Chapter Iii: Modes, Methods, Types, and Techniques of Gathering, Collecting, Preserving, AND Processing OF Information
Chapter Iii: Modes, Methods, Types, and Techniques of Gathering, Collecting, Preserving, AND Processing OF Information
Learning Outcomes:
Introduction
Intelligence always involves a certain degree of interpretation which may inevitably lead
to speculation and risk. The amount of speculation and risk is dependent upon the quality and
quantity of information. Intelligence is usually divided in two main areas:
a. Strategic intelligence: This focuses on the long-term aims of law enforcement agencies.
It includes reviewing current and emerging trends reviewing in the crime environment,
threats to public safety and order, opportunities for controlling action, and the
development of counter programs and avenues that will lead to changes in policies,
programs, and legislation.
b. Operational intelligence: This type of intelligence provides the investigative team with
hypotheses and inferences on specific elements of illegal operations of any sort. These
include hypotheses and inferences about specific criminal networks, individuals or
groups involved in unlawful activities, discussing their methods, capabilities,
vulnerabilities, limitations, and intentions, that could be instrumental in effective law
enforcement.
It is important to note that the state’s national legislation dictates the way intelligence is
used for law enforcement purposes. The process of intelligence gathering, in relation to a
specific investigation, is typically prelude to any evidence gathering phase. Legislation will al will
also dictate whether intelligence material gathered during the course of an investigation is
protected from disclosure in criminal proceedings (UNODC, 2011)..
1. Central Intelligence Agency (CIA)- The military Intelligence agency of United States of
America And is engaged in many undercover activities Throughout the world.
2. Komitet Gusodarstevenoy Bezopasnosti (KGB)- KGB is the intelligence agency of Russia.
3. Mossad Merkazi Le-Modiin U-Letafridim M-eyudim (MOSSAD)- The “Central Institute for
Intelligence and Security” in Israel.
4. Secret Intelligence Service (SIS)- Great Britain’s intelligence agency and known by its
wartime designation, “M16.” This is equivalent to US’s CIA which is in-charged of
gathering information overseas and providing strategic services ranging from foreign
espionage to covert political intervention.
5. Secret de Documentation Exterieure et Contre Espionage (SDECE)- The intellegence
agency of France.
6. Social Affairs Department (SAD)- The intelligence agency of China.
7. Federal Bureau of Investigation (FBI)- The agency whose primary role is counter
intelligence which is limited to internal security within the United States of America.
8. “MI-5” Great Britain’s civilian intelligence agency for internal counter intelligence, this is
equivalent of US’ FBI and equivalent to Internal Security Section of Russia’s KGB.
9. National Intelligence Coordinating Agency (NICA) – The intelligence agency in the
Philippines.
Definitions of Intelligence
1. The capacity to understand and for other forms of adaptive intellect of behavior. The
minds in operation.
2. Knowledge of an event, circumstances, etc. that is received or imparted. The gathering
or distribution of information; the staff of persons engaged in obtaining such
information.
Police Intelligence
Police intelligence is the product of the collection, evaluation, analysis, integration, and
interpretation of all available information regarding the activities of criminals and other law
violators. This is done for the purpose of affecting the arrest of criminals and law violators,
obtaining evidence, and forestalling plan to commit crimes.
What is Information?
1. Open Sources (Overt Source) 99% of the information collected are coming from
opes sources.
a. Enemy Activities
b. POW
c. Captured Documents
d. Map
e. Weather Forecast, Studies, Reports
f. Agencies
2. Close Sources (Covert/Close Source) – 1% of information from close sources. a.
Surveillance
b. Casing
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means such as Bugging and Tapping Devices
f. Tactical Interrogation
g. Observation and Description
Criminal Intelligence- This refers to the essential knowledge in the prevention of crimes and the
investigation, arrest, and prosecution of criminal offenders.
Internal Security Intelligence- This refers to the essential knowledge to maintain peace and
order.
Public Safety Intelligence – This refers to the essential knowledge that will ensure the
protection of lives and properties.
1. Interest
2. Ingenuity
3. Integrity
4. Intelligence
Principles of Intelligence
1. Intelligence and operation are interdependent, These are separate and distinct activities
but complement each other.
2. Intelligence requires continuous security measures. It denies unauthorized personnel
information about operation and intelligence product.
3. Intelligence must be useful. It must serve the commander’s need and requirements.
4. Intelligence must be timely. It must reach the user in time to serve as basis for
appropriate action.
5. Intelligence must be flexible.
6. Intelligence requires imagination and foresight (Pagud-Moster, n.d.).
National Policy – It refers to the specific courses of action to achieve the national objectives.
National Security – This relates to the protection and preservation of military, economic and a
productive strength of a country including the security of the government and domestics and
foreign affairs against espionage, sabotage, and subversion.
A. People
- Living condition of the people
- Sources of income
- Education of the people
- Government livelihood of the people
- Extent of enemy influence to the people
B. Weather
- Visibility
- Cloudy
- Temperature
- Precipitation (rain)
- Wind
C. Enemy
- Location of the enemy
- Strength of the enemy
- Disposition
- Tactical capability
- Enemy vulnerability
D. Terrain
- Relief and drainage system
- Vegetation
- Surface material
- Man-made features
1. Passive Measures – The measures which seek to conceal information from the enemy.
2. Active Measures - The measures which actively seek to block the enemies’ effort to gain
information or engage in espionage, Subversion, and sabotage.
