Lea Intelligence Review Notes
Lea Intelligence Review Notes
238 | P a g e
Q. Julius Ceasar- During his time, the staff of each It was formed in September 1968, as it was
legion includes ten "speculators" who served as an evident that a credible intelligence
information-collecting agency. The "speculators" gathering setup was lacking.
were the first intelligence personnel to appear Its primary function is collection of external
definitely in a military organization. Military success intelligence, counter-terrorism and covert
of the Romans was aided by communication operations.
system. Made use of carrier pigeons, which made In addition, it is responsible for obtaining
possible the amazing speed with which intelligence and analyzing information about foreign
of the Imperial Rome was transmitted. They also governments, corporations, and persons, in
employed ciphers to ensure secrecy of order to advise Indian foreign policymakers.
communications. Until the creation of R&AW, the Intelligence
Bureau handled both internal and external
R. Wilhelm Johann Karl Eduard Steiber- Known as intelligence.
the Prussia's "King of Sleuthhounds" as minister of
police he studied the use of propaganda and 8th - General Directorate for External Security
censorship as well as utilizing statistical intelligence Directorate General for External Security is
accounting. Steiber's thorough organization and France’s external intelligence agency.
ruthless, his sinister innovations and cold, calculating Operating under the direction of the French
manipulation of human weakness made him the ministry of defense, the agency works
spymaster who most shape the course of the 20th alongside the DCRI (the Central Directorate
century espionage. of Interior Intelligence) in providing
intelligence and national security, notably
S. Alfred Redl- A homosexual Double Spy who while by performing paramilitary and
working as intelligence direct proof Austria and counterintelligence operations abroad.
Hungary, spied the Russians. His treasons activities Its primary focus is to gather intelligence
were discovered and compelled to commit suicide. from foreign sources to assist in military and
His spying led to the death of over 500,000 agents strategic decisions for the country.
and soldiers combined in his 13 years episode as a The agency employs more than five
spy. thousand people.
T. Sir Samuel Luke - Chief Scout of Oliver Cromwell 7th – Federal Security Service of Russian Federation
who was able to dethrone King Charles I in British (FSD)
Civil War of 1640's. Sir Samuel Luke was said to be The Federal Security Service of Russian
industrious in snooping on the enemy. Federation (FSD) is the main domestic
security agency of the Russian Federation
U. John Churchill - first duke of Malborough, told and the main successor agency of the
critics of his enormous expenditure on espionage, Soviet-era Cheka, NKVD and KGB.
that “No war can be conducted successfully The FSD is involved in counter-intelligence,
without early and good intelligence, and such internal and border security, counter-
advices cannot be had but a very great expense". terrorism, and surveillance.
V. Edward I- An English monarch who started The FSD is responsible for internal security of
utilizing English informants especially to determine the Russian state, counterespionage, and
seditious writings against the crown and identify the fight against organized crime, terrorism,
and drug smuggling.
W. George Washington - under oath abounds in the The number of FSD personnel and its
history of every nation. George Washington as budget remain state secrets, although the
Grand Master mobilized the free masons of the budget was reported to jump nearly 40% in
colonies at the outbreak of the American war of 2006.
Independence. 6th – Bundesnachrichtendienst (BND)
The Bundesnachrichtendienst is the foreign
III. Most Outstanding Intelligence Agencies intelligence agency of the German
government,
Intelligence Agency is an effective The BND acts as an early warning system to
instrument of a national power. Aggressive alert the German government to threats to
intelligence is its primary weapon to destabilize the German interests from abroad.
target. Indeed, no one knows what the intelligence It depends heavily on wiretapping and
agencies actually do so figuring out who the best electronic surveillance of international
intelligence service is can be difficult. communications.
It collects and evaluates information on a
10th- Australian Secret Intelligence Service (ASIS) variety of areas such as international
Government intelligence of Australia which terrorism, WMD proliferation and illegal
is responsible for collecting foreign transfer of technology, organized crime,
intelligence undertaking counter-intelligence weapons and drug trafficking, money
activities and cooperation with other laundering, illegal migration and
intelligence agencies overseas. information warfare.
Its primary responsibility is gathering As Germany’s only overseas intelligence
intelligence from mainly Asian and Pacific service, the BND gathers both military and
interests using agents stationed in a wide civil intelligence.
variety of areas.
