Review Notes On Law Enforcement Administration Sjit Criminology Cl-Mabikas 2014
Review Notes On Law Enforcement Administration Sjit Criminology Cl-Mabikas 2014
POLICE INTELLIGENCE
INTRODUCTION
The intelligence community is not only our first line of defenses against the
various threats to national stability but also bears the awesome responsibility of providing
comprehensive, accurate and timely information for political and socio-economic
decision-making.
The tasks of the intelligence service have not only grown in dimension but have
also expanded in their complexity. More than ever, the intelligence service is called upon
to bolster the role of intelligence not only in its preventive aspect but also in shaping the
political, social and economic transformation of our society. Intelligence must not only
act as an early warning system against the martial threats to the public but also must
delve deep into the roots of dissidence and indicate the areas where socio-economic
amelioration would be most effective.
First of all, he must be steeped in the precepts of the New Society that he is
foresworn to uphold. He must know not merely the tactical but the national and strategic
considerations of his mission. He must work within an organization that is disciplined,
efficient and resourceful.
The intelligence man must always perform with the highest level of professional
sophistication. He must be aware that covert information, whenever classified maybe
withheld to a point that it cannot be availed for strategic or tactical purposes. Information
must not be withheld from the public when the considerations of psychological warfare
dictate otherwise.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
HISTORICAL SETTING
From the beginnings of recorded history, we note that such inquiries are made not
solely about the situation and prospect of the single individual but about those of the
group - the tribe, the kingdom, the nation.
Biblical Beginnings
The earliest recorded instances of intelligence fathering can be found in the Holy
Bible (Numbers 13) "When Moses was in the wilderness with the children of Israel, he
was directed by the Lord to send a ruler to each of the tribes of Israel to spy out the Land
of Canaan which the Lord had designed as their home. They spent forty days on their
mission and thereafter reported back to Moses their findings."
MOSES
One of the first recorded formalized intelligence efforts, with format, can also be
found in the Holy Bible Numbers 13:17.
"And Moses sent them to spy out the land of Canaan and said unto them, get you up this
way southward, and go up into the mountain; and see the lands, what it is; and the people
that dwell therein, whether they are strong or weak, few or many; and what the land they
dwelt in, whether in tents, or in strongholds; and what land is; whether it be fat or lean,
whether there be wood therein, or not. And be of good courage and bring of the fruit of
the land."
The scriptures also named the twelve intelligence agents whom the Lord directed
Moses to sent into the land of Canaan and records that "all those men were heads of the
children of Israel."
RAHAB
The Harlot of Jericho (Joshua 2:1-21)" who sheltered and concealed the agents of
Israel, made a covenant with the agents and duped their pursuers. She was not only an
impromptu confederate of immense value for the Jewish leader of that far distant day, but
also established a plot-pattern which is still of periodic relief to motion picture producers.
DELILAH
The Philistine used her when she allowed Philistine spies to hide in her house
(Judges 16). Delilah was an impromptu intelligence agent. Apart from her tonsorial
specialty, she also allowed sex to gain intelligence from a powerful enemy. She achieved
the largest effective force of her employer's adversaries and contriving the stroke which
put that force out of action".
Sun -Tzu
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
The East was ahead of the West in the raft of intelligence in 400 B.C. rejecting the
oracles and the seer. Sun - Tzu, a Chinese philosopher takes a more practical view
according to him, what is called foreknowledge cannot be elicited from spirits, nor from
gods nor from/analogy with past events nor from calculations. He wrote, "It must be
stained from men who knew the enemy situation.'' It is no wonder that Sun - Tzu's book
entitled The Art of War" is the favorite readings of the late Mao Tse Tung and is a
required reading material for the Chinese Communist Tacticians. He further wrote the
saying in which most people in the intelligence service believe became a parlance in the
world of intelligence:
"Know thy enemy and know yourself, you need not fear the results of a hundred battles"
"If you know yourself and not the enemy, for every victory, you are a fool who will meet
defeat in every battle."
Sertorius
He was the Roman, Commander in Spain who possessed a White Fawn and
allowed it to become widely known – that he derived secrets and guidance from the fawn.
His intelligence agents credited their information to the supernatural power of animals.
