0% found this document useful (0 votes)
328 views

Lea Intelligence Review Notes

This document provides an overview of intelligence functions and the history of intelligence operations. It discusses intelligence as an activity of collecting information and as an end product. It then outlines the historical developments of intelligence through various biblical, ancient, and modern examples. These include intelligence operations led by figures like Moses, Sun Tzu, Napoleon, and Yamamoto. The document also lists and briefly describes several prominent historical intelligence and secret service agencies.

Uploaded by

Anne Macario
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
328 views

Lea Intelligence Review Notes

This document provides an overview of intelligence functions and the history of intelligence operations. It discusses intelligence as an activity of collecting information and as an end product. It then outlines the historical developments of intelligence through various biblical, ancient, and modern examples. These include intelligence operations led by figures like Moses, Sun Tzu, Napoleon, and Yamamoto. The document also lists and briefly describes several prominent historical intelligence and secret service agencies.

Uploaded by

Anne Macario
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

POLICE INTELLIGENCE AND SECRET SERVICE  Double Spies- the low informers and

unreliable renegades of value chiefly in


I. Nature of Intelligence Function spreading false information to the enemy;
 Intelligence is responsible in procuring and  Spies of Consequences - courtier and
obtaining political, economic, psychological, noblemen, staff officers and kindred
sociological, military and other information conspirators always requiring a considerable
which may bear upon, national interest and bribe or bat
which had been collected by the different  Persons who are forced to undertake
government and agencies. espionage against their will.
 Intelligence is knowledge and powerful it can
prevent war and cause one it can help in F. Alexander the Great- A renowned Greek
crime control and crime prevention. conqueror had his share of advance information
Basic Concepts when rumors of discontent circulated from among
the ranks of his men. He was able to identify those
A. Intelligence disloyal ones by ordering the communication letters
 As an activity- The organized effort to collect opened and was successful in curtailing the decline
information, to assess it little by little, and of esprit de corps and morale of his men.
piece it together until it forms larger and clear
patterns. G. Sir Francis Walsingham of England- Protector of
 As a product- The end product resulting from Queen Elizabeth I who organized the secret police
the collection, evaluation, analysis, and established a spy network to detect fleet
integration, and interpretation of all available movement of enemies of the British Empire
information which may have immediate or particularly the Portuguese. Regarded as the "First
potential significance to the development Great Spymaster", a ruthless in the cause, he was
and execution of plan, policies and programs responsible for the assassination, murdering and
of the user. execution of people who covertly betrayed the
 As an organization- An institution composes of queen.
persons who pursue of preparing plans or
formulating policies. H. Karl Schulmeister- famous as "Napoleon's Eye".
He was credited for establishing counter
B. Police Intelligence – The end product resulting intelligence conducted against spies. He is a master
from the collection, evaluation, analysis, integration of deceit who used black mail to obtain vital
and interpretation of all available information information pertaining to the personality and
regarding the activities of criminals and other law identify of the enemies of Napoleon during the 18th
violators for the purpose of affecting their arrest, Century
obtaining evidence, and forestalling plan to commit
crimes. I. Joseph Petrosino- Member, New York Police
Department in early 1900, he was the head of the
II. Historical Developments of Intelligence Italian Squad. Through extensive intelligence
network, he is credited to smash the Black Society.
The first intelligence operation recorded in history is
found in the Holy Bible. J. Joseph Fouche- The French statesman Joseph
Fouche (1759 - 1820) served as minister of police
A. Number 13:17-32, Old Testament (Holy Bible) - under Napoleon and was influential in the return of
Moses sent twelve (12) scouts to the land of Louis XVIII to the throne in 1815.
Canaan where he detected directed them to spy
the land, the people and their location and the K. Admiral Yamamoto- April 1943, the Cryptanalysts
nature of their cities. of the U.S. Navy Communications Intelligence
interpreted a top secret signal relaying the travel of
B. Sun Tzu- “Those who know themselves as well they the Admiral. En route ha was intercepted and
know their enemies will never suffer defeat". In his crashed in the Jungles of Baungainville.
book "Art of War".
L. Herbert Yadley- Head of the MI-8, The forerunner
C. Delilah- A biblical personality who was able to of the Top Secret National Security Administration
gain information by using her beauty and charm. a.k.a Black Chamber, a Cryptanalytic Organization.
She was responsible for the fall of Samson a known
Israelite leader who terrorized the Philistines. M. Napoleon Bonaparte- "One Spy in the right place
is worth 20,000 men in the field". He organized two
D. Sir Arthur Wellesly- Duke of Wellington, who Bureau of Interest.
defeated Napoleon's at Waterloo in 1815.
Regarded as the "Greatest Military Spymaster at All N. Akbar- The "Great Mogul" and wise master of
Time". He live by the motto; "All the business of war is Hindustan employed more than 4,000 agents for the
to find out what you don’t know by what you do." sole purpose of bringing him the truth that his throne
He always studied the enemy in depth, finding out might rest upon it.
not only where the opposing army was and how
strong it was, but the character of it's commander, O. Battle of Midway- In June 1442, the turning point
the spirit and training of its troops, their battle of the Naval in the Pacific, the victory gained by the
experience, and how they were supplied with arms Americans was due to the disrupted messages from
and rations. He also studied and mapped the the Imperial Japanese Navy.
roads, rivers and topography of the war theatre.
P. V2 - RACKETS - OSS agents working in conjunction
E. Frederick the Great - "Father of Organized Military with the British Intelligence, though penetration and
Espionage". He divided his agents into four classes. technical intelligence discovered Pneumundo,
 Common Spies- recruited among poor folk, which was the V2 guide missile research project of
glad to earn a small sum or to Nazi Germany. It results to its destruction and heavy
accommodate a military officer; bombing.

