0% found this document useful (0 votes)
526 views12 pages

Chapter 12 Surveillance Operations

This document discusses surveillance operations and provides details on various related topics. It defines surveillance as secret observations to obtain valuable information. Several types of surveillance are described, including stationary, moving, aerial, video, audio, and electronic surveillance. Methods like one-man and two-man ("AB") surveillance are also outlined. The goal of surveillance is to track subjects and gather intelligence without being detected. Proper training is needed to successfully plan and conduct different surveillance techniques.

Uploaded by

Mares Baysan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
526 views12 pages

Chapter 12 Surveillance Operations

This document discusses surveillance operations and provides details on various related topics. It defines surveillance as secret observations to obtain valuable information. Several types of surveillance are described, including stationary, moving, aerial, video, audio, and electronic surveillance. Methods like one-man and two-man ("AB") surveillance are also outlined. The goal of surveillance is to track subjects and gather intelligence without being detected. Proper training is needed to successfully plan and conduct different surveillance techniques.

Uploaded by

Mares Baysan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CHAPTER 12 – Surveillance Operations

Topics for Discussions:

 Introduction

Surveillance is, quite simply, observations conducted to gain information.


This simple definition includes a plethora of techniques and methods that
can be considered a form of surveillance. Many of these are recognizable
through common knowledge produced by popular culture. The most well-
known methods include stationary surveillance, technical surveillance
(typically covert video or audio recordings), electronic surveillance (digital
observations, keystroke counting), and many more. Nearly anyone can
engage in surveillance once properly trained and educated; individuals
using the various techniques of surveillance range from federal officials
trying to save lives from terrorists and other criminals to private
investigators gathering evidence for civil court.

Surveillance is a tedious and risky undercover activity. However, it entails


the excitement and challenges to all intelligence operatives. It needs skills
and talents in order to accomplish the mission wherein lies the calculated
risk to all surveillance enthusiasts. They need to cope with the embedded
LIE with finesse.

 Expected Learning Outcomes:

At the end of this lecture, students are expected to:

 memorize the meaning of surveillance operations;


 enumerate the different types of surveillance;
 discuss the various methods of surveillance; and
 interrelate the ODEX Technique in surveillance operations.

❖ Meaning of Surveillance

 In collecting additional information about the person or some


places that is necessary in the conduct of investigation,
surveillance may be conducted.
 Surveillance is defined as the clandestine or secret
observation of persons, places or objects to acquire valuable
information. Unlike undercover operation, which enters or
infiltrates criminal syndicates, surveillance is merely
observation or watching the particular subject.

 In the conduct of surveillance, subject refers to who or what is


being observed which can be any person, place, property, vehicle,
group of people, organization or object as the target in conducting
surveillance.

 The agent here or the person conducting surveillance or making an


observation is referred as the surveillant.

 He is usually an investigator who disguises himself purposely


for surveillance. The conduct of surveillance is guided by the
surveillance plan. Surveillance plan simply refers to the
outline or blueprint as to how surveillance should be
conducted.

 While conducting surveillance, any person whom the subjects


picks or deals with while he is under observation is termed as
contact.

 Take note to be observant as the subject may be accompanied by


a convoy or decoy.

 Convoy is an associate of the subject who follows him to


detect surveillance.

 Decoy is a person or object used by the subject in attempt to


escape the eyes of surveillant.

 The surveillant should be cautious not to alarm the subject since


he might be burn out.

 Burn out or Made happens when subject under surveillance


becomes aware that he is under observation and identifies the
observer. If it happens, the subject often uses all the means to elude
the surveillance.

 When the surveillant does not know the whereabouts of his subject
or the subject had eluded the surveillance, it means lost.

 To prevent this, as much as possible do not make yourself too


close to the subject to avoid detection. Just remember to have a
log.

 Log refers to the chronological record of activities that the


subject had or took place in the target area.

 Target area refers to the area of operation of surveillance


activities. Remember not to forget to take note of whatever
happened and, if possible, take photographs.

 Types of Surveillance

 The types of surveillance that the agent or surveillant use may vary
depending on his purpose. As such, it is the job of the police
investigator in charge as to what should be the best type of
surveillance that should be done in order to acquire necessary for
the case under investigation or for future endeavors.

 The types of surveillance are discussed as follows:

 Stationary surveillance - this surveillance is otherwise known


as fixed, plant or stakeout surveillance and is commonly
done in one standard location. This is best useful when:

o A stolen property is expected to be dropped; or o A


crime is expected to happen.

 Moving surveillance - this surveillance is employed when the


subject moves from one place to another.

