Вы находитесь на странице: 1из 10

Police Intelligence

 “If you know your enemy and know yourself, you need not fear the results of hundred battles. If
you know yourself but not the enemy, for every victory you will suffer defeat. If you know
neither yourself nor the enemy, you are a fool who will meet defeat in every battle”.-Sun tzu
 Sun Tzu- “Ping Fa”,( The Art of War)
5 kinds of secret agents
1. Agents in place
2. Double agents
3. Deception agents
4. Expendable agents
5. Penetration agents
 Moses- the first recorded formalized intelligence effort; sent 12 spies in land of canaan
1. Shamma
2. Shapat
3. Caleb
4. Igal
5. Hoshea
6. Palti
7. Gaddel
8. Gaddi
9. Aurriel
10. Sethur
11. Nahbi
12. Geuel
 Rahab (The Harlot of Jericho)- sheltered and concealed the agents of Israel
 Delilah (Impromptu Intelligence Agent of Philistine)- use sex to gain information
 Cressus of Rome (Marcus Lucinos)- use slave and freemen/fire brigade as intelligence agent
 Akbar (The Great Mogul)- employed for more than 4 thousand agents for single purpose
 Genghis Khan- used intelligence to conquer China. “Cathay” (Khitan); “Tagbach” (Tuoba)
 Frederick the Great (Father of Organized Military Espionage)- establish rules for obtaining every
grade of spy
1. Common spies- from poor folks
2. Double spies- unreliable, may be source of false information
3. Spies of Consequences- required bribe or bait for the exchange of information
4. Person who forced to undertake espionage against their will
 George Washington(Grandmaster of Intelligence)
 Hanibal
 Karl Shulmeister- Napoleon’s secret service agent and Napoleon’s Eye
 Walshingham of England- protector of Queen Elizabeth I
 Wilhelm Stieber- developed informal format on gathering data
 Alfred Redl- chief of Austro-Hungarian secret service
- Became chief through homosexual
- Committed suicide when they found out he committed treason
- Almos 500 000 agents and soldiers combined died because of his treason and
espionage episode for 13 years
 Brahma Kautilya- defeated the Nanda dynasty
- Established the first Mayurkan king
 The Ninja- “ninjutsu” means invisible- served the shogun
 Daniel Defoe- “Robinson Crusoe” and “Moll Flauders”; worked through secret services of Queen
Anne
 Belle Boyd (“Most famous woman on secret activities in the Civil War”-Joseph Hergesheimer)-
The siren of the Shenandoah; The Rebel Joan of Arc; Secesh Cleopatra
 Lord Baden Powell- founder of the Boy Scout movement

Espionage Sabotage Subversion


- collection of secret - action against material - a covert/clandestine/secret
information that a premises which may obstruct act designed to undetermined
government doesn’t want the the national security the police, military etc.
outsider know. - materials strength.
- information

Counter Intelligence Intelligence


- aspects of police intelligence to all security - end product resulting from the collection of
measures designed to safeguard information information
from espionage, sabotage, and subversion

Police Intelligence Military Intelligence


- against organize crime and other major police - concerning actual or possible enemy operations
problems including weather and terrain
- broad fields of strategic intelligence and combat
intelligence

 3 Broads Categories of Intelligence

National Intelligence Department Intelligence Military Intelligence


- intelligence on all government - required by an agency - used for the preparation and
department concerning national - for the execution of its mission execution of military plan and
policy and national security and responsibilities police plan

 3 Major Types of Police Intelligence

Strategic Intelligence Counter Intelligence Line Intelligence


- long range in nature - “defensive” - “offensive”
- intelligence information - defending the organization - immediate in nature
against criminal activities
 Concept and Classification of Police Intelligence

Information Intelligence and Information Intelligence Information


- raw data gathered from - processing the - information gathered and
observation data/information received
- may be true or false

 Types of Military Intelligence

Strategic Intelligence Combat Intelligence Counter Intelligence


- knowledge pertaining to - planning and conduct of - defending the organization
strength and weakness of tactical operation from penetration
foreign nation required for the -people, weather, enemy, and
formulation of adequate terrain(PWET)
national defense in peace and
military operation in times of
war

 General types of Counter Intelligence

Passive measures Active measures


- used for hiding and concealing information - block the enemy’s effort to gain/gather
from enemies information by espionage, sabotage, and
subversion

 4 I’s of Intelligence
1. Interest
2. Integrity
3. Ingenuity
4. Intelligence
 6 Basic Principles of Intelligence
1. Be useful
2. Be timely
3. Be flexible
4. Be thoroughly and carefully planned
5. Constant security measures
 Source- WHERE the information is obtained/gathered/gained/derived.

End products(knowledge) Activity


- results after evaluation, analysis, - product of that knowledge after collection,
interpretation and integration of raw materials processing, dissemination and usage.