238 | P a g e
Q. Julius Ceasar- During his time, the staff of each  It was formed in September 1968, as it was
legion includes ten "speculators" who served as an evident that a credible intelligence
information-collecting agency. The "speculators" gathering setup was lacking.
were the first intelligence personnel to appear  Its primary function is collection of external
definitely in a military organization. Military success intelligence, counter-terrorism and covert
of the Romans was aided by communication operations.
system. Made use of carrier pigeons, which made  In addition, it is responsible for obtaining
possible the amazing speed with which intelligence and analyzing information about foreign
of the Imperial Rome was transmitted. They also governments, corporations, and persons, in
employed ciphers to ensure secrecy of order to advise Indian foreign policymakers.
communications.  Until the creation of R&AW, the Intelligence
Bureau handled both internal and external
R. Wilhelm Johann Karl Eduard Steiber- Known as intelligence.
the Prussia's "King of Sleuthhounds" as minister of
police he studied the use of propaganda and 8th - General Directorate for External Security
censorship as well as utilizing statistical intelligence  Directorate General for External Security is
accounting. Steiber's thorough organization and France’s external intelligence agency.
ruthless, his sinister innovations and cold, calculating  Operating under the direction of the French
manipulation of human weakness made him the ministry of defense, the agency works
spymaster who most shape the course of the 20th alongside the DCRI (the Central Directorate
century espionage. of Interior Intelligence) in providing
intelligence and national security, notably
S. Alfred Redl- A homosexual Double Spy who while by performing paramilitary and
working as intelligence direct proof Austria and counterintelligence operations abroad.
Hungary, spied the Russians. His treasons activities  Its primary focus is to gather intelligence
were discovered and compelled to commit suicide. from foreign sources to assist in military and
His spying led to the death of over 500,000 agents strategic decisions for the country.
and soldiers combined in his 13 years episode as a  The agency employs more than five
spy. thousand people.

T. Sir Samuel Luke - Chief Scout of Oliver Cromwell 7th – Federal Security Service of Russian Federation
who was able to dethrone King Charles I in British (FSD)
Civil War of 1640's. Sir Samuel Luke was said to be  The Federal Security Service of Russian
industrious in snooping on the enemy. Federation (FSD) is the main domestic
security agency of the Russian Federation
U. John Churchill - first duke of Malborough, told and the main successor agency of the
critics of his enormous expenditure on espionage, Soviet-era Cheka, NKVD and KGB.
that “No war can be conducted successfully  The FSD is involved in counter-intelligence,
without early and good intelligence, and such internal and border security, counter-
advices cannot be had but a very great expense". terrorism, and surveillance.
V. Edward I- An English monarch who started  The FSD is responsible for internal security of
utilizing English informants especially to determine the Russian state, counterespionage, and
seditious writings against the crown and identify the fight against organized crime, terrorism,
and drug smuggling.
W. George Washington - under oath abounds in the  The number of FSD personnel and its
history of every nation. George Washington as budget remain state secrets, although the
Grand Master mobilized the free masons of the budget was reported to jump nearly 40% in
colonies at the outbreak of the American war of 2006.
Independence. 6th – Bundesnachrichtendienst (BND)
 The Bundesnachrichtendienst is the foreign
III. Most Outstanding Intelligence Agencies intelligence agency of the German
government,
Intelligence Agency is an effective  The BND acts as an early warning system to
instrument of a national power. Aggressive alert the German government to threats to
intelligence is its primary weapon to destabilize the German interests from abroad.
target. Indeed, no one knows what the intelligence  It depends heavily on wiretapping and
agencies actually do so figuring out who the best electronic surveillance of international
intelligence service is can be difficult. communications.
 It collects and evaluates information on a
10th- Australian Secret Intelligence Service (ASIS) variety of areas such as international
 Government intelligence of Australia which terrorism, WMD proliferation and illegal
is responsible for collecting foreign transfer of technology, organized crime,
intelligence undertaking counter-intelligence weapons and drug trafficking, money
activities and cooperation with other laundering, illegal migration and
intelligence agencies overseas. information warfare.
 Its primary responsibility is gathering  As Germany’s only overseas intelligence
intelligence from mainly Asian and Pacific service, the BND gathers both military and
interests using agents stationed in a wide civil intelligence.
variety of areas.
 Its main purpose, as with most agencies, is to 5th - Ministry of State Security (MSS)
protect the country’s political and economic  Ministry of State Security is the security
interests while ensuring safety for the people agency of the People’s Republic of China.
of Australia against national threats.  Article 4 of the Criminal Procedure Law
gives the MSS the same authority to arrest
9th - Research and Analysis Wing (R&AW or RAW) or detain people as regular police for
 Research and Analysis Wing is India’s crimes involving state security with identical
external intelligence agency. supervision

