Cdi - Module 5
Cdi - Module 5
Cdi - Module 5
INTELLIGENCE
MODULE 5
INFORMATION
Lesson Objectives:
The term information was consistently mentioned in the previous chapters. Technically,
it refers to the element of investigation necessary for gathering ana collection of data to
include its progress as it moved forward in solving the case. As opposed to is legal
perspective, information is defined as accusation in writing, charging a person with an
offense, subscribed by the fiscal, and filed in court.
Sources of Information
Source of information is the network of data which can be linked or grouped in order
to obtain a concrete and reliable information based on the prevailing need or as the need
arises. Some of these common sources are:
Technically, the term informant refers to any person who possess knowledge regarding
crime, criminal syndicate, or ongoing criminal activity and provides information with the
police with or without consideration. It is usually used interchangeable win the term
informer. However, the term informer refers most specifically to those persons who are
recruited or hired and paid in a regular basis just to provide information.
2. Double-crosser- these are those informants who provide information in order also to
gain information from the police. Worst, they acquire more information than what they
give.
3. False Informant- these are those informants who provide false information or
information without bases.
5. Legitimate- these are those informants who provide information voluntarily to the
police.
6. Mercenary- these are those informants who provide information in exchange for a
reward, whether lor money or any other consideration.
8. Women- these are the most dangerous and difficult type of informants against male
subjects.
In addition, below are the common motives of the informant in providing information such
as.
2. Fear- the person gives information due to oppression by enemies or other impending
danger.
4. Jealousy- the informant is pushed to provide information to the police due to his
resentment to the accomplishments or possessions of another.
5. Remuneration - a person informs the police for some pecuniary other material gain
he is to receive.
6. Repentance -the informant provides information as a sign or regret for what he has
previously done.
8. Vanity - the person wants to gain favorable attention and importance from the police.
The power given by the state to police officers in gathering information is so huge that
it may be prone to abuse. To protect the privacy of an individual citizen, the law prohibits
certain police actions Such as the following.
1. Republic Act 4200 (Anti-Wiretapping). Under this law, the following acts are prohibited:
a. Tapping any wire or cable;
2. Republic Act 10173 (Data Privacy Act). Under this law, the following acts are prohibited:
g. Unauthorized disclosure.
Take note, under the same law RA 10173, it defines personal information as any
information whether recorded in a material form or not, from which the identity of an
individual is apparent or can be reasonably and directly ascertained by the entity holding
the information, or when put together with other information would directly and certainly
identity an individual.
In line with the intention of successful criminal investigation, intelligence is at part one
requirement that needs to be satisfied and be given attention. Even in history, intelligence
plays an important role in the success of every war. In like manner, the success of every
war demonstrates and shows how information was gathered and collected correctly and
precisely.
In modem times, intelligence is used primarily to crack down organized crime, defend
from enemy attacks, and aid in the progress of either covert or overt operation. Overt
investigation simply means as operation conducted openly while covert investigation
in contrast is an operation conducted in clandestine manner. Clandestine simply means
as secret Considering that intelligence is the backbone of police operation, then no
operation should be made without successful and accurate intelligence.
In addition, it must be noted that intelligence is not only used in line with the different
police operation but also in improving the political, economic, and sociological advantage
of the nation. Apart from that, take note that intelligence should possess the following
characteristics as it serves its purpose. if not, any information gathered will be hampered
or might acquire false information. As whole, any operation or activity might be
jeopardized.
As intelligence provides valuable inputs for the effectiveness of police operation, in like
manner, operation provides lor the continuity of intelligence activities.
2. Intelligence is continuous
This implies that intelligence must not be disrupted and must be continuous following
simple cycle from the time information is being collected in response to the need, up to
the time will be processed and disseminated to appropriate person.
This means that intelligence must meet the commander's need and should be relevant to
the Current operation.
Intelligence must be forecasted based on prudence with the intuition that information
possible to be collected from a particular source.
It must be noted that intelligence is adaptable to every Situation of all kind as operation
might vary depending on ten purpose and occasion.
Scope of Intelligence
intelligence data that are not of an immediate value. It is usually descriptive in nature,
accumulation of physical description of personalities and modus operandi. It does not
have immediate operational value, but rather long range that may become relevant to
future police operations.
