CDI Intelligence

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

CHAPTER IV

Nature of Intelligence

Learning Objectives
At the end of this module, the students should be able to:

1. Trace the history of intelligence

2. Discuss the basic concept of Intelligence

3. Explain the principles of intelligence

History of Intelligence
HISTORICAL DEVELOPMENTS OF INTELLIGENCE

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 47


 The first intelligence operation recorded in history is found in the HOLY BIBLE.

“NUMBER 13:17-32, Old Testament (Holy Bible) - Moses sent TWELVE (12) SCOUTS to the LAND OF
CANAAN where he detected directed them to spy the land, the people and their location and the nature of their
cities.”

 SUN TZU- “Those who know themselves as well they know their enemies will never suffer defeat". In his
book "ART OF WAR".
 DELILAH- A biblical personality who was able to gain information by using her beauty and charm. She was
responsible for the fall of Samson a known Israelite leader who terrorized the Philistines.
 SIR ARTHUR WELLESLY- Duke of Wellington, who DEFEATED NAPOLEON'S AT WATERLOO IN
1815.

Regarded as the: "GREATEST MILITARY SPYMASTER AT ALL TIME". He lives by the motto; "All the
business of war is to find out what you don’t know by what you do."
He always studied the enemy in depth, finding out not only where the opposing army was and how strong it
was, but the character of its commander, the spirit and training of its troops, their battle experience, and how they
were supplied with arms and rations. He also studied and mapped the roads, rivers and topography of the war
theatre.

 FREDERICK THE GREAT - "Father of Organized Military Espionage". He divided his agents into
four classes.
1. COMMON SPIES - recruited among poor folk, glad to earn a small sum or to accommodate
a military officer;
2. DOUBLE SPIES - the low informers and unreliable renegades of value chiefly in spreading false
information to the enemy;
3. SPIES OF CONSEQUENCES - courtier and noblemen, staff officers and kind red conspirators
always requiring a considerable bribe or bat
4. Persons who are forced to undertake espionage against their will.

 ALEXANDER THE GREAT - A renowned GREEK CONQUEROR had his share of advance
information when rumours of discontent circulated from among the ranks of his men. He was able to
identify those disloyal ones by ordering the communication letters opened and was successful in curtailing
the decline of esprit de corps and morale of his men.

 SIR FRANCIS WALSINGHAM OF ENGLAND- PROTECTOR OF QUEEN ELIZABETH I, who


organized the secret police and established a spy network to detect fleet movement of enemies of the
British Empire particularly the Portuguese. Regarded as the "FIRST GREAT SPYMASTER", a
ruthless in the cause, he was responsible for the assassination, murdering and execution of people who
covertly betrayed the queen.

 KARL SCHULMEISTER - famous as "NAPOLEON'S EYE". He was credited for establishing counter
intelligence conducted against spies. He is a MASTER OF DECEIT who used black mail to obtain vital
information pertaining to the personality and identify of the enemies of Napoleon during the 18th Century
o JOSEPH PETROSINO - Member, New York Police
Department in early 1900, he was the head of the Italian Squad. Through extensive intelligence network, he
is credited to smash the Black Society.

 JOSEPH FOUCHE - the French statesman Joseph Fouche (1759 - 1820) served as minister of police
under Napoleon and was influential in the return of Louis XVIII to the throne in 1815.

 ADMIRAL YAMAMOTO - April 1943, the Cryptanalysts of the U.S. Navy Communications Intelligence
interpreted a top-secret signal relaying the travel of the Admiral. En route he was intercepted and crashed
in the Jungles of Bougainville.

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 48


 HERBERT YADLEY - Head of the MI-8, the forerunner of the Top Secret National Security
Administration a.k.a Black Chamber, a Cryptanalytic Organization. o GENERAL NAPOLEON
BONAPARTE - "One Spy in the right place is worth 20,000 men in the field". He organized two Bureau
of Interest.

 AKBAR - The "GREAT MOGUL" and WISE MASTER OF HINDUSTAN employed more than 4,000
agents for the sole purpose of bringing him the truth that his throne might rest upon it.

 BATTLE OF MIDWAY - In June 1442, the turning point of the Naval in the Pacific, the victory gained
by the Americans was due to the disrupted messages from the Imperial Japanese Navy.

 V2 - RACKETS - OSS agents working in conjunction with the British Intelligence, though penetration
and technical intelligence discovered Pneumundo, which was the V2 guide missile research project of Nazi
Germany. It results to its destruction and heavy bombing.

 JULIUS CEASAR- During his time, the staff of each legion includes ten "SPECULATORS" who served
as an information-collecting agency. The "speculators" were the first intelligence personnel to appear
definitely in a military organization. Military success of the Romans was aided by communication system.
Made use of carrier pigeons, which made possible the amazing speed with which intelligence of the
Imperial Rome was transmitted. They also employed ciphers to ensure secrecy of communications.