 Processing of Information- steps wherin information becomes intelligence


1. Recording- reducing information into writing
2. Interpretation- significance of information
3. Evaluation- critical appraisal of information

Analysis Integration
- determination of significance of - combination of the elements stated in the
information relative to the information and assessment which other known
intelligence already known and drawing information or intelligence to form a logical
probable meaning of the evaluated features of hypothesis for enemy activities
information and the charasteristice of the mission of
the command

 General Classification of Sources of Information

Open Sources Close Sources


- obtained without clandestine operation or - not obtained openly
special effort - located inside the building or safe/vaults
- news, libraries, etc - 1%
- 99%

 Specific Classification of Sources

1. Primary Source 2. Secondary Source


- obtained directly in its original form - partially evaluated or recorded by
intermediate sources

3. Open Source 4. Regular Source 5. Confidential Source


- they made no effort to hide - provides information - information that exploited
the information regularly against the will of the enemy
- government-owned -foreign press, routine
publications activities

6. Informants
7. Informer
 Intelligence Cycle- continuous process which coordinates and integrates all the efforts of
collecting unit

1. Planning and Directing Effort


- The Unit Commander or Intelligence Staff Officer determines the required or important
information relevant to their mission
- The requirements will be distributed to the different collecting agencies by direction or request
- Involves task such as organizing MI assets, identifying personnel, logistics and communication
requirements; identifying and prioritizing and validating intelligence.
2. Collection of Information

- the collecting agency determines what specific information


is to be collected by whom and from whom
- the maneuver and positioning of intelligence assets to locations
favourable to satisfy the collection objectives
- after the collecting activity, the collected information is submitted
for processing

4. Dissemination and Use


- final phase of the cycle. Process information is disseminated into agency or
Command to effect or implement the mission.
How?
1. Spot reports- used by echelons to transmit intelligence or information in
immediate value
- most expedition means of transmission with consistent security(safest)
- answer 4w and 1h
2. Intelligence Summary- brief summary of information of intelligence
covering period of time designated by the COP.

2. Analysis of the area of operation- comprehensive study with emphasis


on weather and terrain and may include about the people in area, their
economy, sociology and religion
3. Intelligence estimate- logical and orderly examination of the intelligence
factors affecting the accomplishment of the mission

3. Processing the Collected Information


- collected information is transformed to intelligence
1. Recording- reduction of information through writings or some other form of geopgraphical representation
2. Evaluation- determination of the pertinence of the information to the operation reliability of the source

Analysis Integration
- determination of significance of information - combination of the elements stated in the
relative to the information and intelligence already assessment which other known information or
known and drawing probable meaning of the intelligence to form a logical features of hypothesis
evaluated information for enemy activities and the charasteristice of the
mission of the command
 Intelligence Files
Journal File Information/Reference File Order of Battle File
- contains a copy each - all the information for - identification strength
message or document molted possible use in the future is command and disposition of
in the journal cross indexed in this file personnel and equipment

 Reliability of Information
Reliability Accuracy
A= completely reliable 1= confirmed by other sources
B= usually reliable 2= probably true
C= fairly reliable 3= possibly true
D= not usually reliable 4= doubtfully true
E= unreliable 5= improbable
F= reliability cannot be judged 6= truth cannot be judged

 An evaluation such as A-1 would indicated complete reliable source and information that was
confirmed by other sources
T= commander and chief of a unit(observe)
U= penetration agent(report)
V= pnp or afp (report)
W= government or civilian(observe)
X= member of populace(observe)
Z= documentary

Interview Interrogation
- questioning of a person who is believed to - questioning of a person suspected of having
possess the knowledge that is official to committed of an offense
investigation - suspect
- witness

 Interrogation Techniques

1. Emotional Approach 2. Sympathetic Approach 3. Kindness


- places the subject in proper - the subject need sympathy or -simplest technique
frame of mind friendship -assumed that the suspect will
- used emotional stimuli that - gestures of friendship may confess if he is treated in a
will unburden the subject to win his cooperation kind manner
confess

4. Extenuation- consider the subject’s indiscretion/imprudence a grave offense


5. Shifting the Blame
6. Mutt and Jeff- 2 agents are employed
- Mutt assumed the suspect guilty
- Jeff is the kind hearted man
7. Stern Approach- used harsh language to make the subject gives his immediate response
8. Bluff on split pair technique- applicable when there are 2 or more person alledgely participated in
the commission of the crime.

 Methods of Gathering Information


Overt method Covert Method
- interview - elicitation
-interrogation -devices in conduct of elicitation
-instrumentation a. Approach- setting people to start talking
-research b. Probe- keep the person(subject) talking
-investigation incessantly/continuously/
-debriefing

 Elicitation- technique of acquiring information on intelligence through conversation from a


person who is aware or unaware of the specific purpose of the conversation
1. Approach
a. Flattery- “praise variants”
b. Teacher-pupil approach- the subject is treated as authority, by requesting the subject to
give opinions that could enlighten them
c. Kindred soul approach- flatter him by showing some concern for his welfare/health
d. Good Samaritan approach- offers help and assistance to the subject
e. Partial-disagreement approach- seek to produce talking by the word “I’m not sure if I
fully agree”.
f. Provocative approach- discovers a wide range of conversational
gambits/strategy/scheme
g. Teaser bait approach- the investigator gathers the sources of knowledge about to a
particular subject
h. Manhattan from Missouri approach- the investigator adopts an unbelievable attitudes
above anything.
Joe Blow approach National pride approach
- “I know the answer to everything” - readiness of a person to defend their
- attitude of being approachable in any country and its policies
field