239 | P a g e
 One of the primary missions of the MSS is  Its personnel have never been caught on
undoubtedly to gather foreign intelligence camera.
from targets in various countries overseas.  It is believed to have the highest number of
 Many MSS agents are said to have agents worldwide, close to 10,000. The most
operated in the Greater China region. striking thing is that it’s one of the least
funded Intelligence agencies out of the top
4th – Central Intelligence Agency (CIA) 10 and still the strongest.
 CIA is the largest of the intelligence
agencies and is responsible for gathering  National Intelligence Coordinating Agency
data from other countries that could (NICA)
impact U.S. policy. It is the primary intelligence gathering and
 It is a civilian intelligence agency of the analysis arm of the Philippine government, in
United States government responsible for charge of carrying out overt, covert,
providing national security intelligence to and clandestine intelligence programs. Its motto
senior United States policymakers. is: "Knowledge is Safety”. Presently, NICA is in close
 The CIA also engages in covert activities at coordination with the CIA, Mossad, Secret
the request of the President of the United Intelligence Service and intelligence services
States of America. of ASEAN countries to counter the threat
 The CIA’s primary function is to collect of terrorism.
information about foreign governments,
corporations, and individuals, and to advise The agency is led by a Director-
public policymakers. The agency conducts General and is assisted by a Deputy Director-
covert operations and paramilitary actions, General. The former reports directly to the President.
and exerts foreign political influence The NICA has a National Intelligence Board that
through its Special Activities Division. serves as an advisory board to the Director-General
 It has failed to control terrorism activities before he would submit his findings to the President
including 9/11, Not even a single top level relating to national security matters affecting
Al-Qaeda leader captured own its own in the Philippines.
the past 13 years –.
 Highly funded and technologically most IV. Principles of Intelligence
advanced Intelligence set-up in the world.
A. Intelligence and operation are interdependent
3rd – Secret Intelligence Service (SIS) MI-6 Intelligence provides valuable inputs for
 The Secret Intelligence Service (SIS) supplies effectiveness of police operation on the
the British Government with foreign other hand operation likewise is needed for
intelligence. continuity of intelligence activities. Operation
 It operates under the formal direction of and intelligence planners work hand and hand
the Joint Intelligence Committee (JIC) to attain greater degree of success in their
alongside the internal Security Service (MI5), common effort.
the Government Communications
Headquarters(GCHQ) and the Defense B. Intelligence is Continuous
Intelligence (DI). The basic principle of intelligence
 It is frequently referred to by the name MI6, operations is that intelligence activities follow a
a name used as a flag of convenience simple cycle, which is continuous at the same time
during the Second World War when it was that new information is being collected in
known by many names. response to direction, other information is being
 The existence of MI6 was not officially processed and intelligence is being used.
acknowledged until 1994.
C. Intelligence must be useful
2nd – Mossad
 The Mossad is responsible for intelligence It must serve the commander’s need and
collection and covert operations including requirements so that effort will not be wasted. It
paramilitary activities. should have an application and significance to the
 It is one of the main entities in the Israeli operation.
Intelligence Community, along with Aman
(military intelligence) and Shin Bet (internal D .Intelligence must be available on time
security), but its director reports directly to
the Prime Minister. Intelligence must be communicated to the
decision maker at the appropriate time to permit
1st - Inter-Services Intelligence (ISI) its most effective use. It must reach the user in time
 With the lengthiest track record of success, to serve as basis for appropriate action. Intel
the best know Intelligence so far on the data must be disseminated on time because late
scale of records is ISI. arrival is as good as useless.
 The Inter-Services Intelligence was created
as an independent unit in 1948 in order to
strengthen the performance of Pakistan’s
Military Intelligence during the Indo- E. Intelligence operations requires imagination and
Pakistani War of 1947. foresight
 The best of its time, failed to counter ISI and
protect Soviet interests in Central Asia. The success of objective is paramount
 It has protected its Nuclear Weapons since importance. Intelligence personnel are reminded to
formed and it has foiled Indian attempts to refrain from utilizing criminal elements in Intel
attain ultimate supremacy in the South- operation. They must use their resourcefulness to
Asian theatres through internal obtain more than what is normally.
destabilization of India. It is above All laws in
its host country Pakistan ‘A State, with in a F. Intelligence must be flexible
State’. Intelligence Operations must be
changeable according to the present situation,

