INTELLIGENCE
In police parlance, it is the end product resulting from
the collection, evaluation, analysis, integration and
interpretation of all available information regarding the
activities of criminals and other law violators for the
purpose of affecting their arrest, obtaining evidence,
and forestalling plan to commit crimes.
• IN MILITARY PARLANCE, IT IS THE END PRODUCT RESULTING
FROM THE COLLECTION, EVALUATION, ANALYSIS,
INTEGRATION, AND INTERPRETATION OF ALL AVAILABLE
INFORMATION WHICH MAY HAVE IMMEDIATE OR POTENTIAL
SIGNIFICANCE TO THE DEVELOPMENT AND EXECUTION OF
PLAN, POLICIES AND PROGRAMS OF THE USER.
NATIONAL INTELLIGENCE COORDINATING AGENCY (PHILIPPINES) – THE
INTELLIGENCE AGENCY IN THE PHILIPPINES UNDER THE OFFICE OF THE
NATIONAL SECURITY ADVISER
INFORMATION
• REFERS TO ALL EVALUATED MATERIALS OF EVERY DESCRIPTION
INCLUDING THOSE DERIVED FROM OBSERVATION, REPORTS, RUMORS,
IMAGERY, AND OTHER SOURCES FROM WHICH INTELLIGENCE IS PRODUCED.
TWO GENERAL CLASSIFICATIONS OF SOURCES OF INFORMATION:
• 1. OPEN SOURCES – 99% OF THE INFORMATION COLLECTED ARE COMING
FROM OPEN SOURCES.
• ENEMY ACTIVITIES
• CAPTURED DOCUMENTS
• MAP
• WEATHER FORECAST, STUDIES, REPORTS
• AGENCIES
2. CLOSE SOURCES – 1% OF INFORMATION FROM CLOSE SOURCES.
CLOSE/COVERT METHOD
SURVEILLANCE
• CASING
• ELICITATION
• SURREPTITIOUS ENTRY
• EMPLOYMENT OF TECHNICAL MEANS
• BUGGING AND TAPPING DEVICES
• TACTICAL INTERROGATION
• OBSERVATION AND DESCRIPTION
• PERSONS AS SOURCES OF INTELLIGENCE
• INFORMANT NET – A CONTROLLED GROUP OF PEOPLE WHO WORK THROUGH THE
DIRECTION OF THE AGENT HANDLER
• INFORMANT – PERSONS WHO GIVE INFORMATION TO THE POLICE VOLUNTARILY
• INFORMER – PERSONS WHO GIVE INFORMATION FOR REWARD OR PRICE
• TYPES OF INFORMANTS
1. CRIMINAL INFORMANT – AN INFORMANT WHO GIVES
INFORMATION TO THE POLICE PERTAINING TO THE
UNDERWORLD ABOUT ORGANIZED CRIMINALS WITH THE
UNDERSTANDING THAT HIS IDENTITY WILL BE PROTECTED.
2. CONFIDENTIAL INFORMANT – IS SIMILAR TO THE FORMER
BUT HE GIVES INFORMATION VIOLATE OF THE LAW TO
INCLUDES CRIMES AND CRIMINALS.
3. VOLUNTARY INFORMANT – A TYPE OF INFORMANT WHO GIVE
INFORMATION FREELY AND WILLFULLY AS A WITNESS TO A
CERTAIN ACT.
4. SPECIAL INFORMANT – THOSE WHO GIVES INFORMATION
CONCERNING SPECIALIZED CASES ONLY AND IT IS
REGARDED A SPECIAL TREATMENT BY THE OPERATIVES (EX.
TEACHERS, BUSINESSMAN)
• 5. ANONYMOUS INFORMANT – THOSE WHO GIVES INFORMATION THROUGH
TELEPHONE WITH THE HOPE THAT THE INFORMANT CANNOT BE IDENTIFIED.
• SUB-TYPE OF INFORMANT
1. INCIDENTAL INFORMANT – PERSON WHO CASUALLY IMPARTS INFORMATION TO
AN OFFICER WITH NO INTENTION OF PROVIDING SUBSEQUENT INFORMATION
2. RECRUITED INFORMANT – PERSON SELECTED, CULTIVATED AND DEVELOPED
INTO A CONTINUOUS SOURCE OF INFORMATION
• CATEGORIES OF INFORMANT
1. SPONTANEOUS INFORMANT – INFORMANT WHO BY REASON OF HIS POSITION OR
WORK HAS CERTAIN LEGAL, MORAL O ETHICAL RESPONSIBILITIES TO REPORT AN
INFO TO THE POLICE. ALSO KNOWN AS AUTOMATIC INFORMANT
2. ORDINARY (OUT-OF-THEIR-WILL) INFORMANT – INFORMANT THAT IS UNDER THE
COMPULSION TO REPOT THE INFO TO THE POLICE
3. SPECIAL EMPLOYEE – INFORMANT WHO IS OF A SPECIFIC OPERATIONAL VALUE
• FUNCTIONAL CLASSIFICATIONS OF POLICE INTELLIGENCE
1. CRIMINAL INTELLIGENCE – REFERS TO THE KNOWLEDGE ESSENTIAL TO THE
PREVENTION OF CRIMES AND THE INVESTIGATION, ARREST, AND PROSECUTION OF
CRIMINAL OFFENDERS.
2. INTERNAL SECURITY INTELLIGENCE – REFERS TO THE KNOWLEDGE ESSENTIAL TO THE
MAINTENANCE OF PEACE AND ORDER.
3. PUBLIC SAFETY INTELLIGENCE – REFERS TO THE KNOWLEDGE ESSENTIAL TO ENSURE
THE PROTECTION OF LIVES AND PROPERTIES.
• PRINCIPLES OF INTELLIGENCE
1. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT – SEPARATE AND DISTINCT
ACTIVITIES BUT COMPLIMENT EACH OTHER.