Its main purpose, as with most agencies, is to 5th - Ministry of State Security (MSS)
protect the country’s political and economic Ministry of State Security is the security
interests while ensuring safety for the people agency of the People’s Republic of China.
of Australia against national threats. Article 4 of the Criminal Procedure Law
gives the MSS the same authority to arrest
9th - Research and Analysis Wing (R&AW or RAW) or detain people as regular police for
Research and Analysis Wing is India’s crimes involving state security with identical
external intelligence agency. supervision
239 | P a g e
One of the primary missions of the MSS is Its personnel have never been caught on
undoubtedly to gather foreign intelligence camera.
from targets in various countries overseas. It is believed to have the highest number of
Many MSS agents are said to have agents worldwide, close to 10,000. The most
operated in the Greater China region. striking thing is that it’s one of the least
funded Intelligence agencies out of the top
4th – Central Intelligence Agency (CIA) 10 and still the strongest.
CIA is the largest of the intelligence
agencies and is responsible for gathering National Intelligence Coordinating Agency
data from other countries that could (NICA)
impact U.S. policy. It is the primary intelligence gathering and
It is a civilian intelligence agency of the analysis arm of the Philippine government, in
United States government responsible for charge of carrying out overt, covert,
providing national security intelligence to and clandestine intelligence programs. Its motto
senior United States policymakers. is: "Knowledge is Safety”. Presently, NICA is in close
The CIA also engages in covert activities at coordination with the CIA, Mossad, Secret
the request of the President of the United Intelligence Service and intelligence services
States of America. of ASEAN countries to counter the threat
The CIA’s primary function is to collect of terrorism.
information about foreign governments,
corporations, and individuals, and to advise The agency is led by a Director-
public policymakers. The agency conducts General and is assisted by a Deputy Director-
covert operations and paramilitary actions, General. The former reports directly to the President.
and exerts foreign political influence The NICA has a National Intelligence Board that
through its Special Activities Division. serves as an advisory board to the Director-General
It has failed to control terrorism activities before he would submit his findings to the President
including 9/11, Not even a single top level relating to national security matters affecting
Al-Qaeda leader captured own its own in the Philippines.
the past 13 years –.
Highly funded and technologically most IV. Principles of Intelligence
advanced Intelligence set-up in the world.
A. Intelligence and operation are interdependent
3rd – Secret Intelligence Service (SIS) MI-6 Intelligence provides valuable inputs for
The Secret Intelligence Service (SIS) supplies effectiveness of police operation on the
the British Government with foreign other hand operation likewise is needed for
intelligence. continuity of intelligence activities. Operation
It operates under the formal direction of and intelligence planners work hand and hand
the Joint Intelligence Committee (JIC) to attain greater degree of success in their
alongside the internal Security Service (MI5), common effort.
the Government Communications
Headquarters(GCHQ) and the Defense B. Intelligence is Continuous
Intelligence (DI). The basic principle of intelligence
It is frequently referred to by the name MI6, operations is that intelligence activities follow a
a name used as a flag of convenience simple cycle, which is continuous at the same time
during the Second World War when it was that new information is being collected in
known by many names. response to direction, other information is being
The existence of MI6 was not officially processed and intelligence is being used.
acknowledged until 1994.
C. Intelligence must be useful
2nd – Mossad
The Mossad is responsible for intelligence It must serve the commander’s need and
collection and covert operations including requirements so that effort will not be wasted. It
paramilitary activities. should have an application and significance to the
It is one of the main entities in the Israeli operation.
Intelligence Community, along with Aman
(military intelligence) and Shin Bet (internal D .Intelligence must be available on time
security), but its director reports directly to
the Prime Minister. Intelligence must be communicated to the
decision maker at the appropriate time to permit
1st - Inter-Services Intelligence (ISI) its most effective use. It must reach the user in time
With the lengthiest track record of success, to serve as basis for appropriate action. Intel
the best know Intelligence so far on the data must be disseminated on time because late
scale of records is ISI. arrival is as good as useless.