 WILHELM JOHANN KARL EDUARD STEIBER - Known as the Prussia's "KING OF


SLEUTHHOUNDS" as minister of police he studied the use of propaganda and censorship as well as
utilizing statistical intelligence accounting. Steiber's thorough organization and ruthless, his sinister
innovations and cold, calculating manipulation of human weakness made him the spymaster who most
shape the course of the 20th century espionage.

 ALFRED REDL - A HOMOSEXUAL DOUBLE SPY who while working as intelligence direct proof
Austria and Hungary, spied the Russians. His treasons activities were discovered and compelled to commit
suicide. His spying led to the death of over 500,000 agents and soldiers combined in his 13 years episode
as a spy.

 SIR SAMUEL LUKE - Chief Scout of Oliver Cromwell who was able to dethrone King Charles I in
British Civil War of 1640's. Sir Samuel Luke was said to be industrious in snooping on the enemy.

 JOHN CHURCHILL - FIRST DUKE OF MALBOROUGH, told critics of his enormous expenditure on
espionage that “No war can be conducted successfully without early and good intelligence, and
such advices cannot be had but a very great expense”.

 EDWARD I - An English monarch who started UTILIZING ENGLISH INFORMANTS especially to


determine seditious writings against the crown and identify

 GEORGE WASHINGTON - under oath abounds in the history of every nation. George Washington as
Grand Master mobilized the free masons of the colonies at the outbreak of the American war of
Independence.

MOST OUTSTANDING INTELLIGENCE AGENCIES


Intelligence Agency is an effective instrument of a national power. Aggressive intelligence is its primary weapon to
destabilize the target. Indeed, no one knows what the intelligence agencies actually do so figuring out who the best
intelligence service is can be difficult.

10th- AUSTRALIAN SECRET INTELLIGENCE SERVICE (ASIS)


 Government intelligence of Australia which is responsible FOR COLLECTING FOREIGN
INTELLIGENCE undertaking counter-intelligence activities and cooperation with other intelligence
agencies overseas. Its primary responsibility is gathering intelligence from mainly Asian and Pacific
interests using agents stationed in a wide variety of areas.
 Its main purpose, as with most agencies, is to protect the country’s political and economic interests while
ensuring safety for the people of Australia against national threats.

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 49


9th - RESEARCH AND ANALYSIS WING (R&AW or RAW) - INDIA Research and Analysis Wing is India’s
EXTERNAL INTELLIGENCE AGENCY.
 It was formed in September 1968, as it was evident that a credible intelligence gathering setup was
lacking.
 Its primary function is collection of external intelligence, counter-terrorism and covert operations.
 In addition, it is responsible for obtaining and analysing information about foreign governments,
corporations, and persons, in order to advise Indian foreign policymakers.
 Until the creation of R&AW, the Intelligence Bureau handled BOTH INTERNAL AND EXTERNAL
INTELLIGENCE.

8th - GENERAL DIRECTORATE FOR EXTERNAL SECURITY - FRANCE Directorate General


for External Security is FRANCE’S EXTERNAL INTELLIGENCE AGENCY. Operating under the direction of
THE FRENCH MINISTRY OF DEFENSE, the agency works alongside the DCRI (the Central Directorate of
Interior Intelligence) in providing intelligence and national security, notably by performing paramilitary and
counterintelligence operations abroad.
 Its primary focus is to gather intelligence from foreign sources to assist in military and strategic decisions
for the country.
 The agency employs MORE THAN FIVE THOUSAND PEOPLE.

7th – FEDERAL SECURITY SERVICE OF RUSSIAN FEDERATION (FSD) – RUSSIA – (FORMELY –


KOMITET GUZUDARST BENOI BEZOPASNOSTI – KGB)
 The Federal Security Service of Russian Federation (FSD) is the MAIN
DOMESTIC SECURITY AGENCY OF THE RUSSIAN FEDERATION and the main successor
agency of the Soviet-era Cheka, NKVD and KGB.
 The FSD is involved in counter-intelligence, internal and border security, counter- terrorism, and
surveillance.
 The FSD is responsible for INTERNAL SECURITY OF THE RUSSIAN STATE, counterespionage, and
the fight against organized crime, terrorism, and drug smuggling.
 The number of FSD personnel and its budget remain state secrets, although the budget was reported to
jump nearly 40% in 2006.

6th – BUNDESNACHRICHTENDIENST (BND) - GERMANY


the Bundesnachrichtendienst is the foreign intelligence agency of the German government,
 The BND acts as an early warning system to alert the German government to threats to German interests
from abroad.
 It depends heavily on WIRETAPPING AND ELECTRONIC SURVEILLANCE OF
INTERNATIONAL COMMUNICATIONS.
 It collects and evaluates information on a variety of areas such as international terrorism, WMD
proliferation and illegal transfer of technology, organized crime, weapons and drug trafficking, money
laundering, illegal migration and information warfare.
 As Germany’s only overseas intelligence service, the BND gathers both military and civil intelligence.

