Cdi101 Intel
Cdi101 Intel
Cdi101 Intel
OPERATION
2
Biblical Personalities
11
Principal foreign intelligence and
counterintelligence agency of the U.S.
government. Formally created in 1947, the
Central Intelligence Agency (CIA) grew out
of the World War II Office of Strategic
Services (OSS).
12
The Russian Intelligence Agency
Served a multi-faceted role outside of and
within the Soviet Union, working as both
an intelligence agency and a force of
“secret police”.
13
Israeli Intelligence Agency
2 BRANCHES OF MOSSAD:
1. A M A N - m i l i t a r y i n t e l l i g e n c e f o r
defense force.
2. SHABAK- the general security service
for internal security, from the word
“SHIN BET”- defender who shall not
be seen. 14
KOREAN CENTRAL INTELLIGENCE
AGENCY
The original duties of the KCIA were to supervise and
coordinate both international and domestic intelligence
activities and criminal investigation by all government
intelligence agencies, including that of the military. The
agency's broad powers allowed it to actively intervene in
politics. Agents undergo years of training and checks
before they are officially inducted and receive their first
assignments.
15
GREAT BRITAIN INTELLIGENCE
AGENCY
MI5 MI6 (SIS)
Ø Domestic intelligence Ø Foreign intelligence
Ø Deals with inside Ø Combats overseas
threats of UK. threats
Ø Investigates matters of Ø Gather intelligence
national security in the pertinent to the UK’s
UK. international affairs.
Ø US NSA- national Ø CIA
security agency. Ø Our Spies
Ø Their Spies Ø Has its own counter
intelligence
16
PRINCIPLES
OF INTELLIGENCE
PRINCIPLE- a fundamental guides to
action, broad statement of truth
from which others are derived.
17
PRINCIPLE OF
OBJECTIVITY
Basic intelligence concept
that there be unity between
knowledge and action.
18
PRINCIPLE OF
INTERDEPENDENCE
Intelligence is subdivided into
components to ensure complete
coverage, eliminate duplication & to
reduce the over-all task or
manageable size.
19
PRINCIPLE OF CONTINUITY
It is necessary that coverage be
continuous so that the shape of what
happen today could be studied in the
light of what happen before, which in
turn would enable us to predict the
shape of things to come.
20
PRINCIPLE OF
COMMUNICATION
Intelligence adequate to their needs
must be communicated to all the
decision makers in manner that they
will understand and form that will
permit its most effective use.
21
PRINCIPLE OF USEFULNESS
Ø Intelligence is useless if it remains in the
minds, or in the files of its collectors or its
producers.
Ø The story must be told and it must be
told well- must be convincing, and not
just plausible or factual but has
significance to the case involved.
22
PRINCIPLE OF SELECTION
In intelligence should be
essential and pertinent to the
purpose at hand.
23
PRINCIPLE OF TIMELINESS
Ø Intelligence must be communicated to
the decision maker at the appropriate
time to permit its most effective use.
Ø This the most important and obvious,
for intelligence that is too soon or too
late are equally useless.
Ø Timeliness is one principle that
complements all others.
24
PRINCIPLE OF SECURITY
Security is achieved by the
measures which intelligence
takes to protect and preserve
the integrity of its activities.
25
BASIC CONCEPT
OF INTELLIGENCE
OPERATION
26
27
IMPORTANCE OF INTELLIGENCE
1. It is vital to enable a nation to its policies, strategic
plans and conduct its diplomacy.
2. Intelligence is needed in order to enable a nation to
the activities of its internal and external enemies.
3. It is necessary to the activities of criminal
and subversive element.
4. It is vital in for the people and the
state.
5. Intelligence plays an
by providing advance and exact knowledge of the
intentions and design of its enemies.
28
MAJOR CATEGORY
OF INTELLIGENCE
MILITARY INTELLIGENCE
The use of processed information in formulating
military plans, programs and policies.
POLICE INTELLIGENCE
The end product resulting from collection, evaluation,
analysis, integration and interpretation of all
available facts which concerns the activities of
criminal elements and its activities significant to
police planning and operation.
29
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 30
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 31
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 32
FORMS OF INTELLIGENCE
1) SOCIOLOGICAL
INTELLIGENCE
2) BIOGRAPHICAL
INTELLIGENCE
3) MILITARY
INTELLIGENCE
4) GEOGRAPHICAL
INTELLIGENCE 33
FUNCTIONAL CLASSIFICATION OF POLICE
INTELLIGENCE
The production of
intelligence The knowledge
essential to the essential to
prevention of ensure the
crimes, protection of lives
investigation and and properties.
arrest and
prosecution of
criminal offenders.
