LEA1 (Police Intelligence)
LEA1 (Police Intelligence)
1
INTELLIGENCE
5
Delilah – an impromptu Philistine
agent. Used her sex to gain
information that lead to the location
of the largest effective forces of the
enemy.
6
Sun Tzu – a Chinese philosopher
takes a more practical view in
intelligence history. According to
him, what is called foreknowledge
cannot be elicited from spirits,
nor from gods. It must be
obtained from men who knew the
enemy situation. Sun–tzu wrote a
book entitled “the Art of War”
which is the favorite book of the
late Communist leader Mao Tse
Tung. 7
Alexander the Great –
when Alexander the Great
was marching to Asia, there
were rumors of disaffection
growing among his allies and
mercenaries. He sought the
truth and got it by simplest
expedient. He devised the
first letter sorting and
opening to obtain
information. (modern day 8
mail censorship)
GeneralRomano Sertorius
– (Quintus Sertorius of
Rome) The Roman
commander in Spain who
possessed a white fawn and
allowed it to become widely
known that he derived both
secrets and guidance from
its fawn. His allies also
believed that he can
communicate with animals. 9
Akbar – known as the
“Great Mogul” master of
Hindustan who
employed more than
4,000 agents for the
sole purpose of
bringing him the truth
that his throne might
rest upon it. 10
Genghis Khan – known
as the “Great Mongol”. A
leader of the so-called
“Mongol Conquerors” who
used effective propaganda
machine by spreading
rumors of Mongol terror.
The Leaders usually
disguise as Merchants
11
The Renaissance Period
Sir Francis Walsingham –
protector of Queen Elizabeth I. he
utilizes students as his agents. He
gave the England its first National
Secret Service. Regarded as the First
Great Spymaster.
He employed spies on the staff of
the Spanish army and able to obtain
information regarding Spanish army
as to their strength and weaknesses.
12
Armand Jean du Plessis (Richelieu) – became
a Cardinal and Chief or prime minister of King
Louis XIII. Cardinal Richelieu became the most
powerful in France.
13
Napoleon Bonaparte – “one spy in the
right place is worth 20,000 men in the
field”. Organized two bureaus.
1. The bureau of intelligence –
consolidate all incoming information
regarding the enemy to obtain
information.
2. The topographical bureau –
maintains a large map, which covers the
latest information regarding both
enemy and friendly forces. 14
Frederick the Great – known
as the father of organized
military espionage.
He divided his agents into
four classes:
1.Common spies – recruited
among poor folk, glad to earn
small sum or to accommodate
a military officer.
15
2. Double spies – the law enforcers and
unreliable renegades of value. Chiefly in spreading
false information to the enemy.
16
Hannibal – considered one of
the brilliant military
strategies in history. He had
developed an effective
intelligence system for 15
years in Rome, and he usually
roam around the city often
disguised as a beggar to
gather first-hand information.
17
Julius Caesar – during his
time, his staff of each legion
includes ten “speculators”
who served as an
information collecting
agency. The speculators
were the first intelligence
personnel to appear
definitely in a military
organization.
18
George Washington –
served as the Grand
Master in intelligence
who mobilized the free
masons of the colonies at
the outbreak of the
American war of
independence.
19
Karl Schulmeister – Renowned as "Napoleon's Eye".
He was credited for establishing counter intelligence
conducted against spies. He is a master of deceit who
used black mail to obtain vital information pertaining
to the personality and identify of the enemies of
Napoleon during the 18th Century.
20
Alfred Redl – brilliant intelligence agent although a
homosexual. Become chief of the Austro Hungarian
Secret Service, but in fact a double agent of Russia. In
1913, his treason was discovered and he was forced to
commit suicide.
His treason lead to the death of 500,000 agents
and soldiers combine in 13 years of espionage
service.
21
Wilhelm Johann Karl Eduard Steiber
– Known as the Prussia's "King of
Sleuthhounds" as minister of police he
studied the use of propaganda and
censorship as well as utilizing statistical
intelligence accounting. Steiber's
thorough organization and ruthless, his
sinister innovations and cold, calculating
manipulation of human weakness made
him the spymaster who most shape the
course of the 20th century espionage.
22
The Brahma Kautlya – in
ancient India, he overthrew the
NANDA dynasty and
established the first
MAYURYAN king in the Indian
throne.
