0% found this document useful (0 votes)
806 views125 pages

LEA1 (Police Intelligence)

The document provides a history of intelligence from biblical times to modern day. It describes key figures who developed and advanced intelligence practices, including Moses who sent spies to Canaan, Sun Tzu who wrote about obtaining information from men, Napoleon who organized intelligence bureaus, and William Donovan who headed the OSS, a precursor to the CIA. The document traces the evolution of intelligence from early uses of spies and scouts to modern systematic collection and analysis of information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
806 views125 pages

LEA1 (Police Intelligence)

The document provides a history of intelligence from biblical times to modern day. It describes key figures who developed and advanced intelligence practices, including Moses who sent spies to Canaan, Sun Tzu who wrote about obtaining information from men, Napoleon who organized intelligence bureaus, and William Donovan who headed the OSS, a precursor to the CIA. The document traces the evolution of intelligence from early uses of spies and scouts to modern systematic collection and analysis of information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 125

POLICE INTELLIGENCE

1
INTELLIGENCE

In Military Parlance, it is the end product


resulting from the collection, evaluation,
analysis, integration, and interpretation of
all available information which may have
immediate or potential significance to the
development and execution of plan,
policies and programs of the user.
  2
In Police Parlance, it is end product
resulting from the collection,
evaluation, analysis, integration and
interpretation of all available
information regarding the activities of
criminals and other law violators for
the purpose of affecting their arrest,
obtaining evidence, and forestalling 3

plan to commit crimes.


HISTORY OF
INTELLIGENCE
Number 13:17-32 , Old
Testament (Holy Bible) =
Moses sent twelve (12)
scouts to the land of Canaan
where he directed them to
spy the land, the people
and their location and the
nature of their cities. 4
Rahab – known as the “Harlot of
Jericho” who sheltered and concealed
the agents of Israel. Made a covenant
with the agents and duped their
pursuers.

5
Delilah – an impromptu Philistine
agent. Used her sex to gain
information that lead to the location
of the largest effective forces of the
enemy.

6
Sun Tzu – a Chinese philosopher
takes a more practical view in
intelligence history. According to
him, what is called foreknowledge
cannot be elicited from spirits,
nor from gods. It must be
obtained from men who knew the
enemy situation. Sun–tzu wrote a
book entitled “the Art of War”
which is the favorite book of the
late Communist leader Mao Tse
Tung. 7
Alexander the Great –
when Alexander the Great
was marching to Asia, there
were rumors of disaffection
growing among his allies and
mercenaries. He sought the
truth and got it by simplest
expedient. He devised the
first letter sorting and
opening to obtain
information. (modern day 8

mail censorship)
GeneralRomano Sertorius
– (Quintus Sertorius of
Rome) The Roman
commander in Spain who
possessed a white fawn and
allowed it to become widely
known that he derived both
secrets and guidance from
its fawn. His allies also
believed that he can
communicate with animals. 9
Akbar – known as the
“Great Mogul” master of
Hindustan who
employed more than
4,000 agents for the
sole purpose of
bringing him the truth
that his throne might
rest upon it. 10
Genghis Khan – known
as the “Great Mongol”. A
leader of the so-called
“Mongol Conquerors” who
used effective propaganda
machine by spreading
rumors of Mongol terror.
The Leaders usually
disguise as Merchants
11
The Renaissance Period
Sir Francis Walsingham –
protector of Queen Elizabeth I. he
utilizes students as his agents. He
gave the England its first National
Secret Service. Regarded as the First
Great Spymaster.
He employed spies on the staff of
the Spanish army and able to obtain
information regarding Spanish army
as to their strength and weaknesses.
12
Armand Jean du Plessis (Richelieu) – became
a Cardinal and Chief or prime minister of King
Louis XIII. Cardinal Richelieu became the most
powerful in France.
 

Louis XIV – systematized political policy,


continuous surveillance, postal censorship and
military intelligence organization.