1. Military Security - It covers the measures taken by a command to protect itself against
espionage, enemy operation, sabotage, subversion, or surprise.
Ex.
- Secrecy discipline
- Special safeguarding of classified information
- Security of troop movement
- Special handling of weather and escapees counter subversion within the
armed
- Forces tactical measures in combat area
2. Port Frontier and Travel Security -The application of military and civil security measures for
counterintelligence control at point of entry and departure, int borders, and boundaries.
International
Ex.
Ex.
- Civil
- National
- Armed forces
- Field press
- POW
5. Special Operations - The operations conducted to counter subversion, sabotage, and
espionage.
1. Conformity to mission
2. Avoidance of publicity
3. Objectivity
4. Confirmation
5. Offense
6. Flexibility
7. Continuity
8. Coordination
1. Denial Measures
a. Secrecy discipline
b. Document scty.
c. Camouflage and concealment
d. Communication scty.
e. Military censorship
f. Counter reconnaissance effort
2. Detection Measures
a. PSI
b. Scty. Tag or pass card
c. Challenge or password
d. Reconnaissance
3. Deception Measures
a. Ruse (use of escape and evasion)
b. Dummy position
c. Fabricated information
1. The intelligence officer must have a comprehensive knowledge of the available sources
of information, the collecting agencies, and type of information the latter can provide.
2. The officer must understand the command operations to provide the required
intelligence to succeed.
3. He must have a thorough knowledge of the tactics, organizations, and characteristics of
the enemy.
4. He must be competent and skilled in the fields of surveillance, reconnaissance, counter-
reconnaissance, and acquisition of operations.
5. He should understand the weather elements and their influence upon personnel,
material, and terrain.
3. Establishment of priorities
- Priorities reflect the criticality of the need for the information. No formula
exists which can automatically determine priorities. Such determination is a
matter of judgment.
B. Collection of Information
1. Determine collecting agency;
2. Send orders or request;
3. Supervise collection efforts;
4. Use tools or technique in collection; and
5. Ensure timely collection.
a. Meaning; and
b. Significance.
a. Assessment –
b. Integration - Combining the elements in the assessment with other information
or intelligence to form a logical feature or hypothesis of the activities of the
enemy. It also includes information on the characteristics of the operational area
of the command mission.
- Annexes
- Estimates
- Reports
- Overlays/cover
- Briefing
- Message
- Situations
- Summaries
Evaluation Guide
Reliability of Information Accuracy of Information
E-Unreliable 5- Improbable
Sources of Information
S-Signal Intercept
Z- Documentary
Cyber Intelligence
• Cyber intelligence is the collection, processing, and analysis of information or data on
cybercrime from various sources which include public, private and open sources
(European Union Agency for Law Enforcement Cooperation (Europol), 2021).
• “Cyber intelligence is the acquisition and analysis of information to identify, track, and
predict cyber capabilities, intentions, and activities to offer courses of action that
enhance decision making” (Europol, 2021).
The objective of cyber intelligence is to enrich and expand the storage and management
of law enforcement data, thus making the fight against cybercrime effective.
• Used to inform organizational or national strategy and policy development that will
direct enterprise over the long term.
• Collected broadly within sector to which organization belongs and likely includes
complementary sectors.
• Focused broadly on threat vectors and adversaries and on contextual political, economic,
and social trends. Includes understanding of state and non- state threat actors’ interests,
policies, doctrines, and concepts of operations.
• Generally nontechnical in nature, focused on trend analysis across and between sectors,
stated and unstated objectives of state and non-state actors, and other strategic
indicators.
• Used to inform risk-based decisions about resource allocation and activity to maintain
business continuity and prevent disruption.
• Collected with an emphasis on enterprises’ operations, to include partners, suppliers,
competitors, customers, and other trusted relationships.
• Focus on targeted, opportunistic, and persistent threat vectors that pose greatest risk to
business continuity.
• Blends technical and nontechnical collection to explore and prioritize threats, the
mechanisms and signatures of potential attacks, and organizational vulnerabilities.
Operational Cycle
11. Payment (Depends upon the motivation) - Buy his life not his job.
- Regularity and dependability that counts not the amount.
- Pay no bonuses.
- Supplement the agent income from regular sources enough to ease his financial
worries but not enough to cause him to live in style.
12. Disposition
- Reroute
- Retraining
- Retesting
- Termination
13. Reporting
14. Operational Testing
Cover – The manner used by a group or organizations conceal the true nature of its acts and or
existence from the observer.
Cover Story – This refers to the fictitious biographical data used by an agent as a cover up. This
can also refer to any fictitious scenario.
Cover Support - An agent assigned in target areas whose primary mission is to support the
cover story.
Essentials of cover:
Hazards to Cover:
Undercover Assignment - This is an investigative technique used when anagent conceals his
official identity and obtains information from the target organization.
