2. • INTELLIGENCE was derived from the latin word INTELLIGERE which
means to “pick out or discern”
• ORGANIZATION – Institution composes of person who pursue
preparing plans or formulating policies.
• Activity – The organized effort to collect information, to assess it
little by little and piece it together until it forms larger and clear
patterns.
• Product – The end product resulting from the collection,
evaluation,analysis, integration and interpretation of all available
information which may have immediate or potential significance to
development and execution of plan ,policies and programs for the
users
3. 3 SOURCES OF INFORMATION
•Regular Source
•Cultivated
•Grapevine
4. • Sun Tzu – He is traditionally to be the author of “The Art of War” an
extremely influential ancient Chinese book on Military strategy
“Know yourself and your enemy. If you know yourself and not
the enemy for every battle you will be a foul who will meet defeats, but if
you know yourself and the enemy, you need not fear the result of a
hundred battles” In his book. “Art of War”
Delilah – A Biblical personality who was able to gain information by using
her beauty and charm. She was responsible for the fall of Samson a
known Israelite leader who terrorized the Philistines.
Sir Arthur Wellesly – One of the leading military and political figures of
the 19th century. He often referred to as the “Duke of Wellington”
He is regarded as the “Greatest Military Spymaster of All time”
He live by the motto “All the business of war is to find out what you
don’t know by what you do”
5. • Frederick the Great – “Father of Organized Military Espionage” He divided
his agents into four classes
>Common Spies – Recruited among poor folk, glad to earn small sum or to
accommodate a military officer.
>Double Spies – The low informers and unreliable renegades of value
chiefly in spreading false information to the enemy.
>Spies of Consequences – Courtier and noblemen, staff officers and kindred
conspirators always requiring a considerable bribe or bat
>Intimidated Spies – Persons who are forced to undertake espionage
against their will.
Alexander the Great – A renowned Greek conqueror had his share of
advance information when rumors of discontent circulated from among
the ranks of his men and he was able to indentify those disloyal ones by
ordering and was successful in curtailing the decline of Esprit De Corps and
6. • Sir Francis Walsingham of England – Protector of Queen Elizabeth I who
organized the secret police and established a spy network to detect fleet
movement of enemies of the British Empire particularly the Portuguese. He is
Regargded as the “1st Great Spymaster” a ruthless in the cause he was
responsible for the assassination, murdering and execution of people who
covertly betrayed the queen.
• Karl Schulmeister – He was an Austrian double agent for France during the reign
of NAPOLEON I
>He is famous as “NAPOLEON’S EYE”
>He acted as a General in Napoleon’s army, undertook espionage missions that
took him into England and Ireland ans was appointed commissioner of police for
Vienna during Napoleon’s 2nd occupation in 1809
>He was credited for establishing counter intelligence conducted against spies.
>He is a MASTER OF DECEIT who used black mail to obtain vital information
pertaining to the personality and Identity of the enemies of Napoleon during the
18th century .
7. • Joseph Petrosino – Pioneer on the fight against organized crime. The
various crime fighting techniques that Petrosino pioneered during his law
enforcement career are still practiced by various in the fight against crime.
> Member, New York Police Department in early 1900 he was the head of
the Italian Squad
> He is credited to smash the Black Society
Joseph Fouche – The French statesman Joseph Fouche (1759-1820) Served
as minister of police under Napoleon and was influential in the return of
Louis XVIII to the throne in 1815.
Admiral Yamamoto – He was a Japanese Marshal Admiral and the
Commander-in-Chief of the combined fleet during World War II, a graduate
of the imperial Japanese Naval Academy.
> He was the Commander-in-chief during the decisive early years of the
pacific war and so was responsible for the major battles such as Pearl Harbor
and Midway.
8. • Herbert Yardly – He was an American cryptologist best known for his
book “ The American Black Chamber”
> Yardly began his career as a code clerk in the U.S State Department. He
accepted a signal corps reserve commission and served as cryptologic
officer with the American Expeditionary forces in France during World
War I.
>His career in cryptology began with his work in the code room, as he
broke the U.S government codes that crossed his desk.
> Head of the MI-8 the forerunner of the Top Secret National Security
Administration a.k.a Black Chamber a Cryptanalytic Organization.
Napoleon Bonaparte – He was a French military and political leader
who rose to prominence during the latter stages of the French
Revolution and its associated wars in Europe.
>”One Spy in the right place is worth 20,000 men in the field”
9. • Akbar – Known as Akbar the Great was Mughai Emperor from 1556
until his death.
> The “Great Mogul” and wise master of Hindustan employed more
than 4,000 agents for the sole purpose of bringing him the truth that
his throne might rest upon it.
Battle of Midway – One of the most important naval battles of the
Pacific Campaign of World War II
> June 1442 the turning point of the Naval in the Pacific the victory
gained by the Americans was due to the disrupted messages from the
imperial Japanese Navy.
> Military Historian John Keegan called it “The most stunning and
decisive blow in the history of naval warfare”
> It was Japan’s worst naval defeat in 350 years.
10. • Julius Caesar – During his time the staff of each legion includes “Ten
Speculators” who served as an information collecting agency.
> “Speculators” were the 1st intelligence personnel to appear definitely
in a military organization.
Wilhelm Johann Karl Eduard Steiber – Otto Von Bismarck’s master
spay and director of the Prussian Feldgendarmarie.
>Stieber was both an agent of domestic surveillance and an extermal
agent.
>Along with Joseph Fouche he invented modern information
gathering.
> He is known as the Prussia’s “King of Sleuthhounds” as minister of
police he studied the use of propaganda and censorship as well as
utilizing statistical intelligence accounting.
11. • Alfred Redl – He was one of the leading figures of Pre-World War I
espionage
> His term in office was marked by innovation and he used very high
technology for the time to ensnare foreign intelligence agents.
> A homosexual Spy
> His treason activities were discovered and compelled to commit suicide
> His spying led to the death of over 500,000 agents and soldiers combined
in his 13 years episode as a spy.
Sir Samuel Luke – Chief scout of Oliver Cromwell who was able to dethrone
King Charles I in British Civil War of 1640’s.
John Churchill – His leadership of the allied armies consolidated Britain’s
emergence as a front-rank power.
> He told critics of his enormous expendure on espionage that “No war can
be conducted successfully and such advices cannot be has but a very great
12. • Edward I – Also known as Edward Longshanks and the Hammer of
the Scots (Latin : Mallues Scotorum) Was king of England from
1272 to 1307
> He was temperamental and this along with his height mad him an
intimidating man and he often instilled fear in his contemporaries.
> Modern historians are divided on their assessment of the king,
while some have praised him for his contribution to the law and
administration.
> He is credited with many accomplishment during his reign
including restoring royal authority after the reign of Henry III
> An English monarch who started utilizing English informants
especially to determine seditious writings againts the crown and
identity.
13. • George Washington - As Grand Master in Intelligence mobilized
the free masons of the colonies at the outbreak of the
American war of Independence.
> 1st President of the United States (1789-1797) the
Commander-in-Chief of the continental Army during the
American Revolutionary war and one of the founding father of
the United States
> Because if his strategy, Revolutionary forces captured major
british army’s at Saratoga in 1777 and Yorktown in 1781
> Historians praise Washington for his selection and supervison
of his generals, encouragement pf moale and ability to hold
together the army coordination wit the state governors and state
militia units, relations with congress and attention to supplies,
logistics and training.
14. •Hannibal - He was a Punic Carthaginian Military
Commander, generally considered one of the greatest
military commanders in history.
> He was considered one of the brilliant millitary
strategists in the history of military intelligence.
> He had developed an effective intelligence system for
15 years in Rome.
> He usually roam around the cuty often disguise
himself as a beggar to gather first-hand information.
15. MOST OUTSTANDING INTELLIGENCE AGENCIES
• Intelligence Agency - It is a government agency responsible for the collection,
analysis or exploitation of information and intelligence in support of law
enforcement, national security defense and foreign policy objectives.
> Effective instrument of a national power.
> Aggressive Intelligence is its primary weapon to destabilize the target
> Means of Information gathering are both overt and covert and may include
espionage, communication, cooperation with other institution and evaluation of
public sources.
• Australian Secret Intelligence Services (ASIS)
> Goverment intelligence of Australia which is responsible for collecting foreigh
intelligence undertaking counter intelligence activities and cooperation with other
intelligence agencies overseas.
> Its primary responsibility is gathering intelligence from mainly Asian and Pacific
interests using agents stationed in a wide variety of areas.
16. • Research and Analysis Wing (R&AW or RAW) - Research and Analysis Wing is
India’s external intelligence agency.
> It was formed in September 1968 under the helmsman-ship of its first Director
R, N. Kao Its creation was necessitated by the poor performance of the
intelligence Bureau (which handled both internal and external intelligence)
> Primary function is collection of external intelligence, counter terrorism and
covert operations. In addition it is responsible for obtaining and analyzing
information about foreign governments, corporations and persons in order to
advise indian foreign policymakers.
• General Directorate for external Security - Directorate general for External
Security is FRANCE’S EXTERNAL INTELLIGENCE AGENGY
>Operating under the direction of the French ministr of defense
> Primary focus is to gather intelligence from foreign sources to assist in military
and strategic decisions for the country.
> Agency employs more than fice thousand people
17. • Federal Security Service of Russian Federation - The Federal Security Service of Russian
Federation (FSB) is the main domestic security agency of the Russian Federation and the
main successor agency of the Soviet-era Cheka, NKVD AND KGB
> FSB is involved in counter-intelligence, internal border security,counter-intelligence and
surveillance
> FSB is responsible for internal security of the Russian state counterespionage and the fight
against organized crime, terrorism and drug smuggling
> The number of FSB personnel and its budget remain state secret, although the budget was
reported to jump nearly 40% in 2006
• Bundesnachrichtendienst (BND) - Foreign intelligence agency of the german government
> The BND acts as an early warning system to alert the German government to threats to
German interest from abroad.
> It depends heavily on wiretapping and electronic surveillance of international comunications
> It collects and evaluates information on a variety of areas such as international terrorism
WMD proliferation and illegal transfer of technology organized crime, weapons and drug
trafficking, money laundering, illegal migration and information warfare
> Both military and civil intelligence.
18. • Ministry of State Security (MSS) - Security agency of the People’s Republic of
China
> Article 4 of the Criminal Procedure Law gives the MSS the same authority to
arrest or detaon people as regular police for crimes involving state security with
identical supervision
> One of the primary missions of the MSS is undoubtedly to gather foreign
intelligence from targets in various countries overseas
> Many MSS agents are said to have operated in the Greated China Region
• Central Intelligence Agency (CIA) - It is an executive and reports directly to the
Director of National Intelligence with responsibility for providing national
security intelligence assessment to senior United States policmakers.
> A predecessor of the Office of Strategic Service (OSS) which was formed in 1942
and renamed CIA in 1947 (William Donovan)
> CIA is the largest of the intelligence agencies and is responsible for gathering
data from other counteries that could impact U.S policy
19. > It’s a civilian intelligence agency o the United States
government responsible for providing national security
intelligence to senior United States policymaker
> CIA also engages in covert activities at the request of the
President of the United States of America
> It has failed to control terrorism activities including 9/11 not
even a single top level Al- Qaeda leader captured own its own
on the past 13 years
> Highly founded and technologically most advanced
intelligence set-up in the world
> The 1st Director of the Agency was Rear Admiral Roscoe
Hillenkoetter
20. •Secret Intelligence Service (SIS) MI-6 - SIS supplies the British
> Government with foreign intelligence
> It operates under the formal direction of Joint Intelligence
Committee (JIC) alongside the Internal Security Service (M15)
the Government Communications Headquarters (GCHQ) and
the defense Intelligence (DI)
> It is frequently referred to by the name M16 a name used as
a flag of convenience during the Second World War when it
was known by many names
>The existence of M16 was not officially acknowledged until
1994
21. •Mossad - Responsible for intelligence collection and
covert operations including paramilitaray activities.
> It is one of the main entities in the Israeli intelligence
Community along with Aman (Military intelligence) and
Shin Bet (Internal Security) But its director reports directly
to the prime minister
2 Branches of Mossad
Aman - Military Intelligence (Defense force)
Shabak - General Security Service (Internal Service)
22. • Inter-Service Intelligence (ISI) - WIth the lengthiest track record of
success the best know intelligence so far on the scale of records is ISI
> Inter-Services Intelligence was created as an independent unit in 1948
in order to strengthen the performance of Pakistan’s Military Intelligence
during the Indo-Pakistani War of 1947
> The best of its time, failed to counter ISI and protect Soviet interest in
Central Asia
> It has protected its Nuclear Weapons since formed and it has failed
indian attempts to attain ultimate supremacy in the South-Asian threaths
through internal destabilization of India It is above all laws in its host
country Pakistan “A state, with in a State”
> Its personnel have never been caught on camera
> It is believed to have the highest number of agents worldwide close to
10,000
23. • National Intelligence Coordinating Agency (NICA) - It is the
primary intelligence gathering and analysis arm of the Philippine
government, which is under the Office of the National Security
Adviser ; NICA is incharge of carrying out overt,covert and
clandestine intelligence programs ; its motto is “Knowledge is
Safety” Presently NICA is in close coordination with CIA,Mossad,
Secret Intelligence Service and intelligence services is ASEAN
countries to counter the threat of terrorism
> The agency is led by the Diretor-General and is assisted by a
Deputy Director-General. The former reports directly to the
President. The NICA has a National Intelligence Board that serves as
an advisory board to the Director General before he would submit
his findings to the President relating to national security matters
affecting the Philippines
24. PRINCIPLE OF INTELLIGENCE
A. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT
B. INTELLIGENCE IS CONTINUOUS
C. INTELLIGENCE MUST BE USEFUL
D. INTELLIGENCE MUST BE AVAILABLE ONTIME
E. INTELLIGENCE OPERATION REQUIRES IMAGINATION AND
FORESIGHT
F. INTELLIGENCE MUST BE FLEXIBLE
G. INTELLIGENCE REQUIRES CONTINUOUS SECURITY
MEASURES
25. • A. INTELLIGENCE AND
OPERATION ARE
INTERDEPENDENT – Intelligence
provides valuable inputs for
effectiveness of police operation
on the other hand operation
likewise is needed for continuity
of intelligence activities.
26. • B. INTELLIGENCE IS CONTINUOUS –
The basic principle of intelligence
operations is that intelligence activities
follow a simple cycle which is
continuous at the same time that new
information is being collected in
response to direction, other
information is being processed and
intelligence is being used.
27. • C. INTELLIGENCE MUST BE
USEFUL – It must serve the
commander’s need and
requirements so that effort will
not be wasted. It should have an
application and significance to the
operation
28. •D. INTELLIGENCE MUST BE AVAILABLE
ONTIME – Intelligence must be
communicated to the decision maker at
the appropriate time to permit its most
effective use. It must reach the user in
time to serve as basis for appropriated
action intel data must b disseminated on
time because late arrival is as good as
useless.
29. •E. INTELLIGENCE OPERATION
REQUIRES IMAGINATION AND
FORESIGHT – The success of objective
personnel are reminded to refrain
from utilizing criminal elements in
intel operation. They must use their
resourcefulness to obtain more than
what is normally.
30. •F. INTELLIGENCE MUST BE FLEXIBLE –
Intelligence Operations must be
changeable according to the present
situation condition and other factors,
Intelligence Operations are based on
reason and sound judgment. Procedures
which do not readily adapt to a given
situation are generally discarded.
31. •G. INTELLIGENCE REQUIRES
CONTINUOUS SECURITY
MEASURES - Deny unauthorized
personal information about
operation and intelligence
product, its source and
organization itself.
32. CATEGORIES OF INTELLIGENCE
A. NATIONAL INTELLIGENCE - Integrated product of intelligence
developed by all government departments concerning the broad
aspect of national policy and national security
1. National Policy - Specific courses of action to achieve the
national objectives.
2. National Security - This relate to the protection and
preservation and a productive strength of a country including the
security of the government and domestics anf foreign affairs
against espionage sabotage and subversion.
33. B. DEPARMENT OF INTELLIGENCE - The intelligence
required by department or agencies of the
government to execute its mission and discharge its
responsibilities
C. MILITARY INTELLIGENCE - Refers to the
knowledge by the military institution essentia in the
preparation and execution of military plans, policues
and programs
36. CATEGORIES OF POLICE INTELLIGENCE
1. STRATEGIC INTELLIGENCE – Knowledge
pertaining to the capabilities and vulnerabilities of
a foreign nation, which is required by the National
Planners for the formulation of an adequate
National defense in peace and forms the basis for,
projected. This is Intelligence information which is
not immediate operational but rather long range,
37. COMPONENTS OF STRATEGIC INTELLIGENCE
1. POLITICAL INTELLIGENCE – Deals with Domestic and
Foreign affairs and relation of government operations.
• BASIC PRINCIPLES OF THE GOVERNMENT
• GOVERNMENT STRUCTURES
•PUBLIC ORDER ANS SAFETY
•SUBVERSION
•INTELLIGENCE AND SECURITY ORGANIZATION
38. 2. ECONOMIC INTELLIGENCE – DEALS WITH THE EXTENT AND
UTILIZATION OF NATURAL AND HUMAN RESOURCES TO THE INDUSTRIAL
POTENTILA OF THE NATIONS
3. TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE –
CONCERNED WITH THE OPERATIONS AND FACILITIES NOT ONLY THE
MILITARY BUT ALSO THE CIVILIANS.
4. SOCIOLOGICAL INTELLIGENCE – DEALS WITH DEMOGRAPHIC AND
PSYCHOLOGICAL ASPECTS OF GROUPS OF PEOPLE
• POPULATION AND MANPOWER
• CHARACTERISTICS OF THE PEOPLE
• PUBLIC OPINION – ATTITUDES OF THE MAJORITY OF THE PEOPLE
TOWARDS MATTERS OF PUBLIC POLICY.
• EDUCATION – BASED ON THE HIERARCY RATE.
39. 5. BIOGRAPHICAL INTELLIGENCE – DEALS WITH INDIVIDUAL
PERSONALITIES WHO HAVE ACTUA POSSESSION OF POWER
6. ARMED FORCES INTELLIGENCE – DEALS WITH THE ARMED
FORCES OF THE NATION.
•POSITION OF THE ARMED FORCES – CONSTITUTIONAL AND
LEGAL BASIS OF TS CREATION AND ACTUAL ROLE.
•ORGANIZATION ANS STRUCTURE AND TERRITORIAL
DISPOSITION
•MILITRAY MANPOWER RECRUITEMENT
•ORDER OF BATTLE – ARRANGEMENT OF MILITARY TROOPS
FOR BATTLE
40. 7. GEOGRAPHICAL INTELLIGENCE – DEALS WOTH THE NATURAL
AS WELL AS MANMADE FEATURES OF THE PHYSICAL
ENVIRONMENT OF MAN CONSIDERED FROM THE POINT IN
VIEW OF MILITARY OPERATIONS.
•LOCATION – MILITARY AND ECONOMIC IMPORTANCE
•SIZE – MEASUREMENT OF WHICH A NATION CAN EXCHANGE
SPACE OR TIME DURING WAR
•SHAPE
•WEATHER AND CLIMATE
8. SCIENTIFIC INTELLIGENCE – DEALS WITH THE PROGRESS OF
THE RESEARCH AND DEVELOPMENT AS IT AFFECTS THE
ECONOMIC AND MILITARY POTENTIAL OF A NATION.
41. 2. COUNTER INTELLIGENCE – PHASE IF
INTELLIGENCE COVERING THE
ACTIVITY DEVOTED IN DESTROYING
THE EFFECTIVENESS OF HOSTILE
FOREIGN ACTIVITIES AND THE
PROTECTION OF INFORMATION
AGAINTST ESPIONAGE, SUBVERSION
AND SABOTAGE
42. TYPES OF COUNTER-INTELLIGENCE
•PASSIVE CI MEASURES – PROTECTION OF
CLASSIFIED AND SENSITIVE INFORMATION TO THE
UNAUTHORIZED THROUGH SECRECY
COMMUNICATION SECURITY AND OTHER VARIOUS
SAFEGUARDS.
•ACTIVE CI MEASURES – ARE THOSE MEASURES
WHICH SEEK ACTIVELY TO BLOCK THE ENEMIES
EFFORT TO GAIN INFORMATION OR ENGAGE IN
ESPIONAGE,SUBVERSION AND SABOTAGE.
43. CONCEPTS OF COUNTER-INTELLIGENCE
•DETECTION – KNOWING THE
CLANDESTINE OPERATION OF THE
ENEMY.
•PREVENTION – APPLICATION OF CI
MEASURES TO AVOID ENEMY
ACTIVITIES.
•NEUTRALIZATION – IT IS THE
CONTAINMENT OF ENEMY ACTIVITIES.
44. OBJECTIVES AND IMPORTANCE OF COUNTER-
INTELLIGENCE
•IT DENIES INFORMATION TO THE
ENEMY
•IT REDUCES THE RISK OF A COMMAND
•AIDS IN ACHIEVING SURPRISES
•INCREASES THE SECURITY OF THE
COMMAND
45. LINE OR TACTICAL INTELLIGENCE – IT IS THE
INTELLIGENCE ONFORMATION WHICH DIRECTLY
CONTRIBUTES TO THE ACCOMPLISHMENT OF
SPECIFIC OBJECTIVES AND IMMEDIATE IN
NATURE, NECESSARY FOR MORE EFFECTIVE
POLICE PLANNING AND OPERATION.
INTEL INFORMATION TO BE DETERMINED IN
LINE INTELLIGENCE (PWET)
47. METHODS AND TECHNIQUES OF COLLECTING
INFORMATION
INFORMATION - All evaluated materials of
every descriptions including those derived
from observation, reports rumors, imagery
and other sources from which intelligence is
produced.
48. TYPES OF AGENT USED IN COLLECTING OF
INFORMATION
•AGENT OF INFLUENCE
•AGENT IN PLACE
•PENETRATION AGENT
•EXPENDABLE AGENT
•DOUBLE AGENT
49. CLASSIFICATIONS OF SOURCES OF
INFORMATION
A. OPEN SOURCES - 99% Of the information collected are coming from
open sources or obtained from Overt Operation.
OVERT OPERATION - Also known as Open Operation method is
collecting information openly regardless the subject is aware that we
are collecting information commonly is by use of
Enemy Activities
Capture Documents
Map
Weather Forecast, Studies, Reports
Agencies
50. B. CLOSE SOURCES - Only 1% of
information are obtained from clandestine
operation.
COVERT OPERATION - Also known as
Clandestine Operation of Close Operation,
method of collecting information secretly
or by using a cover without the knowledge
of the subject.
51. ELEMENTS OF COVERT OPERATION
1.SPONSOR – DIRECTS THE ORGANIZATION
CONDUCING THE CLANDESTINE ACTIVITY.
2. AGENT – IT REFERS TO A PERSON WHO
CONDUCTS THE CLANDESTINE OPERATION TO
INCLUDE PRINCIPLE AGENTS. ACTION AGENTS AND
SUPPORT AGENTS.
3. TARGET – PERSON,PLACE OR THINGS AGAINST
WHICH THE CLANDESTINE ACTIVITY IS TO BE
CONDUCTED.
52. • PRINCIPLE AGENT – LEADER OR MANAGEMENT AGENT IN
CLANDESTINE OPERATION USUALLY UNDERTAKEN BY THE CASE
OFFICER.
• ACTION AGENT – THE ONE WHO CONDUCTS THE CLANDESTINE
OPERATION THAT INCLUDES.
• ESPIONAGE AGENT – AGENT WHO CLANDESTINELY PROCURE OR
COLLECT INFORMATION.
• PROPAGANDIST – AGENTS WHO MOLDS THE ATTITUDES,OPINIONS
AND ACTIONS OF AN INDIVIDUAL GROUP OR NATION.
• SABOTEUR – AGENTS WHO UNDERTAKES POSITIVE ACTIONS
AGAINST AN UNFRIENDLY POWER, RESULTING IN THE LOSS OF USE
TEMPORARILY OR PERMANENTLY OF AN ARTICLE OR OTHER.
53. • SUPPORT AGENT – AGENT WHO IS ENGAGED IN ACTIVITIES WHICH SUPPORTS
THE CLANDESTINE OPERATIONS AND OR THE ACTION AGENT IN HIS OPERATIONS
THAT INCLUDES THE FOLLOWING
• SURVEILLANT – AGENT WHO OBSERVES PERSONS AND PLACES OF OPERATIONS
OF INTEREST.
• INVESTIGATOR – AGENT WHO UNDERTAKE TO PROCURE INFORMATION OR
THINGS OF CLANDESTINE OPERATION.
• PROCURER OF FUNDS – AGENT WHO OBTAIN MONEY WHEN NEEDE FOR
OPERATIONAL USE.
• SAFE HIUSE KEEPER – AGENTS WHO MANAGES AND MAINTAINS A SAFE HOUSE
FOR CLANDESTINE OPERATIONS LIKE MEETINGS, SAFE HEAVENS, TRAINING,
BRIEFING AND DEBRIEFING
• COMMUNICATION AGENT – AGENT WHO IS DETAILED AS SECURING OF
CLANDESTINE COMMUNICATIONS.
54. KINDS OF COVERT OPERATION
1.SURVEILLANCE
2.CASING
3.ELICITATION
4.EMPLOYMENT OF TECHNICAL MEANS
5.TACTICAL INTERROGATON
6.OBSERVATION AND DESCRIPTION
(ODEX)
55. OBJECTIVES OF SURVEILLANCE :
To identify persons involved in certain activities
To secure basis for securing search warrant
To obtain detailed information about the nature,scope
of subjects activities
To check on source of information
To develop leads to vital information
To confirm or deny allegations
To provide protection
56. TERMS TO PONDER IN SURVEILLANCE
1. SURVEILLANT - Is the plainclothes investigator assigned to make the
observation.
2. SUBJECT - Who is observed. It can be a person, place, property and
vehicle group of people, organization or object.
3. AREA TARGET STUDY - Refers to area of operation of surveillance
activities.
4. LOG - Chronological records of activities that took place in the
establishment under surveillance.
5. SAFE HOUSE - Refers to a place where agents meet each other for
purpose of de-briefing and reporting
6. LIVE DROP - Refers to a place where agents or informants leave their
message to the other agents.
57. 7. DECOY - A person or object used by the subject in attemot to
elude surveillant.
8. CONVOY - An associate of the subject who follows him to
detect surveillance.
9. CONTACT - Any person whom the subjects picks or deals
with while he is under observation and identifies the observer.
10. MADE - When subject under surveillance becomes aware
that he is under observation and identities the observer also
known as “BURNT OUT”
11. LOST - When the surveillant does not know the
whereabouts of his subject or the subject had eluded the
surveillance.
58. WHAT ARE THE THINS SHOULD BE AVOIDED IN SURVEILLANCE
•DON’T MEET THE EYE OF THE SUBJECT
•DON’T ADOPT A STINKING,SLEUTING CREEPING
MANNER
•DON’T WEAR STORY BOOK DISGUISES
•DON’T CARRY NOTICEABLE ITEMS
•DON’T GREET FELLOW AGENTS
•DON’T MAKE ENTRIES IN YOUR NOTEBOOK IN PUBLIC
PLACE
•DON’T SPEND MONEY TO MUCH
59. ESSENTIAL REQUIREMENT AND APPEARANCE
•ALWAYS BE ALERT
•BE A GOOD TALKER
•BE RESOURCEFUL
•AVERAGE SIZE,BUILT AND GENERAL APPEARANCE
•HAVE NO PECULIARITIES IN APPEARANCE
•SHOULD HAVE PERSEVERANCE AND ABLE TO WAIT FOR
HOURS
60. 2. CASING
• EXTERNAL - close observation and clear description of an area,
building or installation, particularly its location, approaches and
exits and its immediate vicinity.
• INTERNAL - Close observation and clear description of the layout
of a building, an office or a room etc.
=METHODS OF CASING=
• PERSONAL RECONNAISANCE - Most effective method and will
produced the most into since you know what you’re looking for.
• MAP RECONNAISSANCE - If may not sufficient but it can produce
a certain amount of usable information.
61. •RESEARCH - More information can be acquired best used
with other methods.
•PRIOR INFORMATION - Those records in your file unit
that may provide valuable information.
•HEARSAY - Information usually gain by the person
operating in the area and performing casing job.
3. ELICITATION - The process of extracting
information from a person believes to be in possession of
vital information without his knowledge or suspicion.
62. TWO DEVICES IN THE CONDUCT OF ELICITATION APPROACH
IT IS THE PROCESS OF SETTING PEOPLE TO START TALKING OR TO SHIFT
THE DIRECTION OF AN EXISTING CONVERSATION.
TYPES OF APPROACH
A. FLATTERY – PEOPLE ARE SUSCEPTIBLE TO PRAISE SO USE THIS
WEAKNESSES AS A WAY OF APPROACHING THE SUBJECT FOR
ELICITATION.