 The person is commonly tailing or shadowing the subject.


o Tailing or Shadowing simply means as the act of
following a person’s movement either through foot or
with the use of an automobile.

o The subject of this surveillance is usually a person.


Under this method of surveillance, this could be done
in the following manner:

 Rough tail or open tail - otherwise known as rough


shadow, and is commonly employed if the subject
knows about the presence of the surveillant. Rough
tail can be used in the following scenario:

 When the subject is a material witness of a


crime; or

 A fugitive who knows that he is under


constant surveillance.

 Take note that rough tail also suffers some


liabilities and charges like police
harassment or invasion of privacy.

 Close tail or tight tail – this tailing is employed when


it is extremely important not to lose the subject and
a constant surveillance is needed. Close tail is very
useful when:

 The subject will commit a crime;

 There is a need to know the subject’s exact


habit; and

 Subject’s activities are necessary to


another critical operation.

This tailing is employed even if the subject recognizes the


surveillant which means that the subject must be within the
distance and sight.
 Loose tail – refers to the tailing commonly employed
even if the surveillant wants to remain undetected.
This tailing could be used best when:

 Surveillant needs the general information about


the subject; and
 Surveillant needs to know the subject’s activities
or associates.

If the subject is lost during surveillance, relocate the subject and


continue the surveillance.

 Aerial surveillance – this type of surveillance is done using


helicopters or other aerial devices. This is commonly
employed in areas that is not accessible to foot or surveillance
vehicles.

 Video surveillance – this refers to the use of video equipment


and other devices used to record visual activity of the subject.

 Audio or electronic surveillance – this refers to the


employment of bugging or wiretapping devices. These two
differ such that:

o Bugging is the eavesdropping any communication or


conversation with the aid of any bug devices. Bug is a
form of electronic device placed in an establishment to
record, receive or transmit conversation.

o Wiretapping is the interception of communication lines


such as telephone or cellphone lines in order to listen or
record conversation.

 In addition, eavesdropping is the act of listening secretly to any


conversation who are within the same premises as with the person
who intends to listen to the conversation.

 Methods of Surveillance
 One-Man Surveillance

 One investigator is used to conduct the surveillance. It is best


employed in a fixed surveillance. It should be avoided in
moving surveillance because it provides the least amount of
flexibility in the surveillant, in addition to watching the subject
should take notes, watch for convoys, and collect evidences.

 However, when the one-man techniques of surveillance if


employed in a moving surveillance there are some procedures
that the surveillant should observe.

 When carefully and sensibly performed, the following


procedures will enable the surveillant to keep the subject in
sight for maximum period of time and with a maximum danger
of being made.

 Two-Man or “AB” Surveillance

 In the “AB” technique of surveillance, the surveillant behind


the subject is always known as “A” surveillant. “A” follows the
subject and “B” either follows on the same side of the street or
from across the street.

 When both “A” and “B” operate on the same side of the street
as the subject turns a corner. “B” turns the corner behind the
subject and assumed the position “A”. “A” now becomes “B”
and operates across the street nearest from the subject.

 When “B” operates across the street from “A” and the subject
turns a corner away from “B” will cross the street behind
subject and take up the “A” position. This move should be
prearranged and the signal is necessary.

 Should the subject cross the street toward ‘B”, “B” should
avoid meeting the subject by dropping back, going into a story,
or going straight ahead.
 Whenever course “B” takes, he should try and keep “A” in
sight or signaled him as soon as possible become his “B” next
move will depend on signaled instructions from “A”.

 Three-Man or ABC Surveillance

 The most effective technique of foot surveillance is the “ABC”


technique. It employs three surveillances, and is intended to
keep two sides of the subject covered. “A” follows the subject.
“B” follows “A” and concentrates on keeping “A” in sight rather
than the subject. “B” also watches for convoys.

 The normal position for “B” is behind “A”. “C” normally


operates across the street from slightly to the rear of the
subject. In this manner “C” techniques, necessitated by
weather, traffic, or crowds, would have “A” behind the subject.
With both “B” and “C” following across the street from the
subject.

 There are many ways in this techniques which can be


successfully employed.

 Leapfrog Surveillance

 Two or more surveillants are used to conduct the leapfrog


technique of surveillance. This is a variation of the “AB” and
“ABC” methods. It is simple to execute and greatly reduces
the chances of the subject reorganizing surveillant.

