POLICE INTELLIGENCE By: CHARIBETH M. MAGNO REGISTERED CRIMINOLOGIST *
Introduction “ WHATEVER I SEE OR HEAR OF A CONFIDENTIAL NATURE THAT IS CONFIDED TO ME IN MY OFFICIAL CAPACITY WILL BE KEPT EVER SECRET UNLESS REVELATION IS NECESSARY IN THE PERFORMANCE OF MY DUTY” An Excerpt from the Law Enforcement Code *
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” “If you know yourself and not the enemy, for every victory, you will suffer defeat.” “If you know neither yourself nor the enemy, you are a fool who will meet defeat in every battle” - SUN TZU *
Definition of Terms National Intelligence – the total product of intelligence developed by all governmental agencies that cover the broad aspects of national policy and security. Military Intelligence – it is used in the preparation of military policies, plans and programs. It includes the strategic and combat intelligence. Strategic Intelligence – that knowledge pertaining to the capabilities and probable courses of action of foreign nations. Combat Intelligence – is required by the commander in order to determine the best use of his available firepower and maneuver forces, to accomplish his mission, and to maintain the security of his command. Counter Intelligence – an aspect of intelligence devoted to offensive actions to destroy or neutralize the effectiveness of adverse intelligence activities and to undertake defensive actions to protect information against espionage, individuals against subversion , and installations or materials against sabotage. *
National Security- this shall refer to the state or condition wherein the people’s way of life and attitudes, their institutions, territorial integrity and sovereignty, including their well-being, are protected and enhanced. It is synonymous with the protection of the political, economic, psycho-social, military, geo-ecological, and techno-scientific environment of the nation. *
Information - this shall refer to unevaluated material of every description including that derived from observations, communications, reports, rumors, imagery, and other sources from which intelligence is produced. It is aimed at identifying the composition, organization, and leadership, disposition, training, strategy, and tactics of the insurgents and other threat groups. Syndicated Crime Group – is a group of two or more persons who bond themselves together for the actual commision of crimes in a limited time and frame and jurisdiction. Organized Crime Group – any enterprise or group of persons with a formalized structure engaged in a continuing illegal activity whose primary objective is to obtain profit through criminal activities that transcend national borders and maintains its position through the use of violence, intimidation and corruption.( ATLEAST 2 Hierarchy / LEVEL) *
Order of Battle – is a document which reflects enemy composition, disposition, strength, tactics, logistics, training, combat effectiveness, miscellaneous data, and personalities. Area of Operation – those aspects of the operational environment exclusive of the military forces involved. It concerns weather economics, politics, sociology, hydrographic (study of seas, lakes, etc.) and characteristics of the environment of an area in which military operations are taking place or planned. Capabilities – form a military standpoint, enemy capabilities are courses of action which the enemy can adopt and which, if adopted, will influenced the accomplishment of the friendly mission, either favorable or not. From a broader national standpoint, capabilities of a nation are the available, workable, courses of action to accomplish national objectives. Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it susceptible to any action, which reduces its war, potential, and or its will to fight. *
HISTORICAL FEATURES (Selected Concepts Only) Biblical Setting The earliest source of intelligence, in the age of belief is super natural interventions in the affairs of men, were prophets, seers, oracles, soothsayers and astrologers. Since God knew what was going to happen ahead to time, having to some extent ordained the outcome of events, it was logical to seek out divine intentions in the inspiration of holy men in the riddles of oracles, in the stars and often in dreams. The earliest recorded instances of intelligence fathering can be found in the Holy Bible (Numbers 13) “ When Moses was in the wilderness with the children of Israel, he was directed by the Lord to send a ruler to each of the tribes of Israel to spy out the Land of Canaan which the Lord had designed as their home. They spent forty days on their mission and thereafter reported back to Moses their findings.” *
MOSES One of the first recorded formalized intelligence efforts, with format, can also be found in the Holy Bible Numbers 13:17 “And Moses sent them to spy out the land of Canaan and said unto them, get you up this way southward, and go up into the mountain; and see the lands, what it is; and the people that dwell therein, whether they are strong or weak, few or many; and what the land they dwelt in, whether in tents, or in strongholds; and what land is; whether it be fat or lean, whether there be wood therein, or not. And be of good courage and bring of the fruit of the land.” The scriptures also named the twelve intelligence agents whom the Lord directed Moses to sent into the land of Canaan and records that “all those men were heads of the children of Israel.” *
THE 12 MEN SENT BY MOSES TO SPY CANAAN SHAMMUA THE SON OF ZACCUR – Tribe of Reuben SHAPAT THE SON OF HORI – Tribe of Simeon CALEB THE SON OF JEPHUNNEH – Tribe of Judah IGAL THE SON OF JOSEPH – Tribe of Issachar HOSHEA THE SON OF NUN – Tribe of Ephraim PALTI THE SON OF RAPHU – Tribe of Benjamin GADDIEL THE SON OF SODI – Tribe of Zebulun GADDI THE SON OF SUSI – Tribe of Joseph, that is from the Tribe of Manasseh AMMIEL THE SON OF GEMALLI – Tribe of Dan SETHUR THE SON OF MICHAEL – Tribe of Asher NAHBI THE SON OF VOPSHI – Tribe of Napthali GEUEL THE SON OF MACHI – Tribe of Gad *