240 | P a g e
condition and other factors, Intelligence Operations  Terrain, including natural and artificial
are based on reason and sound judgment. obstacles
Procedures which do not readily adapt to a given  Weather
situation are generally discarded.  Information desired by higher, lower or
adjacent headquarters
G. Intelligence requires continuous security
measures 2. Determination of the Essential Elements of
Deny unauthorized personal information about Information (EEI)
operation and intelligence product, its source and  Is an item of intelligence or information of
organization itself. In the handling of classified characteristics of the area of operations
materials there should be a working balance and the enemy, which the commander
between secrecy and operational convenience. feels he needs before he can reasonably
arrive at a decision.
V. Categories of Intelligence
3. Establishment of Priorities
A. National Intelligence- integrated product of
intelligence developed by all government  Priorities reflect the criticality of the need
departments concerning the broad aspect of for the particular information. No formula
national policy and national security. exists which can automatically determine
 National Policy – specific courses of action priorities. Such determination is a matter
to achieve the national objectives. of judgment.

 National Security – this relate to the B. Collection of Information


protection and preservation of military,
economic and a productive strength of a To successfully plan and perform the
country including the security of the collection effort, the intelligence officer must have
government and domestics and foreign thorough knowledge of the available sources of
affairs against espionage, sabotage and information and collecting agencies and the type
subversion. of information they can provide and consider the
following:
B. Department of Intelligence – the intelligence
required by department or agencies of the 1. Determine collecting agency
government to execute its mission and discharge its 2. Send orders or request
responsibilities. 3. Supervise collection efforts
4. Use tools or technique in collection
C. Military Intelligence – refers to the knowledge by 5. Ensure timely collection
the military institution essential in the preparation
and execution of military plans, policies and Factors in Choosing Collection Agents
programs.
 Capability – agents placement or access to
VI. Intelligence Cycle other target
 Multiplicity – more agents
 Balance – number of agents needed in
PLANNING operation

C. Processing the Collected Information


DISSEMINATION MISSION COLLECTION
Five steps in processing collected information which
is then converted into Intelligence

1. Recording – is the reduction of information into


PROCCESSING writing or some other form of graphical
representation and the arranging of this
Planning and Supervision of the Collection Effort information into groups related items.
2. Evaluation – is the determination of the
 The intelligence officer must have a thorough pertinence of the information to the operation,
knowledge of the available sources of reliability of the source of or agency and the
information, the collecting agencies and type accuracy of the information.
of information the latter can provide.
 He must understand the operations of the Evaluation to Determine:
command in order to provide the particular a. Pertinence – does it holds some value to
intelligence required for success. current operation
 He must have a thorough knowledge of the  is it needed immediately
tactics, organizations and characteristics of b. Reliability – judging the source of information
the enemy. or agency
 He must be especially competent in the fields c. Credibility – truth of information
of surveillance, reconnaissance, counter-
reconnaissance, and acquisition of operations. Judging Credibility
a. It is possible for the reported fact or event to
A. Planning and Directing the Collection Efforts have taken place.
b. Is the report consistent within itself?
1. Determination of Requirements c. Is the report confirmed or corroborated by
 Enemy capabilities, including time, place, information from different sources or agencies.
strength, or other details d. If the report does not agree with information
 Enemy vulnerabilities, including nature, from other sources which one is more likely to
extent, performance and other details be true
 Enemy order of battle and factors
EVALUATION GUIDE FOR COLECTED INFORMATION