The Inter-Services Intelligence was created
as an independent unit in 1948 in order to
strengthen the performance of Pakistan’s
Military Intelligence during the Indo- E. Intelligence operations requires imagination and
Pakistani War of 1947. foresight
The best of its time, failed to counter ISI and
protect Soviet interests in Central Asia. The success of objective is paramount
It has protected its Nuclear Weapons since importance. Intelligence personnel are reminded to
formed and it has foiled Indian attempts to refrain from utilizing criminal elements in Intel
attain ultimate supremacy in the South- operation. They must use their resourcefulness to
Asian theatres through internal obtain more than what is normally.
destabilization of India. It is above All laws in
its host country Pakistan ‘A State, with in a F. Intelligence must be flexible
State’. Intelligence Operations must be
changeable according to the present situation,
240 | P a g e
condition and other factors, Intelligence Operations Terrain, including natural and artificial
are based on reason and sound judgment. obstacles
Procedures which do not readily adapt to a given Weather
situation are generally discarded. Information desired by higher, lower or
adjacent headquarters
G. Intelligence requires continuous security
measures 2. Determination of the Essential Elements of
Deny unauthorized personal information about Information (EEI)
operation and intelligence product, its source and Is an item of intelligence or information of
organization itself. In the handling of classified characteristics of the area of operations
materials there should be a working balance and the enemy, which the commander
between secrecy and operational convenience. feels he needs before he can reasonably
arrive at a decision.
V. Categories of Intelligence
3. Establishment of Priorities
A. National Intelligence- integrated product of
intelligence developed by all government Priorities reflect the criticality of the need
departments concerning the broad aspect of for the particular information. No formula
national policy and national security. exists which can automatically determine
National Policy – specific courses of action priorities. Such determination is a matter
to achieve the national objectives. of judgment.
241 | P a g e
REMINDER: You should LEARN BY HEART this
Accuracy of Source of the
Evaluation Guide
Reliability of Information Information
Information CODE:
3. Analysis- This is the stage in which the collected
CODE: CPPDIT
information is subjected to review in order to satisfy
CUFNUR
significant facts and derive conclusion there from.
A– 1– T – Direct
4, Integration- The combination of the elements
Completely Confirmed Observation by a
isolated analysis with other known information
Reliable By Other commander or Unit
related to the operation.
Sources
5. Interpretation- Process of determining the
B – Usually 2 – Probably U – Report by a
significance of new information in the possible
Reliable True penetration or
alternatives. The interpreter determines the
resident agent
significance of the information as to the meaning of
the interpreted information. C - Fairly 3 – Possibly V – Report by an
Reliable True AFP trooper or PNP
D. Dissemination personnel in
operation
Processed information or intelligence data D – Not 4 – Doubtfully W – Interrogation of
are disseminated to end users, common methods Usually True a captured enemy
of disseminating Intel data are conferences, briefing Reliable or agent
and person to person exchanges. In this process, E – Unreliable 5 – X – Observation by
consider the factors of timeliness, correctness and Improbable a government or
security. civilian employee or
official
VII. Counter-Intelligence F – Reliability 6 – Truth Y – Observation by
Cannot Be Cannot Be a member of
Counterintelligence – phase of intelligence Judged Judged populace
covering the activity devoted in destroying the Z - Documentary
effectiveness of hostile foreign activities and the A. Categories of Police Intelligence
protection of information against espionage,
subversion and sabotage. It also includes protection 1. Strategic Intelligence – knowledge pertaining to
the organization itself. the capabilities and vulnerabilities of a foreign
nation, which is required by the National Planners
A. Types of Counter-intelligence for the formulation of an adequate National
1. Passive CI Measures – protection of classified Defense in peace and forms the basis for,
and sensitive information to the unauthorized projected. This is intelligence information which is
through secrecy, communication security, and not immediate operational but rather long range.
other various safeguards.
2. Active CI Measures – are those measures, Components of Strategic Intelligence
which seek actively to block the enemies’
effort to gain information or engage in a. Political Intelligence – deals with Domestic
espionage, subversion, and sabotage. and Foreign affairs and relation of
government operations;
B. Objectives and Importance of Counter- Basic Principles of the Government
Intelligence Government Structures
It Denies information to the enemy Public Order and Safety
It Reduces the risk of a command Subversion
Aids in achieving surprises Intelligence and Security
Increases the security of the command Organization
Decreases the enemy ability to create
information about the forces. b. Economic Intelligence – deals with the
extent and utilization of Natural and Human
C. Activities and Function of Counter-Intelligence resources to the industrial potential of the
Protection of information against espionage Nations
Protection of personnel against subversion c. Transportation and Telecommunication
Protection of installations and materials Intelligence - concerned with the operations
against sabotage and facilities not only the Military but also the
Civilians.