13
Napoleon Bonaparte – “one spy in the
right place is worth 20,000 men in the
field”. Organized two bureaus.
 
1. The bureau of intelligence –
consolidate all incoming information
regarding the enemy to obtain
information.
2. The topographical bureau –
maintains a large map, which covers the
latest information regarding both
enemy and friendly forces. 14
Frederick the Great – known
as the father of organized
military espionage.
He divided his agents into
four classes:
1.Common spies – recruited
among poor folk, glad to earn
small sum or to accommodate
a military officer.

15
2. Double spies – the law enforcers and
unreliable renegades of value. Chiefly in spreading
false information to the enemy.

3.Spies of consequences – couriers and


noblemen, invariable requiring a substantial
bribes or bait.

4.Persons who are forced to undertake


espionage against his will

16
Hannibal – considered one of
the brilliant military
strategies in history. He had
developed an effective
intelligence system for 15
years in Rome, and he usually
roam around the city often
disguised as a beggar to
gather first-hand information.

17
Julius Caesar – during his
time, his staff of each legion
includes ten “speculators”
who served as an
information collecting
agency. The speculators
were the first intelligence
personnel to appear
definitely in a military
organization.

18
George Washington –
served as the Grand
Master in intelligence
who mobilized the free
masons of the colonies at
the outbreak of the
American war of
independence.

19
Karl Schulmeister – Renowned as "Napoleon's Eye".
He was credited for establishing counter intelligence
conducted against spies. He is a master of deceit who
used black mail to obtain vital information pertaining
to the personality and identify of the enemies of
Napoleon during the 18th Century.

20
Alfred Redl – brilliant intelligence agent although a
homosexual. Become chief of the Austro Hungarian
Secret Service, but in fact a double agent of Russia. In
1913, his treason was discovered and he was forced to
commit suicide.
His treason lead to the death of 500,000 agents
and soldiers combine in 13 years of espionage
service.

21
Wilhelm Johann Karl Eduard Steiber
– Known as the Prussia's "King of
Sleuthhounds" as minister of police he
studied the use of propaganda and
censorship as well as utilizing statistical
intelligence accounting. Steiber's
thorough organization and ruthless, his
sinister innovations and cold, calculating
manipulation of human weakness made
him the spymaster who most shape the
course of the 20th century espionage.
22
The Brahma Kautlya – in
ancient India, he overthrew the
NANDA dynasty and
established the first
MAYURYAN king in the Indian
throne.
 

23
Mayuryan Spy System – rivaled the modern Soviets and
had the following tasks:
 
a. Shadow the king’s ministers and officials and attempt
to determine their very thoughts
b. Report wrong doings of the people
c. Operate secretly in foreign countries
d. Spread unrest
e. Commit act of sabotage
f. Assassinate political and military leaders
g. Official envoys were instructed to make friends with
officials of the enemy to compare their military strengths
with their own 24

 
William "Wild Bill" Donovan –Headed
the Office of Strategic Service (OSS),
the immediate forerunner of the Central
Intelligence Agency, a lawyer and
millionaire Republican, Donovan
enjoyed Roosevelt's trust, friendship, and
most crucial of all direct access to the
inner sanctums of the White House. His
jovial outgoing personality and his upper
class social background played a
considerable part in setting overall tone
and style of "THE COMPANY" 25
Herbert Yardley – Head of
MI-8, The forerunner of the
Top Secret National Security
Administration a.k.a Black
Chamber, a Cryptanalytic
Organization.

26
Battle of Midway – In June
1442, the turning point of the
Naval in the Pacific, the
victory gained by the
Americans was due to the
disrupted messages from the
Imperial Japanese Navy.

27
Admiral Isoroku Yamamoto
– April 1943, the Cryptoanalyst of
the U.S. Navy Communications
Intelligence intercepted a top secret
signal relaying the travel of the
Admiral.
En route ha was intercepted and
crashed in the Jungles of
Bougainville.