2. Probe
a. Competition probe- effective when we used in connection to teacher-pupil approach
b. Clarity probe- used to elicit additional information in which the response is clear(repeat)
c. High pressure probe- serves to pin down the subject in specific are or point out
contradictions on what the subject has said
d. Hypothetical probe- presentation of hypothetical situation to get the subject to read the
hypothetical situation
Casing/Recconnaisance Surveillance
- “reconnoitre”(to recognize)-French - “surveiller”(to watch over)-French
- “recognoscere”Latin -“veiller”(to keep watch)
-visual inspection of area - “vigilane”-Latin
-surveillance/observation of a building, place, or - secret/clandestine/covert observation of person
area to determine its suitability for intelligence places, and vehicles for the purpose of gaining
- intermittent(mission or operational) information
- specific objectives - continuous
- general objectives

 Recconnaisance
Strategical Recconnaisance Tactical Recconnaisance
- performed by squadrons(unit in air force) - lots of troops of all arms
- send forward and patrols to find enemy - contact with the enemy or for self protection

 Methods of Shadowing by foot


One man shadow Two man shadow Three man shadower/ABC
method
- most common - more advantageous
- the shadower followed the because it permits
subject and make notes immediate change
- record all persons
encountered, places visitesd,
time spent in various places
and routes taken

 Types of Surveillance
Moving Fixed Undercover Observation and
assignment Description
-tailing/shadowing -stake out - roping Observation-
-conducted when the - when the subject is -investigator assumes complete and
subject(person, place, not expected to move different identity in accurate awareness by
activity) move from order to obtain an individual of his
one place to another information surroundings
1. Long Range- Description- factual
provide reliable, reporting on what he
accurate, and is observed
continuing access to 1. Sketching-
information putting ideas in
2. Short Range- may an accurate
vary considerable pictorial form
from one time -methods
interview to a a. On the Spot-
seperate sketch or draw the
objects on are
anytime
b. Memory sketch-
observer can only
pass by or stay for a
very short time
c. Semi-memory
sketch- the area was
very strict but does
not prevent the
observer to take
notes on what he
observed

 Types of Surveillance
According to Intensity and Sensitivity According to Methods
1. discreet= the subject is unaware the he is 1. stationary- fixed position
under surveillance/observation 2. moving- followed the subject from one
2. close= subject is aware place to another
3. loose= applied regularly or not 3. technical- used of communication and
= subject is not kept under constant electronic gadgets
observation
4. Harassment= suspected criminals are under
surveillance wherein you intimidate/harass
him

 Definition of Terms
1. Pre surveillance- conference or meeting before the surveillance is conducted
2. Surveillant- one who observed place
3. Undercover man/agent- person trained to observe and penetrate certain organizations
4. Liaison Program- assignment of trained personnel to other in order to gain information
Safe House Drop
- place where police/undercover meet his - secure place where undercover, informer or
action agents for debriefing or reporting informant leaves a note for the action agent,
purposes supervisor

Convoy Decoy Contact


-accomplice or associate to the - person almost similar to -any person whom the subject
subject subject used to avoid or elude picks or deals with while he is
surveillance under surveillance

Made Lost
-subject becomes aware that he is under -observer does not know whereabout of their
observation subject
-identified the observer - subject has avoided the surveillance

 Cover- means of an individual, group or organization conceal the true nature of its act and or
existence from the observer
- any device used by person or organization to insure that onw who do not
have the right to know must not be aware for the real purpose of the mission
Cover Story Cover Support
- biographical data through fictional that will -primary mission to support the cover story
portray the personality of the agents they
assumed
 4 types of cover
Natural Cover Artificial Cover Cover within a Cover Multiple Cover
- using the true - fabricated - used of secondary - any cover you wish
background of the biographical data cover in case of
undercover agent adopted for the compromise in which
purpose involves admission and
confession for a lesser
crime

 Classification of Clandestine/secret/covert agent


Principal agent/Agent handler Action agent Informant net
- managerial agent - doer of the clandestine task - controlled group of persons
- leader of the agent network who worked through the
direction of the agent handler

 Informant net
1. Espionage(counter intelligence agent)- primary and most important human collector
2. Propagandist- actions to mold/build/design the attitudes, opinions, and actions of an
individual
3. Saboteur- one who undertakes/take on/accept/handle positive actions against unfriendly
power
4. Guerilla- member of paramilitary group
5. Strong man- provide special protection during clandestine operation
6. Provocateaur- agent who induces an opponent to act to his own
detriment/harm/damage/hurt by discreeting/charging/guarding himself or revealing his
true purpose
7. Cover action agent- fully recruited agent who is in senior position who have not an ability to
exert influence from foreign goverment

Вам также может понравиться