D. Categories of Counter-Intelligence Operation d. Sociological Intelligence – deals with the
Military Security – it encompasses the demographic and psychological aspects of
measures taken by a command to protect groups of people.
itself against espionage, enemy operation, Population and Manpower
sabotage, subversion or surprise. Characteristics of the People
Port boundary and Travel Security – has to do Public Opinion – attitudes of the
with the application of both military and civil majority of the people towards
security measures for counterintelligence matters of public policy.
control at point of entry and departure, Education – based on literacy rate
international borders and boundaries. e. Biographical Intelligence – deals with
Civil Security – it encompasses active and individual personalities who have actual
passive counterintelligence measures possession of power
affecting the non-military nationals f. Armed Forces Intelligence – deals with the
permanently or temporarily residing in an area armed forces of the Nation.
under military jurisdiction. Position of the Armed Forces –
Special Operations – counter subversion, constitutional and legal basis of its
sabotage and espionage. creation and actual role.
Organization and structure and
VIII. Police Intelligence Operations territorial disposition
Military Manpower Recruitment
242 | P a g e
Order of Battle- arrangement of B. Close Sources – Only 1% of information are
military troops for battle. obtained from Covert Operation Close/Covert
g. Geographical Intelligence – deals with the Method/clandestine operation.
natural as well as manmade features of the
physical environment of man considered Elements of Clandestine Operation
from the point in view of military operations.
Location – military and economic 1. Sponsor-directs the organization conducting the
importance clandestine activity.
Size – measurement of which a 2. Target- Person, place or things against which the
nation can exchange space or time clandestine activity is to be conducted.
during war. 3. Agent- It refers to a person who conducts the
Shape clandestine Operations to include Principal Agents,
Weather and Climate Action Agents, and Support Agents.
h. Scientific Intelligence – deals with the Principal Agent- Leader or management
progress of the research and development Agent in clandestine operation usually
as it affects the economic and military undertaken by the case officer.
potential of a nation. Action Agent- The who one who conducts
the clandestine Operation that includes:
2. Counter-Intelligence- preparation and execution Espionage Agent- Agent who
of plans and programs to neutralize or prevent any clandestinely procure or collect
activities undesirable to the police organization. information.
Propagandist- Agents who molds the
3. Line or Tactical Intelligence – it is the intelligence attitudes, opinions, and actions of an
information which directly contributes to the individual group or nation.
accomplishment of specific objectives and Saboteur- Agents who undertakes
immediate in nature, necessary for more effective positive actions against an unfriendly
police planning and operation. power, resulting in the loss of use
temporarily or permanently of an
B. Functional Classifications of Police Intelligence article or others.
1. Criminal Intelligence (CRIMINT) – refers to Guerilla- Agent who is a member of
the knowledge essential to the prevention of paramilitary group organized to harass
crimes and the investigation, arrest, and the enemy in a hot war situation.
prosecution of criminal offenders. Strong Arm- Agent who is made to
2. Internal Security Intelligence (INSINT) – refers provide special protection during
to the knowledge essential to the dangerous phase of clandestine
maintenance of peace and order. operations.
3. Public Safety Intelligence (PUSINT) – refers to Provocateur- Agent who induces an
the knowledge essential to ensure the opponent to act to his own detriment
protection of lives and properties. by discrediting himself or by revealing
his true purpose or identity.
IX. Methods and Techniques of Collecting
Information Support Agent- Agent who is engaged in
activities which supports the clandestine
Information – All evaluated materials of operations and or the action agent in his
every description including those derived from operations that includes the following:
observation, reports, rumors, imagery, and other Surveillant- Agent who observes
sources from which intelligence is produced. persons and places of operations
of interest.
Types of Agent used in collecting of Information Investigator- Agent who undertake
Agent of Influence- Agent who uses to procure information or things of
authority to gain information clandestine operation.
Agent in Place- Agent who has been Procurer of Funds- Agent who
recruited within a highly sensitive target obtain money when needed for
Penetration Agent- Agent who have operational use.
reached to the enemy, gather information Safe house Keeper- Agents who
and able to get back without being caught. manages and maintains a safe
Expendable Agent- Agent who leaks false house for clandestine operations
information to the enemy. like meetings, safe heavens,
Double Agent- An enemy agent, who has training, briefing, and debriefing.
been taken into custody, turned around and Communication Agent- Agent who
sent back where he came from as an agent is detailed as securing of
of his captors. clandestine communications.