28
King Edward I – King of
England in 1725 organized a
systematic police system so
called Watch and Ward. By
Royal proclamation, the
profession “State Informer”
was created in 1734 enjoining
all informers to expose criminal
activities and be compensated.

29
Joseph Fouche – The French
statesman (1759-1820) served
as minister of police under
Napoleon and was influential in
the return of Louis XVIII to the
throne in 1815.
He rose to become the most
feared and respected
intelligence director in
French history. He founded
the system spying against spy
which later know as counter- 30
espionage
JOSEPH PETROSINO – member of the New York
Police Department in early 1900, he was the head of
the Italian Squad. Through extensive intelligence
network, he is credited to smash the Black Society.

Frey Tomas de Torquemada – Master Planner.


Conducted espionage during the 15th century under
the inquisition wherein purging and ecclesiastical
cleansing was undertaken to fortify and solidify the
church

31
Sir Samuel Luke
Chief Scout of Oliver Cromwell who was able to
dethrone King Charles I in British Civil War of
1640's. Sir Samuel Luke was said to be industrious
in snooping on the enemy.
 
John Churchill
first Duke of Marlborough, told critics of his
enormous expenditure on espionage, that " No war
can be conducted successfully without early and
good intelligence, and such advices cannot be had
but at very great expense". 32
Sir Arthur Wellesly – Duke of Wellington, who
defeated Napoleon's at Waterloo in 1815. Regarded
as the "Greatest Military Spymaster of All Time".
He live by the motto; "All the business of war is to
find out what you don’t know by what you do." He
always studied the enemy in depth, finding out not
only where the opposing army was and how strong it
was, but the character of it's commander, the spirit
and training of its troops, their battle experience, and
how they were supplied with arms and rations. He
also studied and mapped the roads, rivers and
topography of the war theatre. 33
William Stephenson – A film mogul in England who
founded the British Security Coordination in New
York to cooperate with American spy agencies on
secret orders from Winston Churchill in coordination
with Franklin D. Roosevelt.
Stephenson commented that "Battles were won
because of advance knowledge of enemy plans
could influence those plans, and could anticipate
enemy actions by methods heretofore concealed.”

34
V2 Rackets – OSS agents working in conjunction
with the British Intelligence, through penetration and
technical intelligence discovered Pneumundo, which
was the V2 guide missile research project of Nazi
Germany.

35
The Central Intelligence Agency (CIA) – The
agency was created under the US National Security
Act of 1947 a.k.a. Public Law 110 established by the
late President Truman in January 1946.The CIA is
under the National Security Council. The First
Director of the Agency was Rear Admiral Roscoe
Hillenkoetter. It is called THE COMPANY.

36
The Federal Bureau of Investigation (FBI) – First
established in 1908 as an investigative arm of the
U.S. Department of Justice. It becomes what is
known as the F.B.I. under its first director John
Edgar Hoover in 1942.

37
The Committee for State Security – Russia – The
intelligence agency known as the KGB – Komitet
Gosudarstvennoy Bezopasnosti (KGB)

The British Secret Service (BSS – MI5/MI6) –


established in 1909 as an internal departments under
the control of Secret Service Bureau. It is now
known as Secret Intelligence Service (SIS)

38
The Mossad – (Ha-mosad le modiin u-letafquidim
meyuhadim) – The agency’s motto is found in
“Proverbs XI, 14” Where no counsel is, the people
fall, but in the multitude of counselors there is safety.
Mossad has two branches namely:
1. Aman – Military Intelligence (Israels Defense
Forces)
2. Shabak – General Security Service (Internal
Security
Shabak is from the word “shin bet” that means a
defender who shall not be seen. Reuven Shiloah was
the First Director of MOSSAD. 39
NATIONAL INTELLIGENCE COORDINATING
AGENCY (PHILIPPINES) – the intelligence
agency in the Philippines under the Office of the
National Security Adviser

40
IINFORMATION

Refers to all evaluated materials of every


description including those derived from
observation, reports, rumors, imagery, and other
sources from which intelligence is produced.