34
STRATEGIC INTELLIGENCE
Intelligence information which primarily long range
in nature with practical immediate operation value.
LINE INTELLIGENCE
Immediate in nature and necessary for more
effective police planning and operation.
COUNTER INTELLIGENCE
Phase of intel covering the activity devoted in
destroying the effectiveness of hostile foreign
activities and to the protection of info against espionage,
subversion and sabotage.
35
NATIONAL INTELLIGENCE
Ø The integrated product of intelligence developed by
all governmental branches, departments concerning
the broad aspect of national security and policy.
Ø Used to coordinate all the activities of the
government in developing and executing integrated
and national policies and plans.
UNDERCOVER WORK
An investigative process in which disguise and
pretext cover and deception are used to gain the
confidence of criminal s u s p e c t s f o r t h e p u r p o s e o f
determining the nature and extent of any criminal
activities that maybe contemplating or perpetuating. 36
STRATEGIC LINE COUNTER
INTELLIGENCE INTELLIGENCE INTELLIGENCE
Ø An intelligence data that Ø A kind of intelligence Ø This kind of intelligence
are not of an immediate required by the covers the activity
value. commander to provide devoted in destroying
Ø It is usually descriptive for planning and conduct the effectiveness of
in nature, accumulation t a c t i c a l a n d hostile foreign activities
of physical description of administrative operation and to the protection of
person a l i t i e s , m o d u s in counter insurgency. information against
operandi. Ø Intelligence information espionage, subversion
Ø It does not have must conclude the and sabotage.
immediate operational PWET.
value but rather long
range that may become
relevant to future police
operation.
37
Intelligence information to be determined
in line intelligence are:
38
39
2 KINDS OF INTELLIGENCE SERVICE
FOREIGN INTELLIGENCE INTERNAL SECURITY
SERVICE INTELLIGENCE
Ø Gather information about Ø Seek to neutralize hostile
foreign countries and its intelligence services
institution , analyzes such operating within the
information or both. country and focus also on
Ø It can be in covert the detection of
operation. terrorist/criminal group.
Ø May acquires through
open source.
40
41
MAJOR INTELLIGENCE SERVICES IN THE PHILIPPINES
NBI
INTELLIGENCE
NICA Responsible for SERVICE OF AFP
Primary intelligence gathering handling and
and analysis arm of the solving major
philippine government, in high profile
charge of carrying out overt, cases that are
covert, and clandestine in the interest of
intelligence program. the nation.
42
AGENT RECRUITMENT AND
MANAGEMENT
Agent come from a 3 major sources:
1. The university world, where students are sought &
trained for intelligence careers;
2. The armed & police forces, where a degree of
intelligence know-how may already have been
attained; and
3. The underground world of espionage, which
produces an assortment of person, including
criminal informers, with applicable experience. 43
Some spies must be cautiously recruited and
persuaded into cooperation; others volunteer
and are termed “ walk-ins”.
“ Counterintelligence staffs
are spies who
simulates to be
are always doubtful of defecting, but in
walk- ins or defectors and
restrict their use for reality maintain
positive espionage their original loyalty.
purposes.
44
The most valuable spy of all is
the “agent –in-place”- MOLE.
45
INTELLIGENCE PERSONNEL
Agent Intelligence Team
An undercover Composed of specialized agents,
operative that translator teams and phot interpreter
detect, observe, team ussually engaged in the following
infiltrate and activities:
gather 1. Interrogation of criminals and
information inerview civilians;
regarding a
2. Translation of documents; and
particular target.
3. Interpretation of footage and
photographs.
46
PHASES OF RECRUITMENT
INVESTIGATION
Process of determining
the degree of qualification,
APPOINTMENT
personal background of
prospective agent. Issuance of order as
vPartial BI an operative agent in
vComplete BI a certain unit.
Step Step
49
PRINCIPLES OF
INTELLIGENCE ACTIVITIES:
1. Intelligence activities must be done by dedicated
personnel.
2. When the task cannot be obtain by other means.
3. Risk must be justifies by expected results.
4. Collection effort cannot be undertaken without
operational information.
50
Subject of the TARGET/
operation MISSION
The gadgets or
equipment used
to accomplish
its mission.