2. INTELLIGENCE REQUIRES CONTINUOUS SECURITY MEASURES – DENY UNAUTHORIZED
PERSONNEL INFORMATION ABOUT OPERATION AND INTELLIGENCE PRODUCT.
3. INTELLIGENCE MUST BE USEFUL – MUST SERVE THE COMMANDER’S NEED AND
REQUIREMENTS
4. INTELLIGENCE MUST BE TIMELY – MUST REACH THE USER IN TIME TO SERVE AS BASIS
FOR APPROPRIATE ACTION.
5. INTELLIGENCE MUST BE FLEXIBLE – BASED ON REASON AND SOUND JUDGMENT
6. INTELLIGENCE REQUIRES IMAGINATION AND FORESIGHT – AGENTS MUST BE GIVEN THE
LEEWAY TO BE RESOURCEFUL TO OBTAIN MORE THAN WHAT IS NORMALLY ACQUIRED
• BROAD CATEGORIES OF INTELLIGENCE
1. NATIONAL INTELLIGENCE – INTEGRATED PRODUCT OF INTELLIGENCE
DEVELOPED BY ALL GOVERNMENT DEPARTMENTS CONCERNING THE
BROAD ASPECT OF NATIONAL POLICY AND NATIONAL SECURITY.
A. NATIONAL POLICY – SPECIFIC COURSES OF ACTION TO ACHIEVE
THE NATIONAL OBJECTIVES.
B. NATIONAL SECURITY – THIS RELATE TO THE PROTECTION AND
PRESERVATION OF MILITARY, ECONOMIC AND A PRODUCTIVE
STRENGTH OF A COUNTRY INCLUDING THE SECURITY OF THE
GOVERNMENT AND DOMESTICS AND FOREIGN AFFAIRS AGAINST
ESPIONAGE, SABOTAGE AND SUBVERSION.
2. DEPARTMENT OF INTELLIGENCE – THE INTELLIGENCE REQUIRED BY
DEPARTMENT OR AGENCIES OF THE GOVERNMENT TO EXECUTE ITS
MISSION AND DISCHARGE ITS RESPONSIBILITIES.
3. MILITARY INTELLIGENCE – USED IN THE PREPARATION AND
EXECUTION OF TACTICAL PLANS.
• FIELDS OF POLICE INTELLIGENCE
1. STRATEGIC INTELLIGENCE – KNOWLEDGE PERTAINING TO THE
CAPABILITIES AND VULNERABILITIES OF A FOREIGN NATION, WHICH IS
REQUIRED BY THE NATIONAL PLANNERS FOR THE FORMULATION OF
AN ADEQUATE NATIONAL DEFENSE IN PEACE AND FORMS THE BASIS
FOR, PROJECTED MILITARY OPERATIONS IN TIME OF WAR.
COMPONENTS OF STRATEGIC INTELLIGENCE
A. POLITICAL INTELLIGENCE – DEALS WITH DOMESTIC AND FOREIGN
AFFAIRS AND RELATION OF GOVERNMENT OPERATIONS;
1. BASIC PRINCIPLES OF THE GOVERNMENT
2. GOVERNMENT STRUCTURES
3. PUBLIC ORDER AND SAFETY
4. SUBVERSION
5. INTELLIGENCE AND SECURITY ORGANIZATION
B. ECONOMIC INTELLIGENCE – DEALS WITH THE EXTENT AND UTILIZATION
OF NATURAL AND HUMAN RESOURCES TO THE INDUSTRIAL POTENTIAL
OF THE NATIONS.
C. TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE –
CONCERNED WITH THE OPERATIONS AND FACILITIES NOT ONLY THE
MILITARY BUT ALSO THE CIVILIANS.
D. SOCIOLOGICAL INTELLIGENCE – DEALS WITH THE DEMOGRAPHIC AND
PSYCHOLOGICAL ASPECTS OF GROUPS OF PEOPLE.
1. POPULATION AND MANPOWER
2. CHARACTERISTICS OF THE PEOPLE
3. PUBLIC OPINION – ATTITUDES OF THE MAJORITY OF THE PEOPLE
TOWARDS MATTERS OF PUBLIC POLICY.
4. EDUCATION – BASED ON LITERACY RATE
E. BIOGRAPHICAL INTELLIGENCE – DEALS WITH INDIVIDUAL
PERSONALITIES WHO HAVE ACTUAL POSSESSION OF POWER.
• F. ARMED FORCES INTELLIGENCE – DEALS WITH THE ARMED
FORCES OF THE NATION.
1. POSITION OF THE ARMED FORCES – CONSTITUTIONAL AND LEGAL
BASIS OF ITS CREATION AND ACTUAL ROLE.
2. ORGANIZATION AND STRUCTURE AND TERRITORIAL DISPOSITION
3. MILITARY MANPOWER RECRUITMENT
4. ORDER OF BATTLE
G. GEOGRAPHICAL INTELLIGENCE – DEALS WITH THE NATURAL AS
WELL AS MAN MADE FEATURES OF THE PHYSICAL ENVIRONMENT OF
MAN CONSIDERED FROM THE POINT IN VIEW OF MILITARY
OPERATIONS.
1. LOCATION – MILITARY AND ECONOMIC IMPORTANCE
2. SIZE – MEASUREMENT OF WHICH A NATION CAN EXCHANGE SPACE
OR TIME DURING WAR.
3. SHAPE
4. WEATHER AND CLIMATE
H. SCIENTIFIC INTELLIGENCE – DEALS WITH THE PROGRESS OF
THE RESEARCH AND DEVELOPMENT AS IT AFFECTS THE
ECONOMIC AND MILITARY POTENTIAL OF A NATION.
2. LINE INTELLIGENCE (TACTICAL AND COMBAT) – IS THE
INTELLIGENCE REQUIRED BY THE COMMANDER TO PROVIDE
FOR PLANNING AND CONDUCT OF TACTICAL OPERATION.