5th - MINISTRY OF STATE SECURITY (MSS) - CHINA


 Ministry of State Security is the security agency of the People’s Republic of China.
 Article 4 of the Criminal Procedure Law gives the MSS THE SAME AUTHORITY TO ARREST OR
DETAIN PEOPLE AS REGULAR POLICE FOR CRIMES INVOLVING STATE SECURITY WITH
IDENTICAL SUPERVISION. One of the primary missions of the MSS is undoubtedly to gather foreign
intelligence from targets in various countries overseas.
 Many MSS agents are said to have operated in the Greater China region.

4th – CENTRAL INTELLIGENCE AGENCY (CIA) - AMERICA CIA is the largest of the intelligence
agencies and is responsible for gathering data from other countries that could impact U.S. policy.
 It is a civilian intelligence agency of the United States government responsible for providing

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 50


national security intelligence to senior United States policymakers. The CIA also engages in covert
activities at the request of the President of the United States of America. The CIA’s primary function is to
collect information about foreign governments, corporations, and individuals, and to advise public
policymakers. The agency conducts covert operations and paramilitary actions, and exerts foreign political
influence through its Special Activities Division.
 It has failed to control terrorism activities including 9/11, Not even a single top level Al- Qaeda leader
captured own its own in the past 13 years –.
 Highly funded and technologically most advanced Intelligence set-up in the world.

3rd – SECRET INTELLIGENCE SERVICE (SIS) MI-6 – GREAT BRITAIN The Secret
Intelligence Service (SIS) supplies the British Government with foreign intelligence.
 It operates under the formal direction of the Joint Intelligence Committee (JIC) alongside the internal
Security Service (MI5), the Government Communications Headquarters(GCHQ) and the Defense
Intelligence (DI).
 It is frequently referred to by the name MI6, a name used as a flag of convenience during the Second
World War when it was known by many names.
 The existence of MI6 was not officially acknowledged until 1994.

2nd – MOSSAD - ISRAEL - The Mossad is responsible for intelligence collection and covert operations including
paramilitary activities.
 It is one of the main entities in the Israeli Intelligence Community, along with Aman (military
intelligence) and Shin Bet (internal security), but its director reports directly to the Prime Minister.

1st - INTER-SERVICES INTELLIGENCE (ISI) - PAKISTAN - With the lengthiest track record of success, the
best-known Intelligence so far on the scale of records is ISI.
 The Inter-Services Intelligence was created as an independent unit in 1948 in order to strengthen the
performance of Pakistan’s Military Intelligence during the Indo-Pakistani War of 1947.
 The best of its time, failed to counter ISI and protect Soviet interests in Central Asia.
 It has protected its Nuclear Weapons since formed and it has foiled Indian attempts to attain ultimate
supremacy in the South-Asian theatres through internal destabilization of India. It is above All laws in its
host country Pakistan ‘A State, with in a State’.
 Its personnel have never been caught on camera.
 It is believed to have the highest number of agents worldwide, close to 10,000. The most striking
thing is that it’s one of the least funded Intelligence agencies out of the top 10 and still the strongest.

REPUBLIC OF THE PHILIPPINES


NATIONAL INTELLIGENCE COORDINATING AGENCY (NICA)

 It is the primary intelligence gathering and analysis arm of the Philippine government, in charge of
carrying out overt (open – 99%), covert (close, clandestine – 1%), and clandestine intelligence
programs.
 Its motto is: "KNOWLEDGE IS SAFETY”. Presently, NICA is in close coordination with the CIA,
Mossad, Secret Intelligence Service and intelligence services of ASEAN countries to counter the threat of
terrorism.
 The agency is led by a Director-General and is assisted by a Deputy Director-General. The former reports
directly to the President. The NICA has a National Intelligence Board that serves as an advisory board to
the Director-General before he would submit his findings to the President relating to national security
matters affecting the Philippines.

Basic Concept of Intelligence

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 51


NATURE OF INTELLIGENCE FUNCTION or INTELLIGENCE is responsible in procuring and obtaining
political, economic, psychological, sociological, military and other information which may bear upon, national
interest and which had been collected by the different government and agencies.

 INTELLIGENCE - is knowledge and powerful it can prevent war and cause one it can help in crime control
(there is crime) and crime prevention (no crime).
 INTELLIGENCE – The end product resulting from the collection, evaluation, analysis, integration and
interpretation of all available information.

Basic Concepts
A. Intelligence:
 As an ACTIVITY - The organized effort to collect information, to assess it little by little, and
piece it together until it forms larger and clear patterns.