RAHAB The Harlot of Jericho (Joshua 2:1-21)” who sheltered and concealed the agents of Israel, made a covenant with the agents and duped their pursuers. She was not only an impromptu confederate of immense value for the Jewish leader of that far distant day, but also established a plot-pattern which is still of periodic relief to motion picture producers. *
DELILAH The Philistine used her when she allowed Philistine spies to hide in her house (Judges 16). Delilah was an impromptu intelligence agent. Apart from her tonsorial specialty, she also allowed sex to gain intelligence from a powerful enemy. She achieved the largest effective force of her employer’s adversaries and contriving the stroke which put that force out of action”. *
IMPORTANT EVENTS AND PERSONALITIES IN THE WORLD OF INTELLIGENCE Sun –Tzu A Chinese philosopher, creator of the “The Art of War” “Information must be obtained from men who knew the enemy situation.” “Know thy enemy and know yourself, you need not fear the results of a hundred battles” “If you know yourself and not the enemy, for every victory, you will suffer defeat.” “If you know neither yourself nor the enemy, you are a fool who will meet defeat in every battle.” *
Alexander the Great When Alexander the Great was marching to Asia, were rumors of disaffection growing among his allies and mercenaries, he sought the truth, and got it by simplest expedient by devising the first “letter sorting” and opening to obtain information. *
Sertorius He was the Roman Commander in Spain who possessed a White Fawn and allowed it to become widely known - that he derived secrets and guidance from the fawn. His intelligence agents credited their information to the supernatural power of animals. Akbar He was known to be the sagacious master of the Hindustan. He employed more than 4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon it. *
Genghis Khan He was known “The Great Mongol”, who used intelligence to conquer China and invade Cathay. He instructed his Generals to send out spies and used prisoners as sources of information. The leader of the so-called MONGOL CONQUERORS - made use of effective propaganda machine by spreading rumors of Mongol Terror, they collected information on weaknesses and rivalries of Europe. The leaders usually disguised as merchants. *
RENAISSANCE PERIOD With the rise of Nationalism and development of modern armies, intelligence became apparent to large states. In England, Sir Francis Walsingham , under Queen Elizabeth, organized the first National Intelligence Service. He employed spies on the staff of the Admiral in Command of the Spanish Army and able to obtain information regarding Spanish Army as to their ships, equipment, forces and stores. He protected Queen Elizabeth I from countless assassins. In France, Richlieu – introduced the network of covert collectors who transmitted prompt and accurate information to Paris regarding the activities of the rebels and dissidents of the kingdom. Louis XIV – systematized political policy, continuous surveillance, postal censorship and military intelligence organization were his contributions. *
The French Intelligence System continued since 15th Century. Napoleon Bonaparte once said, “One Spy in the right place is worth 20,000 men in the field”. He organized two Bureaus of Interest: Bureau of Intelligence – which consolidate all incoming information regarding the enemy for presentation to the emperor and to obtain information as desired, and Topographic Bureau – which maintains a large map which covers the latest information regarding both enemy and friendly forces. He maintained Military Intelligence and Secret Political Police Service all over Europe. His main arm was “ Spy against spy” concept . *
Frederick the Great He was known as the “Father of Organized Military Espionage” . He has divided his agents into four classes: Common spies – those recruited among poor folk, glad to earn a small sum or to accommodate as military officer. Double spies – are unreliable renegades, chiefly involved in spreading false information to the enemy. Spies of Consequences – couriers and noblemen, staff officers, and kindred conspirators, requiring a substantial bribe or bait, Persons who were forced to undertake espionage against their own will. *
Hannibal He was considered one of the brilliant military strategists in the history of military intelligence. He had developed an effective intelligence system for 15 years in Rome. He usually roam around the city often disguise himself as a beggar to gather first hand information. Julius Caesar During his time, the staff of each Roman Legion includes ten “speculators” who served as an information-collecting agency. The “speculators” were the first intelligence personnel to appear definitely in a military organization. Military success of the Romans was aided by communication system. Made use of carrier pigeons, which made possible the amazing speed with which intelligence of Imperial Rome was transmitted. They also employed ciphers to ensure secrecy of communications. *
George Washington Conspirator under oath abounds in the history of every nation. George Washington was grand master in intelligence. He mobilized the Free Masons of the colonies at the outbreak of the American war of Independence. Karl Schulmeister He was Napoleon’s eye, Napoleon’s military secret, born on August 5, 1770. He began his career in offensive espionage under a cover role. He was able to infiltrate the Austrian General Staff. Alfred Redl He was one of the most brilliant intelligent agents. Though a homosexual, he became Chief of the Austro – Hungarian Secret Service. He became a double agent of Russia. In 1913, his treason was discovered and he was forced to commit suicide. His treason also led to the death of almost 500,000 agents and soldiers combined in his 13 years espionage episode. *
Maj. General Donovan He was the organizer of the OSS, builder of a central intelligence system - OSS whose exploits become legendary in World War II. *
