CDI Intelligence
CDI Intelligence
CDI Intelligence
Nature of Intelligence
Learning Objectives
At the end of this module, the students should be able to:
History of Intelligence
HISTORICAL DEVELOPMENTS OF INTELLIGENCE
“NUMBER 13:17-32, Old Testament (Holy Bible) - Moses sent TWELVE (12) SCOUTS to the LAND OF
CANAAN where he detected directed them to spy the land, the people and their location and the nature of their
cities.”
SUN TZU- “Those who know themselves as well they know their enemies will never suffer defeat". In his
book "ART OF WAR".
DELILAH- A biblical personality who was able to gain information by using her beauty and charm. She was
responsible for the fall of Samson a known Israelite leader who terrorized the Philistines.
SIR ARTHUR WELLESLY- Duke of Wellington, who DEFEATED NAPOLEON'S AT WATERLOO IN
1815.
Regarded as the: "GREATEST MILITARY SPYMASTER AT ALL TIME". He lives by the motto; "All the
business of war is to find out what you don’t know by what you do."
He always studied the enemy in depth, finding out not only where the opposing army was and how strong it
was, but the character of its commander, the spirit and training of its troops, their battle experience, and how they
were supplied with arms and rations. He also studied and mapped the roads, rivers and topography of the war
theatre.
FREDERICK THE GREAT - "Father of Organized Military Espionage". He divided his agents into
four classes.
1. COMMON SPIES - recruited among poor folk, glad to earn a small sum or to accommodate
a military officer;
2. DOUBLE SPIES - the low informers and unreliable renegades of value chiefly in spreading false
information to the enemy;
3. SPIES OF CONSEQUENCES - courtier and noblemen, staff officers and kind red conspirators
always requiring a considerable bribe or bat
4. Persons who are forced to undertake espionage against their will.
ALEXANDER THE GREAT - A renowned GREEK CONQUEROR had his share of advance
information when rumours of discontent circulated from among the ranks of his men. He was able to
identify those disloyal ones by ordering the communication letters opened and was successful in curtailing
the decline of esprit de corps and morale of his men.
KARL SCHULMEISTER - famous as "NAPOLEON'S EYE". He was credited for establishing counter
intelligence conducted against spies. He is a MASTER OF DECEIT who used black mail to obtain vital
information pertaining to the personality and identify of the enemies of Napoleon during the 18th Century
o JOSEPH PETROSINO - Member, New York Police
Department in early 1900, he was the head of the Italian Squad. Through extensive intelligence network, he
is credited to smash the Black Society.
JOSEPH FOUCHE - the French statesman Joseph Fouche (1759 - 1820) served as minister of police
under Napoleon and was influential in the return of Louis XVIII to the throne in 1815.
ADMIRAL YAMAMOTO - April 1943, the Cryptanalysts of the U.S. Navy Communications Intelligence
interpreted a top-secret signal relaying the travel of the Admiral. En route he was intercepted and crashed
in the Jungles of Bougainville.
AKBAR - The "GREAT MOGUL" and WISE MASTER OF HINDUSTAN employed more than 4,000
agents for the sole purpose of bringing him the truth that his throne might rest upon it.
BATTLE OF MIDWAY - In June 1442, the turning point of the Naval in the Pacific, the victory gained
by the Americans was due to the disrupted messages from the Imperial Japanese Navy.
V2 - RACKETS - OSS agents working in conjunction with the British Intelligence, though penetration
and technical intelligence discovered Pneumundo, which was the V2 guide missile research project of Nazi
Germany. It results to its destruction and heavy bombing.
JULIUS CEASAR- During his time, the staff of each legion includes ten "SPECULATORS" who served
as an information-collecting agency. The "speculators" were the first intelligence personnel to appear
definitely in a military organization. Military success of the Romans was aided by communication system.
Made use of carrier pigeons, which made possible the amazing speed with which intelligence of the
Imperial Rome was transmitted. They also employed ciphers to ensure secrecy of communications.