 As a PRODUCT- The end product resulting from the collection, evaluation, analysis, integration,
and interpretation of all available information which may have immediate or potential significance
to the development and execution of plan, policies and programs of the user.

 As an ORGANIZATION- An institution composes of persons who pursue of preparing plans or


formulating policies.

B. POLICE INTELLIGENCE – The end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the activities of criminals and other law
violators for the purpose of affecting their arrest, obtaining evidence, and forestalling plan to commit
crimes.

Principles of Intelligence

 INTELLIGENCE AND OPERATION ARE INTERDEPENDENT - Intelligence


provides valuable inputs for effectiveness of police operation on the other hand
operation likewise is needed for continuity of intelligence activities. Operation and
intelligence planners work hand and hand to attain greater degree of success in their
common effort
 INTELLIGENCE IS CONTINUOUS - The basic principle of intelligence operations
is that intelligence activities follow a simple cycle, which is continuous at the same time that new
information is being collected in response to direction, other information is being processed and
intelligence is being used.

 INTELLIGENCE MUST BE USEFUL - It must serve the commander’s need and requirements so that
effort will not be wasted. It should have an application and significance to the operation.

 INTELLIGENCE MUST BE AVAILABLE ON TIME - Intelligence must be communicated to the


decision maker at the appropriate time to permit its most effective use. It must reach the user in time to
serve as basis for appropriate action. Intel data must be disseminated on time because late arrival is as good
as useless.

 INTELLIGENCE OPERATIONS REQUIRES IMAGINATION AND FORESIGHT - The success of


objective is paramount importance. Intelligence personnel are reminded to refrain from utilizing criminal
elements in Intel operation. They must use their resourcefulness to obtain more than what is normally.

 INTELLIGENCE MUST BE FLEXIBLE - Intelligence Operations must be changeable according to the


present situation, condition and other factors, Intelligence Operations are based on reason and sound
judgment. Procedures which do not readily adapt to a given situation are generally discarded.

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 52


 INTELLIGENCE REQUIRES CONTINUOUS SECURITY MEASURES - Deny unauthorized
personal information about operation and intelligence product, its source and organization itself. In the
handling of classified materials there should be a working balance between secrecy and operational
convenience.

CHAPTER V
Framework of Intelligence

Learning Objectives
At the end of this module, the students should be able to:

1. Differentiate the categories of intelligence

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 53


2. Illustrate and explain the intelligence cycle

3. Explain Counter Intelligence

4. Compare and Contrast the types of counter Intelligence

Categories of Intelligence

NATIONAL INTELLIGENCE - integrated product of intelligence developed by ALL


GOVERNMENT DEPARTMENTS concerning the broad aspect of national policy and national
security.
 NATIONAL POLICY – specific courses of action to achieve the national objectives.
 NATIONAL SECURITY – this relate to the protection and preservation of military,
economic and a productive strength of a country including the security of the
government and domestics and foreign affairs against espionage, sabotage and
subversion.

DEPARTMENT OF INTELLIGENCE (mission) – the intelligence required by department or agencies of the


government to execute its mission and discharge its responsibilities.

MILITARY INTELLIGENCE – refers to the knowledge by the military institution essential in the preparation and
execution of military plans, policies and programs.

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 54


PUBLIC SAFETY INTELLIGENCE (PUSINT) – refers to sabotage and espionage. The knowledge essential to
ensure the protection of lives and properties.

Intelligence Cycle

PLANNING AND SUPERVISION OF THE COLLECTION EFFORT


 The intelligence officer must have a thorough knowledge of the available sources of information,
the collecting agencies and type of information the latter can provide.
 He must understand the operations of the command in order to provide the particular intelligence required
for success.
 He must have a thorough knowledge of the tactics, organizations and characteristics of the enemy.
 He must be especially competent in the fields of surveillance, reconnaissance, counter reconnaissance,
and acquisition of operations.

PLANNING AND DIRECTING THE COLLECTION DETERMINATION OF

REQUIREMENTS
 Enemy capabilities, including time, place, strength, or other details
 Enemy vulnerabilities, including nature, extent, performance and other details
 Enemy order of battle and factors
 Terrain, including natural and artificial obstacles o Weather
 Information desired by higher, lower or adjacent headquarters

DETERMINATION OF THE ESSENTIAL ELEMENTS OF INFORMATION (EEI)


- Is an item of intelligence or information of characteristics of the area of operations and the enemy, which the
commander feels he needs before he can reasonably arrive at a decision.