41
Two General Classifications of Sources of
Information:
1. Open Sources – 99% of the information collected
are coming from open sources.
Enemy Activities
POW
Captured Documents
Map
Weather Forecast, Studies, Reports
Agencies

42
Close Sources – 1% of information from close
sources.
2. Close/Covert Method
a. Surveillance
b. Casing
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means
f. Bugging and Tapping Devices
g. Tactical Interrogation
h. Observation and Description
43
PERSONS AS SOURCES OF INTELLIGENCE
Informant Net – a controlled group of people who
work through the direction of the agent handler

Informant – persons who give information to the


police voluntarily

Informer – persons who give information for


reward or price

44
TYPES OF INFORMANTS

1. Confidential Informant – an informant who gives


information to the police pertaining to the underworld
about organized criminals with the understanding that
his identity will be protected.

2. Voluntary Informant – a type of informant who


give information freely and willfully as a witness to a
certain act.

45
 
3. Special Informant – those who gives information
concerning specialized cases only and it is regarded a
special treatment by the operatives (ex. Teachers,
businessman)

4. Anonymous Informant – those who gives


information through telephone with the hope that the
informant cannot be identified.

46
SUB-TYPE OF INFORMANT

1. Incidental Informant – person who casually


imparts information to an officer with no intention
of providing subsequent information

2. Recruited Informant – person selected,


cultivated and developed into a continuous source
of information

47
Functional Classifications Of Police Intelligence

1. Criminal Intelligence – refers to the knowledge


essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.

48
2. Internal Security Intelligence – refers to the
knowledge essential to the maintenance of peace and
order.

3. Public Safety Intelligence – refers to the


knowledge essential to ensure the protection of lives
and properties.

49
Principles Of Intelligence
1. Intelligence and operation are interdependent –
separate and distinct activities but compliment each
other.
2. Intelligence requires continuous security measures –
deny unauthorized personnel information about
operation and intelligence product.
3. Intelligence must be useful – must serve the
commander’s need and requirements

50
4. Intelligence must be timely – must reach the user in
time to serve as basis for appropriate action.

5. Intelligence must be flexible – based on reason and


sound judgment

6. Intelligence requires imagination and foresight –


agents must be given the leeway to be resourceful to
obtain more than what is normally acquired

51
Broad Categories of Intelligence

1. National Intelligence – integrated product of


intelligence developed by all government
departments concerning the broad aspect of
national policy and national security.

52
2. Department of Intelligence – the intelligence
required by department or agencies of the government
to execute its mission and discharge its
responsibilities.

3. Military Intelligence – used in the preparation and


execution of tactical plans.

53
Fields of Police Intelligence

1. Strategic Intelligence – knowledge pertaining to


the capabilities and vulnerabilities of a foreign nation,
which is required by the National Planners for the
formulation of an adequate National Defense in peace
and forms the basis for, projected military operations
in time of war.

54
Components of Strategic Intelligence
a. Political Intelligence – deals with Domestic and
Foreign affairs and relation of government operations;
1. Basic Principles of the Government
2. Government Structures
3. Public Order and Safety
4. Subversion
5. Intelligence and Security Organization

55
b. Economic Intelligence – deals with the extent and
utilization of Natural and Human resources to the
industrial potential of the Nations.

c. Transportation and Telecommunication


Intelligence – concerned with the operations and
facilities not only the Military but also the Civilians.