Fouche of France A Frenchman born in 1759, rose to become the most feared and respected intelligence director in French history. He created a network of agent. His assistance founded the modern system of spying on spies, which later was known as counter espionage. *
Federal Bureau of Investigation First established in 1908 as an investigative arm of the U.S. Department of Justice and became what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On September 6, 1939 by a presidential directive, it came to its responsibility the task of a domestic intelligence. Central Intelligence Agency The agency was created under the US National Security Act of 1947. It was the Central Intelligence group established during the time of President Truman in January 1946. The CIA was under the National Security Council. Committee for State Security Russia - The Intelligence agency known as the KGB - Komitet Gosudarstvennoy Bezopasnosti (KGB) British Secret Service – Great Britain Mossad – Israel Britain: Scotland Yard, London Metropolitan Police Force It was established by Sir Robert Peel in 1829 which signaled the beginning of a colorful legendary police force and considered one of the most efficient in the world today. *
Central Intelligence Agency (CIA) - The agency was created under the US National Security Act of 1947 a.k.a. Public Law 110 established by the late President Truman in January 1946. The CIA is under the National Security Council. The First Director of the Agency was Rear Admiral Roscoe Hillenkoetter. Committee for State Security – Russia - The Intelligence agency known as the KGB - Komitet Gosudarstvennoy Bezopasnosti (KGB) Mossad (Ha-mosad le modiin u-letafquidim meyuhadim) – The agency’s motto is found in “Proverbs XI, 14” Where no counsel is, the people fall, but in the multitude of counselors there is safety. Mossad has two branches namely: Aman – Military Intelligence (Israels Defense Forces) Shabak – General Security Service (Internal Security); Shabak is from the word “shin bet” that means a defender who shall not be seen. Reuven Shiloah – First Director of MOSSAD *
BRITISH INTELLIGENCE SYSTEM Composed of Several Intelligence Agencies: SIS – Secret Intelligence Service MI6 – British Secret Service (Military Intelligence Section 6) a.k.a. Box 850. George Mansfield Smith-Cumming was the First Director. MI5 – Military Intelligence Section 5, founded 1909 – devoted to counter-espionage. *
ESSENTIAL INTERESTS IN INTELLIGENCE Intelligence Defined Webster defines intelligence as the capacity for understanding and for other forms of adaptive intellect of behavior; the mind in operation; the power of meeting any situation, especially a novel situation, successfully by proper behavior adjustments; the ability to apprehend the interrelationships of presented facts in such a way as to guide action towards goal; knowledge of an event, circumstances, etc., received or imparted; the gathering or distribution of information; the staff of persons engaged in obtaining such information. *
Base on Psychology- Intelligence is the capacity of a person to adjust to new situations through the use of what has been previously learned. *
According to Military Terminologies - Intelligence is the end product resulting from the collection, evaluation, analysis, integration and interpretation of all available information which my have immediate or potential significance to the development and execution of plans, policies and programs of the users. According to Police Parlance - The end product resulting from the collection, evaluation, analysis, integration and interpretation of all available information regarding the activities of criminal and other law violators for the purpose of affecting criminals and other law violators for the purpose of affecting their arrest, obtaining evidence, and forestalling plan to commit crime. *
Principles of Intelligence Objectivity - in intelligence, only the well guided succeed. It is a basic intelligence concept that there must be unity between knowledge and action. It follows therefore that intelligence should interact and condition the decision. Intelligence must be adapted to the needs of the decision ; it is both giver and taker. Action or decision is planned by knowledge and guided by it at every step. Interdependence - Intelligence is artificially subdivided into component elements to insure complete coverage, eliminate duplication and to reduce the overall task or manageable sizes. Nevertheless, each subdivision remains as essential part of unity; contributes proportionately to the end result; possesses a precise interrelationship; and interacts with each other so as to achieve a balanced and harmonious whole. Continuity - Intelligence must be continuous. It is necessary that coverage be continuous so that the shape of what happens today could be studied in the light of what happened before, which in turn would enable us to predict the shape of things to come. *
Communication - Intelligence adequate to their needs must be communicated to all the decision makers in manner that they will understand and form that will permit its most effective use. Usefulness - Intelligence is useless if it remains in the minds, or in the files of its collectors or its producers. The story must be told and it must be told well. The story must be convincing and to be convincing it must not only be plausible or factual but its significance must be shown. Selection - Intelligence should be essential and pertinent to the purpose at hand . Intelligence involves the plowing through a maze of information, considering innumerable number of means or of picking the most promising of a multitude of leads. The requirement of decision-making covers very nearly the entire span of human knowledge. Unless there is selection of only the most essential and the pertinent, intelligence will go off in all directions in one monumental waste of effort. *
Timeliness - Intelligence must be communicated to the decision maker at the appropriate time to permit its most effective use. This is one of the most important and most obvious, for Intelligence that is too soon or too late are equally useless. Timeliness is one principle that complements all the others. Security - Security is achieved by the measures which intelligence takes to protect and preserve the integrity of its activities. If intelligence has no security, it might be as well being run like a newspaper to which it is similar. *