- KNOWLEDGE OF THE PEOPLE, WEATHER, ENEMY, AND TERRAIN
(PWET) – USED IN PLANNING AND CONDUCTING TACTICAL AND
ADMINISTRATIVE OPERATION IN A COUNTER INSURGENCY.
• WHAT ARE THE INTELLIGENCE INFORMATION TO BE DETERMINED IN
LINE INTELLIGENCE?
• PEOPLE
• LIVING CONDITION OF THE PEOPLE
• SOURCES OF INCOME
• EDUCATION OF THE PEOPLE
• GOVERNMENT LIVELIHOOD OF THE PEOPLE
• EXTENT OF ENEMY INFLUENCE TO THE PEOPLE
• WEATHER
• VISIBILITY
• CLOUDY
• TEMPERATURE
• PRECIPITATION(RAIN)
• WIND
• ENEMY
• LOCATION OF THE ENEMY
• STRENGTH OF THE ENEMY
• DISPOSITION
• TACTICAL CAPABILITY
• ENEMY VULNERABILITY
• TERRAIN
• RELIEF AND DRAINAGE SYSTEM
• VEGETATION
• SURFACE MATERIAL
• MAN MADE FEATURES
• 3. COUNTERINTELLIGENCE – PHASE OF INTELLIGENCE
COVERING THE ACTIVITY DEVOTED IN DESTROYING THE
EFFECTIVENESS OF HOSTILE FOREIGN ACTIVITIES AND THE
PROTECTION OF INFORMATION AGAINST ESPIONAGE,
SUBVERSION AND SABOTAGE.
• THREE ACTIVITY OF COUNTERINTELLIGENCE
• 1. PROTECTION OF INFORMATION AGAINST ESPIONAGE
• 2. PROTECTION OF PERSONNEL AGAINST SUBVERSION
• 3. PROTECTION OF INSTALLATIONS AND MATERIALS AGAINST
SABOTAGE
Espionage is defined as the offense of gathering, transmitting, or
losing information respecting the national defense with intent or
reason to believe that the information is to be used to the injury of
the Republic of the Philippines or to the advantage of any foreign
nation
Subversive activity refers to a series of actions that are planned to
overthrow a government by using illegal or violent means.
Examples: A group of rebels planning to attack a government
building to take control of the country.
Sabotage is deliberately destroy, damage, or obstruct
(something), especially for political or military
advantage.
TWO GENERAL TYPES OF COUNTERINTELLIGENCE
1. PASSIVE MEASURES – ARE THOSE MEASURES, WHICH SEEK TO CONCEAL
INFORMATION FROM THE ENEMY.
2. ACTIVE MEASURES – ARE THOSE MEASURES, WHICH SEEK ACTIVELY TO
BLOCK THE ENEMIES’ EFFORT TO GAIN INFORMATION OR ENGAGE IN
ESPIONAGE, SUBVERSION, AND SABOTAGE.
FIVE CATEGORIES OF COUNTERINTELLIGENCE OPERATION
1. MILITARY SECURITY – IT ENCOMPASSES THE MEASURES TAKEN BY A
COMMAND TO PROTECT ITSELF AGAINST ESPIONAGE, ENEMY OPERATION,
SABOTAGE, SUBVERSION OR SURPRISE.
2. PORT FRONTIER AND TRAVEL SECURITY – HAS TO DO WITH THE APPLICATION
OF BOTH MILITARY AND CIVIL SECURITY MEASURES FOR
COUNTERINTELLIGENCE CONTROL AT POINT OF ENTRY AND DEPARTURE,
INTERNATIONAL BORDERS AND BOUNDARIES.
3. CIVIL SECURITY – IT ENCOMPASSES ACTIVE AND PASSIVE
COUNTERINTELLIGENCE MEASURES AFFECTING THE NON-MILITARY
NATIONALS PERMANENTLY OR TEMPORARILY RESIDING IN AN AREA UNDER
MILITARY JURISDICTION.
4. CENSORSHIP – IT IS THE CONTROL AND EXAMINATION OF THE
FOLLOWING;
A. CIVIL
B. NATIONAL
C. ARMED FORCES
D. FIELD PRESS
E. POW
COUNTERINTELLIGENCE INVESTIGATION – IS AN ACTIVITY WHICH
CONSTITUTES THE VALUE OF THE COUNTERINTELLIGENCE
WORKLOAD, WORLDWIDE AND INCLUDES SPECIFIC INVESTIGATION
OF INDIVIDUAL AND INCIDENCE, WHICH FOR THE MOST PART ARE
CONDUCTED IN AN OVERT BUT DISCREET MANNER.
THREE CATEGORIES OF COUNTERINTELLIGENCE MEASURES
1. DENIAL MEASURES – SECRECY DISCIPLINE, DOCUMENT
SECURITY, CAMOUFLAGE AND CONCEALMENT,
COMMUNICATION SECURITY, MILITARY CENSORSHIP, COUNTER
RECONNAISSANCE EFFORT
2. DETECTION MEASURES – SECURITY TAG OR PASS CARD,
CHALLENGE OR PASSWORD, RECONNAISSANCE
3. DECEPTION MEASURES – RUSE – USE OF ESCAPE AND
EVASION, DUMMY POSITION, FABRICATED INFORMATION
THE INTELLIGENCE CYCLE
INTELLIGENCE CYCLE – THE PROCESS THROUGH WHICH
INTELLIGENCE IS OBTAINED, PRODUCED AND MADE AVAILABLE TO
USERS.