241 | P a g e
REMINDER: You should LEARN BY HEART this
Accuracy of Source of the
Evaluation Guide
Reliability of Information Information
Information CODE:
3. Analysis- This is the stage in which the collected
CODE: CPPDIT
information is subjected to review in order to satisfy
CUFNUR
significant facts and derive conclusion there from.
A– 1– T – Direct
4, Integration- The combination of the elements
Completely Confirmed Observation by a
isolated analysis with other known information
Reliable By Other commander or Unit
related to the operation.
Sources
5. Interpretation- Process of determining the
B – Usually 2 – Probably U – Report by a
significance of new information in the possible
Reliable True penetration or
alternatives. The interpreter determines the
resident agent
significance of the information as to the meaning of
the interpreted information. C - Fairly 3 – Possibly V – Report by an
Reliable True AFP trooper or PNP
D. Dissemination personnel in
operation
Processed information or intelligence data D – Not 4 – Doubtfully W – Interrogation of
are disseminated to end users, common methods Usually True a captured enemy
of disseminating Intel data are conferences, briefing Reliable or agent
and person to person exchanges. In this process, E – Unreliable 5 – X – Observation by
consider the factors of timeliness, correctness and Improbable a government or
security. civilian employee or
official
VII. Counter-Intelligence F – Reliability 6 – Truth Y – Observation by
Cannot Be Cannot Be a member of
Counterintelligence – phase of intelligence Judged Judged populace
covering the activity devoted in destroying the Z - Documentary
effectiveness of hostile foreign activities and the A. Categories of Police Intelligence
protection of information against espionage,
subversion and sabotage. It also includes protection 1. Strategic Intelligence – knowledge pertaining to
the organization itself. the capabilities and vulnerabilities of a foreign
nation, which is required by the National Planners
A. Types of Counter-intelligence for the formulation of an adequate National
1. Passive CI Measures – protection of classified Defense in peace and forms the basis for,
and sensitive information to the unauthorized projected. This is intelligence information which is
through secrecy, communication security, and not immediate operational but rather long range.
other various safeguards.
2. Active CI Measures – are those measures, Components of Strategic Intelligence
which seek actively to block the enemies’
effort to gain information or engage in a. Political Intelligence – deals with Domestic
espionage, subversion, and sabotage. and Foreign affairs and relation of
government operations;
B. Objectives and Importance of Counter-  Basic Principles of the Government
Intelligence  Government Structures
 It Denies information to the enemy  Public Order and Safety
 It Reduces the risk of a command  Subversion
 Aids in achieving surprises  Intelligence and Security
 Increases the security of the command Organization
 Decreases the enemy ability to create
information about the forces. b. Economic Intelligence – deals with the
extent and utilization of Natural and Human
C. Activities and Function of Counter-Intelligence resources to the industrial potential of the
 Protection of information against espionage Nations
 Protection of personnel against subversion c. Transportation and Telecommunication
 Protection of installations and materials Intelligence - concerned with the operations
against sabotage and facilities not only the Military but also the
Civilians.
D. Categories of Counter-Intelligence Operation d. Sociological Intelligence – deals with the
 Military Security – it encompasses the demographic and psychological aspects of
measures taken by a command to protect groups of people.
itself against espionage, enemy operation,  Population and Manpower
sabotage, subversion or surprise.  Characteristics of the People
 Port boundary and Travel Security – has to do  Public Opinion – attitudes of the
with the application of both military and civil majority of the people towards
security measures for counterintelligence matters of public policy.
control at point of entry and departure,  Education – based on literacy rate
international borders and boundaries. e. Biographical Intelligence – deals with
 Civil Security – it encompasses active and individual personalities who have actual
passive counterintelligence measures possession of power
affecting the non-military nationals f. Armed Forces Intelligence – deals with the
permanently or temporarily residing in an area armed forces of the Nation.
under military jurisdiction.  Position of the Armed Forces –
 Special Operations – counter subversion, constitutional and legal basis of its
sabotage and espionage. creation and actual role.
 Organization and structure and
VIII. Police Intelligence Operations territorial disposition
 Military Manpower Recruitment