1. Dwelling
2. Work
3. Social
4. Jurisdictional assignment
5. Combination assignment
6. Rope job or buildingfriendship with the subject
Informant – It refers to a person who gives voluntary information to the police without any
consideration.
Informer - It refers to an individual who gives information in exchange for a price or reward.
Types of Informants
1. Anonymous informant - One who gives information through telephone or letters with
the hope that he or she will not be identified.
2. Confidential informant - A person who provides the investigator with confidential
information concerning a past or projected crime and does not wish to be identified as
the source of the information. The investigator should take a special precaution to
protect the identity of the informant because of his value as a source on the disclosure
of crimes and the criminal.
3. Criminal informant - A type of informant who gives information to the police pertaining
to the underworld and the organized crimes with the understanding that his identity will
be protected and in exchange for a certain consideration.
4. Voluntary informant- The informant who gives information freely as a witness to a
certain act.
5. Special informant- The informant who gives information concerning specialized cases
only and is given special treatment by the operatives.
6. Accidental informant- The informant who casually imparts information to an officer with
no intention of providing subsequent information.
7. Rival- Elimination informant- The informat who is usually anonymous. His purpose in
providing information is to eliminate rival or competition.
8. False informant - The informant who provides information with no relevance to the
crime or stuff concocted of thin air. This is done to appear that he is on the side of the
law and to divert the suspicion from himself, his gang, or his associates.
9. Frightened informant - The informant who is prodded because of fear or self-interest.
He maybe one of the “little men” who runs to the police when he sees that his
confederates are about to be involved in a dangerous situation and gives information as
a protective device and as a means of sustaining his own feeling of self- importance. He
is the “weakest link” in the criminal chain.
10. Self-aggrandizing informant- Hangs on the fringes of the underworld and delights in
surprising the police with information. In certain circumstances, his information may be
of value.
11. Mercenary informants- The type of informant who has something to sell. He may be a
valuable source. Sometimes there is a revenge motive present. He may have thought
himself to have been double-crossed or given a “dirty deal” and seeks revenge as well as
profit in the telling.
12. Double crosser informant- The type of informant who uses his desire to give information
as an excuse to talk to the police to get more information from them that he gives. It
entails feeding the informat false information to catch him
Sub-Types of Informants:
1. Incidental informant- A person who casually imparts information to an officer with no
intention of providing subsequent information.
2. Recruited informant – A person who is selected, cultivated, and developed into a
continuous source of information regarding police targets.
Motives of Informants
1. Reward
2. Revenge
3. Fear
4. Patriotism
5. Friendship
1. Selection - It is desired being able to identify and recruit an informant who has access to
many criminal in-groups or subversive organizations. Extensive access is probably the
single most important feature in the consideration of recruiting potential informant.
2. Investigation – The investigation of the potential informants who have been identified as
“probable” must be as thorough as possible. The possible motives why they assist the
police intelligence community must be established. If necessary, a complete background
investigation (CBI) should be conducted.
3. Approach – Approaching the probable informant must be done in pleasant
surroundings. Such as a confidential apartment completely free of any probable
compromise, preferably in an adjacent city or a remote area foreign to the informants’
living pattern.
4. Testing - The testing program should begin with limited assignments, followed with
gradual integration into more important or sensitive areas. The occasional testing of an
informant should continue throughout the entire affiliation.
1. Access
2. Health
3. Built
4. Ability
5. Age
6. Education
7. Personality
8. Sex
An agent handler must be able to determine when to “terminate” the agent. That is to
cut off the agent from a project when it has reached a particular stage. “That is why when you
fall in love with an agent, it becomes difficult to terminate’ him or her.” In extreme cases, like
when agents commit serious acts of betrayal, to terminate means physical elimination.
Information net – This is a controlled group Who work through the direction of the agent
handler. The informants, ts, principal, or cutouts supply the agent handler directly or indirectly
with intelligence information.
➤ Outside the target and merely monitors information from a third person who is
monitoring the information in the area.
Motivations of an Agent
Control - This refers to the authority to direct the agent to carry out the task or requirement on
behalf of the clandestine organization in an acceptable and secured manner.
a. Agent motivation
b. Psychological control
2. Natural weaknesses
a. Inability to keep secret
b. Need for recognition
c. Strain of dual experience
d. Experience
3. Agent training
4. Agent testing
5. Agent termination
The organization’s moral obligation to the agent. The loss incurred by the agent because of
his connection with the intelligence service.
Description - The actual and factual reporting of one’s observation or the reported sensory
experience recounted by another.
1. Mental capability
2. Educational background
3. Occupational background
4. Empirical background through experience. This is acquired
3. Report - Involves in identifying the name in one’s own mind and some facts, which has
been perceived, narrated and identified.
ELICITATION
Types of Approach:
Variants:
a. Teacher-Pupil Approach
- The subject is treated as an authority. Request him to enlighten us and solicit his
viewpoints and opinions.
b. Kindred Sole Approach
- The subject is placed in a pedestal as someone who has specialized qualities
or knowledge. He is flattered through display of concern for his welfare and
special attention to his enjoyment.
d. Partial-Disagreement Approach
- Seeks to illicit talking using the phrase “I not am sure if I fully agree.”