ALFRED REDL - A HOMOSEXUAL DOUBLE SPY who while working as intelligence direct proof
Austria and Hungary, spied the Russians. His treasons activities were discovered and compelled to commit
suicide. His spying led to the death of over 500,000 agents and soldiers combined in his 13 years episode
as a spy.
SIR SAMUEL LUKE - Chief Scout of Oliver Cromwell who was able to dethrone King Charles I in
British Civil War of 1640's. Sir Samuel Luke was said to be industrious in snooping on the enemy.
JOHN CHURCHILL - FIRST DUKE OF MALBOROUGH, told critics of his enormous expenditure on
espionage that “No war can be conducted successfully without early and good intelligence, and
such advices cannot be had but a very great expense”.
GEORGE WASHINGTON - under oath abounds in the history of every nation. George Washington as
Grand Master mobilized the free masons of the colonies at the outbreak of the American war of
Independence.
4th – CENTRAL INTELLIGENCE AGENCY (CIA) - AMERICA CIA is the largest of the intelligence
agencies and is responsible for gathering data from other countries that could impact U.S. policy.
It is a civilian intelligence agency of the United States government responsible for providing
3rd – SECRET INTELLIGENCE SERVICE (SIS) MI-6 – GREAT BRITAIN The Secret
Intelligence Service (SIS) supplies the British Government with foreign intelligence.
It operates under the formal direction of the Joint Intelligence Committee (JIC) alongside the internal
Security Service (MI5), the Government Communications Headquarters(GCHQ) and the Defense
Intelligence (DI).
It is frequently referred to by the name MI6, a name used as a flag of convenience during the Second
World War when it was known by many names.
The existence of MI6 was not officially acknowledged until 1994.
2nd – MOSSAD - ISRAEL - The Mossad is responsible for intelligence collection and covert operations including
paramilitary activities.
It is one of the main entities in the Israeli Intelligence Community, along with Aman (military
intelligence) and Shin Bet (internal security), but its director reports directly to the Prime Minister.
1st - INTER-SERVICES INTELLIGENCE (ISI) - PAKISTAN - With the lengthiest track record of success, the
best-known Intelligence so far on the scale of records is ISI.
The Inter-Services Intelligence was created as an independent unit in 1948 in order to strengthen the
performance of Pakistan’s Military Intelligence during the Indo-Pakistani War of 1947.
The best of its time, failed to counter ISI and protect Soviet interests in Central Asia.
It has protected its Nuclear Weapons since formed and it has foiled Indian attempts to attain ultimate
supremacy in the South-Asian theatres through internal destabilization of India. It is above All laws in its
host country Pakistan ‘A State, with in a State’.
Its personnel have never been caught on camera.
It is believed to have the highest number of agents worldwide, close to 10,000. The most striking
thing is that it’s one of the least funded Intelligence agencies out of the top 10 and still the strongest.
It is the primary intelligence gathering and analysis arm of the Philippine government, in charge of
carrying out overt (open – 99%), covert (close, clandestine – 1%), and clandestine intelligence
programs.
Its motto is: "KNOWLEDGE IS SAFETY”. Presently, NICA is in close coordination with the CIA,
Mossad, Secret Intelligence Service and intelligence services of ASEAN countries to counter the threat of
terrorism.
The agency is led by a Director-General and is assisted by a Deputy Director-General. The former reports
directly to the President. The NICA has a National Intelligence Board that serves as an advisory board to
the Director-General before he would submit his findings to the President relating to national security
matters affecting the Philippines.
INTELLIGENCE - is knowledge and powerful it can prevent war and cause one it can help in crime control
(there is crime) and crime prevention (no crime).
INTELLIGENCE – The end product resulting from the collection, evaluation, analysis, integration and
interpretation of all available information.
Basic Concepts
A. Intelligence:
As an ACTIVITY - The organized effort to collect information, to assess it little by little, and
piece it together until it forms larger and clear patterns.
As a PRODUCT- The end product resulting from the collection, evaluation, analysis, integration,
and interpretation of all available information which may have immediate or potential significance
to the development and execution of plan, policies and programs of the user.
