SlideShare uma empresa Scribd logo
1 de 77
‘’POLICE
INTELLIGENCE’’
PREPARED BY:
JHON MARK C. CUARTERO, RCRIM
1ST PLACER
CLE DEC. 2021 (IV-A)
• INTELLIGENCE was derived from the latin word INTELLIGERE which
means to “pick out or discern”
• ORGANIZATION – Institution composes of person who pursue
preparing plans or formulating policies.
• Activity – The organized effort to collect information, to assess it
little by little and piece it together until it forms larger and clear
patterns.
• Product – The end product resulting from the collection,
evaluation,analysis, integration and interpretation of all available
information which may have immediate or potential significance to
development and execution of plan ,policies and programs for the
users
3 SOURCES OF INFORMATION
•Regular Source
•Cultivated
•Grapevine
• Sun Tzu – He is traditionally to be the author of “The Art of War” an
extremely influential ancient Chinese book on Military strategy
“Know yourself and your enemy. If you know yourself and not
the enemy for every battle you will be a foul who will meet defeats, but if
you know yourself and the enemy, you need not fear the result of a
hundred battles” In his book. “Art of War”
Delilah – A Biblical personality who was able to gain information by using
her beauty and charm. She was responsible for the fall of Samson a
known Israelite leader who terrorized the Philistines.
 Sir Arthur Wellesly – One of the leading military and political figures of
the 19th century. He often referred to as the “Duke of Wellington”
He is regarded as the “Greatest Military Spymaster of All time”
He live by the motto “All the business of war is to find out what you
don’t know by what you do”
• Frederick the Great – “Father of Organized Military Espionage” He divided
his agents into four classes
>Common Spies – Recruited among poor folk, glad to earn small sum or to
accommodate a military officer.
>Double Spies – The low informers and unreliable renegades of value
chiefly in spreading false information to the enemy.
>Spies of Consequences – Courtier and noblemen, staff officers and kindred
conspirators always requiring a considerable bribe or bat
>Intimidated Spies – Persons who are forced to undertake espionage
against their will.
Alexander the Great – A renowned Greek conqueror had his share of
advance information when rumors of discontent circulated from among
the ranks of his men and he was able to indentify those disloyal ones by
ordering and was successful in curtailing the decline of Esprit De Corps and
• Sir Francis Walsingham of England – Protector of Queen Elizabeth I who
organized the secret police and established a spy network to detect fleet
movement of enemies of the British Empire particularly the Portuguese. He is
Regargded as the “1st Great Spymaster” a ruthless in the cause he was
responsible for the assassination, murdering and execution of people who
covertly betrayed the queen.
• Karl Schulmeister – He was an Austrian double agent for France during the reign
of NAPOLEON I
>He is famous as “NAPOLEON’S EYE”
>He acted as a General in Napoleon’s army, undertook espionage missions that
took him into England and Ireland ans was appointed commissioner of police for
Vienna during Napoleon’s 2nd occupation in 1809
>He was credited for establishing counter intelligence conducted against spies.
>He is a MASTER OF DECEIT who used black mail to obtain vital information
pertaining to the personality and Identity of the enemies of Napoleon during the
18th century .
• Joseph Petrosino – Pioneer on the fight against organized crime. The
various crime fighting techniques that Petrosino pioneered during his law
enforcement career are still practiced by various in the fight against crime.
> Member, New York Police Department in early 1900 he was the head of
the Italian Squad
> He is credited to smash the Black Society
Joseph Fouche – The French statesman Joseph Fouche (1759-1820) Served
as minister of police under Napoleon and was influential in the return of
Louis XVIII to the throne in 1815.
Admiral Yamamoto – He was a Japanese Marshal Admiral and the
Commander-in-Chief of the combined fleet during World War II, a graduate
of the imperial Japanese Naval Academy.
> He was the Commander-in-chief during the decisive early years of the
pacific war and so was responsible for the major battles such as Pearl Harbor
and Midway.