General Activities in Police Intelligence Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with little practical immediate operation value. Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary for more effective police planning and operation. National Intelligence - it is the integrated product of intelligence developed by all the governmental branches, departments concerning the broad aspect of national security and policy. It is concerned to more than one department or agency and it is not produced by single entity. It is used to coordinate all the activities of the government in developing and executing integrated and national policies and plans. Counter-Intelligence – phase of intelligence covering the activity devoted in destroying the effectiveness of hostile foreign activities and to the protection of info against espionage, subversion and sabotage. Undercover Work – is an investigative process in which disguises and pretext cover and deception are used to gain the confidence of criminal suspects for the purpose of determining the nature and extent of any criminal activities that maybe contemplating or perpetuating. *
Functional Classification of Police Intelligence Criminal Intelligence – refers to the knowledge essential to the prevention of crimes and the investigation, arrest, and prosecution of criminal offenders. Internal Security Intelligence – refers to the knowledge essential to the maintenance of peace and order. Public Safety Intelligence – refers to the knowledge essential to ensure the protection of lives and properties. *
Forms of Intelligence Sociological Intelligence – deals with the demographic and psychological aspects of groups of people. It includes the population and manpower and the characteristics of the people, public opinion – attitude of the majority of the people towards matter of public policy and education. Biographical Intelligence – deals with individual’s personalities who have actual possession of power. Armed Force Intelligence – deals with the armed forces of the nation. It includes the position of the armed forces, the constitutional and legal basis of its creation and actual role, the organizational structure and territorial disposition, and the military manpower recruitment and Order of Battle Geographical Intelligence – deals with the progress of research and development as it affects the economic and military potential of a nation. *
THREE KINDS OF INTELLIGENCE Strategic Intelligence – as defined earlier, it is an intelligence data that are not of an immediate value. It is usually descriptive in nature, accumulation of physical description of personalities, modus operandi. It does not have immediate operational value but rather long range that may become relevant to future police operations. Line Intelligence – It is the kind of intelligence required by the commander to provide for planning and conduct tactical and administrative operation in counter insurgency. This pertains to knowledge of People, Weather, Enemy and Terrain (PWET) used in planning and conducting tactical and administrative operation in a counter insurgency. *
Intelligence information to be determined in Line Intelligence are: People - living condition of the people, sources of income, education of the people, government livelihood projects, extent of enemy influence to the people Weather – visibility, cloudy, temperature, precipitation (rain), wind Enemy - l ocation of the enemy, strength of the enemy, disposition, tactical capability, enemy vulnerability Terrain - relief and drainage system, vegetation, surface material, man made features. There are military aspects of terrain which includes cover and concealment, obstacle, critical key terrain features, observation and fields of fire, and avenues of approach. *
Counter Intelligence (CI) - this kind of intelligence covers the activity devoted in destroying the effectiveness of hostile foreign activities and to the protection of info against espionage, subversion and sabotage. Hence, the three activities of CI are: protection of information against espionage; protection of personnel against subversion; and protection of installations and material against sabotage. Measures in CI must be both passive and active. Passive measures are those measures which seek to conceal info from the enemy while active measures are those which seek actively to block the enemy’s efforts to gain info or engage in espionage, subversion or sabotage. *
Five Categories of CI Operation Military Security – it encompasses the measures taken by a command to protect itself against espionage, enemy operation, sabotage, subversion or surprise. Examples are: Secrecy discipline - Special safeguarding of classified information - Security of troop movement - Special handling of weather & escapes - Counter subversion with in the armed forces - Tactical measures in combat area Port Frontier and Travel Security – has to do with the application of both military and civil security measures for CI control at point of entry and departure, international borders or boundaries. Examples are:Security screening and control of frontier Security control of merchants, seaman and crew of commercial aircraft, Security control of frontier crossing point Security control of seaports *
Civil Security – it encompasses active and passive CI measures affecting the non-military nationals permanently or temporarily residing in an area under military jurisdiction. Examples are: Systematic registration of civilians and aliens Censorship – it is the control and examination of the civil, national, armed forces, field press, and POWs. *