PHASE I – PLANNING THE COLLECTION EFFORT – IT INVOLVES THE
DETERMINATION OF THE REQUIREMENTS OF INTELLIGENCE
OPERATION
1. DETERMINATION OF REQUIREMENTS
A. ENEMY CAPABILITIES, INCLUDING TIME, PLACE, STRENGTH, OR
OTHER DETAILS
B. ENEMY VULNERABILITIES, INCLUDING NATURE, EXTENT,
PERFORMANCE AND OTHER DETAILS
C. ENEMY ORDER OF BATTLE AND FACTORS
D. TERRAIN, INCLUDING NATURAL AND ARTIFICIAL OBSTACLES
E. WEATHER
F. INFORMATION DESIRED BY HIGHER, LOWER OR ADJACENT
HEADQUARTERS
2. DETERMINATION OF THE ESSENTIAL ELEMENTS OF INFORMATION
ESSENTIAL ELEMENT OF INFORMATION – AN ITEM OF INFORMATION OF
THE CHARACTERISTICS OF THE AREA OF OPERATIONS AND THE
ENEMY WHICH THE COMMANDER FEELS HE NEEDS BEFORE HE CAN
REASONABLY ARRIVE AT A DECISION.
3. ESTABLISHMENT OF PRIORITIES
PRIORITIES – REFLECT THE CRITICALITY OF THE NEED FOR THE
PARTICULAR INFORMATION. NO FORMULA EXISTS WHICH CAN
AUTOMATICALLY DETERMINE PRIORITIES. SUCH DETERMINATION IS A
MATTER OF JUDGMENT.
PHASE II – COLLECTION OF INFORMATION
A. DETERMINE COLLECTING AGENCY
B. SEND ORDERS OR REQUEST
C. SUPERVISE COLLECTION EFFORTS
D. USE TOOLS OR TECHNIQUE IN COLLECTION
E. ENSURE TIMELY COLLECTION
FACTORS IN CHOOSING COLLECTION AGENTS
1. CAPABILITY – AGENT’S PLACEMENT OR ACCESS TO THE TARGET
2. MULTIPLICITY – MORE AGENTS
3. BALANCE – THE NUMBER OF AGENTS NEEDED IN THE OPERATION
PHASE III – PROCESSING THE COLLECTED INFORMATION
1. RECORDING – IS THE REDUCTION OF INFORMATION INTO WRITING OR SOME
OTHER FORM OF GRAPHICAL REPRESENTATION AND THE ARRANGING OF THIS
INFORMATION INTO GROUPS RELATED ITEMS.
2. EVALUATION – IS THE DETERMINATION OF THE PERTINENCE OF THE
INFORMATION TO THE OPERATION, RELIABILITY OF THE SOURCE OF OR AGENCY
AND THE ACCURACY OF THE INFORMATION.
EVALUATION TO DETERMINE
A. PERTINENCE – DOES IT HOLDS SOME VALUE TO CURRENT
OPERATION IS IT NEEDED IMMEDIATELY
B. RELIABILITY – JUDGING THE SOURCE OF INFORMATION OR
AGENCY
C. CREDIBILITY – TRUTH OF INFORMATION
JUDGING CREDIBILITY
A. IT IS POSSIBLE FOR THE REPORTED FACT OR EVENT TO HAVE
TAKEN PLACE?
B. IS THE REPORT CONSISTENT WITHIN ITSELF?
C. IS THE REPORT CONFIRMED OR CORROBORATED BY
INFORMATION FROM DIFFERENT SOURCES OR AGENCIES?
D. IF THE REPORT DOES NOT AGREE WITH INFORMATION FROM
OTHER SOURCES WHICH ONE IS MORE LIKELY TO BE TRUE?
3. INTERPRETATION – IT IS THE DETERMINATION OF THE MEANING
AND SIGNIFICANCE OF THE INFORMATION RELATIVE TO THE
INFORMATION AND INTELLIGENCE ALREADY KNOWN AND
DRAWING DEDUCTIONS ABOUT PROBABLE MEANING OF THE
EVALUATED INFORMATION.
A. ASSESSMENT – SHIFTING AND ISOLATING THOSE ELEMENTS
THE HAVE SIGNIFICANCE IN THE LIGHT OF THE MISSION OR
OBJECTIVE
B. INTEGRATION – COMBINING THE ELEMENTS ISOLATED IN
ANALYSIS AND KNOWN INFORMATION TO FORM A LOGICAL
PICTURE OR THEORY
C. DEDUCTION – THE FORMULATION OF CONCLUSIONS FROM THE
THEORY DEVELOPED, TESTED AND CONSIDERED VALID IN
DETERMINATION OF EFFORT AND MEANING OF THE INFORMATION
Reliability of Accuracy of Information Sources of Information
Information
A – Completely Reliable 1 – Confirmed By Other T-Direct observation by a
Sources commander of a unit
B – Usually Reliable 2 – Probably True U-Report by a penetration or resident
agent
C - Fairly Reliable 3 – Possibly True V-Report by an AFP trooper
or PNP personnel in
encounter or operation
W-Interrogation of a captured enemy
D – Not Usually Reliable 4 – Doubtfully True
agent or foreigner
E – Unreliable 5 – Improbable X-Observation by a
government or civilian
employee or official
F – Reliability Cannot Be 6 – Truth Cannot Be Judged Y-Observation by a
Judged member of populace
Z-Documentary
PHASE IV – DISSEMINATION AND USE OF INFORMATION
1. TIMELINESS – INTELLIGENCE MUST REACH THE USERS ON TIME TO BE
OF VALUE.