Man of
SUPPORT
AGENT/S FACILITIES &
operation
FUNCTION
51
ORDER OF
THE BATTLE
INTELLIGENCE
52
ORDER OF THE BATTLE INTELLIGENCE
COMPOSITE:
1) COMPOSITION- identification or organization of units.
2) DISPOSITION- location of the enemy units.
3) DEPLOYMENT- predetermine deployment of enemy unit.
4) MOVEMENT- determination of enemy’s movement or tactics.
5) STRENGTH- concerned w/ the total no. of personnel, type units &
supporting weapons in a given enemy force.
6) TACTICS- conduct operation by the enemy.
7) TRAINING- enhancement of capabilities of the personnel.
8) LOGISTICS- combat efficiency and the ultimate determination of
capabilities of both agents and enemy’s unit.
9) COMBAT EFFICIENCY- the effectiveness and fighting quality of the
enemy unit.
10) MISCELLANEOUS DATA- knowing more with regards to the enemy for
effective combat operation. 53
INTELLIGENCE CYCLE
INFORMATION 1 PLANNING AND DIRECTION
2 INFORMATION COLLECTION
3 PROCESSING OF INFORMATION
4
INTELLIGENCE INTELLIGENCE DESSEMINATION
I The blood line or main source of intelligence
R N would include any of the following: maps,
A F materials, documents, reports of possible or
actual enemy operations.
W O
R The knowledge or facts which the investigator
M had gathered or acquired from persons or
D A documents, which are pertinent or that has
relevant concerning the subject.
A T
T I It is a communicated knowledge obtained by
O study, observation, research and analysis.
A
N
SOURCES OF
INFORMATION
1. RECORDS;
2. PERSON (INFORMANTS): Controlled group of people
under the direction of agent
a) INFORMANT NET handler.
b) INFORMANT No consideration
56
Report the organized or
I underworld crime.
58
59
1. PLANNING
AND DIRECTION
60
1. PLANNING AND DIRECTION
“course of action to be taken”
63
2 TYPES OF INFORMATION COLLECTION
◦ OVERT METHOD ◦ COVERT METHOD
Collection of A clandestine or
information in an secret means of
open means like o b t a i n i n g
printed materials, information.
internet articles,
interviews, and the
like.
64
C
O ELICITATION
THE PROCESS OF
V EXTRACTING
E
R
INFORMATION FROM A
T PERSON BELIEVE TO
INFILTRATION BE IN POSSESSION
M
E
OF VITAL
T INFORMATION
H SURVEILLANCE WITHOUT SUBJECT
O
D
KNOWLEDGE.
65
PURPOSE OF ELICITATION
I. To acquire information through other
channel;
II. To obtain information that is not
publicly known;
III. To provide source of information; &
IV. To assist various individuals.
66
2 DEVICES OF ELICITATION
A) APPROACH METHOD B) PROBE METHOD
The process of setting Ø An attempt to obtain more
people to start talking. information after the subject
gives a vague, incomplete
general response.
TYPES OF APPROACH:
a. F L A T T E R Y - p e o p l e a r e Ø Used w/ an approach in
susceptible to praise so use order to sustain a
this weakness as a way of conversation.
approaching the subject for a. COMPETITION ROBE
elicitation. b. CLARITY PROBE
b. PROVOCATIVE APPROACH- c. HIGH PRESSURE PROBE
use conventional gambits d. HYPOTHETICAL PROBE
67
TYPES OF APPROACH: flattery & provocative
A A) FLATTERY
P TEACHER PUPIL
Subject is treated with authority, then
solicit his view point and opinion on a
PM APPROACH
subject matter.
R ET KINDRED SOUL A t e c h n i q u e b y s h o w i n g c o n c e r n t o t h e
APPROACH subject in order to gain information.
O HO GOOD SAMARITAN
AD APPROACH Offers help and assistance to the subject.
C PARTIAL
DISAGREEMENT D e b a t e h i m i n a w a y t h a t i t l o o k s a
H APPROACH challenge for him.
68
TYPES OF APPROACH: flattery & provocative
A B) PROVOCATIVE
P The elicitor accumulates the source of
TEASER BAIT knowledge about a particular subject to
PM APPROACH t e m p t t h e s u b j e c t t o g i v e h i s v i e w o f
knowledge.