Variants:
3. Probe - The approach where the people are encouraged to talk incessantly.
Types of Probes
1. Completion Probe - This is effective when used in connection with the teacher
pupil approach.
2. Clarity Probe – This is used to elicit additional information in an area where the
response is clear.
3. High Pressure Probe - This is used to pin down a subject in a specific area or to
point out contradictions in what the subject had said.
4. Hypothetical Probe - This is used by presenting a hypothetical situation to get
the subject to react to the given situation.
CASING
Methods in Casing:
1. Personal reconnaissance- This is the most effective method and will provide the most
information since twhat is being looked for has been identified or known.
2. Map reconnaissance – This may not be sufficient, but it can result to a certain amount of
usable information.
3. Research -There is a bulk of information which can be acquired through research.
4. Prior information – This may be accessed in your unit as well as in other units through
file reports which may be also be a source of information.
5. Hearsay - The information gained by operating in the area and performing a casing job.
1. Area condition and habit-This provides information and description of the locality as to
whether the place is residential, commercial, highly urbanized, or rural. Also included in
the information are the living condition, income of population, operational data (time
where the area seemed to be useful closing time). It includes description of the area
during different weather conditions. In addition, the types of available transportation in
the area and the amount of fare are included. Habits refer to the routine activities of the
people in the area, the dialect, and the different beliefs.
2. Active opposition - This refers to organs of every activity system whose task is to prevent
intelligence activity in each area. This includes hot only the enemy, but also the effort of
the neutral or allied countries to discover and neutree our intelligence activities and
learn its objectives. Remember that a country which is either neutral or ally at present
may, anytime in the future, become the opposition’s ally.
3. Disposal plan – The disposal of the information and materials in cases of possible
compromise.
4. Escape and evasion plan - The plan in cases of emergencies, from immediate focal point,
which includes the general area and completely from the area.
SURVEILLANCE
Surveillance - This refers to a form of clandestine investigation which involves keeping a person,
place or other targets under physical observation in order to obtain evidence or information
pertinent to the investigation.
Surveillance Report Format
HEADING
MEMORANDUM
FOR :
FROM :
SUBJECT :
DATE:
I. Authority
A. Duration
B. Composition of surveillance team
C. Identity of the person under surveillance
D. Type of surveillance used
E. General and specific locations involved.
Objectives of Surveillance
Related Terms:
Pre-surveillance conference - A conference held among the team members or the police
intelligence unit before the conduct of surveillance.
Undercover man -A person trained to observe and penetrate a certain illegal activities and
organization suspected of reports the observations and information forproper operational
action. Safehouse – A place, building, enclosed mobile, or an apartment, where police
undercover man meets his action agent for debriefing or reporting purposes.
Drop – A convenient, secure, and unsuspecting place where a police undercover man, informer,
or informant, by a pre-arrangement, leaves a note, a small package, an envelope or item for the
action agent, supervisor, or another agent.
Decoy-A person or object, almost like the subject, which is used to avoid or elude the
surveillant.
Contact - A person whom the subject picks or deals whit while he is under surveillance.
Made or burnout - It refers to the subject under surveillance who becomes aware that he is
under observation and identifies the observer.
Lost - When the surveillant does not know the whereabouts of his subject or the subject had
eluded the surveillant.
Put to bed - When the subject, under surveillance, returns to the quarter to retire for the night.
Types of Surveillance
B. According to methods
1. Stationary - The observation of place, usually a bookie stall, a gambling joint, or a
residence where illegal activities are happening ( fixed location).
2. Moving – The surveillant follows the subject from place to place to maintain
continuous watch of his activities.
3. Technical - A surveillant hardware, telecommunication systems, and equipment.
Uses gadgets, system, and equipment.
Preparation of Surveillance
A. Area and target study – All available information about the areas should be collected
and analyzed.
B. Surveillance plan - The plan should establish the required type of personnel, as well
as the general and specific instructions for surveillant. The pplan ensures that the
overall objective of the surveillance is understood and all participating personnel will
have a common understanding of the operational limitations, signals, and special
instructions.
C. Selection of Personnel
1. Inconspicuous physical character
2. Ability to remain unnoticed
3. Resourcefulness
4. Patience and physical stamina
5. Keen sensory perception and retentive memory
6. Driving ability
7. Personal courage
8. Area knowledge
9. Security consciousness
Equipment in Surveillance:
Surveillance Precautions:
1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corners
4. Getting out immediately on public conveyance
5. Retracing
6. Entering mobile housing
Methods of Shadowing
A. Foot Surveillance
1. One man shadow
2. Two man shadow
3. Three- man shadow or the ABC method
1. Turning corner- If the subject turns a corner, the surveillant should not hurry. If the
subject is lost, the nature of the neighborhood will determine the subsequent
procedure. In most cases, it is preferable to lose the suspect than to alert him to the tail.