 Progressive Surveillance

 The progressive technique of surveillance is used when


extreme caution is mandatory. It can be presupposed by the
surveillants that the subject will resort to every method it
eludes possible surveillance. It is a slow technique and limited
to subject the follow habitual daily routines.
 Vehicle Surveillance

 In vehicle surveillance the subject will move primarily by automobile,


therefore necessitating the surveillant followed by automobile. Since
many obstacles, such as traffic conditions, signal lights, and speed
restrictions will be encountered, this type of surveillance requires, in
addition to the routinely well-prepared plan as follows.

 A dependable mode of transportation that is commonly used


in the area subject of surveillance.

 License plates on the car, which must be identifiable as


belonging to an official. They should be of the province in
which the surveillance is being conducted.

 A two-way radio communication system if more than one


vehicle is employed.

 Consideration for carrying emergency supplies, such as


additional gasoline, water, and first aid equipment.

 Preparations for alternate of transportation in the even that


change in transportation are required to complete the
surveillance.

 At least two surveillants in each vehicle, one to drive and the


other serves as observer and radio operator, etc

 Three (3) Techniques of Vehicle Surveillance

 One Vehicle Technique

o This technique is conducted by one vehicle following the


subject alone though to observe his movements and far
behind to avoid ready detection.

o The distance between the subject’s vehicle and the


surveillant’s vehicle will depend upon the area of operation.
In city or building area, the distance should be close
enough to avoid losing the subject.

 Two-Vehicle Technique

o This technique is conducted by one vehicle to follow the


subject at different distance on the same street. This can
be arrived by having one vehicle following the subject on a
parallel street while the other is receiving radio transmitted
direction from the surveillance vehicle which is behind the
subject.

o This technique is more available than the onevehicle


technique in the two vehicles can exchange places from
time to time, or one vehicle ahead of the subject, if the
destination becomes apparent, and set up fixed
surveillance post.

 Four-Vehicle Technique

o The four-vehicle technique of surveillance is conducted


with four vehicles boxing in the subject. Radio contact is
necessary among the vehicles, when information on
surveillance vehicle is in front of the subject, one behind,
one to go left of a parallel street, and one to his right on a
parallel street.

o This technique offers maximum flexibility where surveillants


are able to move with the subject.

 Observation and Description (ODEX) Technique

 Meaning of Observation and Description

 Is a complete and accurate awareness by an individual of his


surroundings and encompasses the use of all our major senses
to register and recognize its operational and/or intelligence
significance.

 Description

 Is the actual and factual reporting of one’s own observations or


the reported sensory experience recounted by another.

 Psychological Process for Accurate Observation


 Attention – consists of the psychological process involved in
becoming aware of a fact (aware of the existence of a fact)

 Perception – consists of the psychological process involved in


understanding this fact of awareness.

 Report – used in two (2) senses:

o The first in the psychological process involved in identifying


by name in one’s own mind some facts which has been
perceived.

o Report – narrate of what you perceived/identified.

 Three (3) Types of Attention

 Involuntary – in it, you have no control and it requires no effort.

o Example - looking at the window of the store, suddenly


hears a car collided with another car.

 Voluntary attention – this type is more reliable but not nearly


as dependable as habitual.

o Example - assume that someone is required to listen to


a lecture concerning a subject in which he is not
interested.

 Habitual Attention – an attention which is distinguished by little


effort with a maximum of control
.
o Example: a student who is interested to a certain
subject.

 Factors that Influences Attention


 Size
 Change
 Repetition
 Striking Quality
 Interest
 Organic Condition
 Suggestion

 Factors Involved in Perception


 Mental Capacity
 Educational Background
 Empirical Background
 Occupation Background

 Factors Governing Report


 Vocabulary
 Time Lag
 Recurrence of Similar Incodent
 Memory
 Has bearing in evaluation of information

o refer to a complex group of mental functions and states


of awareness that are concerned with the storing of
experience and its reappearance in consciousness or its
utilization in subsequent activity.
 Types of Memory

 Sensory – that of learning repetition


 Intellectual – higher evaluation

 Functions of Memory

 Storing information – systematic filing


 Recollection – returning to conscious memory that which has
been stored.

 How Recollection May Be Brought About?

 Recall – process of reproducing a past experience


 Recognition – process of identifying a perception as having
been experienced at some time in the past.
 Means of reception:

o Eye – minded
o Ear – minded
o Motor – minded

 Motor
o Involves touch, smell and taste

 References:

 PNP Intelligence Manual, DI, Camp Crame, QC


 Handbook on Intelligence, Soriano
 Handbook in Police Intelligence, Manrong
 Fundamentals of Crimnal Investigationand Intelligence

You might also like