R ET MANHATTAN FROM T h e e l i c i t o r a d o p t s a n u n b e l i e v a b l e
MISSOURI attitude, he questioned all statements and
O HO APPROACH opposition.
AD JOE BLOW
APPROACH
The elicitor adopts the attitude of being
approachable.
C NATIONAL PRIDE
H APPROACH
When the elicitor become patriotic in all
aspect of elicitation.
69
TYPES OF PROBE
Debate him/her (effective when used in
COMPETITION
P PROBE
connection with the teacher pupil
approach.
R ME CLARITY Elicit additional information in an
PROBE area which the response is unclear.
O HT HIGH
Serves to pin down a subject in a
B OD PRESSURE
specific area or used t o p o i n t o u t
PROBE
E contradiction to what the subject said.
HYPOTHETICAL
Presents a hypothetical situation and
PROBE
get the subject reaction.
70
C
O ELICITATION
V
E GRADUAL
R DISCREET
T
INFILTRATION ENTERING INTO
M
E ENEMY’S DOMAIN
T AND TERRITORY.
H SURVEILLANCE
O
D 71
INFILTRATION
PENETRATION
The action inside the
enemy’s compound.
72
C
O ELICITATION THE DISCREET
V OBSERVATION OF
E PERSONS, PLACE AND
R VEHICLES FOR THE
T
INFILTRATION PUEPOSE OF OBTAINING
INFORMATION
M
E CONCERNING THE
T IDENTITIES OR
H ACTIVITIES OF
SURVEILLANCE
O CRIMINALS.
D 73
SURVEILLANCE VS UNDERCOVER
OPERATION
UNDERCOVER
SURVEILLANCE OPERATION/
ASSIGNMENT
DISCREET THE AGENT CONCEALS
OBSERVATION OWN IDENTITY TO
WITHOUT CLOSE CLOSELY OBSERVE
CONTACT WITH THE THE SUBJECT.
SUBJECT.
74
SURVEILLANCE
75
S SURVEILLANCE
T
A
T Stationary Technical Moving
I
O Stake-out Fixed point observation
N
A Follow the subject for a
while, cease from tailing and
R Leap-frog f o l l o w a g a i n w h e r e t h e
Y subject usually passes.
76
T SURVEILLANCE
E
C Stationary Technical Moving
H
Discreet or
N Bugging eavesdropping through
I A generic term for
telephone conversation
with or intercepting a
C eavesdropping or
telephone conversation.
listening in to
A conversation by Wire Tapping
electronic means.
L
77
SURVEILLANCE
78
UNDERCOVER WORK
A form of investigation in which the
investigator assumes a different and
unofficial identity (COVER STORY) in
order to obtain information.
82
Ø ACT IN ACCORDANCE WITH HIS ORDER;
OR
Ø ACT ACCORDING TO HIS JUDGMENT.
NOTE: Agent should refuse to make a statement
except to a member of his own organization.
83
SURVEILLANCE
Reconnaissance/ surveillance
of a building, place, or area
to determine its suitability
Casing
for intelligence use or its
vulnerability in operations.
A term only used on
military aspect.
84
TYPES OF CASING
INTERIOR CASING
Close observation of the lay-out of
the building.
EXTERIOR CASING
Observation of the whole picture of
the area or building, as to observe
possible exits and approaches.
85
SAFE HOUSE
base of the operatives
STASH
base of the enemy
86
INFORMATION DESIRED IN CASING:
AREA CONDITION Description of the locality: residential,
AND HABIT commercial, highly urbanized or rural, and
as well as the living condition, population
and whether condition.
ACTIVE Prevent intelligence activity that includes
OPPOSITION not only the enemy but also the effort of
neutral or allied countries to discover and
observe our intelligence activities.
DISPOSAL PLAN The disposal of information to attain goals
and objectives.
ESCAPE & EVASION The exit planning in case of compromise or
emergencies.
87
SURVEILLANCE
SHADOWING VS TAILING
“Tailgating”
Discreet following of subject’s vehicle
89
TYPES OF SHADOWING/TAILING
LOOSE TAIL ROUGH CLOSE TAIL
Ø General SHADOWING Ø Extreme
impression of the Ø w/out special importance not
subject’s habits & precautions lose the subject
associates is and the subject but equally
required. is aware of the important not
Ø Utmost fact. to be detected.
important to Ø The material
remain witness must be
undetected. protected.