B. POLICE INTELLIGENCE – The end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the activities of criminals and other law
violators for the purpose of affecting their arrest, obtaining evidence, and forestalling plan to commit
crimes.
Principles of Intelligence
INTELLIGENCE MUST BE USEFUL - It must serve the commander’s need and requirements so that
effort will not be wasted. It should have an application and significance to the operation.
CHAPTER V
Framework of Intelligence
Learning Objectives
At the end of this module, the students should be able to:
Categories of Intelligence
MILITARY INTELLIGENCE – refers to the knowledge by the military institution essential in the preparation and
execution of military plans, policies and programs.
Intelligence Cycle
REQUIREMENTS
Enemy capabilities, including time, place, strength, or other details
Enemy vulnerabilities, including nature, extent, performance and other details
Enemy order of battle and factors
Terrain, including natural and artificial obstacles o Weather
Information desired by higher, lower or adjacent headquarters
ESTABLISHMENT OF PRIORITIES - Priorities reflect the criticality of the need for the particular
information. No formula exists which can automatically determine priorities. Such determination is a
matter of judgment.
COLLECTION OF INFORMATION - To successfully plan and perform the collection effort, the
intelligence officer must have thorough knowledge of the available sources of information and collecting
agencies and the type of information they can provide and consider the following:
Five steps in processing collected information which is then converted into Intelligence
RECORDING – is the REDUCTION OF INFORMATION INTO WRITING OR SOME
OTHER FORM OF GRAPHICAL REPRESENTATION and the arranging of this information into
groups related items.
EVALUATION – is the DETERMINATION OF THE PERTINENCE of the information to the
operation, reliability of the source of or agency and the accuracy of the information.
PERTINENCE – does it holds some value to current operation, is it needed immediately
RELIABILITY – judging the source of information or agency
CREDIBILITY – truth of information
JUDGING CREDIBILITY
DISSEMINATION - Processed information or intelligence data are disseminated to end users, common
methods of disseminating Intel data are conferences, briefing and person to person exchanges. In this
process, consider the factors of timeliness, correctness and security.
Counterintelligence
Types of Intelligence
Types of Counter-intelligence
PASSIVE CI MEASURES – protection of classified and sensitive information to the
unauthorized through secrecy, communication security, and other various safeguards.
ACTIVE CI MEASURES – are those measures, which seek actively to block the
enemies’ effort to gain information or engage in espionage, subversion, and sabotage.
Learning Objectives
At the end of this module, the students should be able to:
3. Explain their understanding regarding the tools of Criminal Investigation through ink shedding
B. ECONOMIC INTELLIGENCE – deals with the extent and utilization of resources to the industrial
potential of the Nations.
D. SOCIOLOGICAL INTELLIGENCE – deals with the Enemy Activities demographic and psychological
aspects of groups.
Documents of people.
Map, Population and Manpower
Weather Forecast, Studies, Reports
Characteristics of the People
Agencies Public Opinion – attitudes of the majority of the people towards matters of public
policy.
E. BIOGRAPHICAL INTELLIGENCE – deals with operation individual personalities who have actual
possession of power.
F. ARMED FORCES INTELLIGENCE – deals with the SPONSOR - directs the organization conducting the
armed forces of the Nation’s clandestine activity.
H. SCIENTIFIC INTELLIGENCE – deals with the power, resulting in the loss of use progress of the
research and development as it temporarily or permanently of an article affects the economic and
military potential of other nation.
B. INTERNAL SECURITY INTELLIGENCE (INSINT) – interest that refers to the knowledge essential to
the maintenance of peace and order.
TARGET - Person, place or things against which the constitutional and legal basis of its clandestine activity is to
be conducted.
AGENT - It refers to a person who conducts clandestine operations to include Principal Agents, disposition of
Action Agents, and Support Agents.
Order of Battle- arrangement of military usually troops for battle. Undertaken by the case officer.
SURVEILLANT- Agent who observes criminal offenders. Persons and places of operations of or things.
A. SURVEILLANCE – is the covert, discreet observation of people and places for the
purpose of obtaining information concerning the identities or activities of subjects.