Akbar
Genghis Khan
He was known The Great Mongol", who used intelligence to conquer China and
invade Cathay. He instructed his Generals to send out spies and used prisoners as sources
of information. The leader of the so-called MONGOL CONQUERORS - made use of
effective propaganda machine by spreading rumors of Mongol Terror, they collected
information on weaknesses and rivalries of Europe. The leaders usually disguised as
merchants.
RENAISSANCE Period
In England, Sir Francis Walsingham – under Queen Elizabeth, organized the first
National Intelligence service. He employed spies on the staff of the Admiral in Command
of the Spanish Army and able to obtain information regarding Spanish Army as to their
ships, equipment, forces and stores. He protected Queen Elizabeth I from countless
assassins.
Louis XIV – systematized political policy, continuous surveillance, postal censorship and
military intelligence organization were his contributions.
Napoleon Bonaparte once said, "One Spy in the right place is worth 20 ,000 men in the
field". He organized two Bureaus of Interest:
Topographic Bureau – This maintains a large map which covers the latest
information regarding both enemy and friendly forces. He maintained Military
Intelligence and Secret Political Police Service all over Europe. His main arm was
"Spy against spy" concept.
Common spies – those recruited among poor folk, glad to earn a small sum or to
accommodate as military officer.
Double spies – are unreliable renegades, chiefly involved in spreading false
information to the enemy.
Spies of Consequences – couriers and noblemen, staff officers, and kindred
conspirators, requiring a substantial bribe or bait,
Persons who were forced to undertake espionage against their own will.
Hannibal
He was considered one of the brilliant military strategies in the history of military
Intelligence. He had developed an effective intelligence system for 15 years in Rome. He
usually roam around the city often disguise himself as a beggar to gather first hand
information.
Julius Caesar
During his time, the staff of each Roman Legion includes ten "speculators" who
served as an information-collecting agency.
Military success of the Romans was aided by communication system. Made use
of carrier pigeons, which made possible the amazing speed with which intelligence of
Imperial Rome was transmitted They also employed ciphers to ensure secrecy of
communications.
George Washington
Karl Schulmeister
Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further
device military censorship and organized military propaganda. He introduced military
censorship and organized military propaganda. He works as a census taker and developed
informal gathering of data.
Alfred Redl
Brahma Kautilya
In Ancient India, he overthrew the Nanda dynasty and established the first
MAYURYAN king in the Indian throne. He recommended to his king that for the ruler to
succeed, the ruler should strike at his enemy's weak points by means of spies. He
proposed the following means to conquer enemy's stronghold:
Shadow the king's ministers and officials and attempt to determine their very
thoughts
Report wrong doings of the people
Operate secretly in foreign countries
Spread unrest
Commit act of sabotage
Assassinate political and military leaders
Official envoys were instructed to make friends with officials of the enemy to
compare their military strengths with their own.
State Informer
Fouche of France
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
A Frenchman born in 1759, rose to become the most feared and respected
intelligence director in French history. He created a network of agent. His assistance
founded the modern system of spying on spies, which later was known as counter
espionage.
The agency was created under the US National Security Act of 1947. It was the
Central Intelligence group established during the time of President Truman in January
1946. The CIA was under the National Security Council.
Mossad – Israel,
BND – West Germany
KCIA – Korean Central Intelligence Agency
It was established by Sir Robert Peel in 1829 which signaled the beginning of a
colorful legendary police force and considered one of the most efficient in the world
today.
World War II
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
GERMAN INTELLIGENCE – started the war with the world's best organized
intelligence service through advance preparation of intelligence accompanied by troop
movements. GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer
Group wherein they subordinated intelligence to operation and did not regard intelligence
assignment worthy of a soldier.
BRITISH INTELLIGENCE – the delay in the use of German V-BOMB against them
was their main achievement during this time.
In 1942 – a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Penemuenda. Its intelligence
failed in the defeat of GENERAL MONTGOMERY'S forces at ANNHEIM.
1. Administration
2. Operation
3. Investigation
4. Prosecution, and
5. Personnel.
The CIA and the FBI - the CIA is one among the biggest in the world in terms of
intelligence networking. CIA and the FBI and the other state/federal units of intelligence
services were US main intelligence agencies.
AGENTS OF BETRAYALS
Intelligence Defined
Webster defines intelligence – as the capacity for understanding and for other forms of
adaptive intellect of behavior; the mind in operation; the power of meeting any situation,
especially a novel situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to guide action
towards goal; knowledge of an event, circumstances, etc., received or imparted; the
gathering or distribution of information; the staff of persons engaged in obtaining such
information.