23
Mayuryan Spy System – rivaled the modern Soviets and
had the following tasks:
a. Shadow the king’s ministers and officials and attempt
to determine their very thoughts
b. Report wrong doings of the people
c. Operate secretly in foreign countries
d. Spread unrest
e. Commit act of sabotage
f. Assassinate political and military leaders
g. Official envoys were instructed to make friends with
officials of the enemy to compare their military strengths
with their own 24
William "Wild Bill" Donovan –Headed
the Office of Strategic Service (OSS),
the immediate forerunner of the Central
Intelligence Agency, a lawyer and
millionaire Republican, Donovan
enjoyed Roosevelt's trust, friendship, and
most crucial of all direct access to the
inner sanctums of the White House. His
jovial outgoing personality and his upper
class social background played a
considerable part in setting overall tone
and style of "THE COMPANY" 25
Herbert Yardley – Head of
MI-8, The forerunner of the
Top Secret National Security
Administration a.k.a Black
Chamber, a Cryptanalytic
Organization.
26
Battle of Midway – In June
1442, the turning point of the
Naval in the Pacific, the
victory gained by the
Americans was due to the
disrupted messages from the
Imperial Japanese Navy.
27
Admiral Isoroku Yamamoto
– April 1943, the Cryptoanalyst of
the U.S. Navy Communications
Intelligence intercepted a top secret
signal relaying the travel of the
Admiral.
En route ha was intercepted and
crashed in the Jungles of
Bougainville.
28
King Edward I – King of
England in 1725 organized a
systematic police system so
called Watch and Ward. By
Royal proclamation, the
profession “State Informer”
was created in 1734 enjoining
all informers to expose criminal
activities and be compensated.
29
Joseph Fouche – The French
statesman (1759-1820) served
as minister of police under
Napoleon and was influential in
the return of Louis XVIII to the
throne in 1815.
He rose to become the most
feared and respected
intelligence director in
French history. He founded
the system spying against spy
which later know as counter- 30
espionage
JOSEPH PETROSINO – member of the New York
Police Department in early 1900, he was the head of
the Italian Squad. Through extensive intelligence
network, he is credited to smash the Black Society.
31
Sir Samuel Luke
Chief Scout of Oliver Cromwell who was able to
dethrone King Charles I in British Civil War of
1640's. Sir Samuel Luke was said to be industrious
in snooping on the enemy.
John Churchill
first Duke of Marlborough, told critics of his
enormous expenditure on espionage, that " No war
can be conducted successfully without early and
good intelligence, and such advices cannot be had
but at very great expense". 32
Sir Arthur Wellesly – Duke of Wellington, who
defeated Napoleon's at Waterloo in 1815. Regarded
as the "Greatest Military Spymaster of All Time".
He live by the motto; "All the business of war is to
find out what you don’t know by what you do." He
always studied the enemy in depth, finding out not
only where the opposing army was and how strong it
was, but the character of it's commander, the spirit
and training of its troops, their battle experience, and
how they were supplied with arms and rations. He
also studied and mapped the roads, rivers and
topography of the war theatre. 33
William Stephenson – A film mogul in England who
founded the British Security Coordination in New
York to cooperate with American spy agencies on
secret orders from Winston Churchill in coordination
with Franklin D. Roosevelt.
Stephenson commented that "Battles were won
because of advance knowledge of enemy plans
could influence those plans, and could anticipate
enemy actions by methods heretofore concealed.”
34
V2 Rackets – OSS agents working in conjunction
with the British Intelligence, through penetration and
technical intelligence discovered Pneumundo, which
was the V2 guide missile research project of Nazi
Germany.
35
The Central Intelligence Agency (CIA) – The
agency was created under the US National Security
Act of 1947 a.k.a. Public Law 110 established by the
late President Truman in January 1946.The CIA is
under the National Security Council. The First
Director of the Agency was Rear Admiral Roscoe
Hillenkoetter. It is called THE COMPANY.
36
The Federal Bureau of Investigation (FBI) – First
established in 1908 as an investigative arm of the
U.S. Department of Justice. It becomes what is
known as the F.B.I. under its first director John
Edgar Hoover in 1942.
37
The Committee for State Security – Russia – The
intelligence agency known as the KGB – Komitet
Gosudarstvennoy Bezopasnosti (KGB)
38
The Mossad – (Ha-mosad le modiin u-letafquidim
meyuhadim) – The agency’s motto is found in
“Proverbs XI, 14” Where no counsel is, the people
fall, but in the multitude of counselors there is safety.
Mossad has two branches namely:
1. Aman – Military Intelligence (Israels Defense
Forces)
2. Shabak – General Security Service (Internal
Security
Shabak is from the word “shin bet” that means a
defender who shall not be seen. Reuven Shiloah was
the First Director of MOSSAD. 39
NATIONAL INTELLIGENCE COORDINATING
AGENCY (PHILIPPINES) – the intelligence
agency in the Philippines under the Office of the
National Security Adviser
40
IINFORMATION
41
Two General Classifications of Sources of
Information:
1. Open Sources – 99% of the information collected
are coming from open sources.
Enemy Activities
POW
Captured Documents
Map
Weather Forecast, Studies, Reports
Agencies
42
Close Sources – 1% of information from close
sources.