2. Entering a building - If the building is a store, the surveillant should wait until the subject
comes out. In buildings having several exits, it is necessary to follow him inside. If the
subject enters an elevator, the surveillant should board the same elevator. The
surveillant may tell the elevator boy that his destination is the same floor as the subject,
or he may proceed to the top floor, if there are more than one surveillant, one should
alight at the subject’s floor and should proceed in a different direction then the latter can
return to the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and on
the same side. If he misses the bus, he should hire a taxi and board the bus at a point
ahead.
4. Taking a taxi - When the subject takes a cab, the surveillant records the time, place, and
taxi’s company and license. He should endeavor to follow in another taxi. If this results in
failure, he should trace the taxi by means of recorded information and ascertain the
destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant should
endeavor to get in line behind him with one person intervening. If he hears the
destination requested by the subject, he may buy a similar ticket. If he is unable to hear
the destination, he should merely request for a timetable.
6. In a restaurant – The surveillant should allow a few minutes to elapse before following
the subject into a restaurant. He should then take an obscure seat and arrange to finish
his meal at the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he registered,
the surveillant can take the adjoining room.
8. In a telephone booth- The surveillant should either go the next booth or stand near
enough to hear. He should note the telephone book use and the page at which it was left
open.
9. In the theater- The surveillant should sit behind the subject and take note of the various
available exits.
This entails careful preparation, where the shadowers must use a vehicle, if the subject
uses a vehicle. The vehicle used by the shadowers must be non-descript and preferably rented
vehicles since they can be changed often. The license plates must be anonymous, if the car used
in shadowing is an official or a government vehicle. The “tail” car may be changed several times
a day to lessen the chances of being detected or noticed. It is preferred that there are three
men in shadow car. Number one man is the driver, number two watches for a convoy, number
three takes notes.
The notation should include every place, act, and contact of the subject's vehicle and its
passengers. Complete descriptions should be made of all the persons contacted by the subject if
their identities are unknown. If number two catches a convoy, then the tail job is switched to
the convoy car. The driver should avoid attracting attention by driving at normal speed in a
reasonable manner. He should avoid unnecessary turning, twisting, stating, stopping, and other
maneuvers. If the subject leaves his vehicle, number two and three should alight the shadow
car, then take up the surveillance on foot. Number one remains in the car.
In automobile surveillance, the vehicle used should conform to the same characteristics as the
investigation or surveillance. The make and model of the car should not be eye catchingor
readily unidentifiable, and should not carry any distinctive license plates.
a. License Plate - A popular type of black color car should be used, and care must be taken
that the license plates are not identified. This can be remedied by the following:
1. Use of security plates.
2. Use of “colorum cars or drive-it-yourself rented cars.”
3. Borrowing cars from friends.
b. Appearance - Various devices may be used to change the appearance of a car. Placing and
removing stickers, wind shield adornments, shifting head lights from dim to bright, re-
arranging the seats of occupants, changing the occupants clothing, changing or removing
hats, changing the number of occupants, etc.
It is a form of investigation where the investigator assumes a different ent and and
unofficial identity to obtain information. The police agent assumes a different identity
appropriate with the situation to be explored so that he can obtain information from that
organization.
In business and industry, most undercover agents are found in here, not in law
enforcement. They are employed directly by corporations or employed by private agencies for
internal investigation. Their importance in business and industry is the prevention and control of
employee theft.
1. Long range - This type of operations can provide reliable, accurate, and continuing access
to information which would attainable in short-range. Not be otherwise
2. Short-range – The duration of short undercover activity may vary considerably, form
one- time interview to a series of separate but related actions over an extended period.
The ideal undercover agent is a combination of an actor and a good investigator. The
selection shall be made in consideration of the following elements:
Special Qualifications
Cover - The means used by an individual group or organization to conceal the true nature of its
acts and existence from the observer.
Code Name - The alias or symbolic designations used by intelligence officer, informants, and
even criminals for security.
Cover Story - It refers to any made up scenario to cover up the operation. It may include:
1. A biographical data which is fictional, which will portray the personality of the agent and
the assumed scenario to cover up the operation.
2. A prepared fictitious background and history for the new character of the investigation
which includes the names, addresses, and description Of the assumed places of
education, employment, associates, neighborhoods, trades, and travels. The
investigator’s background story should not be wholly fictitious. It is advisable for the
investigator to maintain his reputation that he is from a city wherein he has lived and
which he is acquainted of. He should avoid the hometown of the subjects by not
selecting it as the origin of the investigation.
Cover support- An agent assigned in target areas with the primary mission of supporting the
cover story.
Physical Details - Personal possessions should be obtained for the undercover investigator,
which is appropriate to the character assumed in quality, price, age, fit, and degree of
cleanliness.. Personal possessions may include clothes, a pocket book, a watch, a ring, a
suitcase, stubs of tickets form amusement places, and letters, certificates, and amount of
money. The undercover investigator must not possess any article which will suggest or reveal his
identity. Badges and credentials must never be found on his person. A firearm may only be
carried when compatible with the investigator’s background story.
Hazards to cover:
1. Passive opposition- It refers to people who are not directly involved in security and ČI
activities.
2. Friendly or not hostile opposition- It refers to friendly organizations that may hinder the
operations.
3. Unfriendly or hostile active opposition It refers to the enemy intelligence operations that
may compromise the undercover.