56
d. Sociological Intelligence – deals with the
demographic and psychological aspects of groups of
people.
1. Population and Manpower
2. Characteristics of the People
3. Public Opinion – attitudes of the majority of the
people towards matters of public policy.
4. Education – based on literacy rate

57
e. Biographical Intelligence – deals with individual
personalities who have actual possession of power.
f. Armed Forces Intelligence – deals with the armed
forces of the Nation.
1. Position of the Armed Forces – constitutional
and legal basis of its creation and actual role.
2. Organization and structure and territorial
disposition
3. Military Manpower Recruitment
4. Order of Battle

58
g. Geographical Intelligence – deals with the natural
as well as man made features of the physical
environment of man considered from the point in view
of military operations.
1. Location – military and economic importance
2. Size – measurement of which a nation can
exchange space or time during war.
3. Shape
4. Weather and Climate

59
h. Scientific Intelligence – deals with the progress of
the research and development as it affects the
economic and military potential of a nation.

60
2. Line Intelligence (Tactical and Combat) – is the
intelligence required by the commander to provide for
planning and conduct of tactical operation.

- Knowledge of the People, Weather, Enemy, and


Terrain (PWET) – used in planning and conducting
tactical and administrative operation in a counter
insurgency.

61
What are the Intelligence Information to be
Determined in Line Intelligence?
People
living condition of the people
sources of income
education of the people
government livelihood of the people
extent of enemy influence to the people

62
Weather

visibility
cloudy
temperature
precipitation(rain)
wind

63
Enemy

location of the enemy


strength of the enemy
disposition
tactical capability
enemy vulnerability

64
Terrain

relief and drainage system


vegetation
surface material
man made features

65
3. Counterintelligence – phase of intelligence
covering the activity devoted in destroying the
effectiveness of hostile foreign activities and the
protection of information against espionage,
subversion and sabotage.

Three Activity of Counterintelligence


1. Protection of information against espionage
2. Protection of personnel against subversion
3. Protection of installations and materials against
sabotage
66
Counterintelligence Investigation – is an activity,
which constitute the value of the counterintelligence
workload, worldwide and includes specific
investigation of individual and incidence, which for
the most part are conducted in an overt but discreet
manner.

67
THE INTELLIGENCE CYCLE

Intelligence Cycle – the process through which


intelligence is obtained, produced and made
available to users.

PHASE I – Planning the Collection Effort – it


involves the determination of the requirements of
intelligence operation

68
1. Determination of Requirements
a. Enemy capabilities, including time, place,
strength, or other details
b. Enemy vulnerabilities, including nature, extent,
performance and other details
c. Enemy order of battle and factors
d. Terrain, including natural and artificial obstacles
e. Weather
f. Information desired by higher, lower or
adjacent headquarters

69
2. Determination of the Essential Elements of
Information

Essential Element of Information – an item of


information of the characteristics of the area of
operations and the enemy which the commander
feels he needs before he can reasonably arrive at a
decision.

70
3. Establishment of Priorities

Priorities – reflect the criticality of the need for the


particular information. No formula exists which can
automatically determine priorities. Such determination
is a matter of judgment.

71
PHASE II – Collection of Information
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or technique in collection
e. Ensure timely collection

72
Factors in Choosing Collection Agents

1. Capability – agents placement or access to other


target
2. Multiplicity – more agents
3. Balance – the number of agents needed in the
operation

73
PHASE III – Processing the Collected Information
1. Recording – is the reduction of information into
writing or some other form of graphical representation
and the arranging of this information into groups
related items.
2. Evaluation – is the determination of the pertinence
of the information to the operation, reliability of the
source of or agency and the accuracy of the
information.

74
Evaluation to Determine

a. Pertinence – does it holds some value to current


operation
is it needed immediately
b. Reliability – judging the source of information or
agency
c. Credibility – truth of information

75
Judging Credibility

a. It is possible for the reported fact or event to have


taken place?
b. Is the report consistent within itself?
c. Is the report confirmed or corroborated by
information from different sources or agencies?
d. If the report does not agree with information from
other sources which one is more likely to be true?