2. PROPRIETY – THE MESSAGE MUST BE CLEAR, CONCISE AND COMPLETE
AND MUST BE IN THE PROPER FORM FOR THE RECEIVER TO BE READILY
UNDERSTANDABLE
TOOLS FOR RECORDING INFORMATION
1. INTELLIGENCE JOURNAL – PERMANENT OFFICIAL CHRONOLOGICAL
RECORD OF THE OPERATIONS OF THE INTELLIGENCE SECTION, UNIT OR
AGENCY. INCLUDES ALL INCOMING AND OUTGOING MESSAGES
2. INTELLIGENCE WORKBOOK – A DEVICE THAT PROVIDES A MEANS OF
SYSTEMATIC ARRANGEMENT OF INFORMATION BY TYPE OR SUBJECT
FOR PARTICULAR TOPIC ARE GROUP TOGETHER
3. SITUATION MAP – GRAPHIC REPRESENTATION OF THE CURRENT ENEMY
SITUATION
COVER AND UNDERCOVER OPERATIONS
COVER – THE MEANS BY WHICH AN INDIVIDUAL, GROUP OR ORGANIZATION
CONCEALS THE TRUE NATURE OF ITS ACTS AND/OR EXISTENCE FROM THE
OBSERVER
COVER STORY – A BIOGRAPHIC ACCOUNT, TRUE OR FICTITIOUS THAT WILL
PORTRAY THE PERSONALITY OF THE AGENT HE ASSUMED, A SCENARIO TO
COVER UP THE OPERATION.
TYPES OF COVER
1. NATURAL COVER – USING ACTUAL OR TRUE BACKGROUND
2. ARTIFICIAL COVER – COVER USING BIOGRAPHICAL DATA ADOPTED FOR
SUCH PURPOSE
3. COVER WITHIN A COVER – USE OF SECONDARY COVER IN CASE OF
COMPROMISE FOR JUSTIFICATION OF EXISTENCE
4. MULTIPLE COVER – ANY COVER WISHED
FUNCTIONS OF COVER
1. OFFENSIVE – GIVES ACCESS TO THE TARGET AND
FACILITATES THE ACHIEVEMENT OF CLANDESTINE
OBJECTIVE
2. DEFENSIVE – SERVES TO PREVENT DETECTION
ORGANIZATIONAL COVER – AN ACCOUNT CONSISTING
OF BIOGRAPHICAL DATA WHICH WHEN ADOPTED BY
AN INDIVIDUAL WILL ASSUME THE PERSONALITY HE
WANTS TO ADOPT
GUIDELINES WHEN ORGANIZATIONAL COVER IS
COMPROMISE
1. MAKE A PHYSICAL MOVE OR RELOCATE
2. START NEW FACILITY AND LET IT GROW
3. USE NEW PERSONNEL
4. LET OLD PERSONNEL REMAIN IN PLACE
5. BUILD ENTIRELY NEW COVER IDENTITY
UNDERCOVER OPERATION – AN INVESTIGATIVE
TECHNIQUE IN WHICH THE AGENT CONCEAL HIS
OFFICIAL IDENTITY TO OBTAIN INFORMATION FROM
THE TARGET ORGANIZATION
TYPES OF UNDERCOVER ASSIGNMENT
1. DWELLING – ONE IN WHICH THE AGENT ESTABLISHES RESIDENCE
IN OR NEAR THE DWELLING WHICH HOUSES THE SUBJECT
2. WORK ASSIGNMENT – PLACES THE UNDERCOVER AGENT IN A TYPE
OF EMPLOYMENT WHERE HE CAN OBSERVE THE ACTIVITIES OF THE
TARGET
3. SOCIAL ASSIGNMENT – REQUIRES TO FREQUENT PLACES OF
ENTERTAINMENT AND AMUSEMENT KNOWN TO BE HABITUALLY
VISITED BY THE TARGET
4. MULTIPLE ASSIGNMENT – AGENT IS GIVEN THE TASK OF COVERING
TWO OR MORE OF THE ABOVE SPECIFIC ASSIGNMENTS
SIMULTANEOUSLY
5. PERSONAL CONTACT ASSIGNMENT OR ROPE JOB –AGENT IS
REQUIRED TO DEVELOP FRIENDSHIP AND TRUST WITH THE TARGET
FOR PURPOSES OF OBTAINING INFORMATION OR EVIDENCE
METHODS OF UNDERCOVER OPERATIONS
1. DIRECT – EMPLOYMENT AND UTILIZATION OF SPECIAL AGENTS
2. INDIRECT – EMPLOYMENT AND UTILIZATION OF CONTROLLED INFORMANTS
SELECTING ACTION AGENTS
1. PLACEMENT – LOCATION OF PROSPECTIVE AGENT WITH RESPECT TO THE
TARGET
2. ACCESS – THE CAPABILITY OF A PROSPECTIVE AGENT TO OBTAIN THE DESIRED
INFORMATION
TYPES OF ACCESS
1. PRIMARY ACCESS – THE PHYSICAL ACCESS TO THE DESIRED INFORMATION
2. SECONDARY ACCESS – THE ACCESS TO THE DESIRED INFORMATION THROUGH
A PRINCIPAL SOURCE WHERE THE AGENT HAS DIRECT ACCESS
3. OUTSIDE ACCESS – AGENT EMPLOYED OUTSIDE TARGET AND MERELY
MONITOR INFORMATION FROM A THIRD PERSON WHO IS MONITORING INFO IN
THE AREA
CONTROL – IS THE AUTHORITY TO DIRECT THE AGENT TO CARRY OUT
TASK OR REQUIREMENT ON BEHALF OF THE CLANDESTINE
ORGANIZATION IN AN ACCEPTABLE MANNER AND SECURITY
TWO CATEGORIES OF CONTROL
1. POSITIVE CONTROL – CHARACTERIZED BY PROFESSIONALISM AND
RAPPORT LIKE AGENT MOTIVATION OR PSYCHOLOGICAL CONTROL
2. NEGATIVE CONTROL – CHARACTERIZED BY THREAT WHICH INCLUDES:
A. DISCIPLINARY ACTION – INCLUDES VERBAL REPRIMAND FOR POOR
PERFORMANCE OR INSECURE ACTIONS OF WITHHOLDING CERTAIN
REWARDS, REDUCTION OF AGENTS, SALARY OR THREAT OF
TERMINATING PROFESSIONAL RELATIONSHIP
B. ESCROW ACCOUNT – CONTROL OF AGENT BY PUTTING HIS SALARY
IN A BANK TO BE WITHDRAWN ONLY AFTER A FULFILLMENT OF A
