our government shall promote social justice.
5. That as a matter of concept, civilian authority is supreme at all times over the military.
This concept is actualized when the President assumes at the same time the position of
the Commander-in- Chief of the AFP (Hipolito, Manwong & Sarmiento, n.d.).

National Security

In furtherance of our national principles and policies, the nation's leader is enabled to
formulate our strategy

Generally, most all will define national strategy as, "the art and science of developing
and using political, economic, and psychological power of a nation, together with its armed
forces, during peace and war, to secure national objectives." It is the long-range plan through
which a nation applies attainment of its objectives. its strength towards the

National Power
The elements of national powers are numerical strength and character of population,
cultural development, character of government, geographical location, resources, economic
development, and military potential. The degree to which a nation is strong or deficient in these
elements is normally a measure of its national power.
Components of National Powers

1. Political Strength - This stems from the character of the people, the type and stability of the
government, and the soundness of its foreign policy.

2. Economic Strength - This stems from a combination of factors such as geographic location,
climatic conditions, supply of natural resources, industrial capacity, internal and external
communication systems, international trades, and the size, health, and technical competence of
the population.

3. Cultural Strength - This stems from the national unity, the social and moral fiber of the
people, and the things they believe in, and from the nature and vigor of national institutions-
political, social, religious, educational, scientific, and cultural.

4. Military Strength - The nation's ability to exert pressure through armed forces in furtherance
of national hal security. It consists of all the armed forces in combination with other elements of
national power, depending heavily on natural resources, economic strength, a broad base of
war industries and a vigorous population, military, economic, and political alliances.

National Security

National security is defined as the "protection of nation's people and territories from
physical assault." In this sense, national security is equated with national defense, and the
threats to a nation's security are perceived to emanate from outside the country.

When we speak of national security, we refer to that state or condition wherein the
people's way of life and institutions, their territorial integrity and sovereignty, as well as their
welfare and well-being, are protected or advanced.

You might also like