76
3. Interpretation – it is the determination of the
meaning and significance of the information relative to
the information and intelligence already known and
drawing deductions about probable meaning of the
evaluated information.

a. Assessment – shifting and isolating those


elements the have significance in the light of the
mission or objective

77
b. Integration – combining the elements
isolated in analysis and known information to form
a logical picture or theory

c. Deduction – the formulation of conclusions


from the theory developed, tested and considered
valid in determination of efffort and meaning of the
information

78
Reliability of
Information Accuracy of Information Sources
A – Completely 1 – Confirmed By Other T-Direct observation by a
Reliable Sources commander of a unit
B – Usually Reliable 2 – Probably True U-Report by a
penetration or resident
agent
C - Fairly Reliable 3 – Possibly True V-Report by an AFP
trooper or PNP
personnel in encounter
or operation
D – Not Usually 4 – Doubtfully True W-Interrogation of a
Reliable captured enemy agent or
foreigner

E – Unreliable 5 – Improbable X-Observation by a


government or civilian
employee or official

F – Reliability 6 – Truth Cannot Be Y-Observation by a


79
Cannot Be Judged Judged member of populace
Z-Documentary
PHASE IV – Dissemination and Use of
Information

1. Timeliness – intelligence must reach the users


on time to be of value.

2. Propriety – the message must be clear, concise


and complete and must be in the proper form for
the receiver to be readily understandable

80
COVER AND UNDERCOVER OPERATIONS
Cover – the means by which an individual, goup or
organization conceals the true nature of its acts
and/or existence from the observer

Cover Story – a biographic account, true or


fictitious that will portray the personality of the
agent he assumed, a scenario to cover up the
operation.

81
TYPES OF COVER

1. Natural Cover – using actual or true background


2. Artificial Cover – cover using biographical data
adopted for such purpose
3. Cover Within a Cover – use of secondary cover
in case of compromise for justification of existence
4. Multiple Cover – any cover wished

82
FUNCTIONS OF COVER

1. Offensive – gives access to the target and


facilitates the achievement of clandestine objective

2. Defensive – serves to prevent detection

83
Organizational Cover – an account
consisting of biographical data which
when adopted by an individual will
assume the personality he wants to
adopt

84
GUIDELINES WHEN COVER IS COMPROMISE
1. Move out immediately
2. Start new facility for operations and develop it
3. Build entirely new cover
4. Use circuitous route and provide careful counter-
surveillance
5. Be patient, build slowly and carefully

85
GUIDELINES WHEN ORGANIZATIONAL COVER IS
COMPROMISE

1. Make a physical move or relocate


2. Start new facility and let it grow
3. Use new personnel
4. Let old personnel remain in place
5. Build entirely new cover identity

86
UNDERCOVER OPERATION
– an investigative technique in which the
agent conceal his official identity to obtain
information from the target organization.

87
TYPES OF UNDERCOVER ASSIGNMENT

1. Dwelling – one in which the agent establishes


residence in or near the dwelling which houses the
subject

2. Work Assignment – places the undercover


agent in a type of employment where he can
observe the activities of the target

88
3. Social Assignment – requires to frequent places
of entertainment and amusement known to be
habitually visited by the target

4. Multiple Assignment – agent is given the task of


covering two or more of the above specific
assignments simultaneously

5. Personal Contact Assignment or Rope Job –


agent is required to develop friendship and trust
with the target for purposes of obtaining
information or evidence 89
SELECTING ACTION AGENTS
1. Placement – location of prospective agent with
respect to the target

2. Access – the capability of a prospective agent to


obtain the desired information

90
TYPES OF ACCESS
1. Primary Access – the physical access to the
desired information

2. Secondary Access – the access to the desired


information through a principal source where the
agent has direct access

3. Outside Access – agent employed outside target


and merely monitor information from a third
person who is monitoring info in the area
91
CONTROL – is the authority to direct the agent to
carry out task or requirement on behalf of the
clandestine organization in an acceptable manner
and security