CONDITION
C. BLACKMAIL
PROCURING DIFFERENT TYPES OF AGENT
1. AGENT IN PLACE – AGENT WHO HAS BEEN RECRUITED BY AN
INTELLIGENCE SERVICE WITHIN A HIGHLY SENSITIVE TARGET, WHO
IS JUST BEGINNING A CAREER OR HAVE BEEN LONG OR INSIDER
2. DOUBLE AGENT – AN ENEMY AGENT WHO HAS BEEN CAPTURED,
TURNED AROUND AS AN AGENT OF HIS CAPTOR
3. EXPANDABLE AGENT – AGENT WHOM FALSE INFORMATION IS
LEAKED TO THE ENEMY
4. PENETRATION AGENT – AGENT WHO REACHED THE ENEMY GETS
INFORMATION AND MANAGE TO GET BACK ALIVE
5. AGENT OF INFLUENCE – AGENT WHO USES INFLUENCE TO GAIN
INFORMATION
6. AGENT OF PROVOCATION – AGENT WHO PROVOKE THE ENEMY TO
GET INFORMATION
SURVEILLANCE
IT IS A FORM OF CLANDESTINE INVESTIGATION WHICH
CONSISTS OF KEEPING PERSONS, PLACE OR OTHER TARGETS
UNDER PHYSICAL OBSERVATION IN ORDER TO OBTAIN EVIDENCE
OR INFORMATION PERTINENT TO AN INVESTIGATION
IMPORTANT TERMS
• SURVEILLANT – PERSON CONDUCTING THE SURVEILLANCE
• SUBJECT – A PARTY UNDER OBSERVATION OR SURVEILLANCE
• STAKEOUT – THE SURVEILLANT REMAINS IN ONE OR FIXED
POSITION OR LOCALE. ALSO CALLED PLANT OR FIXED
SURVEILLANMCE
• CONVOY – A COUNTERMEASURE TO DETECT OR ELUDE
SURVEILLANCE
• DECOY – A COVER SUPPORTING THE SURVEILLANT WHO CAN
BECOME A CONVOY WHENEVER SURVEILLANCE IS BURNED OUT
• DROP – ANY CONVENIENT, SECURE AND UNSUSPECTING PLACE
WHERE POLICE UNDERCOVER MAN MEET HIS ACTION AGENT FOR
DEBRIEFING OR REPORTING PURPOSES
• CONTACT – ANY PERSON WHOM THE SUBJECT PICKS OR DEALS
WITH WHILE HE IS UNDER OBSERVATION AND IDENTIFIES THE
OBSERVER
• MUSTARD PLASTER – THE SUBJECT IS FOLLOWED SO CLOSELY THAT
SURVEILLANT AND SUBJECT ARE ALMOST IN LOCK STEP.. IT IS
TANTAMOUNT TO PROTECTIVE CUSTODY
• TAILGAITING – OPEN SURVEILLANCE IN WHICH THE SUBEJECT’S
VEHICLE IS CLOSELY FOLLOWED
• TAILING OR SHADOWING – SURVEILLANCE OF PERSON
• CASING OR RECONNAISSANCE – SURVEILLANCE OF PLACE
• ROPING – SURVEILLANCE OF EVENTS, ACTIVITIES OR OTHER THINGS
• TYPES OF SURVEILLANCE
A. ACCORDING TO INTENSITY AND SENSITIVITY
1. LOOSE OR DISCREET – A CAUTIOUS SURVEILLANCE IN WHICH
THE SUBJECT IS UNAWARE THAT HE IS BEING FOLLOWED OR
OBSERVED
2. OPEN OR ROUGH – A SURVEILLANCE WITH LITTLE OR NO
ATTEMPT OF CONCEALMENT. THE SUBJECT IS MOST LIKELY
AWARE THAT HE IS FOLLOWED.
3. CLOSE OR TIGHT – THE SUBJECT IS KEPT UNDER CONSTANT
SURVEILLANCE. THE AIM IS NOT TO LOSE THE SUBJECT EVEN AT
THE RISK OF BEING DETECTED.
B. ACCORDING TO METHODS
1. STATIONARY – THE SURVEILLANT IS IN FIXED POSITION
2. MOVING – THE SURVEILLANT FOLLOW THE SUBJECT FROM
PLACE TO PLACE TO MAINTAIN CONTINUOUS WATCH
3. TECHNICAL – SURVEILLANCE WITH THE USE OF ELECTRONIC
GADGETS, EQUIPMENTS OR SYSTEMS
• CASING OR RECONNAISANCE
CASING IS THE TERM USED IN THE POLICE ORGANIZATION
WHILE RECONNAISSANCE IS THE TERM USED IN THE MILITARY. IT IS
THE VISUAL INSPECTION OF AN AREA, INSTALLATION OR BUILDING TO
DETERMINE ITS SUITABILITY FOR OPERATIONAL ACTIVITIES.
• TWO TYPES OF CASING
1. EXTERIOR CASING – OBSERVATION OF THE WHOLE AREA, BUILDING
OR INSTALLATION, POSSIBLE EXITS AND APPROACHES AND THE TYPE
VICINITY
2. INTERIOR – CLOSE OBSERVATION OF THE LAYOUT OF THE BUILDING.
INCLUDES ITEM THAT CAN BE OBSERVED A BUILDING WHICH ARE OF
INTELLIGENCE VALUE
• METHODS OF CASING
1. PERSONAL RECONNAISSANCE – THE MOST EFFECTIVE
METHOD AND WILL PRODUCE THE MOST INFORMATION
2. MAP RECONNAISSANCE – IT MAY NOT BE SUFFICIENT BUT MAY
PRODUCE A CERTAIN AMOUNT OF INFORMATION
3. RESEARCH – SOMETIMES ADDITIONAL INFO CAN BE GATHERED
THROUGH RESEARCH
4. PRIOR INFORMATION – INFORMATION FROM RECORDS OF FILE
5. HEARSAY – INFO USUALLY GAIN BY OPERATING PERSONNEL
• TAILING METHODS
A. ONE-MAN TAILING – MOST DIFFICULT METHOD WHICH MUST BE
A CLOSE ONE OTHERWISE THE PERSON BEING FOLLOWED WILL
BE LOST
B. LEAPFROG METHOD – ONE MEMBER OF THE TEAM MAINTAINS
CONTACT WITH THE SUBJECT. THE OTHER MEMBERS OF THE
TEAM KEEP CONTACT WITH THOSE IMMEDIATELY AHEAD OF
THEM.