Categories of CI Operation Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use human sources to collect information or to conduct sabotage and subversion which includes CI special operations, liaison, counter security, and CI screening. Counter Imagery Intel (IMINT) - includes action taken to determine enemy SIGINT and related enemy weaknesses, capabilities and activities. These actions include surveillance radar, photo thermal and infrared systems. Successful counter – IMINT operations rely heavily on pattern and movement analysis and evaluation of the enemy. Counter Signal Intel (SIGINT) – determine enemy SIGINT and related enemy weaknesses, capabilities and activities, assess friendly operations to identify patterns, profiles and develop, recommend and analyze counter measures. *
THE INTELLIGENCE CYCLE PHASE 1 PLANNING THE COLLECTION EFFORT PHASE 2 COLLECTION OF INFORMATION PHASE 3 PROCESSING THE COLLECTED INFORMATION PHASE 4 DISSEMINATION AND USE OF INFORMATION MISSION *
PHASE 1 Planning the Collection Effort This phase of the cycle involve the determination of the requirements of intelligence. It is concerned with identifying the so called Essential Element of Information (EEI) - an item of intelligence or information of the characteristics of the area of operations and the enemy, which the commander feels he needs before he needs before he can reasonably arrive at a decision. *
What are their capabilities and vulnerabilities? What are the physical characteristics of the probable area of operation? What major policies, plans and decisions must be made in the near future? What step must be taken to preserve the security of the nation? What is the information required by the higher, lower or adjacent echelons within the government or armed forces? *
PHASE 2 Collection of information This phase of the cycle is concerned with identification of the collecting agency, the formulation of procedures on the manner of collecting the information in conjunction with the plans as achieved in phase one. Methods of Collection – information can be collected through overt method (open system) or covert method (secret/clandestine). Collecting Agencies – depending on the type of operation, the collecting agency could be Government Agencies, Intelligence units, or Organizations Trade Crafts – includes the use of photography, investigations / elicitation / interrogation, surveillance, sound equipment, surreptitious entry – keys and locks, use of an artist, communication *
PHASE 3 Processing the Collected Information This phase of the cycle is concerned with the examination and collation of all collected information. Steps in Processing Raw Information Collection – organization of raw data and information into usable form; grouping similar items of information so that they will be readily accessible. Recording – is the reduction of info into writing or some other form of graphical representation and the arranging or this info into writing or some form of graphical representation and the arranging of this into groups of related items. Police log book and Journal, Intel-work Sheet - Intel Files, Situation Maps - Rouges Gallery, Modus Operandi Files Evaluation – examination of raw information to determine intelligence value, pertinence of the information, reliability of the source and agency, and its credibility or truth of information. Evaluation is the determination of the pertinence of the info to the operation, reliability of the source of or agency and the accuracy of the info. *
EVALUATION OF SOURCE 1 - C onfirmed by other 2 - P robably true 3 - P ossibly true 4 - D oubtfully true 5 - I mprobable 6 - T ruth cannot be judged EVALUATION OF ACCURACY OF ITEM A - C ompletely reliable B - U sually reliable C - F airly reliable D - N ot usually reliable E - U nreliable F - R eliability cannot be judged *
Source of Info T- Direct Observation by Comdr/Chf of Unit U- Report by DPA or Resident Agent V- Report by PNP/AFP Troops W- Interrogation of Captured Enemy X- Observation of Gov’t/civilian employee Y- General Populace Z- Documents *
PHASE 4 Dissemination & Use of Information This phase of the cycle refers to the activities of transferring the processed information to the proper users, most particularly the authority that requires the activity. Processed information can be disseminated through annexes, estimates, briefing, message, reports, overlays, and or summaries. *
Methods of Dissemination Fragmentary orders from top to bottom of the command Memorandum, circulars, special orders Operations order, oral or written Conference – staff members Other report and intelligence documents Personal Contact *
Who are the users of intelligence? National leaders and military commanders – formulation and implementation of national policies. Advisors and Staff – preparations of plans and estimates Friendly nations or other branches of the armed forces. Processor – basis for evaluation and interpretation. Head / chairman of an organization Any person with authority for purposes of planning. *
INFORMATION AND ITS SOURCES INFORMATION IS THE LIFE-BLOOD OF INTELLIGENCE NO INFORMATION – NO INTELLIGENCE *
Information Information refers to all evaluated materials of every description including those derived from observation, reports, rumors, imagery, and other sources from which intelligence in produced. Information is a communicated knowledge by others obtaining by personal study, investigation, research, analysis, observation. Two General classifications of sources of information: Open Sources – 99% of the information collected are coming from open sources. Close Sources – 1% of information are collected from close sources. *
Overt Intelligence – is the gathering of information or documents procured openly without regard as to whether the subject or target become knowledgeable of the purpose Open Sources: Includes information taken from Enemy activity POW and Civilians Captured documents Map - Weather, forecast, studies, report - Agencies Covert Intelligence – is the secret procurement of information, which is obtained without the knowledge of the person or persons safeguarding vital intelligence interest. Close Sources : Include information which maybe taken through: Surveillance Casing and Elicitation Surreptitious entry Employment of technical means (Bugging and Tapping device) Tactical Interrogation Observation and Description (ODEX) *
