COLLECTES, AND
TECHNIQUES OF
PRESERVING, AND
PROCESSING OF
INFORMATION
LEARNING
AT THE END OF THIS OUTCOMES:
CHAPTER, THE STUDENTS SHOULD
BE ABLE TO:
1. DISPLAY UNDERSTANDING OF TYPES AND PROCESS OF
INTELLIGENCE;
2. RECOGNIZE THE METHODS AND TECHNIQUES OF
GATHERING INFORMATION;
3. IDENTIFY THE CLASSIFY AND ACCESS OF
INFORMATION
INTRODUCTION
THE WORD INTELLIGENCE DESCRIBES THE MANNER OF
INTERPRETING INFORMATION TO GENERATE MEANING IT
IS ALSO USED TO REFER TO OR DESCRIBE A GROUP OR
A DEPARTMENT WHICH GATHERS SUCH INFORMATION
OR THE PRODUCT ITSELF OF SUCH ACTIVITY.
INTELLIGENCE IS USUALLY
DIVIDED IN TWO MAIN AREAS:
A. STRATEGIC INTELLIGENCE:- THIS
FOCUSES ON THE LONG-TERM AIMS
OF LAW ENFORCEMENT AGENCIES.
B. OPERATIONAL INTELLIGENCE:
- THIS TYPE OF INTELLIGENCE
PROVIDES THE INVESTIGATIVE
TEAM WITH HYPOTHESES AND
INFERENCES ON SPECIFIC
ELEMENTS OF ILLEGAL
OPERATIONS OF ANY SORT.
EXAMPLES OF INTELLIGENCE
UNITS:
EXAMPLES OF INTELLIGENCE UNITS:
1. CENTRAL INTELLIGENCE AGENCY (CIA) - THE MILITARY INTELLIGENCE
AGENCY OF UNITED STATES OF AMERICA AND IS ENGAGED IN MANY
UNDERCOVER ACTIVITIES THROUGHOUT THE WORLD.
2. KOMITET GUSODARSTEVENOY BEZOPASNOSTI (KGB) – KGB IS THE
INTELLIGENCE AGENCY OF RUSSIA.
3. MOSSAD MERKAZI LE-MODIIN U-LETAFRIDIM M-
EYUDIM (MOSSAD) - THE "CENTRAL INSTITUTE FOR
INTELLIGENCE AND SECURITY" IN ISRAEL.
4. SECRET INTELLIGENCE SERVICE (SIS)- GREAT
BRITAIN'S INTELLIGENCE AGENCY AND KNOWN BY ITS
WARTIME DESIGNATION, "MI6."
5. SECRET DE DOCUMENTATION EXTERIEURE ET
CONTRE- ESPIONAGE (SDECE) THE INTELLEGENCE
AGENCY OF FRANCE.
6. SOCIAL AFFAIRS DEPARTMENT (SAD)THE
INTELLIGENCE AGENCY OF CHINA.
7. FEDERAL BUREAU OF INVESTIGATION (FBI)- THE
AGENCY WHOSE PRIMARY ROLE IS COUNTER
INTELLIGENCE WHICH IS LIMITED TO INTERNAL
SECURITY WITHIN THE UNITED STATES OF AMERICA.
8. “MI-5”
- GREAT BRITAIN’S CIVILIAN INTELLIGENCE AGENCY FOR
INTERNAL COUNTER INTELLIGENCE, THIS IS EQUIVALENT
OF US’ FBI AND EQUIVALENT TO INTERNAL SECURITY
SECTION OF RUSSIA’S KGB.
9. NATIONAL INTELLIGENCE COORDINATING AGENCY
(NICA) - THE INTELLIGENCE AGENCY IN THE PHILIPPINES.
DEFINITIONS OF
INTELLIGENCE
INTELLIGENCE – IS THE PRODUCT OF THE COLLECTION,
EVALUATION, ANALYSIS, INTEGRATION, AND INTERPRETATION OF
ALL AVAILABLE INFORMATION WHICH MAY HAVE IMMEDIATE OR
POTENTIAL SIGNIFICANCE TO THE DEVELOPMENT AND EXECUTION
OF PLAN, POLICIES, AND PROGRAMS OF THE USER.
POLICE INTELLIGENCE
IS THE PRODUCT OF THE COLLECTION, EVALUATION, ANALYSIS,
INTEGRATION, AND INTERPRETATION OF ALL AVAILABLE
INFORMATION REGARDING THE ACTIVITIES OF CRIMINALS AND
OTHER LAW VIOLATORS. THIS IS DONE FOR THE PURPOSE OF
AFFECTING THE ARREST OF CRIMINALS AND LAW VIOLATORS,
OBTAINING EVIDENCE, AND FORESTALLING PLAN TO COMMIT
CRIMES.
WHAT IS INFORMATION?
- FROM OBSERVATION, REPORTS, RUMORS, IMAGERY, AND OTHER.
- INFORMATION PERTAINS TO ANY EVALUATED MATERIALS OF
EVENFORMATION PERTAINS TO INCLUDES THE DEVE SOURCES
FROM WHICH INTELLIGENCE IS PRODUCED.
GENERAL CLASSIFICATIONS OF SOURCES
OF INFORMATION
1. OPEN SOURCES (OVERT SOURCE) – 99% OF THE INFORMATION
COLLECTED ARE COMING FROM OPEN SOURCES.
A. ENEMY ACTIVITIES
B. POW
C. CAPTURED DOCUMENTS
D. MAP
E. WEATHER FORECAST, STUDIES, REPORTS
F. AGENCIES
2. CLOSE SOURCES (COVERT/CLOSE SOURCE) – 1% OF
INFORMATION FROM CLOSE SOURCES.
A. SURVEILLANCE
B. CASING
C. ELICITATION
D. SURREPTITIOUS ENTRY
E. EMPLOYMENT OF TECHNICAL MEANS SUCH AS: BUGGING
AND TAPPING DEVICES
F. TACTICAL INTERROGATION
G. OBSERVATION AND DESCRIPTION
F U N C T IO N A L C L A S S IF IC A T IO N S O F P O L IC E IN T E L L IG E N C E
CRIMINAL INTELLIGENCE – THIS REFERS TO THE ESSENTIAL
KNOWLEDGE IN THE PREVENTION OF CRIMES AND THE
INVESTIGATION, ARREST, AND PROSECUTION OF CRIMINAL
OFFENDERS.
INTERNAL SECURITY INTELLIGENCE – THIS REFERS TO THE
ESSENTIAL KNOWLEDGE TO MAINTAIN PEACE AND ORDER.
PUBLIC SAFETY INTELLIGENCE – THIS REFERS TO THE ESSENTIAL
KNOWLEDGE THAT WILL ENSURE THE PROTECTION OF LIVES AND
PROPERTIES.
FOUR I’S OF INTELLIGENCE
1. INTEREST
2. INGENUITY
3. INTEGRITY
4. INTELLIGENCE
PRINCIPLES OF
INTELLIGENCE
1. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT.
THESE ARE SEPARATE AND DISTINCT ACTIVITIES BOTE
COMPLEMENT EACH OTHER.
2. INTELLIGENCE REQUIRES CONTINUOUS SECURITY
MEASURES. DENIES UNAUTHORIZED PERSONNEL INFORMATION
ABOUT OPERATION AND INTELLIGENCE PRODUCT.
3. INTELLIGENCE MUST BE USEFUL. IT MUST SERVE THE
COMMANDER’S NEED AND REQUIREMENTS.
[Link] MUST BE TIMELY. IT MUST REACH THE
USER IN TIME TO SERVE AS BASIS FOR APPROPRIATE
ACTION.
5. INTELLIGENCE MUST BE FLEXIBLE.
6. INTELLIGENCE REQUIRES IMAGINATION AND
FORESIGHT
BROAD CATEGORIES OF INTELLIGENCE
1. NATIONAL INTELLIGENCE - IT REFERS TO THE INTEGRATED
PRODUCT OF INTELLIGENCE DEVELOPED BY ALL GOVERNMENT
DEPARTMENTS REGARDING THE BROAD ASPECT OF NATIONAL
POLICY AND NATIONAL SECURITY.
A). NATIONAL POLICY - IT REFERS TO THE SPECIFIC COURSES OF
ACTION TO NATIONAL OBJECTIVES. ACHIEVE THE
B). NATIONAL SECURITY - THIS RELATES TO THE PROTECTION AND
PRESERVATION OF MILITARY, ECONOMIC AND A PRODUCTIVE
STRENGTH OF A COUNTRY INCLUDING THE SECURITY OF THE
GOVERNMENT AND DOMESTICS AND FOREIGN AFFAIRS AGAINST
ESPIONAGE, SABOTAGE, AND SUBVERSION.
2. DEPARTMENT OF INTELLIGENCE – THIS THE
INTELLIGENCE REQUIRED BY GOVERNMENT
DEPARTMENTS OR AGENCIES TO EXECUTE ITS
MISSION AND DISCHARGE ITS RESPONSIBILITIES.
3. MILITARY INTELLIGENCE – THIS IS USED IN THE
PREPARATION AND EXECUTION OF TACTICAL
PLANS.
FIELDS OF POLICE
INTELLIGEMME
1. STRATEGIC INTELLIGENCE-IL THE WHICH RELATES TO
COMPRISES CAPABILITIES KNOWLED GERABILITIES OF A
FOREIGN NATION.- THIS NATIONAL PLANNERS TO
FORMULATE ICE NATIONAL DEFENSIONS OR TO FORM IS
REQUIRED BY NA ADEQUALS MILITARY OPERATIONS IN
TIME OF WAR.
COMPONENTS OF STRATEGIC
INTELLIGENCE ARE:
A. POLITICAL INTELLIGENCE – IT DEALS WITH DOMESTICAND
FOREIGN AFFAIRS AND RELATIONS OF THE GOVEMMENT
OPERATIONS;
1. BASIC PRINCIPLES OF THE GOVERNMENT
2. GOVERNMENT STRUCTURES
3. PUBLIC ORDER AND SAFETY
4. SUBVERSION
5. INTELLIGENCE AND SECURITY ORGANIZATION
B. ECONOMIC INTELLIGENCE –IT DEALS WITH THE EXTENT AND
UTILIZATION OF ALL RESOUCRES INCLUDING NATURAL AND
HUMAN RELATIVE TO THE INDUSTRIAL POTENTIAL OF THE NATION.
C. TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE-
CONCERNED WITH THE OPERATIONS AND FACILITIES NOT ONLY
THAT OF THE MILITARY BUT ALSO OF THE CIVILIANS.
D. SOCIOLOGICAL INTELLIGENCE – IT DEALS WITH THE
DEMOGRAPHIC AND PSYCHOLOGICAL ASPECTS OF GROUPS OF
PEOPLE.
1. POPULATION AND MANPOWER
2. CHARACTERISTICS OF THE PEOPLE
3. PUBLIC OPINION AND PUBLIC ATTITUDE TOWARDS MATTERS OF
PUBLIC POLICY
4. EDUCATIONBASED ON LITERACY RATE.
E. BIOGRAPHICAL INTELLIGENCE – INDIVIDUAL PERSONALITIES
CEWHO IHDEALS ACTUAL POSSESSION OF POWER.
F. ARMED FORCES INTELLIGENCE – IT DEALS WITH THE ARMED
FORCES OF THE NATION.
1. POSITION OF THE ARMED FORCES – THE CONSTITUTIONAL AND
LEGAL BASIS OF ITS CREATION AND ACTUAL ROLE.
2. ORGANIZATION, STRUCTURE, AND TERRITORIAL DISPOSITION
3. MILITARY MANPOWER RECRUITMENT
4. ORDER OF BATTLE
G. GEOGRAPHICAL INTELLIGENCE – IT DEALS WITH THE NATURAL
AND MAN- MADE FEATURES OF THE PHYSICAL ENVIRONMENT
FROM THE PERSPECTIVES OF MILITARY OPERATIONS.
1. LOCATION-MILITARY AND ECONOMIC IMPORTANCE
2. SIZE MEASUREMENT OF WHICH A NATION CAN EXCHANGE
SPACE OR TIME DURING WAR.