C. GROUP METHOD – INVOLVES SEVERAL MEN, EACH MAN
MAINTAINS CONTACT WITH THE SUBJECT. ONE MAY BE ABREAST
OF THE SUBJECT AND OTHERS IN SIMILAR POSITION. IN ORDER
NOT TO PREVENT DISCOVERY, SUCH POSITIONS MAY BE
EXCHANGE BETWEEN MEMBERS OF THE GROUP.
• OBSERVATION AND DESCRIPTION
OBSERVATION – ENCOMPASSES THE USE OF ALL THE MAJOR
SENSES TO REGISTER AND RECOGNIZE THE SIGNIFICANCE OF
GIVEN OPERATION
DESCRIPTION – ACTUAL AND FACTUAL REPORTING OF ONE’S
OBSERVATION
• 85% OF KNOWLEDGE GATHERED THROUGH SIGHT
• 13% GATHERED THROUGH HEARING
• 2% GATHERED THROUGH THREE OTHER SENSES
• DO’S AND DON’TS IN SURVEILLANCE
1. DO NOT MAKE ABRUPT OR UNNATURAL MOVEMENT
2. DO NOT MAKE USE OF DISGUISE THAT WILL ATTRACT
ATTENTION
3. NEVER STARE AT THE SUBJECT
4. NEVER SPEAK TO OTHER SURVEILLANT UNLESS ABSOLUTELY
NECESSARY
5. PLAN AHEAD AND BE AWARE ON CHANGES OF ACTION
6. TAKE DOWN NOTES SAFELY
7. MAKE USE OF STREET FURNITURE
8. RETRACE THE STEP OF THE SUBJECT IN CASE THE LATTER
TURN AROUND DURING SHADOWING
ELICITATION
A SYSTEM IN WHICH INFORMATION OF VALUE IS
OBTAINED THROUGH THE PROCESS OF DIRECT
COMMUNICATION IN WHICH ONE OR MORE OF THE PARTIES IS
UNAWARE OF THE SPECIFIC PURPOSE OF THE CONVERSATION.
• ORDER OF BATTLE INTELLIGENCE (ORBAT)
IT IS THE IDENTIFICATION OF STRENGTH, COMMAND
STRUCTURE AND DISPOSITION OF THE PERSONNEL, UNITS AND
EQUIPMENT OF ANY THREAT FORCE.
• PHYSICAL SECURITY
THE SYSTEM OF PLACING BARRIER BETWEEN THE
POTENTIAL INTRUDER AND THE MATERIAL BEING PROTECTED
• COMMUNICATION SECURITY
THE PROTECTION RESULTING FROM THE APPLICATION OF MEASURES TO
DENY UNAUTHORIZED PERSONS FROM GAINING ACCESS FROM INFORMATION OF
VALUE
• DOCUMENT SECURITY
DOCUMENT IS ANY RECORDED INFORMATION REGARDLESS OF ITS
PHYSICAL FORM OR CHARACTERISTICS.
• CLASSIFIED MATTER – INFORMATION OR MATTER IN ANY FORM OR NATURE, THE
SAFEGUARDING OF WHICH IS NECESSARY IN THE INTEREST OF NATIONAL
SECURITY.
• COMPARTMENTALIZATION – GRANTING OF ACCESS TO CLASSIFIED DOCUMENT
OR INFORMATION ONLY TO PROPERLY CLEARED PERSONS WHEN SUCH
CLASSIFIED DOCUMENT OR INFO IS REQUIRED IN THE PERFORMANCE OF THEIR
OFFICIAL DUTIES AND RESTRICTING IT TO SPECIFIC PHYSICAL CONFINES WHEN
FEASIBLE
• NEED-TO-KNOW – THE TERM GIVEN TO THE REQUIREMENT THAT THE DISSEMINATION OF
CLASSIFIED MATTERS BE LIMITED STRICTLY TO THOSE PERSONS WHOSE OFFICIAL DUTY
REQUIRES POSSESSION THEROF.
• COMPROMISE – LOSE OF SECURITY RESULTING TO UNAUTHORIZED PERSON OBTAINING
KNOWLEDGE ON CLASSIFIED MATTER
• CLASSIFY – THE ASSIGNING OF INFORMATION OR MATERIAL TO ONE OR OF THE FOUR
SECURITY CLASSIFICATION CATEGORIES.
• UPGRADING – THE CHANGING OF CLASSIFIED MATTER TO A CATEGORIES HIGHER THAN
THE PREVIOUSLY ASSIGNED TO IT
• RECLASSIFY – ACT OF CHANGING THE ASSIGNED CLASSIFICATION OF A DOCUMENT OR
MATERIAL
• DECLASSIFY – REMOVAL OF THE SECURITY CLASSIFICATION FROM DOCUMENT OR
MATERIAL.
• CATEGORIES OF CLASSIFIED MATTERS
1. TOP SECRET DOCUMENT – RECORD CONTAINING INFORMATION
AND MATERIAL, THE UNAUTHORIZED DISCLOSURE OF WHICH
WOULD CAUSED EXCEPTIONALLY GRAVE DAMAGE TO THE
NATION, POLITICALLY, ECONOMICALLY OR FROM THE POINT OF
NATIONAL SECURITY. THIS CATEGORY IS RESERVED FOR THE
NATION’S CLOSEST SECRETS AND IS TO BE USED WITH GREAT
RESERVE. IT IS COVERED WITH LEGAL SIZE BOND PAPER LINED
WITH A 1/2-INCH GREEN BORDER.