• Herbert Yardly – He was an American cryptologist best known for his
book “ The American Black Chamber”
> Yardly began his career as a code clerk in the U.S State Department. He
accepted a signal corps reserve commission and served as cryptologic
officer with the American Expeditionary forces in France during World
War I.
>His career in cryptology began with his work in the code room, as he
broke the U.S government codes that crossed his desk.
> Head of the MI-8 the forerunner of the Top Secret National Security
Administration a.k.a Black Chamber a Cryptanalytic Organization.
Napoleon Bonaparte – He was a French military and political leader
who rose to prominence during the latter stages of the French
Revolution and its associated wars in Europe.
>”One Spy in the right place is worth 20,000 men in the field”
• Akbar – Known as Akbar the Great was Mughai Emperor from 1556
until his death.
> The “Great Mogul” and wise master of Hindustan employed more
than 4,000 agents for the sole purpose of bringing him the truth that
his throne might rest upon it.
Battle of Midway – One of the most important naval battles of the
Pacific Campaign of World War II
> June 1442 the turning point of the Naval in the Pacific the victory
gained by the Americans was due to the disrupted messages from the
imperial Japanese Navy.
> Military Historian John Keegan called it “The most stunning and
decisive blow in the history of naval warfare”
> It was Japan’s worst naval defeat in 350 years.
• Julius Caesar – During his time the staff of each legion includes “Ten
Speculators” who served as an information collecting agency.
> “Speculators” were the 1st intelligence personnel to appear definitely
in a military organization.
Wilhelm Johann Karl Eduard Steiber – Otto Von Bismarck’s master
spay and director of the Prussian Feldgendarmarie.
>Stieber was both an agent of domestic surveillance and an extermal
agent.
>Along with Joseph Fouche he invented modern information
gathering.
> He is known as the Prussia’s “King of Sleuthhounds” as minister of
police he studied the use of propaganda and censorship as well as
utilizing statistical intelligence accounting.
• Alfred Redl – He was one of the leading figures of Pre-World War I
espionage
> His term in office was marked by innovation and he used very high
technology for the time to ensnare foreign intelligence agents.
> A homosexual Spy
> His treason activities were discovered and compelled to commit suicide
> His spying led to the death of over 500,000 agents and soldiers combined
in his 13 years episode as a spy.
 Sir Samuel Luke – Chief scout of Oliver Cromwell who was able to dethrone
King Charles I in British Civil War of 1640’s.
John Churchill – His leadership of the allied armies consolidated Britain’s
emergence as a front-rank power.
> He told critics of his enormous expendure on espionage that “No war can
be conducted successfully and such advices cannot be has but a very great
• Edward I – Also known as Edward Longshanks and the Hammer of
the Scots (Latin : Mallues Scotorum) Was king of England from
1272 to 1307
> He was temperamental and this along with his height mad him an
intimidating man and he often instilled fear in his contemporaries.
> Modern historians are divided on their assessment of the king,
while some have praised him for his contribution to the law and
administration.
> He is credited with many accomplishment during his reign
including restoring royal authority after the reign of Henry III
> An English monarch who started utilizing English informants
especially to determine seditious writings againts the crown and
identity.
• George Washington - As Grand Master in Intelligence mobilized
the free masons of the colonies at the outbreak of the
American war of Independence.
> 1st President of the United States (1789-1797) the
Commander-in-Chief of the continental Army during the
American Revolutionary war and one of the founding father of
the United States
> Because if his strategy, Revolutionary forces captured major
british army’s at Saratoga in 1777 and Yorktown in 1781
> Historians praise Washington for his selection and supervison
of his generals, encouragement pf moale and ability to hold
together the army coordination wit the state governors and state
militia units, relations with congress and attention to supplies,
logistics and training.
•Hannibal - He was a Punic Carthaginian Military
Commander, generally considered one of the greatest
military commanders in history.
> He was considered one of the brilliant millitary
strategists in the history of military intelligence.