3. SHAPE
4. WEATHER AND CLIMATE
H. SCIENTIFIC INTELLIGENCE – IT DEALS WITH THE
PROGRESS OF THE RESEARCH AND DEVELOPMENT AS IT
AFFECTS THE ECONOMIC AND MILITARY POTENTIAL OF A
NATION.
2. LINE INTELLIGENCE (TACTICAL AND COMBAT)
- THE INTELLIGENCE REQUIRED BY THE COMMANDER USED FOR
PLANNING AND CONDUCT OF TACTICAL OPERATION. THIS REFERS
TO KNOWLEDGE OF PEOPLE, WEATHER, ENEMY, AND TERRAIN
(PWET) USED IN PLANNING AND CONDUCTING TACTICAL AND
ADMINISTRATIVE OPERATION IN A COUNTER INSURGENCY.
WHAT INTELLIGENCE INFORMATION ARE
DETERMINED?
A. PEOPLE
-LIVING CONDITION OF THE PEOPLE
-SOURCES OF INCOME
-EDUCATION OF THE PEOPLE
-GOVERNMENT LIVELIHOOD OF THE PEOPLE EXTENT OF ENEMY
INFLUENCE TO THE PEOPLE
B. WEATHER
-VISIBILITY
-CLOUDY
- TEMPERATURE
- PRECIPITATION (RAIN)
- WIND
C. ENEMY
- LOCATION OF THE ENEMY
- STRENGTH OF THE ENEMY
- DISPOSITION
- TACTICAL CAPABILITY
- ENEMY VULNERABILITY
D. TERRAIN
- RELIEF AND DRAINAGE SYSTEM
- VEGETATION
- SURFACE MATERIAL
- MAN-MADE FEATURES
FIVE MILITARY ASPECTS OF
TERRAIN
1. COVER AND CONCEALMENT
2. OBSTACLE
3. CRITICAL KEY TERRAIN FEATURES
4. OBSERVATION AND FIELDS OF FIRE
5. AVENUE OF APPROACH
3. COUNTERINTELLIGENCE
- IT IS THE PHASE OF INTELLIGENCE WHICH
COVERS THE ACTIVITY DEDICATED IN
DESTROYING THE EFFECTIVENESS OF HOSTILE
FOREIGN ACTIVITIES AND THE PROTECTION OF
INFORMATION AGAINST ESPIONAGE,
SUBVERSION, AND SABOTAGE.
THREE ACTIVITIES OF
COUNTERINTELLIGENCE ARE:
A. PROTECTION OF INFORMATION AGAINST ESPIONAGE
B. PROTECTION OF PERSONNEL AGAINST SUBVERSION
C. PROTECTION OF INSTALLATIONS AND MATERIALS
AGAINST SABOTAGE
THE TWO GENERAL TYPES OF
COUNTERINTELLIGENCE ARE:
1. PASSIVE MEASURES - THE MEASURES WHICH SEEK TO
CONCEAL INFORMATION FROM THE ENEMY.
2. ACTIVE MEASURES - THE MEASURES WHICH ACTIVELY
SEEK TO BLOCK THE ENEMIES' EFFORT TO GAIN
INFORMATION OR ENGAGE IN ESPIONAGE.
FIVE IMPORTANCE OF EFFECTIVE
COUNTERINTELLIGENCE
1. DENIES INFORMATION TO THE ENEMY;
2. REDUCES THE RISK OF A COMMAND;
3. AIDS IN ACHIEVING SURPRISES;
4. INCREASES THE SECURITY OF THE COMMAND; AND
5. DECREASES THE ENEMY'S ABILITY TO CREATE INFORMATION
ABOUT THE FORCES.
FIVE CATEGORIES OPERATION OF
COUNTERINTELLIGENCE
1. MILITARY SECURITY – IT COVERS THE MEASURES TAKEN BY A COMMAND TO
PROTECT ITSELF AGAINST ESPIONAGE, ENEMY OPERATION, SUBVERSION, OR
SURPRISE. SABOTAGE,
EX.
SECRECY DISCIPLINE
SPECIAL SAFEGUARDING OF CLASSIFIED INFORMATION
- SECURITY OF TROOP MOVEMENT SPECIAL HANDLING OF WEATHER AND
ESCAPEES
COUNTER SUBVERSION WITHIN THE ARMED FORCES
- TACTICAL MEASURES IN COMBAT AREA
3. CIVIL SECURITY - IT ENCOMPASSES ACTIVE AND PASSIVE
COUNTERINTELLIGENCE MEASURES EFFECTIVELY THE NON-MILITARY
NATIONALS PERMANENTLY OR TEMPORARILY RESIDING IN AN AREA UNDER
MILITARY JURISDICTION.
EX.
- SYSTEMATIC REGISTRATION OF CIVILIANS AND ALIENS
CURFEW C
CONTROL OF CIRCULATION
SURVEILLANCE OF SUSPECTED POLITICAL ORGANIZATION
- SCTY. SCREENING OF LABOR-
ISSUANCE OF PASSES AND PERMITS CONTROL OF INTERNAL COMMERCE
4. CENSORSHIP – THE CONTROL AND EXAMINATION OF THE
FOLLOWING:
- CIVIL
- NATIONAL
- ARMED FORCES
- FIELD PRESS
- POW
5. SPECIAL OPERATIONS – THE OPERATIONS CONDUCTED TO
COUNTER SUBVERSION, SABOTAGE, AND ESPIONAGE.
EIGHT BASIC PRINCIPLES OF
COUNTERINTELLIGENCE OPERATIONS
1. CONFORMITY TO
MISSION
5. Offense
2. AVOIDANCE OF
6. Flexibility
PUBLICITY 7. Continuity
3. OBJECTIVITY 8. Coordination
4. CONFIRMATION
COUNTERINTELLIGENCE INVESTIGATION
- IS ACTIVITY COMPRISING THE VALUE OF THE
COUNTERINTELLIGENCE WORKLOAD, WORLDWIDE AND
INCLUDES SPECIFIC INVESTIGATION OF INDIVIDUAL AND
INCIDENCE, WHICH IS CONDUCTED GATION OVERT BUT
DISCREET MANNER.
THREE CATEGORIES OF
COUNTERINTELLIGENCE MEASURES
1. DENIAL MEASURES
2. DETECTION MEASURES
3. DECEPTION MEASURES
1. DENIAL MEASURES
A. SECRECY DISCIPLINE
B. DOCUMENT SCTY.
C. CAMOUFLAGE AND CONCEALMENT
D. COMMUNICATION SCTY.
E. MILITARY CENSORSHIP
F. COUNTER RECONNAISSANCE EFFORT
2. DETECTION MEASURES
3. Deception Measures
A. PSI
B. SCTY. TAG OR PASS CARDa. ruse (use of escape and
evasion)
C. CHALLENGE OR PASSWORD b. dummy position
D. RECONNAISSANCE c. fabricated information
PHASES OF INTELLIGENCE
CYCLE
DIRECTING THE COLLECTION EFFORTS
1. DETERMINATION OF REQUIREMENTS.
- ENEMY CAPABILITIES, INCLUDING TIME, PLACE, STRENGTH, OR OTHER
DETAILS.
- ENEMY VULNERABILITIES, INCLUDING NATURE, EXTENT, PERFORMANCE AND
OTHER DETAILS.
- ENEMY ORDER OF BATTLE AND FACTORS
- TERRAIN, INCLUDING NATURAL AND ARTIFICIAL OBSTACLES.
- WEATHER
- INFORMATION DESIRED BY HIGHER, LOWER, OR ADJACENT
HEADQUARTERS.
OF INFORMATION.
- AN INTELLIGENCE OR INFORMATION OF THE
CHARACTERISTICS OF THE AREA OF OPERATIONS AND
THE ENEMY, WHICH THE COMMANDER FEELS HE NEEDS
BEFORE HE CAN REASONABLY DECIDE.
3. ESTABLISHMENT OF PRIORITIES
- PRIORITIES REFLECT THE CRITICALITY OF THE
NEED FOR THE INFORMATION. NO FORMULA
EXISTS WHICH CAN AUTOMATICALLY DETERMINE
PRIORITIES. SUCH DETERMINATION IS A MATTER
OF JUDGMENT.
B. COLLECTION OF INFORMATION
1. DETERMINE COLLECTING AGENCY;
2. SEND ORDERS OR REQUEST;
3. SUPERVISE COLLECTION EFFORTS;
4. USE TOOLS OR TECHNIQUE IN
COLLECTION
5. ENSURE TIMELY COLLECTION..
FACTORS IN CHOOSING COLLECTION
AGENTS ARE:
1. CAPABILITY - THE AGENTS' PLACEMENT OR ACCESS TO
OTHER TARGET
2. MULTIPLICITY - THE NUMBER OF AGENTS.
C. PROCESSING THE COLLECTED
INFORMATION
1. RECORDING THE INFORMATION OMIFENCED VEING WRITING OF
GRAPHICAL REPRESENTATION. THE INFORMATION IS PLAC
GROUPED INTO RELATED ITEMS
2. EVALUATION-THE DETERMINATION OF THE INFORMATION’S
RELEVANCE TO THE OPERATION, RELIABILITY OF THE SOURCE OR
THE AGENCY, AND THE INFORMATION’S ACCURACY
EVALUATION IS USED TO DETERMINE
THE:
A. PERTINENCE –THE VALUE TO CURRENT OPERATION
AND IF THE NEED IS IMMEDIATE.
B. RELIABILITY THE TRUSTWORTHINESS OF THE SOURCE
OF INFORMATION OR AGENCY.
C. CREDIBILITY INFORMATION. THE TRUTH OR INTEGRITY.
THE TWO DISTINCT PHASES OF
ANALYSIS ARE:
A. ASSESSMENT
B. INTEGRATION – COMBINING THE ELEMENTS IN THE ASSESSMENT
WITH OTHER INFORMATION OR INTELLIGENCE TO FORM A LOGICAL
FEATURE OR HYPOTHESIS OF THE ACTIVITIES OF THE ENEMY. IT ALSO
INCLUDES INFORMATION ON THE CHARACTERISTICS OF THE
OPERATIONAL AREA OF THE COMMAND MISSION.
D. DISSEMINATION AND USE
PROCESSED INFORMATION IS DISSEMINATED THROUGH:
[Link] Reports
2. Briefing - Situations
3. Estimates - Overlays/cover
[Link] 1.- Summaries
EVALUATION GUIDE
SOURCES OF INFORMATION
S- SIGNAL INTERCEPT
T-DIRECT OBSERVATION BY COMMANDER/CHIEF OF A UNIT
U-REPORT BY PENETRATION AGENT OR RESIDENT AGENT
V-REPORT BY PNP/AFP TROOPS INVOLVED IN ENCOUNTER
W-INTERROGATION OF CAPTURED ENEMY AGENT/FOREIGNER
X – OBSERVATION OF GOVERNMENT/CIVILIAN EMPLOYEE OR
OFFICIALS
Y-OBSERVATION BY A MEMBER OF THE POPULACE
Z-DOCUMENTARY
CYBER INTELLIGENCE
CYBER INTELLIGENCE – IS THE COLLECTION,
PROCESSING, AND ANALYSIS OF INFORMATION OR DATA
ON CYBERCRIME FROM VARIOUS SOURCES WHICH
INCLUDE PUBLIC, PRIVATE AND OPEN SOURCES.