According to Police Parlance – The end product resulting from the collection,
evaluation, analysis, integration and interpretation of al| available information regarding
the activities of criminal and other law violators for the purpose of affecting criminals
and other law violators for the purpose of affecting their arrest, obtaining, evidence, and
forestalling plan to commit crime.
Today all counties have their intelligence services. They maybe different in their
organization, efficiency and method but they all have the basic functions such as:
Principles of Intelligence
Criteria
Doctrines
a. There exists an essential unity between knowledge and action; that knowledge
enhances the effectiveness of action - and minimizes the chances of error.
b. 'The knowledge requirements of decision-making are complex and beyond the
capacities of anyone necessary to meet there requirements."
Principles
Security – Security is achieved by the measures which intelligence takes to protect and
preserve the integrity of its activities. If intelligence has no security, it might be as well
being run like a newspaper to which it is similar.
The cardinal principle in police intelligence at all levels is the proper, economical
and most productive use of personnel resources and equipment employed and/or utilized
in planning the collection of information and dissemination of intelligence. To pursue
these ends, heads of the police commands in the zone/regional, provincial, district and
station levels shall maintain a harmonious working relationship with other civilian
intelligence agencies. Liaison with these agencies will be encouraged at all times and as
necessary to effect coordination of intelligence operations.
The information that nations need for the conduct of their foreign relations and
domestic affairs is vast as to both type and subject. We live today in a highly complex
world in which competition is accurate and often ruthless. No nation today can any
longer exist in an isolated position, sealed off from the rest of the world or projected
automatically by natural barriers. Every nation must, of necessity, fit itself into the global
pattern that technological progress has forced upon the world.
Forms of Intelligence
3. Armed Force Intelligence – deals with the armed forces of the nation. It includes the
position of the armed forces, the constitutional and legal basis of its creation and actual
role, the organizational structure and territorial disposition, and the military manpower
recruitment and Order of Battle
4. Geographical Intelligence – deals with the progress of research and
development as it affects the economic and military potential of a nation.
KINDS OF INTELLIGENCE
C. Counter Intelligence (CI) – this kind of intelligence covers the activity devoted in
destroying the effectiveness of hostile foreign activities and to the protection of info
against espionage, subversion and sabotage.
Passive measures – are those measures which seek to conceal info from the enemy while
active measures – are those which seek actively to block the enemy's efforts to gain info
or engage in espionage, subversion or sabotage.
Security Intelligence – means that the total sum of efforts to counsel the national
policies, diplomatic decisions, military data, and any other information of a secret nature
affecting the security of the nation form unauthorized persons. It is an effort to deny
information to unauthorized persons by restricting to those who are explicitly authorized
to possess it.
Categories of CI Operation
Categories of CI Operation
The single most important part of intelligence activity is the understanding the
intelligence cycle because MISSION, which is the core of the cycle, se foundation of all
intelligence operations. Every operative must therefore place into the following phases of
the cycle:
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
In relation to type
1. Basic – are general reference materials for use in the planning regarding the
enemies, area of operations, capabilities - static comprehensive.
2. Current – are information which are temporary in nature and narrower in scope.
3. Estimative – are those that determine the future courses of action; required by the
executives to plan future military operations and policies.
This phase of the cycle is concerned with identification of the collecting agency,
the formulation of procedures on the manner of collecting the information in conjunction
with the plans as achieved in phase one.
Collecting Agencies – depending on the type of operation, the collecting agency could be
Government Agencies, Intelligence units, or Organizations.
1. Collection – organization of raw data and information into usable form; grouping
similar items of information so that they will be readily accessible.
Recording – Is the reduction of info into writing or some other form of graphical
representation and the arranging or this info into writing or some form of graphical
representation and the arranging of this into groups of related items.
Evaluation – Is the determination of the pertinence of the info to the operation, reliability
of the source of or agency and the accuracy of the info. Evaluation determines the
following:
Analysis – shifting and isolating those elements that have significance in light of
the mission or national objective.
Integration – combining the elements isolated in analysis and known information
to form a logical picture or theory.
Deduction – the formulation of conclusions from the theory developed, tested and
considered valid n determination of effort and meaning of the information.
This phase of the cycle refers to the activities of transferring the processed
information to the proper users, most particularly the authority that requires the activity.