2. Close/Covert Method
a. Surveillance
b. Casing
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means
f. Bugging and Tapping Devices
g. Tactical Interrogation
h. Observation and Description
43
PERSONS AS SOURCES OF INTELLIGENCE
Informant Net – a controlled group of people who
work through the direction of the agent handler
44
TYPES OF INFORMANTS
45
3. Special Informant – those who gives information
concerning specialized cases only and it is regarded a
special treatment by the operatives (ex. Teachers,
businessman)
46
SUB-TYPE OF INFORMANT
47
Functional Classifications Of Police Intelligence
48
2. Internal Security Intelligence – refers to the
knowledge essential to the maintenance of peace and
order.
49
Principles Of Intelligence
1. Intelligence and operation are interdependent –
separate and distinct activities but compliment each
other.
2. Intelligence requires continuous security measures –
deny unauthorized personnel information about
operation and intelligence product.
3. Intelligence must be useful – must serve the
commander’s need and requirements
50
4. Intelligence must be timely – must reach the user in
time to serve as basis for appropriate action.
51
Broad Categories of Intelligence
52
2. Department of Intelligence – the intelligence
required by department or agencies of the government
to execute its mission and discharge its
responsibilities.
53
Fields of Police Intelligence
54
Components of Strategic Intelligence
a. Political Intelligence – deals with Domestic and
Foreign affairs and relation of government operations;
1. Basic Principles of the Government
2. Government Structures
3. Public Order and Safety
4. Subversion
5. Intelligence and Security Organization
55
b. Economic Intelligence – deals with the extent and
utilization of Natural and Human resources to the
industrial potential of the Nations.
56
d. Sociological Intelligence – deals with the
demographic and psychological aspects of groups of
people.
1. Population and Manpower
2. Characteristics of the People
3. Public Opinion – attitudes of the majority of the
people towards matters of public policy.
4. Education – based on literacy rate
57
e. Biographical Intelligence – deals with individual
personalities who have actual possession of power.
f. Armed Forces Intelligence – deals with the armed
forces of the Nation.
1. Position of the Armed Forces – constitutional
and legal basis of its creation and actual role.
2. Organization and structure and territorial
disposition
3. Military Manpower Recruitment
4. Order of Battle
58
g. Geographical Intelligence – deals with the natural
as well as man made features of the physical
environment of man considered from the point in view
of military operations.
1. Location – military and economic importance
2. Size – measurement of which a nation can
exchange space or time during war.
3. Shape
4. Weather and Climate
59
h. Scientific Intelligence – deals with the progress of
the research and development as it affects the
economic and military potential of a nation.
60
2. Line Intelligence (Tactical and Combat) – is the
intelligence required by the commander to provide for
planning and conduct of tactical operation.
61
What are the Intelligence Information to be
Determined in Line Intelligence?
People
living condition of the people
sources of income
education of the people
government livelihood of the people
extent of enemy influence to the people
62
Weather
visibility
cloudy
temperature
precipitation(rain)
wind
63
Enemy
64
Terrain
65
3. Counterintelligence – phase of intelligence
covering the activity devoted in destroying the
effectiveness of hostile foreign activities and the
protection of information against espionage,
subversion and sabotage.
67
THE INTELLIGENCE CYCLE
68
1. Determination of Requirements
a. Enemy capabilities, including time, place,
strength, or other details
b. Enemy vulnerabilities, including nature, extent,
performance and other details
c. Enemy order of battle and factors
d. Terrain, including natural and artificial obstacles
e. Weather
f. Information desired by higher, lower or
adjacent headquarters
69
2. Determination of the Essential Elements of
Information
70
3. Establishment of Priorities
71
PHASE II – Collection of Information
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or technique in collection
e. Ensure timely collection
72
Factors in Choosing Collection Agents
73
PHASE III – Processing the Collected Information
1. Recording – is the reduction of information into
writing or some other form of graphical representation
and the arranging of this information into groups
related items.
2. Evaluation – is the determination of the pertinence
of the information to the operation, reliability of the
source of or agency and the accuracy of the
information.
74
Evaluation to Determine
75
Judging Credibility
76
3. Interpretation – it is the determination of the
meaning and significance of the information relative to
the information and intelligence already known and
drawing deductions about probable meaning of the
evaluated information.