> He had developed an effective intelligence system for
15 years in Rome.
> He usually roam around the cuty often disguise
himself as a beggar to gather first-hand information.
MOST OUTSTANDING INTELLIGENCE AGENCIES
• Intelligence Agency - It is a government agency responsible for the collection,
analysis or exploitation of information and intelligence in support of law
enforcement, national security defense and foreign policy objectives.
> Effective instrument of a national power.
> Aggressive Intelligence is its primary weapon to destabilize the target
> Means of Information gathering are both overt and covert and may include
espionage, communication, cooperation with other institution and evaluation of
public sources.
• Australian Secret Intelligence Services (ASIS)
> Goverment intelligence of Australia which is responsible for collecting foreigh
intelligence undertaking counter intelligence activities and cooperation with other
intelligence agencies overseas.
> Its primary responsibility is gathering intelligence from mainly Asian and Pacific
interests using agents stationed in a wide variety of areas.
• Research and Analysis Wing (R&AW or RAW) - Research and Analysis Wing is
India’s external intelligence agency.
> It was formed in September 1968 under the helmsman-ship of its first Director
R, N. Kao Its creation was necessitated by the poor performance of the
intelligence Bureau (which handled both internal and external intelligence)
> Primary function is collection of external intelligence, counter terrorism and
covert operations. In addition it is responsible for obtaining and analyzing
information about foreign governments, corporations and persons in order to
advise indian foreign policymakers.
• General Directorate for external Security - Directorate general for External
Security is FRANCE’S EXTERNAL INTELLIGENCE AGENGY
>Operating under the direction of the French ministr of defense
> Primary focus is to gather intelligence from foreign sources to assist in military
and strategic decisions for the country.
> Agency employs more than fice thousand people
• Federal Security Service of Russian Federation - The Federal Security Service of Russian
Federation (FSB) is the main domestic security agency of the Russian Federation and the
main successor agency of the Soviet-era Cheka, NKVD AND KGB
> FSB is involved in counter-intelligence, internal border security,counter-intelligence and
surveillance
> FSB is responsible for internal security of the Russian state counterespionage and the fight
against organized crime, terrorism and drug smuggling
> The number of FSB personnel and its budget remain state secret, although the budget was
reported to jump nearly 40% in 2006
• Bundesnachrichtendienst (BND) - Foreign intelligence agency of the german government
> The BND acts as an early warning system to alert the German government to threats to
German interest from abroad.
> It depends heavily on wiretapping and electronic surveillance of international comunications
> It collects and evaluates information on a variety of areas such as international terrorism
WMD proliferation and illegal transfer of technology organized crime, weapons and drug
trafficking, money laundering, illegal migration and information warfare
> Both military and civil intelligence.
• Ministry of State Security (MSS) - Security agency of the People’s Republic of
China
> Article 4 of the Criminal Procedure Law gives the MSS the same authority to
arrest or detaon people as regular police for crimes involving state security with
identical supervision
> One of the primary missions of the MSS is undoubtedly to gather foreign
intelligence from targets in various countries overseas
> Many MSS agents are said to have operated in the Greated China Region
• Central Intelligence Agency (CIA) - It is an executive and reports directly to the
Director of National Intelligence with responsibility for providing national
security intelligence assessment to senior United States policmakers.
> A predecessor of the Office of Strategic Service (OSS) which was formed in 1942
and renamed CIA in 1947 (William Donovan)
> CIA is the largest of the intelligence agencies and is responsible for gathering
data from other counteries that could impact U.S policy
> It’s a civilian intelligence agency o the United States
government responsible for providing national security
intelligence to senior United States policymaker
> CIA also engages in covert activities at the request of the
President of the United States of America
> It has failed to control terrorism activities including 9/11 not
even a single top level Al- Qaeda leader captured own its own
on the past 13 years
> Highly founded and technologically most advanced
intelligence set-up in the world
> The 1st Director of the Agency was Rear Admiral Roscoe
Hillenkoetter
•Secret Intelligence Service (SIS) MI-6 - SIS supplies the British
> Government with foreign intelligence
> It operates under the formal direction of Joint Intelligence
Committee (JIC) alongside the Internal Security Service (M15)
the Government Communications Headquarters (GCHQ) and
the defense Intelligence (DI)
> It is frequently referred to by the name M16 a name used as
a flag of convenience during the Second World War when it
was known by many names
>The existence of M16 was not officially acknowledged until
1994
•Mossad - Responsible for intelligence collection and
covert operations including paramilitaray activities.