- CYBER INTELLIGENCE IS THE ACQUISITION AND
ANALYSIS OF INFORMATION TO IDENTIFY, TRACK, AND
PREDICT CYBER CAPABILITIES, INTENTIONS, AND
ACTIVITIES TO OFFER COURSES OF ACTION THAT
ENHANCE DECISION MAKING”
CYBER-INTELLIGENCE PRODUCTS INCLUDE:
CYBER BITS SHORT INTELLIGENCE NOTIFICATIONS ON CYBER-
RELATED TOPICS
- THE OPEN-SOURCE INTELLIGENCE (OSINT) DASHBOARD,
CAPTURES THE MOST IMPORTANT EVENTS FROM THE PASSING
WEEK IN A BROADLY UNDERSTOOD CYBER DOMAIN
- THE COMMON TAXONOMY FOR THE NATIONAL NETWORK OF
COMPUTER SECURITY INCIDENT RESPONSE TEAMS
TYPES OF CYBER
INTELLIGENCE
CYBER INTELLIGENCE CAN BE A RESULT OF THE
FOLLOWING COMBINATION:
Open Source Intelligence
(OSINT)
Signal Intelligence (SIGINT)
Geospatial Intelligence
(GEOINT)
1. Social Media Intelligence
(SOCMINT), and
STRATEGIC CYBER
INTELLIGENCE
- USED TO INFORM ORGANIZATIONAL OR NATIONAL STRATEGY AND POLICY
DEVELOPMENT THAT WILL DIRECT ENTERPRISE OVER THE LONG TERM.
- FOCUSED BROADLY ON THREAT VECTORS AND ADVERSARIES ECONOMIC,
AND SOCIAL AND ON. INCLUDES UNDERSTANDING OF STATE AND NON-
AND ON CONTEXTUAL POLITICAL, STATE THREAT ACTORS’ INTERESTS,
POLICIES, DOCTRINES,
OPERATIONAL CYBER
INTELLIGENCE
- USED TO INFORM RISK-BASED DECISIONS ABOUT RESOURCE
ALLOCATION AND ACTIVITY TO MAINTAIN BUSINESS CONTINUITY
AND PREVENT DISRUPTION.
- COLLECTED WITH AN EMPHASIS ON ENTERPRISES’ OPERATIONS,
TO INCLUDE PARTNERS, SUPPLIERS, COMPETITORS, CUSTOMERS,
AND OTHER TRUSTED RELATIONSHIPS.
TACTICAL CYBER
INTELLIGENCE
- PRODUCED FOR INCIDENT RESPONSE TEAMS.
- USED TO RESTORE OPERATIONS QUICKLY AND COLLECT
CYBER FORENSIC EVIDENCE FOLLOWING A CYBER-
ATTACK
POLICE INTELLIGENCE
OPERATION
INTELLIGENCE OPERATION - REFERS TO THE OUTCOMES
OF INTELLIGENCE PLANNING WHICH IS DONE AHEAD OF
AN OPERATION. OPERATION HOWEVER, THERE ARE
INSTANCES WHEN AN TAKES WITHOUT A PLAN DUE TO
UNEXPECTED CIRCUMSTANCES. SUCH SITUATION IS AN
EXAMPLE OF POOR INTELLIGENCE MANAGEMENT.
DIFFERENT TASKS INVOLVED IN POLICE
INTELLIGENCE OPERATION
DIFFERENT TASKS INVOLVED IN POLICE INTELLIGENCE OPERATION
1. DISCOVERY AND IDENTIFICATION ACTIVITY
2. SURVEILLANCE 6. Debriefing
7. Relevant
3. LIAISON PROGRAM miscellaneous activity
4. INFORMANT MANAGEMENT 8. Casing
9. Utilization of
5. CLIPPING SERVICES informant
OPERATIONAL CYCLE
1. MISSION AND TARGET IS CARRIED OUT THROUGH:
A) INFILTRATION – THE INSERTION OF ACTION AGENT INSIDE THE
TARGET ORGANIZATION.
B) PENETRATION – THE RECRUITMENT OF ACTION AGENT INSIDE THE
TARGET ORGANIZATION.
2. PLANNING
3. SPOTTING
4. INVESTIGATION – PBI/CBI
5. RECRUITMENT THE MOST PREFERRED QUALIFICATION OF
AN AGENT IS HIS/HER ACCESS TO THE TARGET.
6. TRAINING
7. BRIEFING
8. DISPATCHING
9. COMMUNICATION – TECHNICAL – TELEPHONE
OR RADIO – NON-TECHNICAL – PERSONAL
MEETING
10. DEBRIEFING
- LET YOUR AGENT TALK ALL HE ENCOUNTERED
DURING THE OPERATION.
- DON’T INTERRUPT YOUR AGENT WHILE HE IS
TALKING. NEVER POSTPONE OR PAUSE AND SET FOR
ANOTHER TIME FOR THE BRIEFING
11. PAYMENT (DEPENDS UPON THE MOTIVATION)
- BUY HIS LIFE NOT HIS JOB.
- REGULARITY AND DEPENDABILITY THAT COUNTS NOT
THE AMOUNT.
- PAY NO BONUSES.
- SUPPLEMENT THE AGENT INCOME FROM REGULAR
SOURCES ENOUGH TO EASE HIS FINANCIAL WORRIES
BUT NOT ENOUGH TO CAUSE HIM TO LIVE IN STYLE.
12. DISPOSITION
- REROUTE
- RETRAINING
- RETESTING
- TERMINATION
13. REPORTING
14. OPERATIONAL TESTING
COVER
AND
UNDERCOV
ER
COVER – THE MANNER USED BY A GROUP OR
ORGANIZATIONS CONCEAL THE TRUE NATURE OF ITS
ACTS AND OR EXISTENCE FROM THE OBSERVER.
COVER STORY – THIS REFERS TO THE FICTITIOUS
BIOGRAPHICAL DATA USED BY AN AGENT AS A COVER UP.
THIS CAN ALSO REFER TO ANY FICTITIOUS SCENARIO.
COVER SUPPORT – AN AGENT ASSIGNED IN TARGET
AREAS WHOSE PRIMARY MISSION IS TO SUPPORT THE
COVER STORY.
ESSENTIALS OF COVER:
1. SECRECY OF OPERATION AGAINST ENEMY
INTELLIGENCE.
2. SECRECY OF OPERATION AGAINST FRIENDLY
AGENCIES THAT DO NOT HAVE THE NEED TO KNOW.
3. SUCCESSFUL ACCOMPLISHMENT OF THE MISSION,
FOUR TYPES OF COVER:
1. NATURAL COVER – USING ACTUAL OR TRUE
BACKGROUND.
2. ARTIFICIAL COVER – USING BIOGRAPHICAL
DATA ADOPTED FOR THE PURPOSE.
3. COVER WITHIN A COVER – JUSTIFIES THE
EXISTENCE OF THE AGENT.
4. MULTIPLE COVER – ANY COVER THE AGENT
WISHES TO USE.
HAZARDS TO COVER:
1. STATIC OR DORMANT OPPOSITION (ORDINARY
CITIZENS)
2. UNHOSTILE ACTIVE OPPOSITION (POLITICAL SECURITY
AGENCIES)
3. HOSTILE ACTIVE OPPOSITION (ENEMY INTERNATIONAL
OPERATIVES)
PRECAUTIONS OR GUIDELINES IN CASE OF
COMPROMISE:
1. MOVE OUT IMMEDIATELY.
2. START NEW FACILITY FOR THE OPERATION AND
DEVELOP IT.
3. BUILT ENTIRELY NEW COVER.
4. USE CIRCUITOUS ROUTES AND PROVIDE CAREFUL
COUNTER SURVEILLANCE MEASURE.
5. BE SPECIFICALLY CAREFUL OF FORMER CONTACTS
WITH NON-INTELLIGENCE PERSONNEL.
6. BE PATIENT, ACT SLOW, AND BE CAREFUL.
ORGANIZATION COVER
– REFERS TOADOPTED CONSISTING OF
BIOGRAPHICAL DATA, WHICH WHEN ADOPTED
BY AN INDIVIDUAL WILL ASSUME THE
PERSONALITY HE WANTS TO ADOPT.
OBJECTIVES OF ORGANIZATIONAL
COVER
1. TO CAMOUFLAGE AND PROTECT OPERATIONAL
PERSONNEL AND THEIR ACTIVITIES..
2. TO PROTECT THE INSTALLATION WHERE
CLANDESTINE ACTIVITIES ARE BASED.
GUIDELINES WHEN COMPROMISED: ORGANIZATIONAL
GUIDELINES WHEN ORGANIZATIONAL
COVER IS COMPROMISED.
1. MAKE A PHYSICAL MOVE OR RELOCATION.
2. START A NEW FACILITY FOR THE OLD
OPERATION AND LET IT GROW.
3. USE NEW PERSONNEL.
4. LET OLD PERSONNEL REMAIN IN PLACE.
5. BUILD ENTIRELY NEW COVER.
6. WHEN FILES ARE RELOCATED, USE
CIRCUITOUS ROUTE TO AVOID
SURVEILLANCE AND OTHER
COUNTERINTELLIGENCE.
7. BE CAREFUL IN MAKING CONTACTS
WITH NON- INTELLIGENCE PERSONNEL.
8. BE PATIENT.
UNDERCOVER ASSIGNMENT
– THIS IS TECHNIQUE USED WHEN ANAGENT
CONCEALS HIS OFFICIAL INVESTIGATIVE
IDENTITY AND OBTAINS INFORMATIONCEALS
THE TARGET ORGANIZATION.
PLANNING AN UNDERCOVER
ASSIGNMENT?
1. DETERMINE THE LEVEL IN WHICH THE INVESTIGATION
IS INTENDED;
2. DEVELOP APPROPRIATE COVER AND COVER STORY;
3. SELECT QUALIFIED PERSONNEL;
4. CONSIDER ALL OPERATIONAL DETAILS WHICH
INCLUDE DOCUMENTATION, CONVERGENCE; AND
DETAILS WHICH INCLUDE CONTACT REPORTING,
HOUSING, AND
5. CONDUCT BRIEFING, COACHING, AND REHEARSAL.
TWO USES OF UNDERCOVER
INTERDEPENDENTLY USED TO GET FIRSTHAND INFORMATION ABOUT THE SUBJECT
OF INVESTIGATION.
EX.
A) SECURITY EVALUATION OF EVERY INSTALLATION
B) GAIN CONFIDENCE OF SUSPECTED PERSONS
2. SUPPLEMENT OTHER INVESTIGATIVE TECHNIQUES SUCH AS:
EX.
A) PLAYING GROUND WORKS FOR RAIDS AND SEARCHES BY GOING ENTRY
B) ASSISTING IN LOCATING EVIDENCE
TYPES OF UNDERCOVER
ASSIGNMENTS:
1. DWELLING
2. WORK
3. SOCIAL
4. JURISDICTIONAL ASSIGNMENT
5. COMBINATION ASSIGNMENT
6. ROPE JOB OR BUILDINGFRIENDSHIP WITH THE
SUBJECT
SOCIAL QUALIFICATIONS OF
UNDERCOVER AGENT
1. KNOWLEDGE OF THE LANGUAGE
2. AREA BACKGROUND REGARDING EVENTS
3. KNOWLEDGE ABOUT THE CUSTOMS AND HABITS
4. PHYSICAL APPEARANCE
FACTORS TO BE CONSIDERED IN
SELECTING COVER STORY:
1. MUTUAL POINT OF INTEREST
2. JUSTIFICATION OF PRESENCE
6. Means of
communication
3. PREVIOUS AND PERMANENT ADDRESS
7. Social and financial
4. EFFICIENT IN HIS ROLE status
8. Optional alternate
5. FREEDOM FOR MOVEMENT plan
9. Safe departure
INFORMANT VS.
INFORMER
INFORMANT
- IT REFERS TO A PERSON WHO GIVES
VOLUNTARY INFORMATION TO THE POLICE
WITHOUT ANY CONSIDERATION.
Informer
- It refers to an individual who gives
information in exchange for a price or
reward.
1. ANONYMOUS INFORMANT
- ONE WHO GIVES INFORMATION
THROUGH TELEPHONE OR
LETTERS WITH THE HOPE THAT HE
OR SHE WILL NOT BE IDENTIFIED.
2. CONFIDENTIAL INFORMANT
– A PERSON WHO PROVIDES THE
INVESTIGATOR WITH CONFIDENTIAL
INFORMATION CONCERNING A PAST
OR PROJECTED CRIME AND DOES
NOT WISH TO BE IDENTIFIED AS
THE SOURCE OF THE INFORMATION.