77
b. Integration – combining the elements
isolated in analysis and known information to form
a logical picture or theory
78
Reliability of
Information Accuracy of Information Sources
A – Completely 1 – Confirmed By Other T-Direct observation by a
Reliable Sources commander of a unit
B – Usually Reliable 2 – Probably True U-Report by a
penetration or resident
agent
C - Fairly Reliable 3 – Possibly True V-Report by an AFP
trooper or PNP
personnel in encounter
or operation
D – Not Usually 4 – Doubtfully True W-Interrogation of a
Reliable captured enemy agent or
foreigner
80
COVER AND UNDERCOVER OPERATIONS
Cover – the means by which an individual, goup or
organization conceals the true nature of its acts
and/or existence from the observer
81
TYPES OF COVER
82
FUNCTIONS OF COVER
83
Organizational Cover – an account
consisting of biographical data which
when adopted by an individual will
assume the personality he wants to
adopt
84
GUIDELINES WHEN COVER IS COMPROMISE
1. Move out immediately
2. Start new facility for operations and develop it
3. Build entirely new cover
4. Use circuitous route and provide careful counter-
surveillance
5. Be patient, build slowly and carefully
85
GUIDELINES WHEN ORGANIZATIONAL COVER IS
COMPROMISE
86
UNDERCOVER OPERATION
– an investigative technique in which the
agent conceal his official identity to obtain
information from the target organization.
87
TYPES OF UNDERCOVER ASSIGNMENT
88
3. Social Assignment – requires to frequent places
of entertainment and amusement known to be
habitually visited by the target
90
TYPES OF ACCESS
1. Primary Access – the physical access to the
desired information
92
2. Negative Control – characterized by threat
which includes:
93
b. Escrow Account – control of agent by putting
his salary in a bank to be withdrawn only after a
fulfillment of a condition
c. Blackmail
94
PROCURING DIFFERENT TYPES OF AGENT
1. Agent in Place – agent who has been recruited
by an intelligence service within a highly sensitive
target, who is just beginning a career or have been
long or insider
95
3. Expandable agent – agent whom false
information is leaked to the enemy
97
Surveillant – person conducting the surveillance
98
Decoy – a cover supporting the surveillant who can
become a convoy whenever surveillance is burned
out
100
Tailing or Shadowing – surveillance of person
101
TYPES OF SURVEILLANCE
A. According to Intensity and Sensitivity
1. Loose or Discreet – a cautious surveillance in
which the subject is unaware that he is being
followed or observed
2. Open or Rough – a surveillance with little or no
attempt of concealment. The subject is most likely
aware that he is followed.
3. Close or Tight – the subject is kept undr
constant surveillance. The aim is not to lose the
subject even at the risk of being detected.
102
B. According to Methods
1. Stationary – the surveillant is in fixed position
103
CASING OR RECONNAISANCE
104
METHODS OF SURVEILLANCE
106
OBSERVATION AND DESCRIPTION
108
ORDER OF BATTLE INTELLIGENCE (ORBAT)
It is the identification of strength, command
structure and disposition of the personnel, units
and equipment of any threat force.
109
PHYSICAL SECURITY
COMMUNICATION SECURITY
The protection resulting from the application of
measures to deny unauthorized persons from
gaining access from information of value.
110
DOCUMENT SECURITY
111
Compartmentalization – granting of access to
classified document or information only to properly
cleared persons when such classified document or
info is required in the performance of their official
duties and restricting it to specific physical confines
when feasible
113
Reclassify – act of changing the assigned
classification of a document or material
114
CATEGORIES OF CLASSIFIED MATTERS
1. Top Secret Document – record containing
information and material, the unauthorized disclosure
of which would caused exceptionally grave damage to
the nation, politically, economically or from the point
of national security. This category is reserved for the
nation’s closest secrets and is to be used with great
reserve. It is covered with legal size bond paper lined
with a 1/2-inch green border.
115
2. Secret Document – record containing information
or material, the unauthorized disclosure of which
would endanger national security, cause serious injury
to the interest and prestige of the nation or any
governmental activity or would be of great advantage
to other nation. It is covered with legal size bond paper
lined with a ½-inch red border.
116
3. Confidential Document – containing information
or materials, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the
nation or any government activity or would cause
administrative embarrassment or unwarranted injury to
the honor and dignity of an individual or would be of
advantage to foreign nation. Covered with legal size
bond paper lined with a ½-inch blue border.
117
4. Restricted Record – Information and material
which requires special protection other than that
determined to be top secret, secret or confidential.
Cover sheet is not necessary, what is important is a
bold RESTRICTED word at the top and at the bottom
of the bond paper.
118
PERSONNEL SECURITY INVESTIGATION
It is an inquiry into the character, reputation,
discretion and loyalty of an individual in order to
determine a person’s suitability or access to
classified matters prior to the granting of security
clearance
119
TYPES OF PERSONNEL SECURITY
INVESTIGATION
120
2. Local Agency Check (LAC) – inquiry sent to
local government agencies, former employers,
character references and schools where the subject
attended.
121
TWO TYPES OF B.I.
123
CRYPTOGRAPHY – the art and science of code and
ciphers. It is done through the use of telephone
scrambler or technically speaking, Speech Inverter
where speech frequencies are divided to produce a
scrambling speech when intercepted.
124
Crypto-Analyst – one who break intercepted codes
125