242 | P a g e
 Order of Battle- arrangement of B. Close Sources – Only 1% of information are
military troops for battle. obtained from Covert Operation Close/Covert
g. Geographical Intelligence – deals with the Method/clandestine operation.
natural as well as manmade features of the
physical environment of man considered Elements of Clandestine Operation
from the point in view of military operations.
 Location – military and economic 1. Sponsor-directs the organization conducting the
importance clandestine activity.
 Size – measurement of which a 2. Target- Person, place or things against which the
nation can exchange space or time clandestine activity is to be conducted.
during war. 3. Agent- It refers to a person who conducts the
 Shape clandestine Operations to include Principal Agents,
 Weather and Climate Action Agents, and Support Agents.
h. Scientific Intelligence – deals with the  Principal Agent- Leader or management
progress of the research and development Agent in clandestine operation usually
as it affects the economic and military undertaken by the case officer.
potential of a nation.  Action Agent- The who one who conducts
the clandestine Operation that includes:
2. Counter-Intelligence- preparation and execution  Espionage Agent- Agent who
of plans and programs to neutralize or prevent any clandestinely procure or collect
activities undesirable to the police organization. information.
 Propagandist- Agents who molds the
3. Line or Tactical Intelligence – it is the intelligence attitudes, opinions, and actions of an
information which directly contributes to the individual group or nation.
accomplishment of specific objectives and  Saboteur- Agents who undertakes
immediate in nature, necessary for more effective positive actions against an unfriendly
police planning and operation. power, resulting in the loss of use
temporarily or permanently of an
B. Functional Classifications of Police Intelligence article or others.
1. Criminal Intelligence (CRIMINT) – refers to  Guerilla- Agent who is a member of
the knowledge essential to the prevention of paramilitary group organized to harass
crimes and the investigation, arrest, and the enemy in a hot war situation.
prosecution of criminal offenders.  Strong Arm- Agent who is made to
2. Internal Security Intelligence (INSINT) – refers provide special protection during
to the knowledge essential to the dangerous phase of clandestine
maintenance of peace and order. operations.
3. Public Safety Intelligence (PUSINT) – refers to  Provocateur- Agent who induces an
the knowledge essential to ensure the opponent to act to his own detriment
protection of lives and properties. by discrediting himself or by revealing
his true purpose or identity.
IX. Methods and Techniques of Collecting
Information  Support Agent- Agent who is engaged in
activities which supports the clandestine
Information – All evaluated materials of operations and or the action agent in his
every description including those derived from operations that includes the following:
observation, reports, rumors, imagery, and other  Surveillant- Agent who observes
sources from which intelligence is produced. persons and places of operations
of interest.
Types of Agent used in collecting of Information  Investigator- Agent who undertake
 Agent of Influence- Agent who uses to procure information or things of
authority to gain information clandestine operation.
 Agent in Place- Agent who has been  Procurer of Funds- Agent who
recruited within a highly sensitive target obtain money when needed for
 Penetration Agent- Agent who have operational use.
reached to the enemy, gather information  Safe house Keeper- Agents who
and able to get back without being caught. manages and maintains a safe
 Expendable Agent- Agent who leaks false house for clandestine operations
information to the enemy. like meetings, safe heavens,
 Double Agent- An enemy agent, who has training, briefing, and debriefing.
been taken into custody, turned around and  Communication Agent- Agent who
sent back where he came from as an agent is detailed as securing of
of his captors. clandestine communications.

Kinds of Covert Operation

1. Surveillance – is the covert, discreet observation


of people and places for the purpose of obtaining
Classifications of Sources of Information information concerning the identities or activities of
subjects.
A. Open Sources – 99% of the information collected
are coming from open sources or obtained from Objectives of Surveillance
Overt Operation.  To identify persons involved in certain
 Enemy Activities activities
 Captured Documents  To secure basis for securing search warrant
 Map  To obtain detailed information about the
 Weather Forecast, Studies, Reports nature, scope of subjects activities
 Agencies  To check on source of information
 To develop leads to vital information