TWO CATEGORIES OF CONTROL


1. Positive Control – characterized by
professionalism and rapport like agent motivation
or psychological control

92
2. Negative Control – characterized by threat
which includes:

a. Disciplinary Action – includes verbal


reprimand for poor performance or insecure
actions of withholding certain rewards, reduction
of agents, salary or threat of terminating
professional relationship

93
b. Escrow Account – control of agent by putting
his salary in a bank to be withdrawn only after a
fulfillment of a condition
c. Blackmail

94
PROCURING DIFFERENT TYPES OF AGENT
1. Agent in Place – agent who has been recruited
by an intelligence service within a highly sensitive
target, who is just beginning a career or have been
long or insider

2. Double Agent – an enemy agent who has been


captured, turned around as an agent of his captor

95
3. Expandable agent – agent whom false
information is leaked to the enemy

4. Penetration Agent – agent who reached the


enemy gets information and manage to get back
alive

5. Agent of Influence – agent who uses influence


to gain information
6. Agent of Provocation – agent who provoke the
enemy to get information
96
SURVEILLANCE

It is a form of clandestine investigation which


consists of keeping persons, place or other targets
under physical observation in order to obtain
evidence or information pertinent to an
investigation

97
Surveillant – person conducting the surveillance

Subject – a party under observation or surveillance

Stakeout – the surveillant remains in one or fixed


position or locale. Also called Plant or Fixed
Surveillanmce

Convoy – a countermeasure to detect or elude


surveillance

98
Decoy – a cover supporting the surveillant who can
become a convoy whenever surveillance is burned
out

Drop – any convenient, secure and unsuspecting


place where police undercover man meet his action
agent for debriefing or reporting purposes

Contact – any person whom the subject picks or


deals with while he is under observation and
identifies the observer
99
Mustard plaster – the subject is followed so closely
that surveillant and subject are almost in lock step..
It is tantamount to protective custody

Tailgaiting – open surveillance in which the


subeject’s vehicle is closely followed

100
Tailing or Shadowing – surveillance of person

Casing or Reconnaissance – surveillance of place

Roping – surveillance of events, activities or other


things

101
TYPES OF SURVEILLANCE
A. According to Intensity and Sensitivity
1. Loose or Discreet – a cautious surveillance in
which the subject is unaware that he is being
followed or observed
2. Open or Rough – a surveillance with little or no
attempt of concealment. The subject is most likely
aware that he is followed.
3. Close or Tight – the subject is kept undr
constant surveillance. The aim is not to lose the
subject even at the risk of being detected.
102
B. According to Methods
1. Stationary – the surveillant is in fixed position

2. Moving – the surveillant follow the subject from


place to place to maintain continuous watch

3. Technical – surveillance with the use of


electronic gadgets, equipments or systems

103
CASING OR RECONNAISANCE

Casing is the term used in the police


organization while reconnaissance is the term
used in the military.
It is the visual inspection of an area, installation
or building to determine its suitability for
operational activities.

104
METHODS OF SURVEILLANCE

1. One man –extremely difficult and should be


avoided, if unavoidable keep subject in view at all
times.

2. Two man – two agents are employed to follow the


subject.

3. ABC method – reduces the risk of losing the


subject, affords greater security agents detection.
105
4. Progressive/Leap from method – poor chances of
obtaining good results, agents are stations at a fixed
point assuming that the subject followed the same
general route each day.

5. Combined foot-auto surveillance – employment of


surveillants on foot and agents in an automobile.

106
OBSERVATION AND DESCRIPTION

Observation – encompasses the use of all the


major senses to register and recognize the
significance of given operation

Description – actual and factual reporting of one’s


observation
85% of knowledge gathered through sight
13% gathered through hearing
2% gathered through three other senses
107
ELICITATION
A system in which information of value is
obtained through the process of direct
communication in which one or more of the parties
is unaware of the specific purpose of the
conversation.

108
ORDER OF BATTLE INTELLIGENCE (ORBAT)
It is the identification of strength, command
structure and disposition of the personnel, units
and equipment of any threat force.