1. Don’t drink while working as under cover. Liquor Bagreat tongue loosener. But it can be
used to get the subject.
2. Do not court women. Usually, the less contact the agent has with women, the greater is
the chance of success. The investigator cannot afford to incur the enmity or jealousy of a
subject who might think that the investigator is “making time with his girlfriend.
3. Do not take a woman on an undercover assignment. The subject may become
interested in the woman. If this happens, the subject’s attention is diverted from those
things where the investigator’s interests lie. The woman may be placed in an
embarrassing or impossible situation in which extrication may disclose the identity of the
undercover investigator.
4. Do not claim to be a “big shot”. It is too easy to identify a big shot. It will cause more
inquiries in the place being surveyed. It is better to assume a character of average status
or less.
5. Do not fail to provide or install persons in the place who can vouch for the investigator.
6. Do not spend too much money. Expenditures should be appropriate for the part being
played. If not, suspicion is aroused. Many agents have given themselves away by
spending more money than the amount justified.
1. Demeanor – The undercover must, in all aspect, live the part which he plays. His
appearance language, attitude, opinions, interests, and recreations must support the
assumed role. He should speak little, but let his actions carry conviction. Bragging or
showings up too much knowledge may invite unwanted attention.
2. Approach - This is the making of contacts with the subject or subjects, who normally
makes the first talk with the investigator. In this instance, the undercover should create a
situation which makes the subject or subjects interested in approaching him thinking he
is what he purposes to be. Many subjects has become interested in an undercover who
lived in the same rooming house.
3. Entrapment - It is against public policy for an officer of the law to incite or participate in
the commission of the crime. The investigator may agree with the plan, but he should
never take part or make any suggestions or plan, or render any real assistance with
regards to the perpetration of the crime.
4. Women Associates - Of all the criminals, they are frequently emotional and jealous. It is
best therefore to treat them with exceptional consideration. It may be necessary to avoid
their association. One of the criminals or women may become inquisitive.
1. Technical Communications:
a. Telephone - Communication between headquarters and the undercover
investigator must be accomplished using a secret method. In calling the
headquarters by telephone, it is best to use a dial tone in a public booth not
connected with the local switch board operator. To lessen the possibility of
wiretapping, the investigator should use a different telephone for each call. b. Secret
Writings
c. Radio
d. Cellphone (SMS)
2. Non-technical
1. Personal meetings:
a. Car pick-up
b. Hotel meeting
c. Safe house meeting
d. Restaurant meeting
3. Brief encounter - Personal meeting between agent handler and the agent not more than
60 seconds to pass an urgent message.
4. Written report- The written report may be addressed to a fictitious girlfriend at a pre-
arranged general delivery address which is under the control of officials from
headquarters. It is best not to put the undercover investigator’s return address in the
envelope as the post office department might return it to the investigator’s dwelling for
insufficient postage or other reasons, in which case, it might fall into improper hands.
Since criminals, usually have few correspondences, the investigators should not become
conspicuous by the posting of numerous letters. To preclude the possibility of the report
falling into improper hands before mailing, they may be written in the post office.
5. Brush pass - Passing of an object between two persons going in opposite directions.
6. MBU meeting - The use visual signals, verbal signals, and danger signals.
7. Cut-outs - A person or devices interpose between two persons or groups to provide
communication.
CLANDESTINE OPERATION
What is clandestine operation?
2. Target or Rabbit - A person, place, things, or activity against which the clandestine
organization or operational activity is directed.
3. Agent- A person who is aware that he/she is engaged in counter operational activity and
willingly accepts control and direction.
c. Procurer of funds - A agent who obtains special currency when needed for
operational use.
d. Procurer of supplies - An agent who supplies or procures ordinary as well as critical
operational materials.
e. Safe housekeeper- A agent who manages and maintains the safe house for
operational use, such as for briefings, meetings, debriefings and safe haven and
training.
f. Manager of storage area- An agent who arranges the storage, distribution, or
transportation of operational supplies.
g. Communication agent (Commo. Agent) – An agent who facilitates communications.
Tactical Interrogation
This is conducted because there is a need to obtain information of the highest degree of
credibility with the minimum amount of time. The objectives of interrogation vary and depend
entirely on the situation.
The investigator must be fully aware of the objective for each interrogation.
Related Terms:
Interrogee – It includes any person who is subjected to the interrogation process in any of its
forms and phases.
Source - It refers to persons ersons who for any reason submit information of intelligence
interest usually in a voluntary basis.
Witness - It denotes to any person who has direct knowledge of facts concerning an event or
activity.
Provocateur - An individual from an enemy force who is deliberately introduced in our custody
with a specific mission of causing some unfavorable action or reaction on our part.
Forms of Interrogation:
1. Direct - The subject knows he is being Interrogated, but he may not know the true
objective of the interrogation. This is being used extensively at the tactical level.
2. Indirect – The subject is unaware that he is being interrogated. This is used when the
time element is not so important.
Types of Interrogation:
- The techniques used are similar with other interrogations, however, especial effort must be
made to establish a common frame of reference between the interrogator and
interrogee. The amount of information obtained from this type will depend on the
interrogator’s ingenuity in establishing common the source can understand, to get the
desired Information.