3. CRIMINAL INFORMANT
– A TYPE OF INFORMANT WHO GIVES
INFORMATION TO THE POLICE
PERTAINING TO THE UNDERWORLD AND
THE ORGANIZED CRIMES WITH THE
UNDERSTANDING THAT HIS IDENTITY
WILL BE PROTECTED AND IN EXCHANGE
FOR A CERTAIN CONSIDERATION
4. VOLUNTARY INFORMANT
– THE INFORMANT WHO GIVES
INFORMATION FREELY AS A WITNESS
TO A CERTAIN ACT.
5. Special informant The informant
who gives information concerning
specialized cases only and is given
special treatment by the operatives.
6. ACCIDENTAL INFORMANT
– THE INFORMANT WHO
CASUALLY IMPARTS
INFORMATION TO AN
OFFICER WITH NO
INTENTION OF PROVIDING
SUBSEQUENT INFORMATION.
7. RIVAL- ELIMINATION INFORMANT
– THE INFORMAT WHO IS USUALLY
ANONYMOUS. HIS PURPOSE IN
PROVIDING INFORMATION IS TO
ELIMINATE RIVAL OR COMPETITION.
8. False informant
- The informant who provides
information with no relevance
to the crime or stuff concocted
of thin air.
9. FRIGHTENED INFORMANT
-THE INFORMANT WHO IS PRODDED
BECAUSE OF FEAR OR SELF-
INTEREST.
- HE IS THE “WEAKEST LINK” IN THE
CRIMINAL CHAIN.
10. SELF-AGGRANDIZING INFORMANT
- Hangs on the fringes of the
underworld
and delights in surprising the police
with information.
- In certain circumstances, his
information may be of value.
11. MERCENARY INFORMANTS
- THE TYPE OF INFORMANT
WHO HAS SOMETHING TO SELL.
HE MAY BE A VALUABLE
SOURCE.
- HE MAY HAVE THOUGHT
HIMSELF TO HAVE BEEN
DOUBLE-CROSSED OR GIVEN A
“DIRTY DEAL” AND SEEKS
REVENGE AS WELL AS PROFIT
IN THE TELLING.
12. DOUBLE CROSSER
INFORMANT
- THE TYPE OF INFORMANT
WHO USES HIS DESIRE TO
GIVE INFORMATION AS AN
EXCUSE TO TALK TO THE
POLICE TO GET MORE
INFORMATION FROM THEM
THAT HE GIVES.
SUB-TYPES OF INFORMANTS:
1. INCIDENTAL INFORMANT
- A PERSON WHO CASUALLY IMPARTS INFORMATION TO AN OFFICER
WITH NO INTENTION OF PROVIDING SUBSEQUENT INFORMATION.
2. RECRUITED INFORMANT
A PERSON WHO IS SELECTED, CULTIVATED, AND DEVELOPED INTO A
CONTINUOUS SOURCE OF INFORMATION REGARDING POLICE TARGETS,
CATEGORIES OF RECRUITED
INFORMANTS
[Link] OF AUTOMATIC
INFORMANT.
- INFORMANTS WHO, BY THE
NATURE OF THEIR WORK OR
POSITION IN THE SOCIETY, HAVE A
CERTAIN LEGAL, MORAL, AND
ETHICAL RESPONSIBILITIES TO
REPORT INFORMATION TO LAW
ENFORCEMENT AGENCIES
2. ORDINARY RUN-OF-THE-MILL
INFORMANT
– NAINFORMANTS WHO ARE
NOT OBLIGATED TO REPORT
THE INFORMATION TO THE
POLICE.
[Link] EMPLOYEE
– INFORMANTS WHO ARE
OF A SPECIFIC
OPERATIONAL NATURE
MOTIVES OF
INFORMANTS
1. REWARD 3. FEAR
4. PATRIOTISM
2. REVENGE 5. FRIENDSHIP
PHASES OR STEPS OF INFORMANT
RECRUITMENT
1. SELECTION – IT IS DESIRED BEING ABLE TO IDENTIFY AND RECRUIT
AN INFORMANT WHO HAS ACCESS TO MANY CRIMINAL IN-GROUPS OR
SUBVERSIVE ORGANIZATIONS.
2. INVESTIGATION – THE INVESTIGATION OF THE POTENTIAL
INFORMANTS WHO HAVE BEEN IDENTIFIED AS “PROBABLE MOTIVES
WHY THEY ASSIST THE POLICE INTELLIGENCE THOROUGH AS POSSIBLE.
[Link]
- APPROACHING THE PROBABLE INFORMAT DONE IN
PLEASANT SURROUNDINGS.
4. TESTING
- THE TESTING PROGRAM SHOULD BEGIN WITH LIMITED
ASSIGNMENTS, FOLLOWED WITH GRADUAL INTEGRATION
INTO MORE IMPORTANT OR SENSITIVE AREAS.
FACTORS CONSIDERED IN INFORMANT
RECRUITMENT
1. ACCESS
5. Age
2. HEALTH 6. Education
3. BUILT 7. Personality
4. ABILITY
8. Sex
GENERAL TREATMENT OF
INFORMANTS
1. AVOID THE USE OF DEROGATORY TERMS IN REFERRING TO INFORMANTS OF
ANY TYPE.
2. AVOID DISCLOSING THE IDENTITY OF THE INFORMANT, WHICH, IN MOST
CASES, RUINS HIS POTENTIAL
3. PROTECT THE INTEREST OF THE INFORMANT. THE INVESTIGATOR IS USUALLY
JUST AS GOOD AS HIS SOURCE OF INFORMATION
4. CONSIDER ALL INFORMATION FROM KNOWN AND UNKNOWN INFORMANTS AS
VALUABLE UNTIL PROVEN OTHERWISE.
5. BE NONCOMMITTAL ON THE VALUE OF THE INFORMATION RECEIVED.
6. EXPRESS APPRECIATION OF ALL INFORMATION RECEIVED
REGARDLESS OF ITS VALUE
7. BE PUNCTUAL DURING APPOINTMENT, EVENTHOUGH THE
INFORMANT IS NOT.
8. DO NOT BE OVERANXIOUS. BE PATIENT. TAKE YOUR TIME.
9. HAVE CONTROL OF THE INVESTIGATION.
10. KEEP WHAT YOU KNOW TO YOURSELF, DO NOT BECOME THE
INFORMANT’S INFORMATION.
IMPORTANT RULE THAT A HANDLER OR CIVILIAN AGENT OR
INFORMANT MUST FOLLOW:
“NEVER LOVE YOUR AGENT”
-An agent handler must be able to determine when to
“terminate the agentas That hed a put off the agent from a
project when it has reached a particular start “That is why
when you fall in love with an agent becomes difficult to
terminate’ him or her.” In extreme cases, like when agents it
becomes commit serious acts of betrayal, to terminate means
physical elimination.
INFORMATION
MET
This is a controlled
group of persons who
work through the
direction of the agent
handler.
FACTORS IN THE SELECTION OF ACTION
AGENT
[Link]
-THE LOCATION OF PROSPECTIVE AGENT WITH RESPECT TO THE TARGET.
2. ACCESS
-THE CAPABILITY OR ABILITY OF A PROSPECTIVE AGENT TO OBTAIN THE
DESIRED INFORMATION FOR THE INTELLIGENCE ORGANIZATION OR TO
PERFORM THE INTELLIGENCE’S COLLECTION MISSION IN THE AREA.
PRIMARY ACCESS
-DIRECT ACCESS TO THE DESIRED INFORMATION.
• SECONDARY ACCESS
–THE ACCESS TO THE DESIRED INFORMATION THROUGH A
PRINCIPAL SOURCE, WHERE THE LATTER HAS THE DIRECT
ACCESS.
• OUTSIDE ACCESS
-THE AGENT IS EMPLOYED OUTSIDE FROM A THIRD PERSON
WHO IS MONITORING THE INFORMATION IN THE AREA.
MOTIVATIONS OF AN AGENT
1. IDEOLOGY-BELIEF OR PRINCIPLE IN LIFE.
2. PATRIOTISM
3. REMUNERATION
4. CAREER DEVELOPMENT
5. FEAR
CONTROL
– THIS REFERS TO THE AUTHORITY TO DIRECT
THE AGENT TO CARRY OUT THE TASK OR
REQUIREMENT ON BEHALF OF THE CLANDESTINE
ORGANIZATION IN AN ACCEPTABLE AND
SECURED MANNER.
TWO CATEGORIES OF
CONTROL
TWO CATEGORIES OF CONTROL
1. POSITIVE CONTROL –IT IS CHARACTERIZED BY
PROFESSIONALISM AND RAPPORT.
TYPES OF POSITIVE CONTROL
a. Agent motivation
b. Psychological control
1. NEGATIVE CONTROL – THE USE OF BLACKMAILS AND THREAT.
TYPES OF NEGATIVE CONTROL
A. DISCIPLINARY ACTION – THIS INCLUDES VERBAL REPRIMAND
FOR POOR PERFORMANCE OR INSECURE ACTIONS WITHHOLDING
CERTAIN MATERIAL REWARDS, REDUCTION OF AGENT’S SALARY,
OR, IN EXTREME SITUATION, THE THREAT OF TERMINATING
PROFESSIONAL RELATIONSHIP.
B. ESCROW ACCOUNT – THE CONTROL OF AN AGENT BY PUTTING
HIS SALARY IN A BANK TO BE WITHDRAWN ONLY AFTER A
FULFILLMENT OF A CONDITION.
C. BLACKMAIL
KEY ELEMENTS OF AGENT
MANAGEMENT
1. DIRECTION AND CONTROL
A. LEADERSHIP
B. ACTION
C. PERSONAL EXAMPLE
[Link] WEAKNESSES
3. AGENT TRAINING
A. INABILITY TO KEEP SECRET
4. AGENT TESTING
B. NEED FOR RECOGNITION
C. STRAIN OF DUAL EXPERIENCE
5. AGENT TERMINATION
D. EXPERIENCE
OBSERVATION AND
DESCRIPTION
OBSERVATION – THE COMPLETE AND ACCURATE
OBSERVATION OF ONE’S SURROUNDINGS. IT
ENCOMPASSES THE USE OF ALL THE SENSES TO
REGISTER AN AND RECOGNIZED ITS
OPERATIONAL OR INTELLIGENCE SIGNIFICANCE.
DESCRIPTION – THE ACTUAL AND FACTUAL
REPORTING OF ONE’S OBSERVATION OR THE
REPORTED SENSORY EXPERIENCE RECOUNTED
BY ANOTHER.
PSYCHOLOGISTS ESTIMATE THAT
APPROXIMATELY.
A. 85% OF YOUR KNOWLEDGE IS GATHERED
THROUGH SIGHT.
B. 13% IS GATHERED THROUGH YOUR HEARING.
C. 2% IS GATHERED THROUGH THE OTHER
THREE SENSES.
PSYCHOLOGICAL PROCESS FOR
1. ATTENTION – CONSISTS OF THE PSYCHOLOGICAL
ACCURATE OBSERVATION
PROCESS INVOLVED TO BECOME AWARE OF AN
EXISTENCE OF FACT.
TYPES OF ATTENTION
INVOLUNTARY – ONE HAS NO CONTROL AND REQUIRES
NO EFFORT.
VOLUNTARY – IT IS MORE RELIABLE BUT NOT
DEPENDABLE.
HABITUAL – IT REQUIRES LITTLE EFFORT WITH
2. PERCEPTION – INVOLVES IN THE UNDERSTANDING
OF THESE FACTS OR AWARENESS.
FACTORS INVOLVED IN THE PERCEPTION
•MENTAL CAPABILITY
• EDUCATIONAL BACKGROUND
•OCCUPATIONAL BACKGROUND
•EMPIRICAL BACKGROUND THROUGH EXPERIENCE. THIS
IS ACQUIRED
3. REPORT – INVOLVES IN
IDENTIFYING THE NAME IN
ONE’S OWN MIND AND
SOME FACTS, WHICH HAS
BEEN PERCEIVED,
NARRATED AND IDENTIFIED.