PERSONS AS SOURCES OF INFORMATION Informant Net – It is a controlled group of people who worked through the direction of the agent handler. The informants, principal or cutouts supply the agent handler directly or indirectly with Intel information Informants (Asset) – people selected as sources of information, which could be voluntary, or in consideration of a price. Informant – refers to a person who gives information to the police voluntarily or involuntarily with out any consideration Informer – those who give information to the police for price or reward *
Types of Informants Criminal Informant – an informant who give information to the police pertaining to the underworld about organized criminals with the understanding that his identity will be protected Confidential Informant – is similar to the former but he gives information violate of the law to includes crimes and criminals Voluntary Informant – a type of informant who give information freely and willfully as a witness to a certain act Special Informant – those who gives information concerning specialized cases only and it is regarded a special treatment by the operatives (ex. teachers, businessmen) Anonymous Informant – those who gives information through telephone with the hope that the informant can not be identified *
Sub-type of Informant Incidental Informant – a person who casually imparts information to an officer with no intention of providing subsequent information Recruited Informant – A person who is selected cultivated and developed into a continuous source of info Categories of Recruited Informants: Spontaneous or Automatic Informant – Informants who by the nature of their work or position in society have a certain legal, moral or ethical responsibilities to report info to the police Ordinary (run-of-the-mill) Informants – those under the compulsion to report info to the police Special Employee – informants who are of a specific operational nature *
Other Classification of Informant Other terms related to people who gives information are Automatic Informant, Penetrating Agent , Infiltrating Agent , Full time Informant , Rival – Elimination Informant, False Informant, Frightened Informant, Self- aggrandizing Informant, Mercenary Informant , Double Crosser Informant , Woman Informant , Legitimate Informant . *
Motives of Informants People give information to the police due to various reasons. Their motives include reward, revenge, fear and avoidance of punishment, friendship, patriotism, vanity, civic-mindedness, repentance, competition, and other motives. *
INFORMANT RECRUITMENT Selection – it is particularly desirable to be able to identity and recruit an informant who has access to many criminal in-group or subversive organization. Wide access is probably the single most important feature in the consideration of recruiting the potential informant Investigation – the investigation of the potential informants that has tentatively identified as a “probable” must be as thorough as possible. It must establish possible existing motives as to this person might assist the police Intel community. Failure to do so will deny this office who must perform the approach and persuasion phase with little more that a guess. If necessary, conduct complete background investigation (CBI) Approach – must be done in a setting from which might include pleasant surroundings, perhaps a confidential apartment, completely free form any probability of compromise, preferably in an adjacent city or a remote area foreign to the informants living pattern. Testing – the testing program should begin, of course, with the limited assignment, with a gradual integration into the more important areas. The occasional testing of an informant should continue through the entire affiliation *
INTELLIGENCE OPERATIONS Intelligence Operations is the result of intelligence planning, planning is always ahead of operation although an operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence management *
THE 14 OPERATIONAL CYCLES Mission and Target Infiltration – the insertion of action agent inside the target organization Penetration – recruitment of action agent inside the target organization Planning Spotting Partial Background Investigation (PBI) or Complete Background Investigation Recruitment - the only qualification of an agent is to have an access to the target Training Briefing Operational Testing Dispatch Communication - technical method like telephone/radio, non-technical method like personal meeting, live drop or dead drop Debriefing Payments – depends upon the motivation of informant Disposition – involve activity on rerouting, retraining, retesting, termination Reporting *
COVER AND UNDERCOVER Cover - the means by which an individual group of organization conceals the true nature of its acts and or existence from the observer. Cover story – a biographical data through fictional that will portray the personality of the agent he assumed, a scenario to cover up the operation Cover Support – an agent assigned in target areas with the primary mission of supporting the cover story. *
Undercover Assignment – is an investigative technique in which agent conceal his official identity an obtain information from that organization *
THE UNDECOVER AGENT Special qualifications include knowledge of the language, area background regarding events, knowledge about the custom and habits, physical appearance, and must be an artist. *
Selecting Action Agents Placement – location of prospective agent with respect to the target Access – it is the capability of a prospective agent to obtain the desired info for the Intel organization or to perform to Intel collection mission in the area. Primary Access – it is the access to the desired info Secondary Access – it is the access to the desired info through a principal source where the latter has the direct access Outside Access – the agent is employed outside the target and merely monitor info from a third person who is monitoring info n the area *