243 | P a g e
To confirm or deny allegations Wire Tapping- A method of collecting
information thru interception of telephone
Terms to remember in Surveillance conversation.
Surveillant – is the plainclothes investigator 5. Tactical Interrogation- It is a process or method of
assigned to make the obtaining information from a captured enemy who
observation. is reluctant to divulge information.
Subject – is who or what is observed. It can 6. Observation and Description (ODEX) - The
be a person, place, property, and vehicle, complete awareness by an individual of his
group of people, organization or object. surroundings, achieved through maximum
Area Target Study – refers to area of employment of the senses and techniques of
operation of surveillance activities factuality reporting one’s own observation of the
Log – chronological records of activities that sensory experiences recounted by others.
took place in the establishment under
surveillance. X. Cover and Undercover Operations
Safe house- Refers to a place where agents
meet each other for purposes of de-briefing Undercover Operations- also referred to as “Roping”
and reporting. Undercover is disguising one's own identity or using
Live Drop- Refers to a place where agents or an assumed identity for the purposes of gaining the
informants leave their messages to the other trust of an individual or organization to learn secret
Agents. information or to gain the trust of targeted
Decoy- A person or object used by the individuals in order to gain information or evidence.
subject in attempt to elude Surveillant
Convoy- An associate of the subject who Cover- It refers to the changing, forging or falsifying
follows him to detect surveillance. agent’s real personality including but not limited to
Contact - Any person whom the subjects things, location, job, and others that will be used in
picks or deals with while he is under undercover assignment.
observation and identifies the observer
Made – when subject under surveillance Cover Story – A biographical data through fictional
becomes aware that he is under observation that will portray the personality of the agent he
and identifies the observer also known as “ assumed, a scenario to cover the operation.
Burnt out” Cover Support – An agent assigned in target areas
Lost – when the surveillant does not know the with the primary mission of supporting the cover
whereabouts of his subject or the subject story.
had eluded the surveillance.
Types of Cover
Methods of Surveillance Artificial- altering the background that will
Stationary Surveillance – also referred to as correspond to the operation
Fixed and Stakeout Surveillance – is used Multiple- Includes different cover
when you know or suspect that a person is at Natural- Actual or True Background.
or will come to a known location when you
suspect that stolen goods are to be dropped Hazards of Undercover Operations
or when informants have told you that a Reintegration back into normal duty-
crime is going to be committed. Agents work their own hours, they are
Moving Surveillance or Shadowing or tailing – removed from direct supervisory monitoring
simply the act of following a person. and they can ignore the dress and
Technical Surveillance – by the use of etiquette rules. So the resettling back into
communications and electronics gadgets, the normal police role requires the coming
system and equipment. off of old habits, language and dress. After
working such free lifestyles, agents may
Forms: have discipline problems or exhibit neurotic
Loose tail – employed where a general responses.
impression of the subject’s habits and Maintenance of identity- Living a double life
associates is required. in a new environment presents many
Rough Shadowing – employed without problems. Undercover work is one of the
special precautions, the subject maybe most stressful jobs an agent can undertake.
aware of the surveillance; employed also The largest cause of stress identified is the
when the subject is a material witness and separation of an agent from friends, family
must be protected from harm or other and their normal environment. This simple
undesirable influences. isolation can lead to depression and
Close tail – extreme precautions are taken anxiety.
against losing the subject is employed where
constant surveillance is necessary. Uses and Types of Undercover Assignment
Residential Assignment- It is related to the
2. Casing- It is the careful inspection of a place to neighborhood of the subject, where the
determine its suitability for a particular operational agent will live as a new resident without
purpose. It is also known as the RECONNAISSANCE making any suspicion. His mission is to make
or RECCE in Military term. friends within its neighborhood and gather
information regarding the subject and
3. Elicitation- The process of extracting information possibly getting closer to the subject
from a person believes to be in possession of vital Social Assignment- The agent will gain
information without his knowledge or suspicion. access to the subject by going to the
different hang out places of the subject
4. Employment of Technical Means and gather information like knowing how to
Bugging- The use of an equipment or tool drink socially without getting drunk.
to listen and record discreetly conversations Work Assignment- The agent will be
of other people. employed where the subject work to
acquire information. The agent must know
his work and focus his mind set and habit to
244 | P a g e
his work assignment or getting employed A. Cryptography- It is defined as an art and
where the investigator can observe the science of codes and ciphers. This is done
activities of the subject at his place of work. through the use of “Speech Inverter” whereby
Subversive Organization- This is the most essential speech frequencies are divide into
dangerous of all the undercover several ranges by filters then inverted to
assignment; the agent will join the produce it scrambled speech when
organization of the subject itself he must intercepted.
know the ideologies of the group and the B. Crypto Analyst- Refers to those persons who
actions while inside should conform to the break intercepted codes.
organization to avoid any suspicion. C. Cryptographer- It refers to a person who is
Personal Contact Assignment – the highly skilled in converting message from clear
investigator required to develop the to unintelligible forms by use of codes and
friendship and trust of the subject. cipher.