Line Intelligence on the other hand is a type of intelligence that is immediate in nature
and can be available or developed within a short period of time. It is the kind of intelligence
required by the commander to provide for planning and conduct tactical administrative
operation in counterinsurgency. This includes knowledge of People, Weather, Enemy and
terrain (PWET) which is fundamental in planning and conducting tactical and
administrative operation counterinsurgency.
People includes the living condition of the people, sources of income, their education,
government livelihood projects, and the extent of enemy influence to the people. Weather
refers to the visibility, cloudy, temperature, precipitation (rain) or windy of the climate.
Enemy as the term suggest, refers to the study of location, strength, disposition, tactical
capacity, and vulnerability of the enemy. Terrain includes relief and drainage system,
vegetation, surface material, manmade features and some military aspects of terrain
which includes cover and concealment, obstacle, Critical key terrain features, observation
and fields of fire, and avenues of approach.
Counterintelligence
Lesson Objectives:
In the field of Counter intelligence (CI) Operation, it could either be Counter Human Intel,
Counter Imagery Intel or Counter Signal Intel. Counter Human Intel (HUMINT) seeks to
overcome enemy attempts to use human sources to collect information or to conduct
sabotage and subversion. Counter Imagery Intel (IMINT) are actions such as
surveillance radar, photo thermal and infrared systems and rely heavily
on pattern and movement analysis and evaluation of the enemy. Lasty, Counter Signal
Intel (SIGINT) which determines enemy SIGINT and related enemy weaknesses,
capabilities and activities, assess friendly operations to identity patterns, profiles and
develop, recommend and analyze countermeasures.
In addition, the concept of counterintelligence does not only limit to the protection of vital
information or to hide one’s identity from the enemy but also includes detection,
prevention, and neutralization of enemy activities. Detection is about knowing the
clandestine operation of the enemy. Prevention is about avoiding enemy attacks or
infiltration while neutralization is the suppression of enemy activities.
To sum up, counterintelligence is very significant to but not limited to the following such
that:
Intelligence Cycle
Lesson Objectives:
Planning
Dissemination
Collection
MISSION MISSION
Collation
Intelligence Cycle
Planning Phase
In intelligence cycle, planning is defined as the process of determining the extent and
scope of preparation which includes the supervision of the collection of information and
other requirements based on the standard priorities.
In planning for the collection of information, the following factors should be considered
such as.
1. Sources of information;
Collection Phase
Take note that since the collection and gathering of data is a cycle, any information
gathered or collected to which the intelligence officer finds less value or no value at all
shall be recorded and, if possible, preserved as it may be used for future endeavors.
Collation Phase
In intelligence cycle, collation refers to the process involved in evaluating the accuracy
and reliability of the information collected. Reliability means judging the source or
information while accuracy simply means the level of truthfulness of the information
collected.
1. Recording- refers to the systematic sorting of all documented information and present
them either in writing or some other form of presentation so that they can be analyzed
and studied for future action.
2. Analysis- the collected information is divided into different components; and isolate
those that are relevant to the mission or those that has intelligence value which includes
looking into the source of information, truthfulness of the information and who provides
the information.
Z- Documentary
4. Integration - is the combination of all that isolated information from various sources
to produce a new information necessary for the success of the mission.
Dissemination Phase
In line with dissemination, the intelligence can be disseminated in any of the following:
4. Conference-staff members
6. Personal Contact
1. National leaders;
2. Military commanders;
4. Friendly nations;
Undercover Operations
Lesson Objectives:
2. enumerate and apply the types of undercover operation and discuss the elements of
undercover operation.
Undercover operation is very vital in criminal investigation. This serves as their arm
in information gathering or even in the capture of suspects. As per definition, undercover
operation is a form of investigative technique whereby an undercover agent usually
investigators assume another identity in order to infiltrate the ranks of criminal syndicates.
Take note that undercover agent should have their best cover and cover story. Cover
refers to the means as to how investigators will hide his original identity while cover story
Is the biographical portrayal of the investigator as to what role he will depict toward
criminal syndicate while collecting vital information. The person who provides support to
the investigator is referred to as the cover support. Undercover operation is otherwise
known as roping although most of the time it refers to the surveillance of certain activities
or events.
In police work, undercover operation is done in order to acquire necessary inputs from
a particular person or place that might possess valuable information. It also assisted the
investigation in apprehending law violators.
Talking about over, it could either be artificial or multiple type of cover. Artificial cover is
done if the undercover agent is modifying his identity based on the current operation or
as the case may require while the multiple cover involves the use of different cover that
will fit to a given situation.