Processed information ban be disseminated through annexes, estimates, briefing,
message, reports, overlays, and or summaries.
Propriety of the message must be clear, concise and complete, as well as in the proper
form for the receiver to readily understand its contents. It must be disseminated to the
correct user, presented in a form that lends itself to immediate use and distributed by the
most effective means appropriate to both time and security requirements.
Methods of Dissemination
Information
1. Open Sources – 99% of the information collected are coming from open sources.
2. Close Sources – 1% of information are collected from close sources.
Enemy activity
ROW and Civilians
Captured documents
Map - Weather, forecast, studies, report – Agencies
1. Surveillance
2. Casing and
3. Elicitation
4. Surreptitious entry
5. Employment of technical means (Bugging and Tapping device)
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
Informant Net – It is a controlled group of people who worked through the direction of
the agent handler. The informants, principal or cutouts supply the agent handler directly
or indirectly with Intel information
Types of Informants
Sub-type of Informant
1. Automatic Informant
2. Penetrating Agent
3. Infiltrating Agent
4. Full time Informant
5. Rival – Elimination Informant
6. False Informant
7. Frightened Informant
8. Self – aggrandizing Informant
9. Mercenary Informant
10. Double Grosser Informant
11. Woman Informant
12. Legitimate Informant.
People give information to the police due to various reasons. Their motives include:
1. reward
2. revenge
3. fear and avoidance of punishment
4. friendship
5. patriotism
6. vanity
7. civic-mindedness
8. repentance
9. competition, and
10. other motives.
INFORMANT RECRUITMENT
Phases
INTELLIGENCE OPERATIONS
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
Cover – the means by which an individual group of organization conceals the true nature
of its acts and or existence from the observer.
Cover story – a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation.
Cover Support – an agent assigned in target areas with the primary mission of
supporting the cover story.
Importance of Cover
2. Access – it is the capability of a prospective agent to obtain the desired info for the
Intel organization or to perform to Intel collection mission in the area.
Surveillance
According to
9. Security consciousness
10. Administrative and Logistics: Communication and control
Careful survey of the surrounding area should be made. The character of the
neighborhood, the residents and the transients should be noted. The observation point
should be selected. The following may be considered:
1. Study the Subject – name, address, description, family and relatives, associates,
character and temperament, vice, hobbies, education, others
2. Knowledge of the area and terrain – maps, national and religious backgrounds,
transportation, public utilities
3. Subversive Organization – history and background, biography of the official,
identity and background of members and former members, method of
identification employed by the members, files and records, nature, location and
accessibility, meeting
4. Cover Story – the scenario must be appropriate to cover up operation and
avoidance of identification of mission.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
CASING OR RECONNAISSANCE
Casing is the term use in the police organization while reconnaissance is used in
military terms. Casing or reconnaissance is the surveillance of a building place or area to
determine its suitability for Intel use or its vulnerability in operations. It aids in the
planning of an operation by providing needed information. It assists the agent handler to
install confidence in his agent during briefing phase by being able to speak knowingly
about the area of operation. Casing is also considered a security measure because it offers
some degree of protection for those operating in an area unfamiliar to them.
Method of Casing
a. Personal Reconnaissance – the most effective method and will produced the most
info since you know just what you're looking for.
b. Map Reconnaissance – It may not sufficient but it can produce a certain amount of
usable information
c. Research – much info can be acquired through research
d. Prior Information – your unit and of the unit will have file report that they may
provide you with info
e. Hearsay – Info usually gain by the person operating in the area and performing
casing job
a. Area condition and habit – a description of the locality as whether the place is a
residential, commercial, highly urbanized, rural. Habits refer to the routine activities of
the people in the area dialect and different beliefs also considered.
b. Active Opposition – means all organs of every security system whose task it to
prevent intelligence activity in a given area.
c. Disposal Plan – disposal of the information, in case of possible compromise. Disposal
of information and materials
d. Escape and Evasion – the exit planning in case of emergencies, from immediate focal
point, the general area and completely from the area
Description – the actual and factual reporting of one's observation of he reported sensory
experience recounted by another
Types of Attention
ELICITATION
Types of Approach
Types to Probe
1. Competition Probe – this is effective when used in connection with the teacher pupil
approach
2. Clarity Probe – used to elicit additional information in an area which the response is
clear
3. High Pressure Probe – It serves to point out contradictions in what the subject has
said
4. Hypothetical Probe – presents a hypothetical situation and to get he subject to react
to the hypothetical situations
Purposes of Elicitation
1. Close observation of the person and accurate recording of the terms describing the
features
2. Information describing through interviews of witnesses
3. Examination of observation of photographs and sketches
4. Examination of records
Information needed:
1. Domestic Background
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
2. Personal Habit
3. Business History
4. Social or Business Associates
5. Medical History
6. Educational Background
7. Family History
The approach in tracing fugitive depends upon the character of the subject. In case
the fugitive is exclusive, rather elusive, discreet methods must be employed. With the
experienced criminal, a more direct approach is permissible. The following are to be
taken.