Multiple Assignment – The investigator is D. Coding-It is the changing of message from plain
tasked to cover two (2) or more of the clear text to unintelligible form also known as
above specific assignments simultaneously, “Encrypting”.
it can produce extensive information with E. Decoding- Transforming of coded message into
minimum expenses but more prone to plain text also known as “Decrypting”.
compromise.
XIII. Security Measures & Operations in Relation to
XI. Informers and Informants Intelligence
A. Informants- Any person who hand over A. Physical Security- The broadest type of security
information to the agents which is relevant to the that is concerned with the physical measures
subject. The informant may openly give the designed to safeguard personnel and prevent
information clandestinely and choose to remain unauthorized access to equipment, facilities,
anonymous. materials, documents, and to protect them from
espionage, sabotage, damage or theft
Types of Informants
B. Communication Security- The protection resulting
Anonymous-Unidentified or unknown informants from the application of various measures which
False Informant- reveals information of no prevent or delay the enemy or unauthorized person
consequences, value or stuff connected within in gaining information through communication. This
thin air. includes transmission, cryptographic and physical
Frightened Informants- weakest link in criminal security.
chain, motivated by anxiety.
Self-Aggrandizing- moves around the center of C. Document Security- Protection of documents,
criminals delight in surprising the police about classified matters and vital records from loss, access
bits of information. to unauthorized persons, damage, theft and
Mercenary- Information for sale needed compromise through proper storage and
something for exchange of information. procedures.
Double-Crosser- He wants to get more
information from the police more than he gives. Classify – Assigning of Information or material
Women- Most dangerous to one of the four security classification after
Legitimate- operators of business desire to give determining that such information requires
information for legitimate reasons. security as prescribed by PNP regulation 200-
012.
Motives of Informants Reclassify – The act of changing the assigned
classification of a document or material.
Vanity – conceited act/character of the Declassify – The removal of the security
criminal resulting to self - betrayal or classification from classified document or
tantamount to guilt, gaining favorable attention material.
and importance by the police. Upgrading - The process of assigning higher
Civic-mindedness – sense of duty and category of document or information
obligation to assist the police. according to the degree of security needed
Fear – A person under an illusion of oppression Compartmentation – The granting of access
by enemies or of other impending danger. to classified document or information only to
Repentance – One who has a change of heart properly cleared persons when such classified
and wishes to report a crime that is preying on information is required in the performance of
his conscience. their official duties, and restricting it to specific
Gratitude or gain – An expression of physical confines when feasible.
appreciation to obtain a privilege or an interest
in the welfare of his family during his detention. Categories of Classified Matter (PNPR 200-0121)
Revenge – To settle a grudge due to settle a
previous injury 1. Top Secret (GREEN) – Top Secret documents calls
Jealousy – envious of the accomplishments or for the utmost degree of protection. Unauthorized
possessions of another and wishes to humiliate revelation of this materials and information
him. would cause extremely severe damage to the
Remuneration – a person who informs solely for nation, politically, economically, or militarily.
the pecuniary or other material gain he is to 2. Secret (RED) - Unauthorized disclosure of this
receive. documents or things may put at risk the nation
security, cause serious injury to the reputation of the
B. Informers- refers to any person who provides nation, the reproduction of which will be
information to the agents in a regular basis considerable cost and labor, or significant delay
regarding to the subject they are either paid
regularly or in base-to-case basis. 3. Confidential (BLUE) - Unauthorized revelation of
which may be injurious to the reputation of
XII. Cryptography the nation or governmental activity or would cause
245 | P a g e
administrative humiliation or unnecessary
injury.
TYPES OF PSI
Local Agency Check- Refers to the
investigation of the records and files of agency
in the area of principal residence of the
individual being investigated.
246 | P a g e