FACTORS GOVERNING
REPORT
1. VOCABULARY – THE WORDS WHICH AN INDIVIDUAL
USES TO EXPRESS HIMSELF.
2. TIME LOG – ACCURATE REPORTING DEPENDS
ENTIRELY ON TIMELINESS.
ALSO INCLUDED IN THE FACTORS ARE THE DELAYS IN
REPORTING THE RESULTS AND THE UNCONSCIOUS
OMISSION OF DETAILS.
3. RECURRENCE OF SIMILAR INCIDENTS.
ELICITATI
ON
ELICITATION
- A PROCESS VALUED INTELLEGENT OR PLAN IN
OBTAINING INFORMATION USING DIRECT
INTERCOMMUNICATION. IN THIS PROCESS, ONE OR
MORE OF THE PARTIES IS UNAWARE OF THE SPECIFIC
PURPOSE OF THE CONVERSATION.
THREE PHASES OF ELICITATION
1. DETERMINATION OF THE MISSION
2. SELECTION OF THE SUBJECT
3. ACCOMPLISHMENT OF THE MISSION
TECHNIQUES IN THE CONDUCT OF
ELICITATION
TECHNIQUES IN THE CONDUCT OF ELICITATION
1. APPROACH – IT REFERS TO THE PROCESS OF
SETTING PEOPLE TO START TALKING.
TYPES OF APPROACH:
[Link] APPROACH-BANK ON PEOPLE’S ARE
SUSCEPTIBILITY TO PRAISES. VARIANTS:
A. TEACHER-PUPIL APPROACH
- THE SUBJECT IS TREATED AS AN AUTHORITY. REQUEST HIM TO
ENLIGHTEN US AND SOLICIT HIS VIEWPOINTS AND OPINIONS.
B. KINDRED SOLE APPROACH
- THE SUBJECT IS PLACED IN A PEDESTAL AS SOMEONE WHO HAS
SPECIALIZED QUALITIES OR KNOWLEDGE.
C. GOOD SAMARITAN APPROACH
- SINCERE AND VALID OFFERS TO HELP AND ASSIST ARE MADE TO
THE SUBJECT.
D. PARTIAL DISAGREEMENT APPROACH
SEEKS TO ILLICIT TAKING USING THE PHRASE “I NOT I’M SURE IF I
FULLY AGREE”
2. PROACTIVE APPROACH – USING A WIDE RANGE OF
CONVERSATIONAL GAMBITS
VARIANTS:
A. TEASER BAIT APPROACH
- THE ELICITOR ACCUMULATES THE SOURCES OF
KNOWLEDGE ABOUT A PARTICULAR SUBJECT.
B. MANHATTAN FROM MISSOURI APPROACH
- THE ELICITOR ADOPTS AN UNBELIEVABLE
ATTITUDE ABOUT ANYTHING. HE QUESTIONS ALL
STATEMENTS AND OPPOSITIONS.
C. JOE BLOW APPROACH
- USING THE “I KNOW THE ANSWER TO EVERYTHING”
APPROACH. THE ELICITOR ADOPTS THE ATTITUDE OF
BEING APPROACHABLE OF ANY FIELD.
D. NATIONAL PRIDE APPROACH
- THE NATURAL PROPENSITY OF ALL PERSONS DEFEND
THEIR COUNTRY AND ITS POLICIES. TO
[Link]-THE APPROACH WHERE THE
PEOPLE ARE ENCOURAGED TO TALK
INCESSANTLY.
TYPES OF PROBES
1. COMPLETION PROBE – THIS IS
EFFECTIVE WHEN USED IN CONNECTION
WITH THE TEACHER PUPIL APPROACH.
2. CLARITY PROBE – THIS IS USED TO ELICIT
ADDITIONAL INFORMATION IN AN AREA WHERE THE
RESPONSE IS CLEAR.
3. HIGH PRESSURE PROBE – THIS IS USED TO PIN
DOWN A SUBJECT IN A SPECIFIC AREA OR TO POINT OUT
CONTRADICTIONS IN WHAT THE SUBJECT HAD SAID.
4. HYPOTHETICAL PROBE – THIS IS USED BY
PRESENTING A HYPOTHETICAL SITUATION TO GET THE
SUBJECT TO REACT TO THE GIVEN SITUATION.
FOUR PURPOSES OF
ELICITATION:
1. TO ACQUIRE INFORMATION THAT IS UNACHIEVABLE
THROUGH OTHER CHANNELS.
2. TO OBTAIN INFORMATION, WHICH, ALTHOUGH
UNCLASSIFIED IS NOT PUBLICLY KNOWN.
3. TO PROVIDE OPERATIONAL INFORMATION AND
BACKGROUND DATA ON POTENTIAL SOURCE OF
INFORMATION
4. TO ASSIST VARIOUS INDIVIDUALS
CASIN
G
CASING
-THIS REFERS TO THE INVESTIGATION OR
SURVEILLANCE OF A BUILDING, PLACE, OR
AREA TO DETERMINE ITS SUITABILITY FOR
INTELLIGENCE USE OR ITS VULNERABILITY IN
OPERATIONS.
- THIS PROCESS IS NECESSARY IN PLANNING
AN OPERATION AS IT PROVIDES ESSENTIAL
INFORMATION ON THE AREA OF OPERATION.
TYPES OR FORMS OF CASING
1. SURVEILLANCE – THE ACT OF GATHERING SPECIFIC OR
DETAILED INFORMATION OF A PARTICULAR AREA, WHICH MAY
TAKE A LONG PERIOD OF TIME. SURVEILLANCE IS CONTINUOUS
WHILST RECONNAISSANCE IS INTERMITTENT OR SPORADIC
(MISSION OR OPERATION).
2. RECONNAISSANCE –THE ACT OF GATHERING GENERAL
INFORMATION IN A WIDER AREA, WHICH REQUIRES SHORT TIME
FRAME. RECONNAISSANCE IS DONE WITH SPECIFIC OBJECTIVES IN
MIND, WHILE SURVEILLANCE IS GUIDED BY GENERAL OBJECTIVES.
THE GENERAL PRINCIPLES OF CASING
ARE:
1. IDENTIFY THE BEST ROUTE TO TAKE TO THE AREA.
2. IDENTIFY HOW TO CONDUCT ONESELF WITHOUT
ATTRACTING ATTENTION.
3. IDENTIFY SECURITY HAZARDS ARE IN THE AREA AND HOW
IT CAN BE AVOIDED OR MINIMIZED.
4. IDENTIFY THE BEST ROUTE TO EXTRICATE FROM THE AREA.
METHODS IN CASING:
1. PERSONAL RECONNAISSANCE - THIS IS THE MOST
EFFECTIVE METHOD AND WILL PROVIDE THE MOST INFORMATION
SINCE THAT IS BEING LOOKED FOR HAS BEEN IDENTIFIED OR
KNOWN.
2. MAP RECONNAISSANCE - THIS MAY NOT BE SUFFICIENT, BUT
IT CAN RESULT TO A CERTAIN AMOUNT OF USABLE INFORMATION.
3. RESEARCH – THERE IS A BULK OF INFORMATION
WHICH CAN BE ACQUIRED THROUGH RESEARCH.
4. PRIOR INFORMATION – THIS MAY BE ACCESSED IN
YOUR UNIT AS WELL AS IN OTHER UNITS THROUGH
FILE REPORTS WHICH MAY BE ALSO BE A SOURCE OF
INFORMATION.
5. HEARSAY – THE INFORMATION GAINED BY
OPERATING IN THE AREA AND PERFORMING A CASING
JOB.
THE DESIRED INFORMATION IN CASING
ARE:
[Link] CONDITION AND HABIT – THIS PROVIDES
INFORMATION AND DESCRIPTION OF THE LOCALITY AS TO
WHETHER THE PLACE IS RESIDENTIAL, COMMERCIAL, HIGHLY
URBANIZED, OR RURAL.
2. ACTIVE OPPOSITION – THIS REFERS TO ORGANS OF EVERY
ACTIVITY SYSTEM WHOSE TASK IS TO PREVENT INTELLIGENCE
ACTIVITY IN EACH AREA.
3. DISPOSAL PLAN – THE DISPOSAL OF THE
INFORMATION AND MATERIALS IN CASES OF
POSSIBLE COMPROMISE.
4. ESCAPE AND EVASION PLAN –THE PLAN IN
CASES OF EMERGENCIES, FROM IMMEDIATE
FOCAL POINT, WHICH INCLUDES THE GENERAL
AREA AND COMPLETELY FROM THE AREA.
SURVEILLA
NCE
SURVEILLANCE
-THIS REFERS TO A FORM OF
CLANDESTINE INVESTIGATION WHICH
INVOLVES KEEPING A PERSON, PLACE
OR OTHER TARGETS UNDER PHYSICAL
OBSERVATION IN ORDER TO OBTAIN
EVIDENCE OR INFORMATION
PERTINENT TO THE INVESTIGATION.
Surveillance
-Presentations are communication tools that can
be wand as demonstrations, lectures, speeches
reports, and more
Title
-This refers to a form of clandestine
investigation which involves keeping a person,
place or other targets under physical
OBJECTIVES OF
SURVEILLANCE
1. TO CONFIRM OR DENY ALLEGATIONS.
2. TO IDENTIFY PERSONS INVOLVED IN CERTAIN ACTIVITIES.
3. TO PROVIDE BACKGROUND INFORMATION FOR UNDERCOVER
ASSIGNMENT.
4. TO DEVELOP LEADS TO VITAL INFORMATION.
5. TO OBTAIN UPON WHICH TO CONDUCT ADDITIONAL
INVESTIGATION.
6. TO CHECK ON SOURCES OF INFORMATION.
7. TO LOCATE ADDRESSES, OR PLACES FREQUENTLY BY
SUBJECT AS WELL AS HIS ASSOCIATES.
8. TO OBTAIN DETAILED INFORMATION ABOUT THE
NATURE, SCOPE OF SUBJECT’S ACTIVITIES.
9. TO SECURE BASIS FOR SECURING SEARCH WARRANT.
10. TO PROVIDE PROTECTION.
Related Terms:
1. PRE-SURVEILLANCE CONFERENCE – A
CONFERENCE HELD AMONG THE TEAM MEMBERS OR
THE POLICE INTELLIGENCE UNIT BEFORE THE CONDUCT
OF SURVEILLANCE.
2. SUBJECT/RABBIT- IT REFERS TO THE SUBJECT
WHICH IS EITHER PERSON OR PLACE.
[Link] – A PERSON WHO CONDUCTS A
SURVEILLANCE WHICH INCLUDES OBSERVATIONS ONLY.
4. STAKEOUT OR PLANT – THE OBSERVATION OF
PLACES OR AREAS FROM A FIXED POINT.
5. TAILING OR SHADOWING – THE OBSERVATION OF A
PERSON’S MOVEMENT.
6. UNDERCOVER MAN –A PERSON TRAINED TO OBSERVE AND
PENETRATE A CERTAIN ORGANIZATION SUSPECTED OF ILLEGAL
ACTIVITIES AND REPORTS THE OBSERVATIONS AND
INFORMATION FOR PROPER OPERATIONAL ACTION.
7. SAFE HOUSE – A PLACE, BUILDING, ENCLOSED MOBILE, OR
AN APARTMENT, WHERE POLICE UNDERCOVERS MAN MEETS
HIS ACTION AGENT FOR DEBRIEFING OR REPORTING
PURPOSES.
8. DROP – A CONVENIENT, SECURE, AND UNSUSPECTING WHERE
A POLICE UNDERCOVER MAN, INFORMER, OR THING PLACE BY A
PRE-ARRANGEMENT, LEAVES A NOTE, A SMALL PACKAGE AN
ENVELOPE OR ITEM FOR THE ACTION AGENT, SUPERVISOR, OR
ANOTHER AGENT.
9. CONVOY – AN ACCOMPLICE OR ASSOCIATE OF THE SUBJECT.
DECOY-A PERSON OR OBJECT, ALMOST LIKE THE SUBJECT, WHICH
IS USED TO AVOID OR ELUDE THE SURVEILLANCES.