1. Routine Information
Full name and alias - Physical description - Modus operand! - Motive -Associates, Past
and present including girlfriend - Habits, hang-outs, and resorts he is known to frequent -
Criminal Record, photographs and fingerprints -Residence last known and previous
location - Employment, last known and previous employee - Relatives, names and
addresses - Driver's license - SSS or GSIS number - Handwriting for comparison
TACTICAL INTERROGATION
The need for obtaining information of the highest degree of credibility taken on
the minimum of time can be through interrogation which varies and dependent entirely
on the situation. In tactical interrogation, familiarization of the following is necessary:
Interrogee – any person who is subjected to the interrogation prbcess in any of its forms
and phases.
Source - a person who for any reason submits information of intelligence interest usually
on a voluntary basis
Interview – Similar to a debriefing although it is less formal and the interrogee is not
necessarily under the control or employment of the respective intelligence service
Form of Interrogation
1. Direct – the subject is aware of the fact that he is being interrogated, but he may not
learn the true objectives of the interrogation. This is being used extensively at the tactical
lever.
2. Indirect – the subject is not aware that he is being interrogated. This is used when
time is not so important
Types of Interrogation
3. Debriefing – a form of eliciting information, which is generally used when the area
of intellectual capability of the interrogee is known. Maximum use of the narrative and
not try to trap the person being debriefed with leading question. The
debriefer/interrogator must be familiar with the subject in which the interrogation is
being conducted.
4. Interview – the interviewer must be fully aware ot the actual type of information
desired and alert on the interviewee's moods and expressions. It must be tactual especially
if the source (interviewee) is to remain unaware of the type of information desired by the
interviewer.
5. Interrogation of Lay Personnel (Specific Type) – the techniques used are the same
as in the interrogations, however, especial effort must be made to established a common
frame of reference between the interrogator and the interrogee.
6. Technical Interrogation – the level of interrogation where the source has specific
and such detailed information that requires a trained expert in the subject matter to be
explored. It usually covers the specific subject and time is not as limited as during other
interrogation.
INTERROGATION TECHNIQUES:
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
Techniques of Approach - the purpose is to gain the cooperation of the source and
induce him to answer questions which will follows.
1. The "Open Techniques" – the interrogator is open and direct in his approach and
makes no attempts to conceal the purpose of the interrogator. It is best employed when
the interrogee is cooperative. It is frequently used at the tactical level where time is a
major interrogator.
2. The "Common Interest" Technique – the interrogator must exert effort to impress
the interrogee of their common interest. The interrogator must look for he point out the
real advantages the interrogee will receive if he cooperates
3. Record File (we know all technique) – the interrogator prepare a file on the source
listing all known information (record should be padded to make it appear to be very
extensive). The information must contain the life history of he interrogee to include his
activities and known associates (Party- bio-data of the interrogee is important).
4. Exasperation – Techniques (Harassment) - effectively employed against hostile type
interrogee. The interrogator must be alert because the interrogee may fabricate
information to gain relief from irritation (monotype).
5. Opposite Personality Technique – also known as "Mutt and Jeff", 'Threat and
Rescue", "Bud Guy - God Guy', "Sweet and Sour", "Sugar and Vinegar, "Devil and
Angel". Use of two (2) interrogators playing opposite roles.
6. Egotist Techniques (Pride and Ego) – usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity.
7. "Silent" Technique – employed against nervous or the confident type of interrogee.
Look out the interrogee squarely in the eye with sarcastic smile (force him to break eye
contact first).
8. "Question Barrage" Technique (Rapid Fire Questioning) – Intended to confuse
the interrogee and put him into a defensive position. The interrogee become frustrated
and confused, he will likely reveal more than he intended, thus creating opening for
further questioning.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
hgdjhd