243 | P a g e
 To confirm or deny allegations  Wire Tapping- A method of collecting
information thru interception of telephone
Terms to remember in Surveillance conversation.
 Surveillant – is the plainclothes investigator 5. Tactical Interrogation- It is a process or method of
assigned to make the obtaining information from a captured enemy who
observation. is reluctant to divulge information.
 Subject – is who or what is observed. It can 6. Observation and Description (ODEX) - The
be a person, place, property, and vehicle, complete awareness by an individual of his
group of people, organization or object. surroundings, achieved through maximum
 Area Target Study – refers to area of employment of the senses and techniques of
operation of surveillance activities factuality reporting one’s own observation of the
 Log – chronological records of activities that sensory experiences recounted by others.
took place in the establishment under
surveillance. X. Cover and Undercover Operations
 Safe house- Refers to a place where agents
meet each other for purposes of de-briefing Undercover Operations- also referred to as “Roping”
and reporting. Undercover is disguising one's own identity or using
 Live Drop- Refers to a place where agents or an assumed identity for the purposes of gaining the
informants leave their messages to the other trust of an individual or organization to learn secret
Agents. information or to gain the trust of targeted
 Decoy- A person or object used by the individuals in order to gain information or evidence.
subject in attempt to elude Surveillant
 Convoy- An associate of the subject who Cover- It refers to the changing, forging or falsifying
follows him to detect surveillance. agent’s real personality including but not limited to
 Contact - Any person whom the subjects things, location, job, and others that will be used in
picks or deals with while he is under undercover assignment.
observation and identifies the observer
 Made – when subject under surveillance Cover Story – A biographical data through fictional
becomes aware that he is under observation that will portray the personality of the agent he
and identifies the observer also known as “ assumed, a scenario to cover the operation.
Burnt out” Cover Support – An agent assigned in target areas
 Lost – when the surveillant does not know the with the primary mission of supporting the cover
whereabouts of his subject or the subject story.
had eluded the surveillance.
Types of Cover
Methods of Surveillance  Artificial- altering the background that will
 Stationary Surveillance – also referred to as correspond to the operation
Fixed and Stakeout Surveillance – is used  Multiple- Includes different cover
when you know or suspect that a person is at  Natural- Actual or True Background.
or will come to a known location when you
suspect that stolen goods are to be dropped Hazards of Undercover Operations
or when informants have told you that a  Reintegration back into normal duty-
crime is going to be committed. Agents work their own hours, they are
 Moving Surveillance or Shadowing or tailing – removed from direct supervisory monitoring
simply the act of following a person. and they can ignore the dress and
 Technical Surveillance – by the use of etiquette rules. So the resettling back into
communications and electronics gadgets, the normal police role requires the coming
system and equipment. off of old habits, language and dress. After
working such free lifestyles, agents may
Forms: have discipline problems or exhibit neurotic
 Loose tail – employed where a general responses.
impression of the subject’s habits and  Maintenance of identity- Living a double life
associates is required. in a new environment presents many
 Rough Shadowing – employed without problems. Undercover work is one of the
special precautions, the subject maybe most stressful jobs an agent can undertake.
aware of the surveillance; employed also The largest cause of stress identified is the
when the subject is a material witness and separation of an agent from friends, family
must be protected from harm or other and their normal environment. This simple
undesirable influences. isolation can lead to depression and
 Close tail – extreme precautions are taken anxiety.
against losing the subject is employed where
constant surveillance is necessary. Uses and Types of Undercover Assignment
 Residential Assignment- It is related to the
2. Casing- It is the careful inspection of a place to neighborhood of the subject, where the
determine its suitability for a particular operational agent will live as a new resident without
purpose. It is also known as the RECONNAISSANCE making any suspicion. His mission is to make
or RECCE in Military term. friends within its neighborhood and gather
information regarding the subject and
3. Elicitation- The process of extracting information possibly getting closer to the subject
from a person believes to be in possession of vital  Social Assignment- The agent will gain
information without his knowledge or suspicion. access to the subject by going to the
different hang out places of the subject
4. Employment of Technical Means and gather information like knowing how to
 Bugging- The use of an equipment or tool drink socially without getting drunk.
to listen and record discreetly conversations  Work Assignment- The agent will be
of other people. employed where the subject work to
acquire information. The agent must know
his work and focus his mind set and habit to

244 | P a g e
his work assignment or getting employed A. Cryptography- It is defined as an art and
where the investigator can observe the science of codes and ciphers. This is done
activities of the subject at his place of work. through the use of “Speech Inverter” whereby
 Subversive Organization- This is the most essential speech frequencies are divide into
dangerous of all the undercover several ranges by filters then inverted to
assignment; the agent will join the produce it scrambled speech when
organization of the subject itself he must intercepted.
know the ideologies of the group and the B. Crypto Analyst- Refers to those persons who
actions while inside should conform to the break intercepted codes.
organization to avoid any suspicion. C. Cryptographer- It refers to a person who is
 Personal Contact Assignment – the highly skilled in converting message from clear
investigator required to develop the to unintelligible forms by use of codes and
friendship and trust of the subject. cipher.
 Multiple Assignment – The investigator is D. Coding-It is the changing of message from plain
tasked to cover two (2) or more of the clear text to unintelligible form also known as
above specific assignments simultaneously, “Encrypting”.
it can produce extensive information with E. Decoding- Transforming of coded message into
minimum expenses but more prone to plain text also known as “Decrypting”.
compromise.
XIII. Security Measures & Operations in Relation to
XI. Informers and Informants Intelligence