CONTROL – authority to direct the agent to carryout task or requirement on behalf of the clandestine organization in an acceptable manner and security Two Categories of Control Positive Control – is characterized by professionalism and rapport like Agent motivation and Psychological control Negative Control – characterized by threat and it include the following: Disciplinary Action – includes verbal reprimand for poor performance or insecure actions withholding certain material rewards, reduction of agents salary or in extreme situation the threat of terminating professional relationship Escrow Account – control of an agent by putting his salary in a bank to be withdrawn only after a fulfillment of a condition Blackmail *
Procuring Different Type of Agents Agent in Place – an agent who has been recruited by an intelligence service within a highly sensitive target, who is just beginning a career or have been long or (outside) insider. Double Agent – an enemy agent who has been captured, turned around and sent back where he came from as an agent of his captors Expandable Agent – an agent whom false information is leaked to the enemy. Penetration Agent – an agent who has such reached the enemy gets information and would manage to get back alive. Agent of Influence – an agent who uses influence to gain information Agent of Provocation – one who provoke the target/subject to act according to the objective *
METHODS OF COVERT INTELLIGENCE Surveillance Surveillance is a form of clandestine investigation which consists of keeping persons, place or other targets under physical observation in order to obtain evidence or information pertinent to an investigation. Surveillance of persons is called Tailing or Shadowing, Surveillance of place is called Casing or Reconnaissance, and Surveillance of other things, events, and activities is called Roping. *
In Surveillance, the following are considered: Pre-Surveillance Conference – a conference held among the team members, the police intelligence unit before surveillance is conducted. Surveillance Plan – a plan established the as required according to type of personnel, and the general and specific instructions for surveillance. Area Target Study – refers to the area of operation of surveillance activities. *
Surveillant – a person who conducts surveillance with includes only observations. Stakeout or Plant – is the observation of places or areas from a fixed point. Tailing or Shadowing – it is the observation of a person’s movement. Undercover Man – it refers to a person trained to observe and penetrate certain organization suspected of illegal activities and later reports the observation and information’s that proper operational action can be made Liason Program – the assignment of trained intelligence personnel to other agencies in order to obtain information of police intelligence value. (Agencies like the press, credit agencies, labor unions, telephone companies) Safehouse – is a place, building, enclosed mobile, or an apartment, where police undercover men meet for debriefing or reporting purposes. *
Drop – any person is a convenient, secure and unsuspecting place where police undercover men meet his action agent for debriefing or reporting purposes. Convoy – an accomplice or associate of the subject used to avoid or elude surveillant. Decoy – a cover supporting the surveillant who can become a convoy whenever surveillant is burned. Contact – any persons whom the subject picks or deals with while he is under observation and identifies the observer. Made – when subject under surveillance becomes aware that he is under observation and identifies the observer. Lost – when the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance. *
TYPES OF SURVEILLANCE According to Intensity and Sensitivity Discreet –subject person to be watch is unaware that he is under observation Close – subject is aware that he is under observation varied on each occasions Loose – applied frequently or infrequently, period of observation varied on each occasion According to Methods Stationary – this is observation of place usually a bookie stall, a gambling, joint, a residence where illegal activities are going on (fixed position) Moving – surveillance follow the subject from the place to place to maintain continuous watch of his activities Technical – this is a surveillance by the use of communications and electronic hardware’s, gadgets, system and equipment *
Special Equipment (Technical Supports) Camera with telephoto lens Moving Picture camera Binoculars Tape recording apparatus Wire taping device Other instrument – miniaturized one-way radio Methods available to employ in Surveillance Ordinarily, the methods are surveillance of place, tailing or shadowing (1-2-3 man shadow), undercover investigation, special methods includes: wire tapping - concealed microphones - tape recorder -television - electric gadgets *
Counter Surveillance – the conduct of operation is coupled with counter intelligence measures such as window shopping, use of convoys and decoys, stopping immediately on blind corners, getting out immediately on public conveyances, retracing, entering mobile housing *
CASING OR RECONNAISSANCE Casing is the term use in the police organization while reconnaissance is used in military terms. Casing or reconnaissance is the surveillance of a building place or area to determine its suitability for Intel use or its vulnerability in operations. It aids in the planning of an operation by providing needed information. It assists the agent handler to install confidence in his agent during briefing phase by being able to speak knowingly about the area of operation. Casing is also considered a security measure because it offers some degree of protection for those operating in an area unfamiliar to them. *
Method of Casing Personal Reconnaissance – the most effective method and will produced the most info since you know just what you’re looking for. Map Reconnaissance – it may not sufficient but it can produce a certain amount of usable information Research - much info can be acquired through research Prior Information – your unit and of the unit will have file report that they may provide you with info Hearsay –info usually gain by the person operating in the area and performing casing job *