90
METHODS OF FOOT SURVEILLAANCE
1-MAN SHADOW 2-MAN SHADOW 3-MAN SHADOW
Ø Conducted by Ø Easiest way to OR ABC
one man alone. fully cover the TECHNIQUE
Ø Applicable to
subject. Ø 3 shadowers
close contact Ø One will follow
with the subject. the subject on
the same
direction and the
other will come
from different
direction.
91
3.PROCESSING
OF INFORMATION
92
3.PROCESSING OF INFORMATION
“Information becomes intelligence”
1. A process through which
A step by which information is managed;
the intelligence is
transformed from 2. Increases our knowledge
raw facts or of a particular problem
materials to and situation; and
intelligence data. 3. Results in preventive and
informed public policy.
93
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION Organized raw
2. RECORDING d a t a i n t o
usable form or
3. EVALUATION
grouping them
4. ANALYSIS into similar
5. INTEGRATION items.
6. DEDUCTION 94
COLLATION METHOD
A. INTELLIGENCE
Daily logbook
JOURNAL
B. ENEMY Disposition of
SITUATION MAP the enemy
C. INTELLIGENCE
Documents
WORKSHEET
D. INTELLIGENCE Journal file, reference
file, order of battle, and
FILE wanted list files.
95
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION
2. RECORDING The reduction
of information
3. EVALUATION
into writing.
4. ANALYSIS
5. INTEGRATION
6. DEDUCTION 96
STEPS OF PROCESSING OF
INFORMATION
1. COLLATION
The examination
2. RECORDING of information
3. EVALUATION to determine
4. ANALYSIS intelligence
value.
5. INTEGRATION
6. DEDUCTION 97
EVALUATION GUIDE:
EVALUATION OF ACCURACY OF INFORMATION
RELIABILITY CREDIBILITY SOURCE
COMPLETELY CONFIRMED BY THE
A RELIABLE 1 OTHER SOURCES T UNIT COMMANDER
USUALLY
B RELIABLE 2 PROBABLY TRUE U INTELLIGENCE AGENT
MILITARY/ LE
C FAIRLY RELIABLE 3 POSSIBLE TRUE V PERSONNEL
NOT USUALLY
D RELIABLE 4 DOUBTFULLY TRUE W INTERROGATION
IMPROBABLE GOVERNMENT
E UNRELIABLE 5 REPORT X CIVILIAN EMPLOYEE
RELIABILITY TRUTH CANNOT BE Members of the
F UNKNOWN 6 JUDGED Y populace
5. INTEGRATION
6. DEDUCTION 101
DEDUCTIVE INDUCTIVE
LOGIC LOGIC
GENERAL TO SPECIFIC TO
SPECIFIC GENERAL
GATHER EVIDENCES THAT FACTS ARE CONCLUDED,
WILL EVENTUALLY THUS PROVIDING
POINTING TO A EVIDENCES TO MAKE IT
SPECIFIC AND ESTABLISHED AND
CONCLUSIVE FACT. CONCLUSIVED DATA.
102
4.INTELLIGENCE
DESSEMINATION
103
CARDINAL
THE PRINCIPLE OF OF
TIMELY CONVEYANCE
DISSEMINATION
INFORMATION OF
BY ANY SUITABLE
INTELLIGENCE
MEANS TO THOSE WHO NEED IT.
“NEED TO KNOW
BASIS” 104
SAFE HAND METHOD
IT IS DISPATCHED TO THE ADDRESSE
INTO THE PERSONAL CARE OF
AUTHORIZED PERSONS.
105
DESSEMINATION
THE TIMELY CONVEYANCE OF
INFORMATION BY ANY SUITABLE
MEANS TO THOSE WHO NEED IT.
108
CLIPPING SERVICES LINK ANALYSIS FLOW CHARTING
Ø Clipping articles ØShow relationship Ø Demonstrate a
from newspapers in between individual chain of event or
accordance with an and organization. activities over a
existing format is an period.
important method of
gathering intelligence
data.
109
CLASSIFICATION OF CLANDESTINE AGENT
COVERT ACTION
PRINCIPAL AGENT ACTION AGENT SUPPORT AGENT
AGENT
A m a n a g e r i a l The doer of the Recruited agent Performs all
a g e n t a n d t h e clandestine task. who is in senior auxiliary services
leader of an agent position usually at the direction of
network. w i t h i n a the project officer.
government and
able to exert
influence on a
f o r e i g n
government at the
direction of a
sponsor.
110