> It is one of the main entities in the Israeli intelligence
Community along with Aman (Military intelligence) and
Shin Bet (Internal Security) But its director reports directly
to the prime minister
2 Branches of Mossad
 Aman - Military Intelligence (Defense force)
Shabak - General Security Service (Internal Service)
• Inter-Service Intelligence (ISI) - WIth the lengthiest track record of
success the best know intelligence so far on the scale of records is ISI
> Inter-Services Intelligence was created as an independent unit in 1948
in order to strengthen the performance of Pakistan’s Military Intelligence
during the Indo-Pakistani War of 1947
> The best of its time, failed to counter ISI and protect Soviet interest in
Central Asia
> It has protected its Nuclear Weapons since formed and it has failed
indian attempts to attain ultimate supremacy in the South-Asian threaths
through internal destabilization of India It is above all laws in its host
country Pakistan “A state, with in a State”
> Its personnel have never been caught on camera
> It is believed to have the highest number of agents worldwide close to
10,000
• National Intelligence Coordinating Agency (NICA) - It is the
primary intelligence gathering and analysis arm of the Philippine
government, which is under the Office of the National Security
Adviser ; NICA is incharge of carrying out overt,covert and
clandestine intelligence programs ; its motto is “Knowledge is
Safety” Presently NICA is in close coordination with CIA,Mossad,
Secret Intelligence Service and intelligence services is ASEAN
countries to counter the threat of terrorism
> The agency is led by the Diretor-General and is assisted by a
Deputy Director-General. The former reports directly to the
President. The NICA has a National Intelligence Board that serves as
an advisory board to the Director General before he would submit
his findings to the President relating to national security matters
affecting the Philippines
PRINCIPLE OF INTELLIGENCE
A. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT
B. INTELLIGENCE IS CONTINUOUS
C. INTELLIGENCE MUST BE USEFUL
D. INTELLIGENCE MUST BE AVAILABLE ONTIME
E. INTELLIGENCE OPERATION REQUIRES IMAGINATION AND
FORESIGHT
F. INTELLIGENCE MUST BE FLEXIBLE
G. INTELLIGENCE REQUIRES CONTINUOUS SECURITY
MEASURES
• A. INTELLIGENCE AND
OPERATION ARE
INTERDEPENDENT – Intelligence
provides valuable inputs for
effectiveness of police operation
on the other hand operation
likewise is needed for continuity
of intelligence activities.
• B. INTELLIGENCE IS CONTINUOUS –
The basic principle of intelligence
operations is that intelligence activities
follow a simple cycle which is
continuous at the same time that new
information is being collected in
response to direction, other
information is being processed and
intelligence is being used.
• C. INTELLIGENCE MUST BE
USEFUL – It must serve the
commander’s need and
requirements so that effort will
not be wasted. It should have an
application and significance to the
operation
•D. INTELLIGENCE MUST BE AVAILABLE
ONTIME – Intelligence must be
communicated to the decision maker at
the appropriate time to permit its most
effective use. It must reach the user in
time to serve as basis for appropriated
action intel data must b disseminated on
time because late arrival is as good as
useless.
•E. INTELLIGENCE OPERATION
REQUIRES IMAGINATION AND
FORESIGHT – The success of objective
personnel are reminded to refrain
from utilizing criminal elements in
intel operation. They must use their
resourcefulness to obtain more than
what is normally.