The Head is the person who directs the organization conducting the undercover
operation. The target pertains to any person, place or things against which the
undercover operation is to be conducted while the agent refers to a person who conducts
the clandestine activity. This could either be a police officer or any person who can access
and gather information from the target.
In the conduct of undercover operation, be cautious when confronting with the ranks of
criminal a syndicate. When gathering information, be sure that you are good in elicitation.
Elicitation is a form of extracting information done through an interview with the person
who might possess valuable information concerning person, event, organization or place
without his knowledge or suspicion.
In elicitation, be sure to have a good approach and a proper probing technique. Approach
pertains to the manner as to how you will start talking while probe refers to the manner
how will you keep the person talk.
When reporting to the office, the investigator should meet any personality or his
companion with the law enforcement agency in a safe house only. The term safe house
refers to a safe place where the investigator or his informant will meet for briefing or
debriefing purpose. To avoid any suspicion from those who are in the ranks of a criminal
syndicate, the undercover agent may use couriers to provide feedback as to the current
operation. Courier refers to the person who carries an information to another person.
It could also be through leaving a message in some places or drop. Drop refers to a
secure place Where agents or informants give their message to the other agents which
could be either.
2. Live Drop- the courier hand over the message directly to the agent.
It must be noted that undercover agent must be very cautious at all times as any
failure in this operation might cost his life. Be reminded of the following while conducting
undercover operations:
3. Do not indulge in any activity, which is not in conformity with the assumed identity. This
means that if you play the part of a fisherman then act like a fisherman and have a
knowledge, attitude, and skills of a fisherman.
4. Do not make notes unless they are to be mailed or passed immediately. Use code or
cipher if possible (to be discussed in the next lesson).
5. Do not use liquor or any intoxicants except it necessary and limit the amount to avoid
being drunk.
Surveillance
Lesson Objectives:
In the conduct of surveillance, subject refers to who or what is being observed which can
be any person. place. property, vehicle. group of people, organization or object as the
target in conducting surveillance. The agent here or the person conducting surveillance
or making an observation is referred as the surveillant. He is usually an investigator who
disguises himself purposely for surveillance. The conduct of surveillance is guided by the
surveillance plan. Surveillance plan simply refers to the outline or Blueprint as to how
surveillance should be conducted.
While conducting surveillance, any person whom the subjects picks or deals with while
he is under observation is termed as contact. Take note to be observant as the subject
may be accompanied by a convoy or decoy. Convoy is an associate of the subject who
follows him to detect surveillance while decoy is a person or object used by the subject in
attempt to escape the eyes of surveillant.
The surveillant should be cautious not to alarm the subject since he might be bum out.
Bum out or Made happens when subject under surveillance becomes aware that he is
under observation and identifies the observer. If it happens, the subject often uses all the
means to elude the surveillance. When the surveillant does not know the whereabouts of
his subject or the subject had eluded the surveillance, it means lost.
To prevent this, as much as possible do not make yourself too close to the subject to
avoid detection. Just remember to have a log. Log refers to the chronological record of
activities that the subject had or took place in the target area. Target area refers to the
area of operation of surveillance activities. Remember not to forget to take note of
whatever happened and, if possible, take photographs.
Types of Surveillance
The types of surveillance that the agent or surveillant use may vary depending on his
purpose. As such, it is the job of the police investigator in charge as to what should be
the best type of surveillance that should be done in order to acquire details necessary for
the case under investigation or for future endeavors. The types of surveillance are
discussed as follows:
2. Moving surveillance -this surveillance is employed when the subject moves from one
place to another. The person is commonly tailing or shadowing the subject. Tailing or
shadowing simply means as the act of following a person's movement either through
foot or with the use of an automobile. The subject of this surveillance is usually a person.
Under this method of Surveillance, this could be done in the following manner:
a. Rough tail or open tail- otherwise known as rough shadowing, and is commonly
employed if the subject knows about the presence of the surveillant. Rough tail can be
used in the following scenario:
Take note that rough tail also suffers some liabilities and charges like police harassment
or invasion of privacy.
b. Close tail or tight tail - this tailing is employed when tis extremely important not to
lose the subject and a constant surveillance is needed. Close tail is very useful when:
This tailing is employed even if the subject recognizes the surveillant which means that
the subject must be within his distance and sight.
c. Loose tail- refers to the tailing commonly employed if the surveillant wants to remain
undetected. This tailing could be used best when:
lf the subject is lost during surveillance, relocate the subject and continue the surveillance.
3. Aerial surveillance - this type of surveillance is done using helicopters or other aerial
devices. This is commonly employed in areas that is not accessible to toot or surveillance
vehicle.
4. Video surveillance- this refers to the use of video equipment and other devices used
to record visual activity of the subject
a. Bugging- is the eavesdropping any communication or conversation with the aid of any
bug devices. Bug is a form of electronic device place in an establishment to record,
receive or transmit conversation.
In addition, eavesdropping is the act of listening secretly to any conversation who are
within the same premise as with the person who intends to listen to the conversation.
Example of this:
Listening to people who are talking at the table beside you, and
Sitting beside the person who is talking to someone over telephone lines.
Methods of Surveillance
In one-man shadow, as the number speaks, there is only one surveillant following the
subject. If two-man shadow, two Surveillant. In three-man shadow three surveillant.
1. Follow the subject, but not too close. A distance that is enough for you to see the
subject, but not too far to lose the subject
2. If the subject tums, you either follow his path or cross to the other side, whichever you
think is practicable in the situation.
3. Make a good decision as to where the subject will be going. In that case, the surveillant
is at the advantage in taking the right position or placement while following the subject
4. Do not wear any apparel or clothing that are obvious or can caught the attention of the
subject.
1. The first surveillant (A) should subject while the second surveillant (B) follows the first
surveillant.
2. Both surveillant should have a proportionate distance. Meaning, a distance that is
enough for them to see, but not too far to lose subject. They must also have a
proportionate distance which means that they are not a or too close to one another.
3. If the subject either crosses the street or tums, allow the second surveillant (B) to follow
the subject while the first surveillant (A) should either cross or go straight but not on the
same side where the subject go. This time, the first surveillant should find the right place
and timing to regroup. He may stop and later follow surveillant (B) or turn and catch them
on the next corner depending on the situation.
4. Make a good decision as to where the subject will be going. In that case, the surveillant
is at the advantage in taking the night position or placement while following the subject.
5. Regroup if chances are possible. Meaning. have the original placement but necessarily
the same surveillant when you started doing the shadowing of the subject. This means
that the first surveillant (A) may now become the second surveillant (B) or vice versa.
6. Do not wear any apparel or clothing that is obvious or can catch the attention of the
subject.
1. The first surveillant (A) should follow the subject while the second surveillant (B) follows
the first surveillant. The third surveillant (C) is in the same way where the subject is going
but on the opposite street parallel with surveillant (A).
2. Like in one man and two man shadow, both surveillant should have a proportionate
distance.
3. If the subject either crosses the street or turns, allow the second surveillant (B) to follow
the subject while the first surveillant (A) should either cross or go straight but not on the
same side where the subject gone. The third surveillant (C) should observe the subject
and act the role of either surveillant A or B depending on the situation. Whoever becomes
the third surveillant should follow the same. Later, they should find the right place and
timing to regroup.
4. Make a good decision as to where the subject will be going. In that case, the surveillant
is at the advantage in taking the right position or placement while following the subject.
5. Regroup if chances are possible but again, not necessarily the same place when you
started doing the shadowing of the subject. This means that the first surveillant (A) may
now become the second surveillant (B) or vice versa and surveillant (B) becomes now
the surveillant (C) and surveillant (C) becomes now the surveillant (A) or vice versa
depending on the situation.
6. Do not wear any apparel or clothing that is obvious or can caught the attention of the
subject.
Take note that the procedure taken either in one man, two man, or three man shadow are
quite the same. They just differ in terms of their role and placement. In this way, alarming
the subject that he is under surveillance is quite small considering that there are two or
three persons conducting the surveillance.
Casing
Casing refers to the process of inspecting places to determine its suitability for
operational use. In the military, itis known as Reconnaissance. Sometimes, it is called
the surveillance of places or building.
Casing could be done either
1. Internal - it is the inspection of the different parts of the building or any structure which
includes but not limited to the different rooms within the building.
2. External- this is the inspection and observation of the immediate areas surrounding
the building or any structure which includes location, direction, possible exits, and others.
AGENTS
Lesson Objectives:
Agents also play an important role in extracting information in any undercover operation.