A. Informants- Any person who hand over A. Physical Security- The broadest type of security
information to the agents which is relevant to the that is concerned with the physical measures
subject. The informant may openly give the designed to safeguard personnel and prevent
information clandestinely and choose to remain unauthorized access to equipment, facilities,
anonymous. materials, documents, and to protect them from
espionage, sabotage, damage or theft
Types of Informants
B. Communication Security- The protection resulting
 Anonymous-Unidentified or unknown informants from the application of various measures which
 False Informant- reveals information of no prevent or delay the enemy or unauthorized person
consequences, value or stuff connected within in gaining information through communication. This
thin air. includes transmission, cryptographic and physical
 Frightened Informants- weakest link in criminal security.
chain, motivated by anxiety.
 Self-Aggrandizing- moves around the center of C. Document Security- Protection of documents,
criminals delight in surprising the police about classified matters and vital records from loss, access
bits of information. to unauthorized persons, damage, theft and
 Mercenary- Information for sale needed compromise through proper storage and
something for exchange of information. procedures.
 Double-Crosser- He wants to get more
information from the police more than he gives.  Classify – Assigning of Information or material
 Women- Most dangerous to one of the four security classification after
 Legitimate- operators of business desire to give determining that such information requires
information for legitimate reasons. security as prescribed by PNP regulation 200-
012.
Motives of Informants  Reclassify – The act of changing the assigned
classification of a document or material.
 Vanity – conceited act/character of the  Declassify – The removal of the security
criminal resulting to self - betrayal or classification from classified document or
tantamount to guilt, gaining favorable attention material.
and importance by the police.  Upgrading - The process of assigning higher
 Civic-mindedness – sense of duty and category of document or information
obligation to assist the police. according to the degree of security needed
 Fear – A person under an illusion of oppression  Compartmentation – The granting of access
by enemies or of other impending danger. to classified document or information only to
 Repentance – One who has a change of heart properly cleared persons when such classified
and wishes to report a crime that is preying on information is required in the performance of
his conscience. their official duties, and restricting it to specific
 Gratitude or gain – An expression of physical confines when feasible.
appreciation to obtain a privilege or an interest
in the welfare of his family during his detention. Categories of Classified Matter (PNPR 200-0121)
 Revenge – To settle a grudge due to settle a
previous injury 1. Top Secret (GREEN) – Top Secret documents calls
 Jealousy – envious of the accomplishments or for the utmost degree of protection. Unauthorized
possessions of another and wishes to humiliate revelation of this materials and information
him. would cause extremely severe damage to the
 Remuneration – a person who informs solely for nation, politically, economically, or militarily.
the pecuniary or other material gain he is to 2. Secret (RED) - Unauthorized disclosure of this
receive. documents or things may put at risk the nation
security, cause serious injury to the reputation of the
B. Informers- refers to any person who provides nation, the reproduction of which will be
information to the agents in a regular basis considerable cost and labor, or significant delay
regarding to the subject they are either paid
regularly or in base-to-case basis. 3. Confidential (BLUE) - Unauthorized revelation of
which may be injurious to the reputation of
XII. Cryptography the nation or governmental activity or would cause

245 | P a g e
administrative humiliation or unnecessary
injury.

4. Restricted (BLACK) - This are information which


should not be published or communicated to
anyone except for official purposes, These records
are daily files, routine in nature even if lost or
destroyed, will not affect operation or
administration.

D. Personnel Security- the sum total procedures


followed, inquiries conducted and criteria applied
to determine the work suitable to a particular
applicant or the retention or transfer of a particular
employee.

Personnel Security Investigation – is an inquiry into


the character, reputation, discretion,
integrity, morals and loyalty of an individual in order
to determine a person’s suitability for appointment
access to classified matter.

TYPES OF PSI
 Local Agency Check- Refers to the
investigation of the records and files of agency
in the area of principal residence of the
individual being investigated.

 National Agency Check- It consists of LAC


supplemented by investigation of the records
and files of the following agencies: PNP, ISAFP,
NBI, CSC, Bureau of Immigration and
Deportation and other agency.

 Background Investigation – a check made on


an individual usually seeking employment
through subjects records in the police files,
educational institutions, place of residence,
and former employers.
 Complete Background Investigation- it is a type
of BI which is more comprehensive, that consist
of detailed information regarding the subject.
Security Clearance- It is a certification by a
responsible authority that the person described
is cleared to access and classify matters at
appropriate levels.
 Interim Clearance- Effectivity Two
Years
 Final Clearance- Effectivity Five
Years

246 | P a g e

You might also like