 ESTABLISHMENT OF PRIORITIES - Priorities reflect the criticality of the need for the particular
information. No formula exists which can automatically determine priorities. Such determination is a
matter of judgment.
 COLLECTION OF INFORMATION - To successfully plan and perform the collection effort, the
intelligence officer must have thorough knowledge of the available sources of information and collecting
agencies and the type of information they can provide and consider the following:

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 55


RELIABILITY OF ACCURACY OF SOURCE OF THE INFORMATION
INFORMATION INFORMATION

CODE: CUFNUR CODE: CPPDIT


A. Completely Reliable 1. Confirmed S.intercepted
By Other Sources T. Direct Observation by a
commander or Unit
B. Usually Reliable 2. Probably True U. Report by a penetration or
resident agent
C. Fairly Reliable 3. Possibly True V. Report by an AFP trooper or PNP
personnel in
operation
D. Not Usually Reliable 4. Doubtfully True W. Interrogation of a captured enemy or
agent
E. Unreliable 5. Improbable true X. Observation by a government or
civilian employee
or official
F. Reliability Cannot Be 6. Truth Cannot Be Y. Observation by a member of
Judged Judged populace
Z. Documentary
1. Determine collecting agency
2. Send orders or request
3. Supervise collection efforts
4. Use tools or technique in collection
5. Ensure timely collection

FACTORS IN CHOOSING COLLECTION AGENTS


 CAPABILITY – agents’ placement or access to a target
 MULTIPLICITY – more agents o BALANCE – number of agents needed in operation

PROCESSING THE COLLECTED INFORMATION

Five steps in processing collected information which is then converted into Intelligence
 RECORDING – is the REDUCTION OF INFORMATION INTO WRITING OR SOME
OTHER FORM OF GRAPHICAL REPRESENTATION and the arranging of this information into
groups related items.
 EVALUATION – is the DETERMINATION OF THE PERTINENCE of the information to the
operation, reliability of the source of or agency and the accuracy of the information.
 PERTINENCE – does it holds some value to current operation, is it needed immediately
 RELIABILITY – judging the source of information or agency
 CREDIBILITY – truth of information

JUDGING CREDIBILITY

 It is possible for the reported fact or event to have taken place.


 Is the report consistent within itself?
 Is the report confirmed or corroborated by information from different sources or agencies.
 If the report does not agree with information from other sources which one is more likely to be true

 EVALUATION GUIDE FOR COLECTED INFORMATION ANALYSIS - This is the stage in


 which the collected information is subjected to review in order to satisfy significant facts and derive
conclusion there from.

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 56


 INTEGRATION- The combination of the elements isolated analysis with other known information
related to the operation.

 INTERPRETATION - Process of determining the significance of new information in the possible


alternatives. The interpreter determines the significance of the information as to the meaning of the
interpreted information.

 DISSEMINATION - Processed information or intelligence data are disseminated to end users, common
methods of disseminating Intel data are conferences, briefing and person to person exchanges. In this
process, consider the factors of timeliness, correctness and security.

Counterintelligence

COUNTERINTELLIGENCE – phase of intelligence covering the activity devoted in destroying


the effectiveness of hostile foreign activities and the protection of information against espionage,
subversion and sabotage. It also includes protection the organization itself.

Objectives and Importance of Counter-Intelligence


 It Denies information to the enemy o It Reduces the risk of a command o Aids in
achieving surprises o Increases the security of the command o Decreases the enemy ability to create
information about the forces.

Activities and Function of Counter-Intelligence


 Protection of information against espionage o Protection of personnel against subversion
 Protection of installations and materials against sabotage

Types of Intelligence

Types of Counter-intelligence
 PASSIVE CI MEASURES – protection of classified and sensitive information to the
unauthorized through secrecy, communication security, and other various safeguards.

 ACTIVE CI MEASURES – are those measures, which seek actively to block the
enemies’ effort to gain information or engage in espionage, subversion, and sabotage.

Categories of Counter-Intelligence Operation


 MILITARY SECURITY – it encompasses the measures taken by a command to protect itself against
espionage, enemy operation, sabotage, subversion or surprise.
 PORT BOUNDARY AND TRAVEL SECURITY – has to do with the application of both military and
civil security measures for counterintelligence control at point of entry and departure, international
borders and boundaries.
 CIVIL SECURITY – it encompasses active and passive counterintelligence measures affecting the non-
military nationals permanently or temporarily residing in an area under military jurisdiction.
 SPECIAL OPERATIONS – counter subversion

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 57


CHAPTER VI
Police Intelligence Operations

Learning Objectives
At the end of this module, the students should be able to:

1. Integrate the tools of investigation through discussion.

2. Describe the different methods

3. Explain their understanding regarding the tools of Criminal Investigation through ink shedding

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 58


Categories of Police Intelligence

CATEGORIES OF POLICE INTELLIGENCE INFORMATION – All evaluated materials of


every description:

A. STRATEGIC INTELLIGENCE – knowledge pertaining to the including those derived


from observation, reports, rumours, capabilities and vulnerabilities of a foreign nation,
which is imagery, and other sources from which intelligence is required by the National
Planners for the formulation of a produced adequate National Defense in peace and forms the basis for,
projected. This is intelligence information which is not immediate operational but rather long range.

TYPES OF AGENTS USED IN COLLECTING OF INFORMATION

• AGENT OF INFLUENCE- Agent who uses authority to gain information


• AGENT IN PLACE - Agent who has been recruited
• POLITICAL INTELLIGENCE – deals with within a highly sensitive target.
 Domestic and Foreign affairs and relation of government
• PENETRATION AGENT - Agent who have reached to operations; the enemy, gather information and
able to get back.
• EXPENDABLE AGENT - Agent who leaks false information to the enemy.
• DOUBLE AGENT - An enemy agent, who has been taken into custody, turned around and sent back
where he came from as an agent of his captors.

B. ECONOMIC INTELLIGENCE – deals with the extent and utilization of resources to the industrial
potential of the Nations.

C. TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE - concerned with the

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 59


operations not only the Military but also the Civilians Operation.

D. SOCIOLOGICAL INTELLIGENCE – deals with the Enemy Activities demographic and psychological
aspects of groups.
 Documents of people.
 Map, Population and Manpower
 Weather Forecast, Studies, Reports
 Characteristics of the People
 Agencies Public Opinion – attitudes of the majority of the people towards matters of public
policy.

E. BIOGRAPHICAL INTELLIGENCE – deals with operation individual personalities who have actual
possession of power.

F. ARMED FORCES INTELLIGENCE – deals with the SPONSOR - directs the organization conducting the
armed forces of the Nation’s clandestine activity.

G. GEOGRAPHICAL INTELLIGENCE – deals with the following:


 Clandestinely procure or collect Location – military and economic information.
 Size – measurement of which a nation attitudes, opinions, and actions of a can exchange space or time
during war of individual group or nation.
 Weather and Climate

H. SCIENTIFIC INTELLIGENCE – deals with the power, resulting in the loss of use progress of the
research and development as it temporarily or permanently of an article affects the economic and
military potential of other nation.

I. LINE OR TACTICAL INTELLIGENCE – it is the intelligence operation information which directly


contributes necessary for more effective police planning

FUNCTIONAL CLASSIFICATIONS OF POLICE INTELLIGENCE


A. CRIMINAL INTELLIGENCE (CRIMINT) – refers to the operations and or the action agent in his
knowledge essential to the prevention of crimes operations that includes the following: investigation,
arrest, and prosecution.

B. INTERNAL SECURITY INTELLIGENCE (INSINT) – interest that refers to the knowledge essential to
the maintenance of peace and order.

TARGET - Person, place or things against which the constitutional and legal basis of its clandestine activity is to
be conducted.

AGENT - It refers to a person who conducts clandestine operations to include Principal Agents, disposition of
Action Agents, and Support Agents.

• PRINCIPAL AGENT - Leader or management of Agent in clandestine operation


• ACTION AGENT - one who conducts natural as well as manmade features of the clandestine operation
that includes: physical environment of man considered.
• ESPIONAGE AGENT - Agent who point in view of military operations.
• PROPAGANDIST - Agents who meld with the enemy organization
• SABOTEUR- Agents who undertakes positive actions against an unfriendly
• PROVOCATEUR- Agent who induces an accomplishment of specific objectives and immediate in

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 60


opponent to act to his own detriment by nature and discrediting himself or by revealing his operation true
purpose or identity.
• SUPPORT AGENT - Agent who is engaged in an activity which supports the clandestine.

Order of Battle- arrangement of military usually troops for battle. Undertaken by the case officer.

SURVEILLANT- Agent who observes criminal offenders. Persons and places of operations of or things.

CLASSIFICATIONS OF SOURCES OF INFORMATION


 OPEN SOURCES – 99% of the information collected are coming from open sources or obtained from
overt facilities
• CLOSE SOURCES – Only 1% of information are obtained o Education – based on literacy rate from
Covert Operation Close/Covert Method/clandestine

Method of Collecting Information

KINDS OF COVERT OPERATION

A. SURVEILLANCE – is the covert, discreet observation of people and places for the
purpose of obtaining information concerning the identities or activities of subjects.

Objectives of Surveillance
• To identify persons involved in certain activities
• To secure basis for securing search warrant
• To obtain detailed information about the nature, scope of subjects activities
• To check on source of information
• To develop leads to vital information
• To confirm or deny allegations

TERMS TO REMEMBER IN SURVEILLANCE


o SURVEILLANT –it is the plainclothes investigator assigned to make the observation.
o SUBJECT – is who or what is observed. It can be a person, place, property, and vehicle, group of people,
organization or object.
o AREA TARGET STUDY – refers to area of operation of surveillance activities
o LOG – chronological records of activities that took place in the establishment under surveillance.
o SAFE HOUSE - Refers to a place where agents meet each other for purposes of debriefing and reporting.
o LIVE DROP- Refers to a place where agents or informants leave their messages to the other Agents.
o DECOY- A person or object used by the subject in attempt to elude Surveillant
o CONVOY - An associate of the subject who follows him to detect surveillance.
o CONTACT - Any person whom the subjects picks or deals with while he is under observation and
identifies the observer
o MADE – when subject under surveillance becomes aware that he is under observation and identifies the
observer also known as “BURNT OUT”
o LOST – when the surveillant does not know the whereabouts of his subject or the subject had eluded the
surveillance.

METHODS OF SURVEILLANCE
• STATIONARY SURVEILLANCE – also referred to as FIXED AND STAKEOUT SURVEILLANCE –

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 61


is used when you know or suspect that a person is at or will come to a known location when you
suspect that stolen goods are to be dropped or when informants have told you that a crime is going to
be committed.
• MOVING SURVEILLANCE OR SHADOWING OR TAILING – simply the act of following a person.
• TECHNICAL SURVEILLANCE – by the use of communications and electronics gadgets, system and
equipment.

FORMS OF SURVEILLANCE
• LOOSE TAIL – employed where a general impression of the subject’s habits and associates is required.
• ROUGH SHADOWING – employed without special precautions, the subject maybe aware of the
surveillance; employed also when the subject is a material witness and must be protected from harm or other
undesirable influences.
• CLOSE TAIL – extreme precautions are taken against losing the subject is employed where constant
surveillance is necessary.

B. CASING - It is the careful inspection of a place to determine its suitability for a particular
operational purpose. It is also known as the RECONNAISSANCE OR RECCE in Military term.

C. ELICITATION- The process of extracting information from a person believes to be in possession of vital
information without his knowledge or suspicion

EMPLOYMENT OF TECHNICAL MEANS

o BUGGING - The use of an equipment or tool to listen and record discreetly conversations of other people.
o WIRE TAPPING - A method of collecting information thru interception of telephone conversation.

TACTICAL INTERROGATION - It is a process or method of obtaining information from a captured enemy who is
reluctant to divulge information.

OBSERVATION AND DESCRIPTION (ODEX) - The complete awareness by an individual of his surroundings,
achieved through maximum employment of the senses and techniques of factuality reporting one’s own observation
of the sensory experiences recounted by others.

COVER AND UNDERCOVER OPERATIONS

A. UNDERCOVER OPERATIONS- also referred to as “ROPING” Undercover is disguising one's own


identity or using an assumed identity for the purposes of gaining the trust of an individual or organization to
learn secret information or to gain the trust of targeted individuals in order to gain information or evidence.

• COVER - It refers to the changing, forging or falsifying agent’s real personality including but not
limited to things, location, job, and others that will be used in undercover assignment.

• COVER STORY – A biographical data through fictional that will portray the personality of the agent
he assumed, a scenario to cover the operation.

• COVER SUPPORT – An agent assigned in target areas with the primary mission of supporting the
cover story.

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 62


TYPES OF COVER
• Artificial- altering the background that will correspond to the operation
• Multiple- Includes different cover
• Natural- Actual or True Background.
HAZARDS OF UNDERCOVER OPERATIONS
• REINTEGRATION BACK INTO NORMAL DUTY - Agents work their own hours, they are removed
from direct supervisory monitoring and they can ignore the dress and etiquette rules. So the resettling back
into the normal police role requires the coming off of old habits, language and dress.
• After working such free lifestyles, agents may have discipline problems or exhibit neurotic responses.
• MAINTENANCE OF IDENTITY - Living a double life in a new environment presents many problems.
Undercover work is one of the most stressful jobs an agent can undertake. The largest cause of stress
identified is the separation of an agent from friends, family and their normal environment. This simple
isolation can lead to depression and anxiety.

USES AND TYPES OF UNDERCOVER ASSIGNMENT


• RESIDENTIAL ASSIGNMENT - It is related to the neighborhood of the subject, where the agent will
live as a new resident without making any suspicion. His mission is to make friends within its
neighborhood and gather information regarding the subject and possibly getting closer to the subject.
• SOCIAL ASSIGNMENT - The agent will gain access to the subject by going to the different hang out
places of the subject and gather information like knowing how to drink socially without getting drunk.
• WORK ASSIGNMENT - The agent will be employed where the subject work to acquire information. The
agent must know his work and focus his mind set and habit to his work assignment or getting employed
where the investigator can observe the activities of the subject at his place of work.
• SUBVERSIVE ORGANIZATION - This is the most dangerous of all the undercover assignment; the
agent will join the organization of the subject itself he must know the ideologies of the group and the
actions while inside should conform to the organization to avoid any suspicion.
• PERSONAL CONTACT ASSIGNMENT – the investigator required to develop the friendship and trust
of the subject.
• MULTIPLE ASSIGNMENT – The investigator is tasked to cover two (2) or more of the above specific
assignments simultaneously, it can produce extensive information with minimum expenses but more prone
to compromise.