They do interview of suspected individuals, infiltrate the rank of criminal syndicate or even
disguise as one of them with the sole purpose of acquiring vital information relevant to
the success of the operation. Most of the time, you do not recognize them or you do not
see them. That is part of their job in order to hide their identity as well as to protect the
lives of their family and loved ones.
There are agents who use authority to gain information. He is called an agent of influence.
For those who are recruited within a highly sensitive target are called agent in place.
There are also agents who leak false information to the enemy and they are called
expandable agents. Those agents who have reached the enemy camp. gathered
information, and are able to get back without being caught are called penetration agents.
However, there are also those who acted as double agents. He is an enemy agent who
has been taken into custody, turned around, and sent back where he came from as an
agent of his captors.
Agents are generally classified based on their assignment whether they are those who
direct the planning in gathering information, directly penetrate the ranks of criminal
syndicate or supports the whole operation. These agents are as follows.
2. Action Agents -These are those who conducts the clandestine operation which is
further classified into:
b. Propagandist - these are agents who molds the attitude, action or opinion of an
individual or a group of people:
d. Guerilla - these are agents who are part of paramilitary group organized to cause great
damage to the enemy during hot war situation;
e. Strong Am - these are those agents who provide special protection in times df
dangerous phase of clandestine operation; and
f. Provocateur - these are agents who induces the enemy to act on their own detriment
or put them in disadvantage.
3. Support Agents - These are those agents who engage in activities in line with giving
support to the clandestine operations. This includes:
a. Surveillant investigator - these are those who continue to Observe any person or
places that is connected to the operation;
b. Procurer of Funds- these are those who obtain money needed to sustain the
operation;
c. Safe house Keeper - is the person responsible in maintaining the safe house for
training, briefing, debriefing or any other purposes; and
As a whole, people may think that agents are cool and skillful in various aspects.
However, those skills are necessary in order for them to survive and go back alive to their
respective agency and family Some of them were relocated and isolated in areas away
from home for the sole purpose of accomplishing their tasks as agents.
Cryptography
Lesson Objectives:
The agent needs to communicate whatever valuable information they had possessed or
acquired and in like manner commander needs to provide instruction to the troops in the
ground without allowing the enemy to intercept this communication. However, sending
any form of communication through plain message might jeopardize the operation. With
this regard, all information should be sent with accompanying security measures and this
could be done with the aid of cryptography.
Cryptography is defined as an art and science that deals with codes and cipher. In line
with intelligence, this is used in order to protect vital information from being intercepted
by the enemy or if intercepted, will disable them to read or understand the information
contained in the communication.
Simply because it depends primarily with the undercover agent as to how he will
convert plain text into cryptogram or unintelligible.
It is science since it involves systematic process or procedure in converting the plain text
into cryptogram or unintelligible.
Take note, plain text refers to the readable and understandable message that will be
converted into Cryptogram. Cryptogram or unintelligible simply means as unreadable.
Cryptogram is the result of cryptography.
Codes
Codes is a system of words, numbers or symbols that are used to represent a word. In
using codes, one must possess a code book. Code book is defined as a compilation of
words, number, symbols, or a combination of either words, number, or symbol with their
corresponding meaning.
Symbol
Defend
Original Message
(Plain Text) Coded Message
If the code system is used, the term of converting plaintext into unintelligible is known as
encode while the term of converting coded message into plain text is known as decode.
Coded message refers to the product or output of the code system. Also, coded message
is the cryptogram in the code system.
This is now the unreadable message ready for transmittal to the appropriate person or
organization.
Cipher
Cipher is the system which involves the substitution or transposition of individual letters
to make it unreadable. Cipher can be either transposition cipher or substitution cipher. A
Transposition cipher involves the shuffling of individual letter or switching the original
position of individual letter. All letters in the original text are present, they are just merely
disarranged.
Need Eden
From Form
Help Leph
Base
Sabe
Using the transposition cipher system. Use the above example such that:
On the other hand, the substitution cipher system involves the process of substituting
individual letters or number with another letter or number. An example is provided
below:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
The first row provides for the original arrangement of the letters in the alphabet while the
second row provides the propose letter to be used as the substitute.
Using the transposition cipher system. Use the above example such that:
In contrary to the code system, if the cipher system is used then the term of converting
plaintext into unintelligible is known as encipher while the term of converting a ciphered
message into plain text is known as decipher. The ciphered message refers to the
product or output of the cipher system. Also, ciphered message is the cryptogram in the
cipher system. This is now the unreadable message ready for transmittal to the
appropriate person or organization