Objectives of Surveillance
• To identify persons involved in certain activities
• To secure basis for securing search warrant
• To obtain detailed information about the nature, scope of subjects activities
• To check on source of information
• To develop leads to vital information
• To confirm or deny allegations
METHODS OF SURVEILLANCE
• STATIONARY SURVEILLANCE – also referred to as FIXED AND STAKEOUT SURVEILLANCE –
FORMS OF SURVEILLANCE
• LOOSE TAIL – employed where a general impression of the subject’s habits and associates is required.
• ROUGH SHADOWING – employed without special precautions, the subject maybe aware of the
surveillance; employed also when the subject is a material witness and must be protected from harm or other
undesirable influences.
• CLOSE TAIL – extreme precautions are taken against losing the subject is employed where constant
surveillance is necessary.
B. CASING - It is the careful inspection of a place to determine its suitability for a particular
operational purpose. It is also known as the RECONNAISSANCE OR RECCE in Military term.
C. ELICITATION- The process of extracting information from a person believes to be in possession of vital
information without his knowledge or suspicion
o BUGGING - The use of an equipment or tool to listen and record discreetly conversations of other people.
o WIRE TAPPING - A method of collecting information thru interception of telephone conversation.
TACTICAL INTERROGATION - It is a process or method of obtaining information from a captured enemy who is
reluctant to divulge information.
OBSERVATION AND DESCRIPTION (ODEX) - The complete awareness by an individual of his surroundings,
achieved through maximum employment of the senses and techniques of factuality reporting one’s own observation
of the sensory experiences recounted by others.
• COVER - It refers to the changing, forging or falsifying agent’s real personality including but not
limited to things, location, job, and others that will be used in undercover assignment.
• COVER STORY – A biographical data through fictional that will portray the personality of the agent
he assumed, a scenario to cover the operation.
• COVER SUPPORT – An agent assigned in target areas with the primary mission of supporting the
cover story.
CRYPTOGRAPHY - It is defined as an art and science of codes and ciphers. This is done through the use of
“Speech Inverter” whereby essential speech frequencies are divided into several ranges by filters then inverted to
produce it scrambled speech when intercepted.
• CRYPTO ANALYST - Refers to those persons who break intercepted codes.
• CRYPTOGRAPHER - It refers to a person who is highly skilled in converting message from clear to
unintelligible forms by use of codes and cipher.
• CODING - It is the changing of message from plain clear text to unintelligible form also known as
“Encrypting”.
• DECODING - Transforming of coded message into plain text also known as
“Decrypting”.
PHYSICAL SECURITY - The broadest type of security that is concerned with the physical measures
designed to safeguard personnel and prevent unauthorized access to equipment, facilities, materials,
documents, and to protect them from espionage, sabotage, damage or theft
PERSONNEL SECURITY - the sum total procedures followed, inquiries conducted and criteria applied to
determine the work suitable to a particular applicant or the retention or transfer of a particular employee.
PERSONNEL SECURITY INVESTIGATION – is an inquiry into the character, reputation, discretion, integrity,
morals and loyalty of an individual in order to determine a person’s suitability for appointment access to classified
matter.
TYPES OF PSI
• LOCAL AGENCY CHECK - Refers to the investigation of the records and files of agency in the area of
principal residence of the individual being investigated.
• NATIONAL AGENCY CHECK - It consists of LAC supplemented by investigation of the records and
files of the following agencies: PNP, ISAFP, NBI, CSC, Bureau of Immigration and Deportation and other
agency.
• BACKGROUND INVESTIGATION – a check made on an individual usually seeking employment
through subjects records in the police files, educational institutions, place of residence, and former
employers.
• COMPLETE BACKGROUND INVESTIGATION - it is a type of BI which is more comprehensive, that
consist of detailed information regarding the subject.
SECURITY CLEARANCE - It is a certification by a responsible authority that the person described is cleared to
access and classify matters at appropriate levels.
INTERIM CLEARANCE - Effectivity Two Years
FINAL CLEARANCE - Effectivity Five Years
Compiled by:
Instructor
Reviewed by: