Вы находитесь на странице: 1из 12

Police Intelligence Reviewer

By: Dean Bimboy Cueno


Foundation University-Dumaguete City

Police Intelligence

It is the end product resulting from the collection, evaluation, analysis, integration, and interpretation of all
available information regarding the activities of criminals and other law violators for the purpose of affecting
their arrest, obtaining evidence, and forestalling them to commit crime.

Historical Backgrounds

Delilah - a biblical personality, she was able to gain information by using her beauty and charm, she was
responsible for the fall of Samson, a known Israelite leader and enemy of the Philistines.

Frederick The Great - Father of organized military espionage. This Prussian master was able to classify his
agents into four classes: common spies, double spies, spies of consequence, and persons which are
involuntarily lead to undertake espionage.

Alexander The Great - A Greek Conqueror, was able to identify those who are disloyal to him by ordering the
opening of communication letter of his men and was successful in uplifting the esprit de corps and morale of
his men. He devised the first letter sorting and opening to obtain information.

Gen. Romano Sertorius- the Roman commander who possessed a white fawn and allowed it to become
widely known that he derived both secrets and guidance from the fawn. His intelligence agents credited their
information to the supernatural power of animals.

Abu'l-Fath Jalal-ud-din Muhammad Akbar- the “Great Mogul” and sagacious master of Hidustan employed
more than 4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon it.

Napoleon Bonaparte- according to him “one spy in the right place is equivalent to 20,000 men in the field.”
He maintained military intelligence and secret political police service in all over Europe.
Genghis Khan- a Mongol who used intelligence to conquer China and invade Cathay. He instructed his
generals to send out spies and used prisoners as sources of information. They collected information on the
weaknesses of rivals by posting themselves as disguised merchants.

Hannibal- known as one of the greatest Roman enemy who ruled and conquered Rome for 15 years by
obtaining common street knowledge by posing as a beggar to gather first hand information on the pulse of
the people. His famous feat was at the outbreak of the Second Punic War when he marched an army which
included was elephants from Iberia to Northern Italy. Military historians consider Hannibal as the “father of
strategy” because his greatest enemy, Rome, came to adopt the elements of his military tactics in its own
strategic arsenal.

Julius Caesar - in his time, the staff of each legion includes the speculators who served as an information
collecting agency. The Speculators were the first intelligence personnel to appear in a military organization.
Military success of the Romans was aided by the communication system. Made use of pigeons as carrier
which made intelligence transmittal very fast.

Karl Schulmeister - known as Napoleon's Eye, he was credited for establishing counter-intelligence against
spies. He is a master of deceit who used black mail to obtain vital information to identify the enemy's of
Napoleon.

Alfred Redl- one of the most brilliant, homosexual intelligence agent. A double spy who while working
as intelligence director of Austria and Hungary, spied for the Russians. In 1913, his treason was
discovered and he was forced to commit suicide. His treason lead to the death of 500,000 agents and soldiers
combined in his 13 years espionage episode.

Sun Tzu - author of the art of war. A Chinese philosopher who takes into account practical view in battle.
According to him foreknowledge cannot be elicited from spirits nor from gods nor from analogy with past
events nor from calculations. He further asserted that if you know thy enemy and know thyself, you need
not fear the results of a hundred of battles.

Principles of Intelligence

1. Objectivity- it is a basic intelligence concept that there be unity between knowledge and action.
Intelligence must be adapted to the needs of the decision.
2. Interdependence- intelligence is artificially subdivided into component elements to insure complete
coverage, eliminate duplication, and to reduce the overall task or manageable sizes. Each subdivision
remains as essential part of unity which will contribute proportionately to the end result.
3. Continuity- intelligence must be continuous. What happens today could be studied in the light of
what has happened before which in turn would enable us to predict the shape of the things to come.
4. Communication- intelligence must be communicated to all the decision makers in the manner that
they will understand and puts intelligence to its most effective use.
5. Usefulness- intelligence is useless if it remains in the minds or in the files of its collectors. The story
must be told.
6. Selection- an intelligence should be essential and pertinent to the purpose at hand.
7. Timeliness- intelligence must be communicated at the appropriate time to permit its most effective
use.

Notable Intelligence Organizations

1. Inter-Service Intelligence, (ISI) Pakistan


The Directorate for Inter-Services Intelligence (Inter-Services Intelligence) is the premier
intelligence service of Pakistan, founded in1948. It has responsibilities of collecting information of
critical national security and intelligence assessment for Government of Pakistan.

2. Central Intelligence Agency, (CIA) United States


Central Intelligence Agency (CIA) is most prominent and familiar among other United States National
Security Agency (NSA), Defense Intelligence Agency (DIA) and Federal Bureau of Investigation (FBI).
CIA has been founded in 1947, considered as an independent and top agency in the whole world.The
prime functions includes acquiring and analyzing information about foreigners, public relations for
required data and underground operations at the direction of the president of United States. The
agency headquarter is located in Langley, Virginia, a few miles west of Washington.

3. Secret Intelligence Service, (MI6) United Kingdom


MI6 formally known as the Secret Intelligence Service was created just before the World War I for the
possible reach the activities of the Imperial German government. MI6 has been closely involved in
various conflicts in 20th and 21st centuries but not officially acknowledged till 1994. The secret front
line” of Britain`s national security has responsibilities to keep close eye on internal and external
terror activities, organizations and countries which could harm national defense and state security.

4. Federal Security Services, (FSB) Russia


The Federal Security Service of the Russian Federation (FSB) is the principal security agency of the
Russian Federation and the main successor agency to the USSR’s Committee of State Security (KGB).

5. Bundesnachrichtendienst, (BND) Germany


The Bundesnachrichtendienst (BND), Federal Intelligence Service was established prior to World
War II to spy the enemies’ strategies and plans, headquartered in Pullach near Munich. The main
objective of Agency is surveillance of sensitive issues referred to domestic and foreign intelligence.
6. Australian Secret Intelligence Service (ASIS), Australia
The Australian Secret Intelligent Service (ASIS) agency has been founded in 1951 by the executive
power of the Commonwealth, the mission of ASIS is ‘Protect and promote Australia’s vital interests
through the provision of unique foreign intelligence services as directed by Government’.

7. Ministry of State Security (MSS), China


The Ministry of State Security (MSS) is the intelligence-security agency of the People’s Republic of
China, the headquarters located near the Ministry of Public Security of the People’s Republic of China
in Beijing. MSS is working parallel to the public security bureaus but has non-state security matters
often collaborate both for the large extent. The Agency was established in 1937 which has been
founded in 1949 by Communist Part of China, collected antithetical information for civil war in China.

8. The Institute For Intelligence and Special Operation (MOSAD), Israel


MOSSAD is the intelligence agency of Israel, most active organization in the country committed to
collect intelligence involved in counter-terrorism and various covert operations. The director of
agency is bound to report activities to the head of state Prime Minister of Israel.Contrary to others
MOSSAD is considered as most powerful agency due to scarce widened resources, the undercover
agents has been present in various countries to collect the valuable information for the country.
Mossad’s most notorious unit is the “Special Operations Division” or Metsada which has involved in
many assassinations and secret operations worldwide.

9. General Directorate For External Security - France external intelligence agency, operating under
the direction of the French Ministry of Defense.

10. National Intelligence Coordinating Agency (NICA) is the primary intelligence gathering and
analysis arm of the Philippine government, in charge of carrying out overt,covert,
and clandestine intelligence programs. Its motto is: Kaalaman ay Kaligtasan (translated: "Intelligence
is Security").[Presently, NICA is in close coordination with the CIA, Mossad, Secret Intelligence
Service and intelligence services of ASEANcountries to counter the threat of terrorism.

Types of Police Intelligence/General Activities of Police Intelligence

1. Police Strategic Intelligence- is processed information which is long ranged in nature. It is used to
describe and define criminals and their activities as well as provide insight of their Modus Operandi.
2. Police Line Intelligence- an intelligence that is immediate in nature. Such information must be
updated to provide effective aids in police operations.
3. Police Counter Intelligence- it is an activity which is intended to build an organization against the
enemy by ensuring loyalty of its members through stringent background investigation. It also seeks
to deny the enemy of any information consisting of passive and active intelligence measures. This is
also known as Negative Intelligence. - phase of intelligence covering the activity devoted in
destroying the effectiveness of hostile foreign activities and the protection of information against
espionage, subversion and sabotage.
4. National Intelligence- it is the integrated product of intelligence developed by all governmental
branches and departments concerning the broad aspect of national security and policy. It is used to
coordinate all the activities of the government in developing and executing integrated and national
policies and plans.
5. Undercover Works- is an investigative process in which disguises and pretext cover and deception
are used to gain the confidence of criminal suspects for the purpose of determining the nature and
extent of any criminal activities that maybe contemplating or perpetuating.

Functional Classification of Police Intelligence

1. Criminal Intelligence (CRIMINT)- production of intelligence essential to the prevention of crimes


and the investigation, arrests, and prosecution of criminal offenders.
2. Internal Security Intelligence (INSINT)- refers to the knowledge essential to the maintenance of
peace and order. Keeping peace within the borders of a sovereign state or other self-governing
territories, generally by upholding the national law and defending against internal security threats
3. Public Safety Intelligence (PUSINT)- refers to the knowledge essential to ensure the protection of
lives and properties.

General Qualifications of an Intelligence Officer

1. College graduate
2. Passed prescribed test for intelligence officer
3. Passed background investigation
4. Good moral character
5. Loyal to the Republic of the Philippines
6. No undesirable traits (gambling, drug addiction, etc)
7. Passed the standards set by the screening committee

Phases of Recruitment

1. Selection- process of choosing from available personnel the most qualified operative fitted for police
intelligence work.
2. Investigation- the process of determining the degree of qualification, personal background of
prospective agents.
3. Testing- a series of actual and theoretical assignment to determine the intellectual capacity of the
prospect.
4. Appointment- issuance of order as an operative intelligence agent in a certain unit.

COUNTER INTELLIGENCE

Types of Counter Intelligence

1. Passive CI Measures - protection of classified and sensitive information against unauthorized access
through secrecy communication security and other safeguards.

2. Active CI Measures - are those measures which seek actively to block enemies effort to gain information
or engage in espionage, subversion and sabotage.

Categories of Counter Intelligence Operations

1. Military Security - it encompasses the measures taken by a command to protect itself against espionage,
enemy operation sabotage, subversion, or surprise.
2. Port Boundary and Travel Security - application of both military and civil security measures for
counter-intelligence control at point of entry and departure, international borders and boundaries.
3. Civil Security - active and passive counter-intelligence measures affecting the non-military nationals
permanently or temporarily residing in an area under military jurisdiction.
4. Special Operations - counter subversion, sabotage and espionage.
5. Combat Intelligence- A kind of intelligence required by the commander to provide for planning and
conduct tactical and administrative operation in counter insurgency. This pertains to knowledge of People,
weather, enemy and Terrain (PWET) used in planning and conducting tactical and administrative operation
in a counter insurgency.

COUNTER INTELLIGENCE OPERATION


Is also called CI investigation. It is an activity that constitutes the value of the CI workload, and includes
specific investigation of individual and incidence which for the most part are conducted in an overt but
discreet manner.
Mission

1. Detection- identify the threat


2. Evaluation- analyzing the data plan
3. Counter action and prevention- recommend counter measures in neutralizing the target

Categories of CI Operation

1. Counter Human Intelligence (HUMINT)- seeks to overcome enemy attempts to use human sources
to collect information or to conduct sabotage and subversion which includes CI Special Operations,
Liaison, Counter Security, CI Screening.
2. Counter Imagery Intelligence (IMINT)- includes action taken to determine enemy signal
intelligence and related capabilities and activities. These actions include surveillance radar, photo
thermal and infrared systems. This primarily includes interpretation of photographs from aerial
units. Sometimes this is termed as PHOTINT.
3. Counter Signal Intelligence (SIGINT)- determines enemy signal intelligence and related electronic
warfare capabilities. It also assesses friendly operations to identify patterns, profiles, and develop
and recommend counter measures.

THE INTELLIGENCE CYCLE

Phases of Intelligence Cycle (PCPAD)

1. Planning and direction


2. Collection
3. Processing
4. Analysis and production
5. Dissemination

PLANNING

The intelligence officer must have a thorough knowledge of the available sources of information, the
collecting agencies and type of information the latter can provide.

Priority Intelligence Requirement- an item of intelligence or information of the characteristics of the area of
operations and the enemy which the commander feels he needs before he can reasonably arrive at a decision.
Also known as Essential Element of Information.

Examples:

1. Selection of collecting agencies


2. Collection plan

Information Requirement- information regarding the enemy and its environment which needs to be
collected and processed in order to meet the PIR of a chief.

Examples:

1. What are the capabilities and vulnerabilities of the enemy?


2. What is the physical characteristic of the probable area?

COLLECTION

The intelligence officer must have thorough knowledge of the available sources of information and collecting
agencies and the type of information they can provide and consider the following:
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or techniques in collection
e. Ensure timely collection

Methods of Collection (overt and covert intelligence)

1. Overt- open sources. 99% of the information collected are coming from open sources.

Examples: Information taken from enemy activity, civilians, captured documents, etc.

2. Covert- closed/secret sources. Only 1% of information are obtained from covert


operation.

Examples: surveillance, elicitation, surreptitious entry, etc.

Persons as Sources of Information

Informant Net- a controlled group of people who worked through the direction of the agent handler.

Informants (assets)- people selected as sources of information which could be voluntary or in


consideration of a price.

a. Informant- gives information without any consideration.


b. Informer- gives information in exchange of a reward or a price.

Types of Informants

1. Anonymous – those who gives information through telephone with the hope that the informant
cannot be identified.
2. False Informant - reveals information of no consequences or value.
3. Self-Aggrandizing - moves around the center of criminals delight in surprising the police about bits
of information.
4. Double Crosser - wants to get more information from the police more than what he gives.
5. Special/legitimate informant- those who gives information concerning specialized cases. Usually
they are regarded with a special treatment by the operatives.
6. Voluntary informant- gives information freely and willfully as a witness to a certain act.
7. Recruited informant- a person who is selected, cultivated, and developed into a continuous source
of information.
8. Rival elimination informant- an informant who gives information to eliminated rivalry.
9. Mercenary informant – informant who gives information for remuneration or compensation.

Types of Agents Used in Collecting Information

1. Agent of Influence - agent who uses authority to gain information.


2. Agent in Place - agent who has been recruited within a highly sensitive target who is just beginning a
career or has been long insider.
3. Penetration Agent - agent who have reached the enemy, gather information and able to get back without
being caught.
4. Expendable Agent - agent who leaks false information to the enemy.
5. Double Agent - an enemy agent who has been taken into custody turned around and sent back where he
came from as an agent of his captors.

Mole - also known as sleeper agent. Tasked with monitoring an organization or individual. A mole can spend
years in the same place only responding to missions when assigned. They are trained to be visible but to keep
their motives unknown.
In any clandestine operation, the upper echelon of a spy bureaucracy consists of:

1. Regional desk officer- who oversees all HUMINT operations in that region of the world.
2. Watch officers- who staffs a 24 hour crisis center.
3. Counterintelligence officer- who oversees clandestine meetings between officers and agents.
4. Report officer- who acts as a liaison between officers in the field and analysts at headquarters.

The spies themselves are mostly considered as traitors, and traitors come in amazing variety of forms:

1. Inadvertent spies- people with loose lips, careless security attitudes.


2. Defectors- people fleeing the rule of their own country.
3. Walk-ins- people who look for an extra income.
4. Undercovers- people who have made the plea bargain with law enforcement.
5. Recruits- people tricked, bribed, or blackmailed.
6. Double agents- people caught spying against you.

False Flag- a pretension on the part of the case officer where he holds a nationality whom the target expects
to be friendly to the targets own interest.

Example: a Chinese businessman thinks he is working for the Republic of China when he is really spying for
Taiwan.

Dead Drop- a place usually a dumpster or public garbage can where materials are discarded and later picked
up.

Techniques in Blackmailing

1. Black mail marketing- targets are threatened with exposure for buying contraband goods and
services in the black market.
2. Currency violations- targets are threatened with exposure for violating currency laws of the host
nation.
3. Security violations- targets are threatened with exposure for violating no trespassing zones or
being on government property of the host nation.
4. Criminal law violations- targets are threatened for prosecution for various criminal offenses that
they have been set up in.

PROCESSING/ANALYSIS

Steps in Processing

1. Collation- organization of raw data and information into usable form, grouping similar items of
information so that they will be readily accessible.
2. Recording- is the reduction of info writing or some other form of graphical representation and the
arranging of this into groups of related items.
3. Evaluation- examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source of information and its credibility.
4. Analysis - is the stage in which the collected information is subjected to review in order to satisfy
significant facts and derive conclusions there from.
5. Integration - the combination of the elements isolated analysis with other known information
related to the operation.
6. Interpretation - process of determining the significance of new information and its meaning.
7. Deduction- the formulation of conclusions from the theory developed.

Pertinence - does it holds some value to current operation.


Reliability - judging the source of information or agency
Credibility - truth of information
Accuracy of Information (CODE: CPPDIT)
1 - Confirmed By Other Sources
2 - Probably True
3 - Possibly True
4 - Doubtfully True
5 - Improbable
6 - Truth Can Not Be Judged

Reliability of Information (CODE: CUFNUR)


A - Completely reliable
B - Usually Reliable
C - Fairly Reliable
D - Not Usually Reliable
E - Unreliable
F - Reliability Cannot be Judged

Evaluation of Source of Information


T- Direct observation by Commander/Chief of Unit
U- Report by resident agent
V- Report by PNP/AFP Troops
W- Interrogation of captured enemy
X- Observation of government/civilian employee
Y- Member of the populace
Z- Documentary

Example: SPO3 Juan Cruz evaluated the information gathered as “completely reliable, source probably true”.
What is the information`s evaluation rating?

Answer: A-2
PO1 Juan Cruz submitted an intelligence report evaluated as B-5. What is the interpretation of this evaluated
intelligence report?

Answer: Information is usually from a reliable source and is impropable.

DISSEMINATION
Processed information or intelligence data are disseminated to end users, common methods of disseminating
intel data are conferences, briefing and person to person exchanges.In this process, consider the factors of
timeliness, correctness and security.

KINDS OF COVERT OPERATIONS

1. SURVEILLANCE - is the covert, discreet observation of people and places for the purpose of obtaining
information concerning the identities or activities of subjects.

Surveillant - is the plainclothes investigator assigned to make the observation.


Subject - can be a person, place, property and vehicle, group of people, organization, or object.
Safe house - refers to place where agents meet each other for purposes of debriefing and reporting.
Decoy - a person or object used by the subject in an attempt to elude the surveillant.
Convoy - an associate of the subject who follows him to detect surveillance.
Log - chronological records of activities that took place in the establishment under surveillance.
Made- when the subject under surveillance becomes aware that he is under observation.
Burn out- identity of the undercover has been know by the subject.

Difference between surveillance and reconnaissance


1. Surveillance is continues while reconnaissance is intermittent (mission or operation)
2. Reconnaissance has specific objectives while surveillance has general objectives.

Methods of Surveillance

1. Stationary Surveillance - also referred to as Fixed or Stakeout Surveillance - is used when you
know or suspect that a person is at or will come to a known location, when you suspect that stolen
goods are to be dropped or when informants have told you that a crime is going to be committed.
2. Technical- surveillance by the use of communications and electronic hardware, gadgets, etc.
3. Moving Surveillance/Shadowing/Tailing - simply the act of following a person.

Forms of Shadowing/Tailing

1. Loose Tail - employed where a general impression of the subject's habits and associates is required. It can
be applied frequently or infrequently, or in varied occasions.
2. Rough Shadowing - employed without special precautions, subject maybe aware of the surveillance,
employed also when the subject is a material witness and must be protected from harm or other undesirable
influences.
3. Close Tail - extreme precautions are taken against losing the subject is employed where constant
surveillance is necessary.

2. CASING - it is the careful inspection of a place to determine its suitability for a particular operational
purpose.

Information desired in Casing

1. Area condition and habit- whether the place is a residential, commercial, highly urbanized, or rural.
2. Active opposition- means all organs of every security system whose task is to prevent intelligence
activity in a given area.
3. Disposal plan- disposal of the information in case of possible compromise.
4. Escape and evasion- the exit planning in case of emergencies from immediate focal point to the
general area.

3. ELICITATION - the process of extracting information from a person believe to be in possession of vital
information without his knowledge or suspicion. It is a system whereby information of intelligence value is
obtained through the process of direct intercommunication with one or more parties who are unaware of the
purpose of the conversation.

Two basic Devices

1. Approach – used to start a conversation or to shift the direction of an existing conversation.


a. Flattery

Teacher/Pupil- make the person express topics about him. Most people like to talk about themselves.
Kindred Sole- “misery loves company”. People express a need for recognition, particularly the lonely, the
neglected, the vain and those with feelings of inferiority.
Good Samaritan- do good deeds or favors for the source.
Partial- Disagreement Approach- seeks to produce talking by the word “I am not sure if I fully agree”

b. Provocation (ex. Convince me why you hate he current government administration)

Teaser-bait – make the source believe you know more than he knows on the topic.

Joe blow- purposely disagree with the source to induce anger.


Manhattan from Missouri Approach- the elicitor adopts an unbelievable attitude above anything. He
questions all statements and oppositions.

National Pride Approach- natural propensity of all persons to defend their country and its policies.

2. Probes- an attempt to obtain more information after the subject gives a vague, incomplete general
response. It is used to sustain the conversation.

Completion- by inserting bits of factual information on a particular topic, the source may be influenced to
confirm and further expand on the topic.

Clarity- a request for additional information where the source`s response is unclear. Like “whay do you mean
by….”

Hypothetical- can be associated with a thought or idea expressed by the source. Many people who might not
make a comment concerning an actual event may express an opinion on a hypothetical situation.

High Pressure Probe- it serves to pin down a subject in a specific area or it may be used to point out
contradictions in what the subject has said.

4. EMPLOYMENT OF TECHNICAL MEANS

Bugging - the use of an equipment or tool to listen and record discreetly conversation of other people.

Wiretapping - a method of collecting information through interception of telephone conversation.

5. TACTICAL INTERROGATION - it is the process or method of obtaining information from a captured enemy
who is reluctant to divulge information.

Interrogator- person who does the questioning


Interrogee- a person subjected for interrogation.

Interrogation Techniques

a. Open Technique- the interrogator is open and direct in his approach and makes no attempts to
conceal the purpose of the interrogator. This is best employed when the interrogee is cooperative.
b. Common interest technique- the interrogator exerts effort to impress the interrogee of their
common interest. The interrogator points out the advantages if interrogee will cooperate.
c. Record file or “we know all” technique- the interrogator may ask about a subject, if the interrogee
refuses to cooperate, the interrogator may provide the answer in order to impress the interrogee
that the interrogator knows him very well.
d. Exasperation- effectively employed against hostile type of interrogee. Subject is placed in a longer
period of interrogation without rest or sleep. The interrogator permits the source to go to sleep and
subsequently awaken for another series of repeated questioning. After many repetitions the
interrogee will be exasperated and will finally cooperate hoping that he can be allowed to rest or
sleep. The purpose is to bore the interrogee.
e. Opposite personality technique (mutt and Jeff)- two interrogators playing opposite roles.
f. Egotist technique- employed to an interrogee who displays insecurity. The interrogee is
complimented in hopes of getting him to admit certain information to gain credit. Described him as
the best effective source who have been looked down upon by his superiors.
g. Silent technique- employed against nervous or the confident type of interrogee. Look out the
interrogee squarely in the eye with sarcastic smile. Force him to break eye contact first. he may ask
questions but the interrogator must not answer. Patience is needed. When the interrogator is ready
to break silence, he may do so with a quietly and non chalantly idea that the interrogee is surely
being part of the crime.
h. Question Barrage or rapid Fire Questioning- intended to confuse the interrogee and put him into a
defensive position. The interrogee become frustrated and confused, he will likely reveal more than
he intended.

6. OBSERVATION AND DESCRIPTION - it is a method of collecting information by just merely using the
different senses.

85% of our knowledge is gathered through sight


13% of your hearing
2% through the other senses

7. POTRAIT/PARLE- it is a means of using descriptive terms in relation to the personal features of an


individual and it can be briefly described as a word description or a spoken picture.

8. UNDERCOVER OPERATION - also called Roping - is disguising one's own identity or using an assumed
identity for the purpose of gaining the trust of an individual or organization to learn secret information or to
gain the trust of targeted individuals in order to gain information or evidence.

Cover - it refers to the changing, forging, or falsifying agent' real personality including but not limited to
things, location, job and others that will be used in undercover assignments.

Types of Cover
1. Artificial -altering the background that will correspond to the operation.
2. Multiple - includes different cover
3. Natural - actual or true background

Coding - the changing of message from plain clear text to unintelligible form, also known as encrypting.

Decoding - transforming of coded message into plain text, also known as decrypting.

Cryptography - arts and science of codes and ciphers.

Crypto Analyst - refers to those persons who break intercepted codes.

Cryptographer - refers to a person who is highly skilled in converting message from clear to unintelligible
forms by use of codes and ciphers.

SECURITY CLEARANCE - is a certification by a responsible authority that the person described is clear to
access and classify matters at appropriate levels.

Interim Clearance - effective for 2 years.


Final Clearance - effective for 5 years.

Classified- to assign information by one of the four security classifications.


Compromise-means lose of security.
Compartmentation- the grant of access to classified matter only to properly cleaved persons in the
performance of their official duties.
Declassify- removal of security classification.
Reclassify- act of changing the assigned classification number.
Upgrading- act of assigning to a matter of higher classification to a classified document.
Classifications of Documents
1. Top Secret - calls for the utmost degree of protection, Unauthorized revelation of this materials and
information will cause extremely severe damage to the nation, politically, economically, or militarily.
Examples: political negotiations, military defense, war strategic plans, etc.

2. Secret - unauthorized disclosure of this documents or things may put at risk the national security, cause
serious injury to the reputation of the nation.
Examples: info about intelligence operations, troop movements, order of battle, etc.

3. Confidential - Unauthorized revelation of which may be injurious to the reputation of the nation or
governmental activity or will cause administrative humiliation or unnecessary injury.
Examples: plans of government projects, routine intelligence reports, personnel records, etc.

4. Restricted - this are information which should not be published or communicated to anyone except for
official purposes. These records are daily files, routine in nature even if lost or destroyed will not affect
operation or administration.
Examples: blotters, daily logbook file, etc.

Security Measures and Operations in Relation To Intelligence


1. Physical Security - the broadest type of security that is concerned with the physical measures designed to
safeguard personnel and prevent unauthorized access to equipment, facilities, materials, documents and to
protect them from espionage, sabotage, damage, or theft.

2. Communication Security - the protection resulting from the application of various measures which
prevent or delay the enemy or unauthorized person in gaining information through communication. This
includes transmission, cryptographic and physical security.

3. Documentary Security - protection of documents, classified matters and vital records from loss, access to
unauthorized persons, damage, theft and compromise through proper storage and procedure.

4. Personnel security - the sum total procedures followed, inquiries conducted and criteria applied to
determine the work suitable to a particular applicant or the retention or transfer of a particular employee

Personnel Security Investigation - is an inquiry into the character, reputation, discretion, integrity, morals
and loyalty of an individual in order to determine a person's suitability for appointment and access to
classified matters.

Types of PSI
1. Local Agency Check - refers to the investigation of the records and files of agency in the area of principal
residence of the individual being investigated: Mayor, Police, Fiscal where the individual is a resident.
2. National Agency Check - it consist of LAC supplemented by investigation of the records and files of the
following agencies: PNP. ISAFP, NBI, CSC, Bureau of Immigration and other agencies.
3. Background Investigation - a check made on an individual usually seeking employment through subject's
records in the police files, educational institutions, place of residence and former employers.

Complete Background Investigation - a type of BI which is more comprehensive, it consist of detailed


information regarding the subject.

Partial Background Investigation - investigation of the background of an individual but limited only to
some of the circumstances.

“If you have questions- ASK; If you don’t understand- SPEAK; It`s okay to let people know that you don’t know” ----Cueno, 2016

Вам также может понравиться