5. Technical Interrogation - The level of interrogation where the source has specific and
detailed information that requires a trained expert in the subject matter to be explored.
- It usually covers the specific subject. The time is not limited compared during other
interrogation.
Phases of Interrogation:
3. Questioning
- The questioning is the heart of the interrogation.
- The interrogator asks questions to obtain the desired information.
4. Termination
- Termination of interrogation will depend on various factors such as the physical
condition of the interrogee.
- If there is enormous amount of information possessed by the interrogee, it will take
several sessions to complete the interrogation.
- Interrogation should be ended on a friendly basis leaving the interrogee the idea that he
may be further interrogated at later date.
5. Recording
- Interrogator should take note of the interrogation in a cryptic manner if possible.
- The interrogator should take notes of the interrogation unless rapport with the
interrogee has been established.
- It is desirable to record the interrogation with a tape-recording device without the
knowledge of the interrogee, especially if the latter refuses to talk with an interrogator
taking notes. The recorder must be tested before and after the interrogation.
6. Reporting
- The product of an interrogation is the tactical interrogation report containing the
information gained. Report must be made orally or in writing depending on the situation.
Normally, an oral report is followed by a written report.
- The interrogator must remain objective in his report.
- The interrogator must state information is factual and which is inferred which as well as
differentiate between first-hand information and hearsay.
- The interrogator must be able to evaluate the source as to his credibility.
Interrogation Techniques
Technique Approach - The purpose of the various approach is to earn the cooperation of the
source and induce him to answer questions that will follower
1. The Open Technique – The interrogator is open and direct in his approach and makes no
attempt to conceal the purpose of the interrogation.
- It is best employed when the interrogee is cooperative.
- It is frequently used at the tactical level where time is a major factor.
2. Common Interest Technique – The interrogator must exert effort to impress the
interrogee of their common interest.
- The interrogator must look for and point out the real advantages the interrogee will receive
if he cooperates.
3. Record File (We Know All) - The interrogator prepares a file on the source, listing all
known information (the record should be padded to make it appear to be very
extensive).
- The information must contain the life history of the interrogee to include his activities
and known associates (bio-data of the interrogee is important).
- The “we know all” is used in conjunction with the record file.
- During the approach, the interrogator may ask the interrogee ea about a subject, if he
refuse to, cooperate, the interrogator may provide the answer to impress him that the
interrogator knows him very well. Appro
- By these, the interrogee may develop a pessimistic attitude, he will, thus consider it
futile to resist because the interrogator has so much information concerning the subject.
5. Opposite Personalities Technique - It is also known as the “Mutt and Jeff”; “Treat and
Rescue”; “Bad Guy Good Guy”; Sweet and Sour”; “Sugar – Vinegar”; and “Devil Angel”.
- Use of two interrogators playing opposite roles.
6. Egotist Technique (Pride and Ego) - Usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity.
- The interrogator states that if the source had not been stupid, he would never have been
captured the interrogee will be quick to retort that no one could have escape, then, he
may tell why. The why may reveal the desired information.
- You may reverse the technique by complimenting the interrogee in hopes of getting him
to admit certain information to gain credit.
- Describe him as the best.
- - Effective on the source whom his superiors or comrades have looked down upon.
8. Question Barrage Technique (Rapid Fire Questioning)- This is intended to confuse the
interrogee and put him into a defensive position. The interrogee becomes frustrated and
confused, he will likely reveal more than he intended, thus creating openings for further
questioning.
Document - Any recorded information, regardless of physical forms or characteristics, and may
include but not limited to the following:
Classify - Assigning information or material using one of the four security classification
categories after determining that the information requires special protection as stated in the
regulations.
Classified matters - Information or materials in any form or of any nature which requires
safeguarding for the interest of national security. The term classified Military information
include all information concerning the documents, cryptographic devices, development projects
and materials falling in the categories secret, secret, confidential or restricted. Of top
Security clearance - An administrative manner of determining if an individual is eligible, from a
security standpoint, to access classified matter of specific category.
Compromise - A loss of security which results from unauthorized persons obtaining knowledge
of classified matters. As used in this manner, the term unauthorized to have access to classified
matters.
Need-to-know - The term given to the dissemination of classified matters be limited strictly to
those persons whose official military or other governmental duties requires knowledge of
possession thereof.
Damage to national security - The prejudice, embarrassment, or injury to the Republic of the
Philippines resulting from any act or omission.
Declassify - The removal of security classification from the classified matter. Notification of
interested commands is part of the process.
Reclassify or regrading - The act of changing the assigned classification. Notification of unaware
authorities is part of the process.
Upgrading – The Act of assigning to a matter of higher classification than that previously
assigned to it. Notification of interested command is part of the process.
Security awareness - States of mind and implies understanding of security principles, security
procedures, and security objectives.
Document security prescribes the policies and establishes the standard basic procedures
which govern the classification and security of official matters in the interest of national security
General Principles
1. The authority and responsibility for the classification of classified matters rest exclusively
with the originating office.