CRYPTOGRAPHY - It is defined as an art and science of codes and ciphers. This is done through the use of
“Speech Inverter” whereby essential speech frequencies are divided into several ranges by filters then inverted to
produce it scrambled speech when intercepted.
• CRYPTO ANALYST - Refers to those persons who break intercepted codes.
• CRYPTOGRAPHER - It refers to a person who is highly skilled in converting message from clear to
unintelligible forms by use of codes and cipher.
• CODING - It is the changing of message from plain clear text to unintelligible form also known as
“Encrypting”.
• DECODING - Transforming of coded message into plain text also known as
“Decrypting”.

SECURITY MEASURES & OPERATIONS IN RELATION TO INTELLIGENCE

 PHYSICAL SECURITY - The broadest type of security that is concerned with the physical measures
designed to safeguard personnel and prevent unauthorized access to equipment, facilities, materials,
documents, and to protect them from espionage, sabotage, damage or theft

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 63


 COMMUNICATION SECURITY - The protection resulting from the application of various measures
which prevent or delay the enemy or unauthorized person in gaining information through communication.
This includes transmission, cryptographic and physical security.
 DOCUMENT SECURITY - Protection of documents, classified matters and vital records from loss, access
to unauthorized persons, damage, theft and compromise through proper storage and procedures.
• CLASSIFY – Assigning of Information or material to one of the four security classification after
determining that such information requires security as prescribed by PNP regulation 200-012.
• RECLASSIFY – The act of changing the assigned classification of a document or material.
• DECLASSIFY – The removal of the security classification from classified document or material.
• UPGRADING - The process of assigning higher category of document or information according
to the degree of security needed
• COMPARTMENTATION – The granting of access to classified document or information only
to properly cleared persons when such classified information is required in the performance of
their official duties, and restricting it to specific physical confines when feasible.

CATEGORIES OF CLASSIFIED MATTER (PNPR 200-0121) – (GRBuBa)


• TOP SECRET (GREEN) – Top Secret documents calls for the utmost degree of protection. Unauthorized
revelation of this materials and information would cause extremely severe damage to the nation, politically,
economically, or militarily.
• SECRET (RED) - Unauthorized disclosure of this documents or things may put at risk the nation security,
cause serious injury to the reputation of the nation, the reproduction of which will be considerable cost and
labor, or significant delay
• CONFIDENTIAL (BLUE) - Unauthorized revelation of which may be injurious to the reputation of the
nation or governmental activity or would cause administrative humiliation or unnecessary injury.
• RESTRICTED (BLACK) - This are information which should not be published or communicated to
anyone except for official purposes, These records are daily files, routine in nature even if lost or destroyed,
will not affect operation or administration.

PERSONNEL SECURITY - the sum total procedures followed, inquiries conducted and criteria applied to
determine the work suitable to a particular applicant or the retention or transfer of a particular employee.

PERSONNEL SECURITY INVESTIGATION – is an inquiry into the character, reputation, discretion, integrity,
morals and loyalty of an individual in order to determine a person’s suitability for appointment access to classified
matter.

TYPES OF PSI
• LOCAL AGENCY CHECK - Refers to the investigation of the records and files of agency in the area of
principal residence of the individual being investigated.
• NATIONAL AGENCY CHECK - It consists of LAC supplemented by investigation of the records and
files of the following agencies: PNP, ISAFP, NBI, CSC, Bureau of Immigration and Deportation and other
agency.
• BACKGROUND INVESTIGATION – a check made on an individual usually seeking employment
through subjects records in the police files, educational institutions, place of residence, and former
employers.
• COMPLETE BACKGROUND INVESTIGATION - it is a type of BI which is more comprehensive, that
consist of detailed information regarding the subject.

SECURITY CLEARANCE - It is a certification by a responsible authority that the person described is cleared to
access and classify matters at appropriate levels.
 INTERIM CLEARANCE - Effectivity Two Years
 FINAL CLEARANCE - Effectivity Five Years

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 64


References:

• Criminal procedure for law enforcement officers and criminologist


• Introduction to law enforcement and criminal justice
• Essentials of criminal justice; Wadsworth/Thomson
• Police operations theory and practice
• Handbook on police intelligence
• Special crime investigation: theories and techniques
• Criminology glossary: Wiseman’s Books Trading, Inc
• Criminology dictionary

Compiled by:

Josie D. Buhain, RCrim

Instructor

Reviewed by:

Jeffson G. Naungayan, MSCrim

Program Chairperson, SCJE

Lecture Notes on CDI 1 – Fundamentals of Criminal Investigation with Intelligence | 65

You might also like