10. CONTACT – A PERSON WHOM THE SUBJECT PICKS OR DEALS
WHIT WHILE HE IS UNDER SURVEILLANCE.
11. MADE OR BURNOUT – IT REFERS TO THE SUBJECT UNDER
SURVEILLANCE WHO BECOMES AWARE THAT HE IS UNDER
OBSERVATION AND IDENTIFIES THE OBSERVER.
12. LOST - WHEN THE SURVEILLANCES DOES NOT KNOW THE
WHERE ABOUT OF HIS SUBJECT OR THE SUBJECT HAD ELUDED THE
SURVEILLANCE.
13. FINGER MAN – AN INDIVIDUAL WHO CAN POSITIVELY POINT THE
SUBJECT.
14. PUT TO BED - WHEN THE SUBJECT, UNDER SURVEILLANCE,
RETURNS TO THE QUARTER TO RETIRE FOR THE NIGHT.
TYPES OF SURVEILLANCE
ACCORDING TO INTENSITY AND SENSITIVITY
1. DISCREET – SUBJECT TO BE WATCHED IS UNAWARE THAT
HE IS UNDER OBSERVATION.
2. CLOSE – SUBJECT IS AWARE THAT HE IS UNDER
OBSERVATION.
3. LOOSE – APPLIED FREQUENTLY OR INFREQUENTLY, THE
PERIOD OF OBSERVATION WHICH VARIES FOR EACH
OCCASION.
1. STATIONARY – THE OBSERVATION OF PLACE,
USUALLY A BOOKIE STALL, A GAMBLING JOINT, OR A
RESIDENCE WHERE ILLEGAL ACTIVITIES ARE
HAPPENING(FIXED LOCATION).
2. MOVING – THE SURVEILLANT FOLLOWS THE
SUBJECT FROM PLACE TO PLACE TO MAINTAIN
CONTINUOUS WATCH OF HIS ACTIVITIES.
3. TECHNICAL - A SURVEILLANT USES HARDWARE,
GADGETS, TELECOMMUNICATION SYSTEMS, AND
EQUIPMENT.
PREPARATION OF
SURVEILLANCE
A. AREA AND TARGET STUDY – ALL AVAILABLE INFORMATION
ABOUT THE AREAS SHOULD BE COLLECTED AND ANALYZED.
B. SURVEILLANCE PLAN- THE PLAN SHOULD ESTABLISH THE
REQUIRED TYPE OF PERSONNEL, AS WELL AS THE GENERAL
AND SPECIFIC INSTRUCTIONS FOR SURVEILLANT.
A. SELECTION OF
PERSONNEL
1. INCONSPICUOUS PHYSICAL
CHARACTER
6. DRIVING ABILITY
2. ABILITY TO REMAIN UNNOTICED
7. PERSONAL COURAGE
3. RESOURCEFULNESS
8. AREA KNOWLEDGE
4. PATIENCE AND PHYSICAL STAMINA
5. KEEN SENSORY PERCEPTION AND 9. SECURITY CONSCIOUSNESS
RETENTIVE MEMORY
A. ADMINISTRATIVE AND
LOGISTICS
1. COMMUNICATION AND CONTROL
2. THE CONDUCT OF SURVEILLANCE
EQUIPMENT IN
SURVEILLANCE:
1. CAMERA WITH TELEPHOTO LENS
2. VOICE RECORDER
3. MINI-VIDEO CAMERA AND OTHERS
KINDS OF SURVEILLANCE
A. STAKE OUT OR SURVEILLANCE OF PLACES
TWO TYPES OF PLACE SURVEILLANCE:
1. USING A ROOM IN A NEARBY HOUSE OR BUSINESS ESTABLISHMENT
AND REMAINING UNDERCOVER.
2. REMAINING OUTDOORS AND POSING AS A PERSON WHO NORMALLY
CONDUCT HIS AS BUSINESS IN SUCH AN AREA, EX. A LABORER,
CARPENTER, STREET VENDOR, ETC.
B. TAILING OR SHADOWING DON’TS IN
SHADOWING:
1. DO NOT MAKE ABRUPT OR UNNATURAL MOVEMENTS.
2. DO NOT MAKE USE OF DISGUISE THAT WILL ATTRACT ATTENTION.
3. DO NOT MEET THE SUBJECT’S EYE. DOING SO TENDS TO FIX THE SHADOWER IN IN THE MIND
OF THE SUBJECT. IF THE SUBJECT TURNS AND IT SEEMS AS IF A FACE TO FACE ENCOUNTER WILL
RESULT, THE SHADOWER MUST LOOK ANYWHERE EXCEPT THE SUBJECT’S FACE.
4. DO NOT ADOPT A SLINKING, SLEUTHING, CREEPING, PEEKING MANNER. DO NOT SLINK IN AND
OUT OF DOORWAYS, SLEUTH BEHIND THE SUBJECT, CREEP FROM AROUND PARKED CARS, PEEK
FOR AROUND CORNERS, IT IS UNNECESSARY, INEFFECTUAL AND ABOVE ALL ATTRACT
ATTENTION.
5. DO NOT WEAR STORY BOOK DISGUISES. FALSE WHISKERS,
ARTIFICIAL NOSES, SIMULATED DEFORMITIES AND THE LIKE,
THESE DISGUISES MAYBE GOOD IN THEATERS BUT NOT ON THE
STREET
6. DO NOT CARRY BRIEFCASES, NOTEBOOKS, PAPERS, OR OTHE
METHODS OF SHADOWING
[Link] SURVEILLANCE
1. ONE-MAN SHADOW
2. TWO- MAN SHADOW
3. THREE- MAN SHADOW OR THE ABC
METHOD
TECHNIQUES IN SHADOWING USING
FOOT SURVEILLANCE:
1. TURNING CORNER- IF THE SUBJECT TURNS A COMER, THE
SURVEILLANT SHOULD NOT HURRY.
2. ENTERING A BUILDING- IF THE BUILDING IS A STORE, THE
SURVEILLANT SHOULD WAIT UNTIL THE SUBJECT COMES OUT.
3. TAKING A BUS- THE SURVEILLANT SHOULD BOARD THE
SAME BUS, SIT BEHIND THE SUBJECT AND ON THE SAME SIDE
4. TAKING A TAXI
5. TAKING A TRAIN- IF THE SUBJECT SHOWS HIS
INTENTION OF BUYING A TICKET, THE SURVEILLANT
SHOULD ENDEAVOR TO GET IN LINE BEHIND HIM WITH
ONE PERSON INTERVENING.
6. IN A RESTAURANT THE SURVEILLANT SHOULD ALLOW
A FEW MINUTES INTO A TO ELAPSE BEFORE FOLLOWING
THE SUBJECT RESTAURANT.
7. IN A HOTEL OF AN INQUIRY CAN BE MADE
CONCERNING THE ROOM OF THE SUBJECT.
8. IN A TELEPHONE BOOTH THE SURVEILLANT SHOULD
EITHER GO THE NEXT BOOTH OR STAND NEAR ENOUGH
TO HEAR.
9. IN THE THEATER- THE SURVEILLANT SHOULD SIT
BEHIND THE SUBJECT AND TAKE NOTE OF THE VARIOUS
AVAILABLE EXITS.
UNDERCOVER
INVESTIGATION
UNDERCOVER
INVESTIGATION?
IT IS A FORM OF INVESTIGATION WHERE THE
INVESTIGATOR ASSUMES A DIFFERENT AND
UNOFFICIAL IDENTITY TO OBTAIN INFORMATION.
IMPORTANCE OF UNDERCOVER
INVESTIGATION
IN LAW ENFORCEMENT AGENCIES, MEMBERS OF
ORGANIZED CRIME, LOCAL GAMBLING OPERATORS, AND
PROSTITUTES MAKE IT THEIR BUSINESS TO GET TO
KNOW THE FACES OF AS MANY MEMBERS OF THE POLICE
DEPARTMENT AS POSSIBLE.
TYPES OF UNDERCOVER ACCORDING TO
TIME FRAME:
1. LONG-RANGE – THIS TYPE OF OPERATIONS CAN PROVIDE
RELIABLE, ACCURATE, AND CONTINUING ACCESS TO INFORMATION
WHICH WOULD NOT BE OTHERWISE ATTAINABLE IN SHORT-RANGE.
2. SHORT-RANGE – THE DURATION OF SHORT UNDERCOVER ACTIVITY
MAY VARY CONSIDERABLY, FORM ONE-TIME INTERVIEW TO A SERIES
OF SEPARATE BUT RELATED ACTIONS OVER AN EXTENDED PERIOD.
SELECTION OF UNDERCOVER
WORKER
THE IDEAL UNDERCOVER AGENT IS A COMBINATION OF
AN ACTOR AND A GOOD INVESTIGATOR. THE SELECTION
SHALL BE MADE IN CONSIDERATION OF THE FOLLOWING
ELEMENTS:
1. BACKGROUND - A GOOD UNDERCOVER HAVE THE ABILITY
TO FIT IN THE ENVIRONMENT OF ASSIGNMENT. THE SPEECH
AND LINE OF THINKING MUST SUIT THAT OF HIS ASSOCIATES.
HIS EDUCATIONAL AND TECHNICAL BACKGROUND MUST RISE
TO THE REQUIRED LEVEL AND STRATUM THAT IS NAVIGATED,
WHICH ALSO INCLUDE CONVERSATION AND KNOWLEDGE AND
GENERAL INFORMATION OF HOBBIES, SPORTS
2. TEMPERAMENT A CALM, AFFABLE, AND ENDURING
PERSONALITY IS REQUIRED.
- IT IS NECESSARY THAT THE AGENT’S SELF-CONFIDENCE IS
ESTABLISHED SO THAT IT WILL CARRY HIM THROUGH THE
MORE TRYING MOMENTS.
3. INTELLECT THE UNDERCOVER AGENT MUST, ABOVE ALL,
BE INTELLIGENT. HE SHOULD HAVE A CLEAR
UNDERSTANDING OF THE OBJECTIVE OF THE MISSION, THE
KNOWLEDGE OF THE OVER-ALL STRATEGY, A RETENTIVE
MEMORY, AND A KEEN IMAGINATION MUST BE EMPLOYED TO
ACCOMPLISH THE MISSION.
SPECIAL QUALIFICATIONS
1. KNOWLEDGE OF THE LANGUAGE
2. AREA BACKGROUND REGARDING EVENTS
3. KNOWLEDGE ABOUT THE CUSTOMS AND
HABITS
4. PHYSICAL APPEARANCE IS APPROPRIATE
A. STUDY OF THE
SUBJECT
1. NAME
PREPARATION OF 2. ADDRESS
3. DESCRIPTION
UNDERCOVER 4. FAMILY AND
ASSIGNMENTS RELATIVES
5. ASSOCIATES
6. CHARACTER AND TEMPERAMENT
7. DRUG
8. HOBBIES
9. EDUCATION
10. OCCUPATION AND SPECIALTY
A. KNOWLEDGE OF THE AREA
1. MAPS
2. NATIONAL AND RELIGIOUS
BACKGROUND
3. TRANSPORTATION
4. PUBLIC UTILITIES
KNOWLEDGE OF SUBVERSIVE
ORGANIZATIONS
1. HISTORY AND BACKGROUND OF ORGANIZATION AND BIOGRAPHY OF
THE OFFICIALS.
2. IDENTITY AND BACKGROUND OF MEMBERS AND FORMER MEMBERS.
3. METHOD OF IDENTIFICATION EMPLOYED BY MEMBERS.
4. FILES AND RECORDS OF NATURE, LOCATION, AND ITS ACCESSIBILITY.
5. MEETING SCHEDULE AND THE MEETING PLACE.
COVER
-THE MEANS USED BY AN INDIVIDUAL GROUP OR
ORGANIZATION TO CONCEAL THE TRUE NATURE
OF ITS ACTS AND EXISTENCE FROM THE
OBSERVER.
CODE NAME
-THE ALIAS OR SYMBOLIC DESIGNATIONS USED
BY INTELLIGENCE OFFICER, INFORMANTS, AND
EVEN CRIMINALS FOR SECURITY.
COVER STORY
- IT REFERS TO ANY MADE UP SCENARIO TO
COVER UP THE OPERATION. IT MAY INCLUDE:
COVER SUPPORT - AN AGENT ASSIGNED IN
TARGET AREAS WITH THE PRIMARY MISSION OF
SUPPORTING THE COVER STORY.
PHYSICAL DETAILS – PERSONAL POSSESSIONS
SHOULD BE OBTAINED FOR THE UNDERCOVER
INVESTIGATOR, WHICH IS APPROPRIATE TO THE
CHARACTER ASSUMED IN QUALITY, PRICE, AGE,
FIT, AND DEGREE OF CLEANLINESS..
HAZARDS TO COVER:
1. PASSIVE OPPOSITION – IT REFERS TO PEOPLE WHO ARE NOT DIRECTLY
INVOLVED IN SECURITY AND ČI ACTIVITIES.
2. FRIENDLY OR NOT HOSTILE OPPOSITION – IT REFERS TO FRIENDLY
ORGANIZATIONS THAT MAY HINDER THE OPERATIONS.
3. UNFRIENDLY OR HOSTILE ACTIVE OPPOSITION IT REFERS TO THE ENEMY
INTELLIGENCE OPERATIONS THAT MAY COMPROMISE THE UNDERCOVER.
PRECAUTIONS OR GUIDELINES IN CASE
OF COMPROMISE
1. MOVE OUT IMMEDIATELY.
2. START NEW FACILITIES FOR OPERATION AND
DEVELOP IT.
3. BUILD ENTIRELY NEW COVER.
4. USE CIRCUITOUS ROUTES AND PROVIDE COUNTER
SURVEILLANCE MEASURES.
5. BE SPECIFICALLY CAREFUL OF FORMER
CONTACTS WITH NON- INTELLIGENCE PERSONNEL.
6. BE PATIENT, BUILD SLOWLY, AND CAREFULLY.
GOLDEN RULES OF AN UNDERCOVER
AGENT:
1. DON’T DRINK WHILE WORKING AS UNDER COVER.
LIQUOR IS A GREAT TONGUE LOOSENED. BUT IT CAN BE USED TO
GET THE SUBJECT.
2. DO NOT COURT WOMEN. USUALLY, THE LESS CONTACT THE
AGENT HAS WITH WOMEN, THE GREATER IS THE CHANCE OF
SUCCESS. THE INVESTIGATOR CANNOT AFFORD TO INCUR THE
ENMITY OR JEALOUSY OF A SUBJECT WHO MIGHT THINK THAT THE
INVESTIGATOR IS “MAKING TIME” WITH HIS GIRLFRIEND.
3. DO NOT TAKE A WOMAN ON AN UNDERCOVER
ASSIGNMENT. THE SUBJECT MAY BECOME INTERESTED IN THE
WOMAN. IF THIS HAPPENS, THE SUBJECT’S ATTENTION IS DIVERTED
FROM THOSE THINGS WHERE THE INVESTIGATOR’S INTERESTS LIE.
THE WOMAN MAY BE PLACED IN AN EMBARRASSING OR IMPOSSIBLE
SITUATION IN WHICH EXTRICATION MAY DISCLOSE THE IDENTITY OF
THE UNDERCOVER INVESTIGATOR.
4. DO NOT CLAIM TO BE A “BIG SHOT”. IT IS TOO EASY TO
IDENTIFY A BIG SHOT. IT WILL CAUSE MORE INQUIRIES IN THE PLACE
BEING SURVEYED. IT IS BETTER TO ASSUME A CHARACTER OF
AVERAGE STATUS OR LESS.
5. DO NOT FAIL TO PROVIDE OR INSTALL PERSONS IN THE
PLACE WHO CAN VOUCH FOR THE INVESTIGATOR.
6. DO NOT SPEND TOO MUCH MONEY. EXPENDITURES
SHOULD BE APPROPRIATE FOR THE PART BEING PLAYED, IF
NOT, SUSPICION IS AROUSED. MANY AGENTS HAVE GIVEN
THEMSELVES AWAY BY SPENDING MORE MONEY THAN THE
AMOUNT JUSTIFIED.
CONDUCT OF UNDERCOVER WORK
AGENT AND ASSIGNMENT:
[Link] – THE UNDERCOVER MUST, IN ALL
ASPECT, LIVE THE PART WHICH HE PLAYS. HIS
APPEARANCE LANGUAGE, ATTITUDE, OPINION INTEREST
AND RECREATIONS MUST SUPPORT THE ASSUMED ROLE.
2. APPROACH – THIS IS THE MAKING OF CONTACTS
WITH THE SUBJECT OR SUBJECTS, WHO NORMALLY
MAKES THE FIRST TALK WITH THE INVESTIGATOR.
3. ENTRAPMENT – IT IS AGAINST PUBLIC POLICY FOR AN
OFFICER OF THE LAW TO INCITE OR PARTICIPATE IN THE
COMMISSION OF THE CRIME.
4. WOMEN ASSOCIATES - OF ALL THE CRIMINALS, THEY ARE
FREQUENTLY EMOTIONAL AND JEALOUS. IT IS BEST
THEREFORE TO TREAT THEM WITH EXCEPTIONAL
CONSIDERATION. IT MAY BE NECESSARY TO AVOID THEIR
ASSOCIATION.
MEANS OF COMMUNICATIONS – COMMUNICATION MAY BE DONE
THROUGH TECHNICAL AND NON-TECHNICAL
1. TECHNICAL COMMUNICATIONS:
A. TELEPHONE – COMMUNICATION BETWEEN HEADQUARTERS AND THE
UNDERCOVER INVESTIGATOR MUST BE ACCOMPLISHED USING A SECRET
METHOD.
B. SECRET WRITINGS
C. RADIO
D. CELLPHONE (SMS)
[Link]-TECHNICAL
THREE FORMS OF NON-TECHNICAL
COMMUNICATIONS:
1. PERSONAL MEETINGS:
A. CAR PICK-UP
B. HOTEL MEETING
C. SAFE HOUSE MEETING
1. BRIEF ENCOUNTER – PERSONAL MEETING BETWEEN AGENT
HANDLER AND THE AGENT NOT MORE THAN 60 SECONDS TO PASS AN
URGENT MESSAGE.
2. WRITTEN REPORT – THE WRITTEN REPORT MAY BE ADDRESSED TO A
FICTITIOUS GIRLFRIEND AT A PRE- ARRANGED GENERAL DELIVERY
ADDRESS WHICH IS UNDER THE CONTROL OF OFFICIALS FROM
HEADQUARTERS
3. BRUSH PASS – PASSING OF AN OBJECT BETWEEN TWO PERSONS
GOING IN OPPOSITE DIRECTIONS.
4. MBU MEETING – THE USE VISUAL SIGNALS, VERBAL SIGNALS, AND
DANGER SIGNALS.
5. CUT-OUTS – A PERSON OR DEVICES INTERPOSE BETWEEN TWO
PERSONS OR GROUPS TO PROVIDE COMMUNICATION.
CLANDESTINE OPERATION
- IT IS A SECRET ACTION UNDERTAKEN BY AN
INTELLIGENCE / COUNTERINTELLIGENCE
ORGANIZATION IN BEHALF OF THE GOVERNMENT
OR OTHER FRIENDLY FORCES.
ELEMENTS OF CLANDESTINE
OPERATION
1. SPONSOR – IT REFERS TO THE ORGANIZATION OR
GOVERNMENT THAT AUTHORIZES, APPROVES, DIRECTS,
CONTROLS, AND SUPPORTS CLANDESTINE OPERATIONAL
ACTIVITIES. IT MAY BE REPRESENTED BY THE FOLLOWING:
A. PROJECT OFFICER
B. CASE OFFICER
C. AGENT HANDLER
2. TARGET OR RABBIT – A PERSON, PLACE, THINGS,
OR ACTIVITY AGAINST WHICH THE CLANDESTINE
ORGANIZATIONOR OPERATIONAL ACTIVITY IS
DIRECTED.
3. AGENT – A PERSON WHO IS AWARE THAT HE/SHE
IS ENGAGED IN COUNTER OPERATIONAL ACTIVITY AND
WILLINGLY ACCEPTS CONTROL AND DIRECTION.
CLASSIFICATION OF CLANDESTINE
AGENTS:
A. PRINCIPAL AGENT OR AGENT HANDLER – A MANAGERIAL
AGENT AND IN MOST CASES THE LEADER OF THE AGENT NETWORK.
B. ACTION AGENT – THE DOER OF THE CLANDESTINE TASK AND
FURTHER CLASSIFIED ACCORDING TO THE TASK THAT HE IS
ASSIGNED.
C. ESPIONAGE (COUNTER INTEL/INTEL AGENT) - THE PRIMARY
AND MOST IMPORTANT HUMAN COLLECTOR AGENT.
D. PROPAGANDIST – AN AGENT THAT UNDERTAKES ACTION TO
MOLD THE ATTITUDES, OPINIONS, AND ACTIONS OF AN INDIVIDUAL,
GROUP, ORGANIZATION OR NATION.
E. SABOTEUR – AN AGENT WHO UNDERTAKES POSITIVE ACTION
AGAINST UNFRIENDLY POWER OR FORCES RESULTING IN THE LOSS
TEMPORARILY OR PERMANENTLY OF AN ARTICLE, MATERIAL OR
FACILITIES WHICH ARE BEING USED.
F. GUERILLA – A MEMBER OF A PARAMILITARY GROUP ORGANIZED
TO HARASS THE ENEMY.
G. STRONG MAN/ARM – A AGENT READILY AVAILABLE TO PROVIDE
SPECIAL PROTECTION DURING DANGEROUS PHASES OF THE
CLANDESTINE OPERATION.
H. PROVOCATEUR – AN AGENT WHO INDUCES AN OPPONENT
TO ACT ON HIS OWN DETRIMENT BY DISCREDITING HIMSELF
OR REVEALING HIS TRUE PURPOSE OR IDENTITY.
I. COVER ACTION AGENT – A FULLY RECRUITED AGENT WHO
IS IN A SENIOR POSITION USUALLY WITHIN THE GOVERNMENT
AND IS ENABLED TO EXERT INFLUENCE FROM FOREIGN
GOVERNMENT UPON THE DIRECTION OF THE SPONSOR.
J. SUPPORT AGENT – AN AGENT WHO ENGAGES IN
ACTIVITIES WHICH SUPPORT THE CLANDESTINE OPERATION
CATEGORIES OF SUPPORT
AGENT ARE:
A. SURVEILLANT – A SUPPORT AGENT WHO OBSERVES
PERSONS AND PACES OF OPERATIONAL INTERESTS.
B. INVESTIGATOR – A AGENT WHO PROVIDES INFORMATION
ABOUT PERSONS OR THINGS OF OPERATIONAL INTERESTS.
C. PROCURER OF FUNDS – A AGENT WHO OBTAINS SPECIAL
CURRENCY WHEN NEEDED FOR OPERATIONAL USE.
D. PROCURER OF SUPPLIES- AN AGENT WHO SUPPLIES OR
PROCURES ORDINARY AS WELL AS CRITICAL OPERATIONAL
MATERIALS.
E. SAFE HOUSEKEEPER – A AGENT WHO MANAGES AND
MAINTAINS THE SAFE HOUSE FOR OPERATIONAL USE, SUCH
AS FOR BRIEFINGS, MEETINGS, DEBRIEFINGS AND SAFE
HAVEN AND TRAINING.
F. MANAGER OF STORAGE AREA – AN AGENT WHO
ARRANGES THE STORAGE, DISTRIBUTION, TRANSPORTATION
OF OPERATIONAL SUPPLIES.
G. COMMUNICATION AGENT (COMMO. AGENT) – AN
AGENT WHO FACILITATES COMMUNICATIONS.
TACTICAL
INTERROGATION
- THIS IS CONDUCTED BECAUSE
THERE IS A NEED TO OBTAIN
INFORMATION OF THE HIGHEST
DEGREE OF CREDIBILITY WITH THE
MINIMUM AMOUNT OF TIME.
RELATED TERMS:
INTERROGATION – IT IS
THE SYSTEMATIC ASKING
OF QUESTIONS TO ELICIT
INFORMATION IN THE
MINIMUM OF TIME.
INTERROGATOR – THIS
REFERS TO THE PERSON
WHO DOES THE
QUESTIONING.
INTERROG
EE- IT INCLUDES ANY PERSON
WHO IS SUBJECTED TO THE
INTERROGATION PROCESS IN
ANY OF ITS FORMS AND
PHASES.
SUSPECT - IT REFERS TO ANY
PERSON BELIEVED TO BE
ASSOCIATED WITH
PROHIBITED ACTIVITY.
SOURCE – IT REFERS TO
PERSONS WHO FOR
ANY REASON SUBMIT
INFORMATION OF INTELLIGENCE
INTEREST USUALLY IN A
VOLUNTARY BASIS.
WITNESS – IT
DENOTES TO ANY
PERSON WHO HAS
DIRECT KNOWLEDGE
OF FACTS
CONCERNING AN
EVENT OR ACTIVITY.
PROVOCATEUR – AN INDIVIDUAL FROM AN
ENEMY FORCE WHO IS DELIBERATELY
INTRODUCED IN OUR CUSTODY WITH A SPECIFIC
MISSION OF CAUSING SOME UNFAVORABLE
ACTION OR REACTION ON OUR PART.
SCREENING – INITIAL EXAMINATION OF AN
INTERROGEE TO DETERMINE THE EXTENT OF HIS
KNOWLEDGE OF PERSONS, PLACES, THINGS, OR
EVENTS IN WHICH WE ARE INTERESTED.
FORMAL INTERROGATION – IT REFERS TO THE
SYSTEMATIC ATTEMPT TO EXPLOIT TO AN
APPROPRIATE DEPTH THOSE AREAS OF
INTERROGEE’S KNOWLEDGE, WHICH HAVE BEEN
IDENTIFIED IN THE SCREENING PROCESS.
DEBRIEFING – IT IS THE INTERROGATION OF A FRIENDLY
INTERROGEE WHO HAS INFORMATION AT THE DIRECTION OF OR
UNDER THE CONTROL OF THE FRIENDLY INTELLIGENCE SERVICE.
INTERVIEW – IT IS SIMILAR TO DEBRIEFING ALTHOUGH IT IS LESS
FORMAL, AND THE INTERROGEE IS NOT NECESSARILY UNDER THE
CONTROL OR EMPLOYMENT OF THE RESPECTIVE INTELLIGENCE
SERVICE.
INTERROGATION REPORT – IT IS AN ORAL OR WRITTEN
STATEMENT OF INFORMATION BY THE QUESTIONING OF AN
INTERROGEE.
FORMS OF INTERROGATION:
1. DIRECT – THE SUBJECT KNOWS HE IS BEING INTERROGATED, BU
HE MAY NOT KNOW THE TRUE OBJECTIVE OF THE INTERROGATION.
THIS IS BEING USED EXTENSIVELY AT THE TACTICAL LEVEL.
2. INDIRECT – THE SUBJECT IS UNAWARE THAT HE IS BEING
INTERROGATED. THIS IS USED WHEN THE TIME ELEMENT IS NOT SO
IMPORTANT.
TYPES OF INTERROGATION:
1. SCREENING – USUALLY ACCOMPLISHED RIGHTAFTER CAPTURE,
APPREHENSION, OR ARREST OF AN INTERROGEE.
2. FORMAL INTERROGATION (DETAILED) -THE SYSTEMATIC ATTEMPT
TO EXPLOIT TO AN APPROPRIATE DEPTH THE INTERROGEE’S KNOWLEDGE,
WHICH HAS BEEN IDENTIFIED IN THE SCREENING PROCESS.
3. DEBRIEFING – A FORM OF ELICITING INFORMATION WHICH IS
GENERALLY USED WHEN THE AREA OF KNOWLEDGE OF THE INTERROGEE
IS KNOWN.
4. INTERVIEW – THE INTERVIEWER MUST BE FULLY AWARE OF
THE ACTUAL TYPE OF INFORMATION DESIRED AND ALERT ON
THE INTERVIEWEE’S MOODS AND EXPRESSION.
[Link] OF LAY PERSONNEL (SPECIFIC TYPE) –
THE TECHNIQUES USED ARE SIMILAR WITH OTHER
INTERROGATIONS, HOWEVER, ESPECIAL EFFORT MUST BE MADE
TO ESTABLISH A COMMON FRAME OF REFERENCE BETWEEN THE
INTERROGATOR AND INTERROGEE.
[Link] INTERROGATION - THE LEVEL OF
INTERROGATION WHERE THE SOURCE HAS SPECIFIC AND
DETAILED INFORMATION THAT REQUIRES A TRAINED EXPERT IN
THE SUBJECT MATTER TO BE EXPLORED.
PHASES OF INTERROGATION:
1. PLANNING AND PREPARATION
[Link] (MEETING THE INTERROGEE)
[Link]
[Link]
5. RECORDING
[Link]
INTERROGATION TECHNIQUES
TECHNIQUE APPROACH – THE PURPOSE OF
THE VARIOUS APPROACH IS TO EARN THE
COOPERATIONS OF THE SOURCE AND INDUCE
HIM TO ANSWER QUESTIONS THAT WILL FOLLOW
[Link] OPEN TECHNIQUE – THE INTERROGATOR IS
OPEN AND DIRECT IN HIS APPROACH AND MAKES
NO ATTEMPT TO CONCEAL THE PURPOSE OF THE
INTERROGATION.
2. COMMON INTEREST TECHNIQUE – THE
INTERROGATOR MUST EXERT EFFORT TO IMPRESS
THE INTERROGEE OF THEIR COMMON INTEREST.
3. RECORD FILE (WE KNOW ALL) – THE
INTERROGATOR PREPARES A FILE ON THE SOURCE,
LISTING ALL KNOWN INFORMATION (THE RECORD
SHOULD BE PADDED TO MAKE IT APPEAR TO BE
VERY EXTENSIVE).
4. OPPOSITE PERSONALITIES TECHNIQUE – IT
IS ALSO KNOWN AS THE “MUTT AND JEFF”; “TREAT
AND RESCUE”; “BAD GUY – GOOD GUY”; SWEET
AND SOUR”; “SUGAR – VINEGAR”; AND “DEVIL –
ANGEL”.
5. EGOTIST TECHNIQUE (PRIDE AND EGO) – USUALLY
SUCCESSFUL WHEN EMPLOYED AGAINST AN INTERROGEE WHO
HAS DISPLAYED A WEAKNESS OR A FEELING OF INSECURITY.
[Link] TECHNIQUE – EMPLOYED AGAINST NERVOUS OR
THE CONFIDENT TYPE OF INTERROGEE.
[Link] BARRAGE TECHNIQUE (RAPID FIRE
QUESTIONING) – THIS IS INTENDED TO CONFUSE THE
INTERROGEE AND PUT HIM INTO A DEFENSIVE POSITION
SECURITY AND ACCESS OF
INFORMATION AND DOCUMENTS
DEFINITION OF TERMS
DOCUMENT – ANY RECORDED INFORMATION, REGARDLESS OF PHYSICAL
FORMS OR CHARACTERISTICS, AND MAY INCLUDE BUT NOT LIMITED TO THE
FOLLOWING:
CLASSIFY - ,ASSIGNING INFORMATION OR MATERIAL USING ONE OF THE FOUR
SECURITY CLASSIFICATION CATEGORIES AFTER DETERMINING THAT THE
INFORMATION REQUIRES SPECIAL PROTECTION AS STATED IN THE REGULATIONS.
CLASSIFIED MATTERS – INFORMATION OR MATERIALS IN ANY
FORM OR OF ANY NATURE WHICH REQUIRES SAFEGUARDING FOR
THE INTEREST OF NATIONAL SECURITY.
SECURITY CLEARANCE – AN ADMINISTRATIVE MANNER OF
DETERMINING IF AN INDIVIDUAL IS ELIGIBLE, FROM A SECURITY
STANDPOINT, TO ACCESS CLASSIFIED MATTER OF SPECIFIC
CATEGORY.
COMPROMISE – A LOSS OF SECURITY WHICH RESULTS FROM
UNAUTHORIZED PERSONS OBTAINING KNOWLEDGE OF CLASSIFIED
MATTERS
COMPARTMENTALIZATION – THE GRANT OF ACCESS TO
CLASSIFIED MATTER ONLY TO PROPERLY CLEARED PERSONS.
NEED-TO-KNOW – THE TERM GIVEN TO THE DISSEMINATION OF
CLASSIFIED MATTERS BE LIMITED STRICTLY TO THOSE PERSONS
WHOSE OFFICIAL MILITARY OR OTHER GOVERNMENTAL DUTIES
REQUIRES KNOWLEDGE OF POSSESSION THEREOF.
DAMAGE TO NATIONAL SECURITY – THE PREJUDICE,
EMBARRASSMENT, OR INJURY TO THE REPUBLIC OF THE
PHILIPPINES RESULTING FROM ANY ACT OR OMISSION.
DECLASSIFY – THE REMOVAL OF SECURITY CLASSIFICATION FROM THE CLASSIFIED
MATTER. NOTIFICATION OF INTERESTED COMMANDS IS PART OF THE PROCESS.
RECLASSIFY OR REGARDING – THE ACT OF CHANGING THE ASSIGNED
CLASSIFICATION. NOTIFICATION OF UNAWARE AUTHORITIES IS PART OF THE
PROCESS.
UPGRADING – THE ACT OF ASSIGNING TO A MATTER OF HIGHER CLASSIFICATION
THAN THAT PREVIOUSLY ASSIGNED TO [Link] OF INTERESTED COMMAND IS
PART OF THE PROCESS.
SECURITY AWARENESS – STATES OF MIND AND IMPLIES UNDERSTANDING OF
SECURITY PRINCIPLES, SECURITY PROCEDURES, AND SECURITY OBJECTIVES.
WHAT IS NATIONAL
INTEREST?
– NATIONAL INTEREST HAS
SEVERAL DEFINITIONS.
FOR THIS PURPOSE,
NATIONAL INTEREST
MEANS THE GENERAL AND
CONTINUING END FOR
WHICH A NATION ACTS.
NATIONAL SECURITY
– IN FURTHERANCE OF
OUR NATIONAL PRINCIPLES
AND POLICIES, THE
NATION’S LEADER IS
ENABLED TO FORMULATE
OUR STRATEGY.
NATIONAL POWER
– THE ELEMENTS OF NATIONAL
POWERS ARE NUMERICAL
STRENGTH AND CHARACTER OF
POPULATION, CULTURAL
DEVELOPMENT, CHARACTER OF
GOVERNMENT, GEOGRAPHICAL
LOCATION, RESOURCES,
ECONOMIC DEVELOPMENT,
AND MILITARY POTENTIAL.
COMPONENTS OF NATIONAL
POWER
1. POLITICAL STRENGTH
– THIS STEMS FROM THE
CHARACTER OF THE PEOPLE,
THE TYPE AND STABILITY OF
THE GOVERNMENT, AND THE
SOUNDNESS OF ITS FOREIGN
POLICY.
2. ECONOMIC STRENGTH
– THIS STEMS FROM A
COMBINATION OF FACTORS
SUCH AS GEOGRAPHIC
3. CULTURAL STRENGTH
– THIS STEMS FROM THE
NATIONAL UNITY, THE SOCIAL AND
MORAL FIBER OF THE PEOPLE,
AND THE THINGS THEY BELIEVE
IN, AND FROM THE NATURE AND
VIGOR OF NATIONAL
INSTITUTIONS-POLITICAL, SOCIAL,
RELIGIOUS, EDUCATIONAL,
SCIENTIFIC, AND CULTURAL.
4. MILITARY STRENGTH
– THE NATION’S ABILITY TO
EXERT PRESSURE THROUGH
ARMED FORCES IN
FURTHERANCE NATIONAL
SECURITY.