2. Classified matters should be organized according to content and not the classification of
the file in which they are held or of another document to which they refer; except
radiogram or telegram referring to the previously classified radiogram or telegram.
3. Classification should be made as soon as possible by placing the appropriate marks on
the matter to be classified.
4. Everyone, whose duty allows access to classified matter, is responsible for the protection
of the classified matter while it is in his possession and shall ensure that the
dissemination of such classified matter is on the need-to-know basis and to properly
cleared persons only.
1. Top secret- Pertains to the information and materials where the unauthorized disclosure
of which would cause exceptionally grave damage to the nation, politically, economically,
or militarily.
Examples:
1. Top secret matter may be copied, extracted, or reproduced only when classifying
authority has authorized such action.
2. When so authorized, the reproduction of Top-Secret matter shall be carried out under
the supervision of an authorized officer (Memorandum Circular No. 78, s.1964).
The inventory to Top Secret matter shall be conducted annually, every 01 January and 01
June or semi-annually.
2. Top Secret matter shall not be transmitted by mail, express, or electrical means unless in
cryptographic form.
- Double envelope with the mandatory. Receipt
Storage shall be in safe, steel file cabinet or other steel container equipped with built-in
three position, dial type combination lock of such weight, size, and construction to minimize
the possibility of physical theft or damage by fire.
1. Destruction shall be done through burning by the custodian in the presence of the
witness cleared for Top-Secret.
2. Secret - Pertains to the information or material, the unauthorized disclosure of which would
endanger national security, cause serious injury to the interest or prestige of the nation or of
any governmental activity or would be of great advantage to a foreign nation.
Examples:
d. War plans or complete plans for future operations of war not included under Top- Secret;
1. Persons authorized to classify secret matter are enumerated under Top- Secret
2. Commanders of Infantry Divisions
4. General and Special Staff of Major Services Areas and Unified Commanders
5. Superintendent, PMA/PNPA
Destruction is the same as Top-Secret matter, except that there is no need to prepare
Certification of Destruction. Instead a record of destruction is prepared, and the witnessing
officer need to have Secret clearance.
3. Confidential - Pertains to the information and material, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the nation or government activity or would
cause administrative embarrassment or unwarranted injury to an individual or would be an
advantage to a foreign nation.
Examples:
Transmission is the same with secret or using a single enveloped with receipt as required.
Destruction is the same with secret. However, there is no need to prepare record of
destruction and without any witnessing officer.
4. Restricted - Pertains to the information and material that requires special protection other
than that determined to be confidential, secret, and top-secret.
Examples:
1. Departmental books of instruction and training and technical documents intended for
official use only or not intended for public release;
2. Routine information relating to the supply and procurement of military stores; and 3.
Minor modifications of data or items, which individually maybe classified unclassified in
which the aggregate warrants higher classification.
National Interest
Every nation, regardless of creed or form, has their national interests. People from each
nation would willingly go to war to succeed or perish for this national interest.
National interest has several definitions. For this purpose, national interest means the
general and continuing end for which a nation acts.
“National interest” refers to the general concept of national security and well-being.
National are what the decision-making body in the government determines, which beliefs,
matters, or dictates of conscience are important to the maintenance of the nation. To secure or
support national interests, certain objectives may be set by a nation.
And what are the Philippines national interests? Our national interests include
selfpreservation, freedom and independence, territorial integrity, political stability, and
socioeconomic welfare. This is enshrined in the Preamble of our Constitution.
From the national interests, national principles and policies are derived. These are:
National Security
In furtherance of our national principles and policies, the nation's leader is enabled to
formulate our strategy
Generally, most all will define national strategy as, "the art and science of developing
and using political, economic, and psychological power of a nation, together with its armed
forces, during peace and war, to secure national objectives." It is the long-range plan through
which a nation applies attainment of its objectives. its strength towards the
National Power
The elements of national powers are numerical strength and character of population,
cultural development, character of government, geographical location, resources, economic
development, and military potential. The degree to which a nation is strong or deficient in these
elements is normally a measure of its national power.
Components of National Powers
1. Political Strength - This stems from the character of the people, the type and stability of the
government, and the soundness of its foreign policy.
2. Economic Strength - This stems from a combination of factors such as geographic location,
climatic conditions, supply of natural resources, industrial capacity, internal and external
communication systems, international trades, and the size, health, and technical competence of
the population.
3. Cultural Strength - This stems from the national unity, the social and moral fiber of the
people, and the things they believe in, and from the nature and vigor of national institutions-
political, social, religious, educational, scientific, and cultural.
4. Military Strength - The nation's ability to exert pressure through armed forces in furtherance
of national hal security. It consists of all the armed forces in combination with other elements of
national power, depending heavily on natural resources, economic strength, a broad base of
war industries and a vigorous population, military, economic, and political alliances.
National Security
National security is defined as the "protection of nation's people and territories from
physical assault." In this sense, national security is equated with national defense, and the
threats to a nation's security are perceived to emanate from outside the country.
When we speak of national security, we refer to that state or condition wherein the
people's way of life and institutions, their territorial integrity and sovereignty, as well as their
welfare and well-being, are protected or advanced.