• TEACHER-PUPIL APPROACH – THE SUBJECT IS TREARTED AS AN
AUTHORITY THAN SOLICITS HIS VIEW POINT AND OPINION ON A
SUBJECT MATTER,
• GOOD SAMARITAN APPROACH – IS THE SINCERE AND VALID OFFERS
OF HELP AND ASSISTANCE ARE MADE TO THE SUBJECT.
63. • KINDRED SOUL APPROACH – THE SUBJECT IS PLACED IN A PEDESTAL
HAVING SOME SPECIALIZED QUALITY THEN FLATTER HIM BY SHOWING
ENOUGH CONCERN FOR HIS WELFARE TO PAY SPECIAL ATTENTION TO
HIS EMPLOYMENT.
• PARTIAL DISAGREEMENT APPROACH – SEEK TO PRODUCE TALKING BY
THE WORD “I’M SURE IF I FULLY AGREE”
B. PROVOCATIVE APPROACH – THIS ARE DESIGNED TO INDUCE THE
SOURCE TO DEFEND A POSITION OR CORRECT A WRONG IMPRESSION.
• TEASER BELT APPROACH – THE ELICITOR ACCUMULATES SOURCES OF
KNOWLEDGE ABOUT A PARTICULAR SUBJECT TO TEMPT THE SUBJECT
TO GIVE HIS VIEWS.
• MANHATTAN FROM MISSOURI APPROACH – THE ELICITOR ADOPTS
AN UNBELIEVABLE ATTITUDE ABOVE ANYTHING HE QUESTIONS ALL
THE STATEMENT AND PROPOSITIONS.
64. • JOE BLOW APPROACH – IS “I” KNOW THE ANSWER TO EVERYTHING APPROACH
THE ELICITOR ADOPTS THE ATTITUDE OF BEING APPROACHABLE IN ANY FIELD.
• NATIONAL PRIDE APPROACH – NATURE PROPENSITY OF ALL PERSONS TO
DEFEND THEIR COUNTRY AND ITS POLICIES.
65. 4. EMPLOYMENT OF TECHNICAL MEANS
1. BUGGING - The use or an equipment or tool to listen and
record discreetly conversations of other people.
2. WIRE TAPPING - A method of collecting information
through interception of telephone conversation.
5.TACTICAL INTERROGATION – The need for
obtaining information of the highest degree of credibility
taken on the minimum of time can be through interrogation
which varies and dependent entirely on the situation.
66. 6.OBSERVATION AND DESCRIPTION
(ODEX)
OBSERVATION - A complete and accurate observation by an
individual of his surroundings and encompasses the use of all the
major sense to register and recognized its operation or intel
significance.
DESCRIPTION - The actual and factual reporting of ones’s
observation of he reported sensory experience recounted by
another.
PSYCHOLOGIST ESTIMATE THAT APPROXIMATELY
67. =COVER AND UNDERCOVER OPERATIONS=
UNDERCOVER IS DISGUISING ONE’S OWN IDENTITY OR USING AN ASSUMED IDENTITY
FOR THE PURPOSE OF GAINING THE TRUST OF AN INDIVIDUAL OR ORGANIZATION TO
LEARN SECRET INFORMATION OR TO GAIN THE TRUST OF TARGETED INDIVIDUALS IN
ORDER TO GAIN INFORMATION
1. COVER - The means by which an individual, group or organization
conceals the true nature of its acts or existence from the observer
2. COVER STORY - A biographic account true or fictious that will portray
The personality of the agent be assumed a scenario to cover up the
operation
3. COVER SUPPORT – An agent assigned in target areas with the primary
mission of supporting the cover story.
68. TYPES OF COVER
1.ARTIFICIAL – ALTERING THE
BACKGROUND THAT WILL
CORRESPOND TO THE
OPERATION
2.NATURAL – ACTUAL OR TRUE
BACKGROUND.
69. TYPES OF UNDERCOVER ASSIGNMENT
1. DWELLING – ONE IN WHICH THE AGENT ESTABLISHES RESIDENCE IN OR NEAR THE
DWELLING IN WHICH HOUSES THE SUBJECT.
2. WORK ASSIGNMENT – PLACES THE UNDERCOVER AGENT IN A TYPE OF
EMPLOYMENT WHERE HE CAN OBSERVE THE ACTIVITIES OF THE TARGET
3. SOCIAL ASSIGNMENT – REQUIRES TO FREQUENT PLACES OF ENTERTAINMENT AND
AMUSEMENT KNOWN TO BE HABITUALLY VISITED BY THE TARGET
4. MULTIPLE ASSIGNMENT – AGENT IS GIVEN THE TASK OF COVERING TWO OR MORE
OF THE ABOVE SPECIFIC ASSIGNMENT SIMULTNEOUSLY
5. PERSONAL CONTACT ASSIGNMENT OR ROPE JOB – AGENT IS REQUIRED TO
DEVELOP FRIENDSHIP AND TRUST WITH THE TARGET FOR PURPOSES OF OBTAINING
INFORMATION OR EVIDENCE.
6. SUBVERSIVE ORGANIZATION – THIS IS THE MOST DANGEROUS OF ALL
UNDERCOVER ASSIGNMENT, THE AGENT WILL JOIN THE ORGANIZATION OF THE
SUBJECT ITSELF HE MUST KNOW THE IDEOLOGIES OF THE GROUP AND ACTIONS
WHILE INSIDE SHOULD CONFORM TO THE ORGANIZATION TO AVOID ANY
SUSPICION.
70. INFORMANTS AND INFORMER
•INFORMANT NET - A controlled group
of people who work through the
direction of the agent handler
•INFORMANT - Perosn who give
information to the police voluntarily
•INFORMER - Persons who give
information for reward or price.
71. TYPES OF INFORMANTS
1. CONFIDENTIAL INFORMANT - An informant who gives
information to the police pertaining to the underworld about
organized criminals with the understanding that his identity will be
protected.
2. ANONYMOUS INFORMANT - Those who gives information
through telephone with the hope that the informant cannot be
identified.
3. VOLUNTARY INFORMANT - A type of informant who give
information freely and willingly as a witness to a certain act.
4. SPECIAL INFORMANT -Those who gives information concerning
specialized cases onlu and it is regarded a special treatment by the
operatives (ex.teachers,businessman etc.)
72. 5. FALSE INFORMANT – REVEALS INFORMATION OF NO
CONSEQUENCES, VALUE OR STUFF CONNECTED WITHIN THIN AIR.
6. FRIGHTENED INFORMANTS – WEAKEST LINK IN CRIMINAL CHAIN,
MOTIVATED BY ANXIETY
7. SELF-AGGRANDIZING – MOVES AROUND THE CENTER OF CRIMINALS
DELIGHT IN SURPRISING THE POLICE ABOUT BITS OF INFORMATION
8. MERCENARY – INFORMATION FOR SALE NEEDED SOMETHING FOR
EXCHANGE OF INFORMATION.
9. DOUBLE-CROSSER – HE WANTS TO GET MORE INFORMATION FROM
THE POLICE MORE THAN HE GIVES.
10. WOMEN – MOST DANGEROUS
11. LEGITIMATE – OPERATORS OF BUSINESS DESIRE TO GIVE
INFORMATION FOR LEGITIMATE REASONS.
73. MOTIVES OF INFORMANTS
• VANITY – CONCEITED ACT/CHARACTER OF THE CRIMINAL RESULTING TO SELF-BETRAYAL
OR TANTAMOUNT TO GUILT,GAINING FAVORABLE ATTENTION AND IMPORTANCE BY
THE POLICE.
• CIVIC-MINDEDNESS – SENSE OF DUTY AND OBLIGATION TO ASSIST THE POLICE.
• FEAR – A PERSON UNDER AN ILLUSION OF OPPRESSION BY ENEMIES OR OF OTHER
IMPENDING DANGER.
• REPENTANCE – ONE WHO HAS A CHANGE OF HEART AND WISHES TO REPORT A CRIME
THAT IS PREYING ON HIS CONSCIENCE
• GRATITUDE OR GAIN – AN EXPRESSION OF APPRECIATION TO OBTAIN A PRIVILEGE OR
AN INTEREST IN THE WELFARE OH HIS FAMILY DURING HIS DETENTION.
• REVENGE – TO SETTLE A GRUDGE DUE TO SETTLE A PREVIOUS INJURY
• JEALOUSY – ENVIVOUS OF THE ACCOMPLISHMENTS OR POSSESSIONS OF ANOTHER
AND WISHES TO HUMILIATE HIM.
• REMUNERATION – A PERSON WHO INFORMS SOLELY FOR THE PECUNIARY OR OTHE
MATERIAL GAIN HE IS TO RECEIVE.
74. STEPS IN RECRUITMENT OF INFORMANT
• SELECTION – TO IDENTIFY AND RECRUIT AN INFORMANT WHO HAS ACCESS TO
SEVERAL SUBVERSIVE ORGANIZATIONS, ACCESS IS THE VALUABLE FACTOR IN
RECRUITING THE POTENTIAL INFORMANT
• INVESTIGATION – IT MUST ESTABLISHED POSSIBLE EXISTEING MOTIVES AS TO
THIS PERSON MIGHT ASSIST THE OFFICER, IF NECESSARY CONDUCT A COMPLETE
BACKGROUND INVESTIGATION TO THE POSSIBLE INFORMANT.
• APPROACH – IT MUST BE DONE IN A PLACE CONDUCIVE TO THE POSSIBLE
INFORMANT,AVOID PLACES WHICH MIGHT HAVE ANY PROBABILITY OF
COMPROMISE,APPROACH MUST BE DONE IN A FOREIGN TERRITORY
• TESTING – IT MUSR COMMERCE WITH LIMITED ASSIGNMENT WITH AGRADUAL
INTERGRATION INTO MORE IMPORTANT MISSION.