2. SECRET DOCUMENT – RECORD CONTAINING INFORMATION OR
MATERIAL, THE UNAUTHORIZED DISCLOSURE OF WHICH WOULD
ENDANGER NATIONAL SECURITY, CAUSE SERIOUS INJURY TO THE
INTEREST AND PRESTIGE OF THE NATION OR ANY
GOVERNMENTAL ACTIVITY OR WOULD BE OF GREAT ADVANTAGE
TO OTHER NATION. IT IS COVERED WITH LEGAL SIZE BOND PAPER
LINED WITH A ½-INCH RED BORDER.
3. CONFIDENTIAL DOCUMENT – CONTAINING INFORMATION OR
MATERIALS, THE UNAUTHORIZED DISCLOSURE OF WHICH
WOULD BE PREJUDICIAL TO THE INTEREST OR PRESTIGE OF
THE NATION OR ANY GOVERNMENT ACTIVITY OR WOULD CAUSE
ADMINISTRATIVE EMBARRASSMENT OR UNWARRANTED INJURY
TO THE HONOR AND DIGNITY OF AN INDIVIDUAL OR WOULD BE
OF ADVANTAGE TO FOREIGN NATION. COVERED WITH LEGAL
SIZE BOND PAPER LINED WITH A ½-INCH BLUE BORDER
4. RESTRICTED RECORD – INFORMATION AND MATERIAL WHICH
REQUIRES SPECIAL PROTECTION OTHER THAN THAT
DETERMINED TO BE TOP SECRET, SECRET OR CONFIDENTIAL.
COVER SHEET IS NOT NECESSARY, WHAT IS IMPORTANT IS A
BOLD RESTRICTED WORD AT THE TOP AND AT THE BOTTOM OF
THE BOND PAPER.
• PERSONNEL SECURITY INVESTIGATION
IT IS AN INQUIRY INTO THE CHARACTER, REPUTATION, DISCRETION AND
LOYALTY OF AN INDIVIDUAL IN ORDER TO DETERMINE A PERSON’S SUITABILITY
OR ACCESS TO CLASSIFIED MATTERS PRIOR TO THE GRANTING OF SECURITY
CLEARANCE
• TYPES OF PERSONNEL SECURITY INVESTIGATION
1. NATIONAL AGENCY CHECK (NAC) – INVESTIGATION OF AN INDIVIDUAL MADE ON
THE BASIS OF WRITTEN INFORMATION SUPPLIED BUY HIM IN RESPONSE TO AN
OFFICIAL INQUIRY. IT IS SIMPLY A CHECK NO THE FILES AND RECORDS OF
NATIONAL AGENCIES
2. LOCAL AGENCY CHECK (LAC) – INQUIRY SENT TO LOCAL GOVERNMENT
AGENCIES, FORMER EMPLOYERS, CHARACTER REFERENCES AND SCHOOLS
WHERE THE SUBJECT ATTENDED.
3. BACKGROUND INVESTIGATION (BI) – MORE COMPREHENSIVE THAN LAC OR
NAC.
• TWO TYPES OF B.I.
1. COMPLETE BACKGROUND INVESTIGATION (CBI) – IT CONSISTS
OF THE THOROUGH AND COMPLETE INVESTIGATION OF THE
BACKGROUND OF THE SUBJECT INCLUDING ALL THE
CIRCUMSTANCES OF HIS LIFE.
2. PARTIAL BACKGROUND INVESTIGATION (PBI) – INVESTIGATION
OF THE BACKGROUND OF THE SUBJECT BUT LIMITED ONLY TO
CIRCUMSTANCES OF HIS PERSONAL LIFE WHICH ARE DEEMED
PERTINENT TO AN INVESTIGATION.
• SECURITY CLEARANCE – ADMINISTRATIVE DETERMINATION
FROM A SECURITY STANDPOINT THAT AN INDIVIDUAL IS
ELIGIBLE FOR ACCESS TO CLASSIFIED MATTER
• TYPES OF CLEARANCE
1. SECURITY CLEARANCE – A CERTIFICATION ISSUED BY THE PROPER
AUTHORITY THAT THE PERSON DESCRIBED HAS AN ACCESS TO
CLASSIFIED MATTER AT THE APPROPRIATE LEVEL.
2. DIRECTED CLEARANCE – A CLEARANCE GRANTED FOR A SPECIFIC
PURPOSE UPON COMPLETION OF PRESCRIBED RECORDS CHECK OR
BACKGROUND CHECK
• CRYPTOGRAPHY – THE ART AND SCIENCE OF CODE AND CIPHERS. IT IS
DONE THROUGH THE USE OF TELEPHONE SCRAMBLER OR TECHNICALLY
SPEAKING, SPEECH INVERTER WHERE SPEECH FREQUENCIES ARE
DIVIDED TO PRODUCE A SCRAMBLING SPEECH WHEN INTERCEPTED.
• CRYPTOGRAPHER – PERSON SKILLED IN CONVERTING MESSAGES FROM
CLEAR TO UNINTELLIGIBLE FORMS BY THE USE OF CODES AND CIPHERS.
ALSO KNOWN AS CODER, ENCRYPTER OR CODE CLERK.
• CRYPTO-ANALYST
– ONE WHO BREAK INTERCEPTED CODES
• CODING
– CHANGING OF MESSAGE FROM PLAIN CLEAR TEXT TO
UNINTELLIGIBLE FORM. ALSO KNOWN AS ENCRYPTING.
• DECODING
– TRANSFORMING OF CODED MESSAGE INTO PLAIN
TEXT. ALSO KNOWN AS DECRYPTING.