OBSERVATION AND DESCRIPTION (ODEX) Observation – a complete and accurate observation by an individual of his surroundings an encompasses the use of all the major sense to register and recognized its operational or Intel significance Description – the actual and factual reporting of one’s observation of he reported sensory experience recounted by another *
ELICITATION Elicitation is the gaining of information through direct communications and where one or more of the involved parties is not aware of the specific purpose of the conversation. Two Devices in the conduct of Elicitation Approach – process of setting people to start talking Probe – to keep the people taking incessantly *
Example of Approach: 1. FLATTERY-people are susceptible to praise Teacher – Pupil Approach – the subject is treated as an authority then solicit his view point and opinion on a subject matter. Good Samaritan Approach – is the sincere and valid offers of help and assistance are made to the subject Kindred Soul Approach Partial Disagreement Approach *
2. PROVOCATIVE APPROACH- discover a wide range of conversational gambits TEASER BAIT APPROACH- elicitor accumulates the sources of knowledge about a particular subject MANHATTAN FROM MISSOURI- elicitor adapts an unbelievable attitude above anything. He questions all statements and opposition. JOE BLOW APPROACH- it is “I know” the answer everything approach. NATIONAL PRIDE APPROACH- it is a natural propensity of all person to defend their country and its policies. *
Probes: A probe is an attempt to obtain more information after the subject gives a vague, incomplete general response. A probe is used with an approach in order to sustain a conversation. There are three types of probes: completion, hypothetical and clarity. 1) Completion: By inserting bits of factual information on a particular topic, the source may be influenced to confirm and further expand on the topic. 2) Clarity: A request for additional information where the source’s response is unclear. For example, “I agree, but what do you mean by…….?” 3) Hypothetical: Can be associated with a thought or idea expressed by the source. Many people who might not make a comment concerning an actual event may express an opinion on a hypothetical situation. 4) High Pressure Probe – it serves to pin down a subject in a specific area or it maybe used to point out contradictions in what the subject has said *
PORTRAIT PARLE (P/P) -It is a means of using descriptive terms in relation to the personal features of an individual and it can be briefly described as a world description or a spoken picture. (Anthropometry - no two human beings has the same body measurement) -can be defined as a rigorous system for verbal description of physical characteristics of the subject. It is based on the Bertillon method of criminal identification by measurements of the human body and is still in practice today to some extent *
BACKGROUND CHECKS AND INVESTIGATION (BI- PSI or CBI) Information needed: Domestic Background Personal Habit Business History Social or Business Associates Medical History Educational Background Family History *
TACTICAL INTERROGATION The need for obtaining information of the highest degree of credibility taken on the minimum of time can be through interrogation which varies and dependent entirely on the situation. *
Codes and Ciphers What is Cryptography? Cryptography is the art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key. Cryptography from the Greek word kryptos that means “secret” and graphos that means “writing”. It refers both to the process or skill of communicating in or deciphering secret writings (codes, or ciphers) and to the use of codes to convert computerized data so that only a specific recipient will be able to read it using a key. In its broadest sense, cryptography includes the use of concealed messages, ciphers, and codes. Concealed messages, such as those hidden in otherwise innocent text and those written in invisible ink, depend for their success on being unsuspected. *
What are the disadvantages and complications of Cryptography? They are easy to decipher once they discovered the codes, in which predetermined words, numbers, or symbols represent words and phrases. They are usually impossible to read without the key codebook. Cryptography also includes the use of computerized encryption to protect transmissions of data and messages. Difficulty of printing and distributing codebooks—books of known codes—under conditions of absolute secrecy limits their use to places in which the books can be effectively guarded. In addition, the more a codebook is used, the less secure it becomes. *
What are the benefits from Cryptography? Today most communication leaves some kind of recorded trail. All of this amounts to a great potential loss of privacy. Cryptography is one tool that will be able to ensure more privacy. The ability to encrypt data, communications, and other information gives individuals the power to restore personal privacy. A properly constructed code can give a high degree of security. *
What are the important terminologies in Cryptography? Plaintext – a.k.a cleartext, it is the original communication to be scrambled or enciphered. Cryptogram – a.k.a ciphertext, the product of the enciphering process that usually involves an algorithm and a key. Cryptanalysis – is the art of analyzing ciphertext to extract the plaintext or the key. In other words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers. *
What are the types of Cryptography? Codes – codes rely on codebooks. A well-constructed code can represent phrases and entire sentences with symbols, such as five-letter groups, and is often used more for economy than for secrecy. *
*
Ciphers – a secret or disguised way of writing *
*
THANK YOU FOR LISTENING ☺ TOP THE BOARD EXAM MIGHTY EAGLES!!! *