109
PHYSICAL SECURITY

The system of placing barrier between the


potential intruder and the material being protected

COMMUNICATION SECURITY
The protection resulting from the application of
measures to deny unauthorized persons from
gaining access from information of value.

110
DOCUMENT SECURITY

Document is any recorded information


regardless of its physical form or characteristics.

Classified Matter – information or matter in any


form or nature, the safeguarding of which is
necessary in the interest of national security.

111
Compartmentalization – granting of access to
classified document or information only to properly
cleared persons when such classified document or
info is required in the performance of their official
duties and restricting it to specific physical confines
when feasible

Need-To-Know – the term given to the


requirement that the dissemination of classified
matters be limited strictly to those persons whose
official duty requires possession therof.
112
Compromise – lose of security resulting to
unauthorized person obtaining knowledge on
classified matter

Classify – the assigning of information or material


to one or of the four security classification
categories.

Upgrading – the changing of classified matter to a


categories higher than the previously assigned to it

113
Reclassify – act of changing the assigned
classification of a document or material

Declassify – removal of the security classification


from document or material.

114
CATEGORIES OF CLASSIFIED MATTERS
1. Top Secret Document – record containing
information and material, the unauthorized disclosure
of which would caused exceptionally grave damage to
the nation, politically, economically or from the point
of national security. This category is reserved for the
nation’s closest secrets and is to be used with great
reserve. It is covered with legal size bond paper lined
with a 1/2-inch green border.

115
2. Secret Document – record containing information
or material, the unauthorized disclosure of which
would endanger national security, cause serious injury
to the interest and prestige of the nation or any
governmental activity or would be of great advantage
to other nation. It is covered with legal size bond paper
lined with a ½-inch red border.

116
3. Confidential Document – containing information
or materials, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the
nation or any government activity or would cause
administrative embarrassment or unwarranted injury to
the honor and dignity of an individual or would be of
advantage to foreign nation. Covered with legal size
bond paper lined with a ½-inch blue border.

117
4. Restricted Record – Information and material
which requires special protection other than that
determined to be top secret, secret or confidential.
Cover sheet is not necessary, what is important is a
bold RESTRICTED word at the top and at the bottom
of the bond paper.

118
PERSONNEL SECURITY INVESTIGATION
It is an inquiry into the character, reputation,
discretion and loyalty of an individual in order to
determine a person’s suitability or access to
classified matters prior to the granting of security
clearance

119
TYPES OF PERSONNEL SECURITY
INVESTIGATION

1. National Agency Check (NAC) – investigation of


an individual made on the basis of written
information supplied by him in response to an
official inquiry. It is simply a check on the files and
records of national agencies

120
2. Local Agency Check (LAC) – inquiry sent to
local government agencies, former employers,
character references and schools where the subject
attended.

3. Background Investigation – more comprehensive


that LAC or NAC.

121
TWO TYPES OF B.I.

1. Complete Background Investigation (CBI) – it


consists of the thorough and complete investigation
of the background of the subject including all the
circumstances of his life.

2. Partial Background Investigation (PBI) –


investigation of the background of the subject but
limited only to circumstances of his personal life
which are deemed pertinent to an investigation.
122
Security Clearance – administrative
determination from a security standpoint that an
individual is eligible for access to classified matter

123
CRYPTOGRAPHY – the art and science of code and
ciphers. It is done through the use of telephone
scrambler or technically speaking, Speech Inverter
where speech frequencies are divided to produce a
scrambling speech when intercepted.

Cryptographer – person skilled in converting


messages from clear to unintelligible forms by the
use of codes and ciphers. Also known as Coder,
Encrypter or Code Clerk.

124
Crypto-Analyst – one who break intercepted codes

Coding – changing of message from plain clear text


to unintelligible form. Also known as Encrypting.

Decoding – transforming of coded message into


plain text. Also known as Decrypting.

125

You might also like