•F. INTELLIGENCE MUST BE FLEXIBLE –
Intelligence Operations must be
changeable according to the present
situation condition and other factors,
Intelligence Operations are based on
reason and sound judgment. Procedures
which do not readily adapt to a given
situation are generally discarded.
•G. INTELLIGENCE REQUIRES
CONTINUOUS SECURITY
MEASURES - Deny unauthorized
personal information about
operation and intelligence
product, its source and
organization itself.
CATEGORIES OF INTELLIGENCE
A. NATIONAL INTELLIGENCE - Integrated product of intelligence
developed by all government departments concerning the broad
aspect of national policy and national security
1. National Policy - Specific courses of action to achieve the
national objectives.
2. National Security - This relate to the protection and
preservation and a productive strength of a country including the
security of the government and domestics anf foreign affairs
against espionage sabotage and subversion.
B. DEPARMENT OF INTELLIGENCE - The intelligence
required by department or agencies of the
government to execute its mission and discharge its
responsibilities
C. MILITARY INTELLIGENCE - Refers to the
knowledge by the military institution essentia in the
preparation and execution of military plans, policues
and programs
INTELLIGENCE CYCLE
CATEGORIES OF POLICE INTELLIGENCE
1. STRATEGIC INTELLIGENCE – Knowledge
pertaining to the capabilities and vulnerabilities of
a foreign nation, which is required by the National
Planners for the formulation of an adequate
National defense in peace and forms the basis for,
projected. This is Intelligence information which is
not immediate operational but rather long range,
COMPONENTS OF STRATEGIC INTELLIGENCE
1. POLITICAL INTELLIGENCE – Deals with Domestic and
Foreign affairs and relation of government operations.
• BASIC PRINCIPLES OF THE GOVERNMENT
• GOVERNMENT STRUCTURES
•PUBLIC ORDER ANS SAFETY
•SUBVERSION
•INTELLIGENCE AND SECURITY ORGANIZATION
2. ECONOMIC INTELLIGENCE – DEALS WITH THE EXTENT AND
UTILIZATION OF NATURAL AND HUMAN RESOURCES TO THE INDUSTRIAL
POTENTILA OF THE NATIONS
3. TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE –
CONCERNED WITH THE OPERATIONS AND FACILITIES NOT ONLY THE
MILITARY BUT ALSO THE CIVILIANS.
4. SOCIOLOGICAL INTELLIGENCE – DEALS WITH DEMOGRAPHIC AND
PSYCHOLOGICAL ASPECTS OF GROUPS OF PEOPLE
• POPULATION AND MANPOWER
• CHARACTERISTICS OF THE PEOPLE
• PUBLIC OPINION – ATTITUDES OF THE MAJORITY OF THE PEOPLE
TOWARDS MATTERS OF PUBLIC POLICY.
• EDUCATION – BASED ON THE HIERARCY RATE.
5. BIOGRAPHICAL INTELLIGENCE – DEALS WITH INDIVIDUAL
PERSONALITIES WHO HAVE ACTUA POSSESSION OF POWER
6. ARMED FORCES INTELLIGENCE – DEALS WITH THE ARMED
FORCES OF THE NATION.
•POSITION OF THE ARMED FORCES – CONSTITUTIONAL AND
LEGAL BASIS OF TS CREATION AND ACTUAL ROLE.
•ORGANIZATION ANS STRUCTURE AND TERRITORIAL
DISPOSITION
•MILITRAY MANPOWER RECRUITEMENT
•ORDER OF BATTLE – ARRANGEMENT OF MILITARY TROOPS
FOR BATTLE
7. GEOGRAPHICAL INTELLIGENCE – DEALS WOTH THE NATURAL
AS WELL AS MANMADE FEATURES OF THE PHYSICAL
ENVIRONMENT OF MAN CONSIDERED FROM THE POINT IN
VIEW OF MILITARY OPERATIONS.
•LOCATION – MILITARY AND ECONOMIC IMPORTANCE
•SIZE – MEASUREMENT OF WHICH A NATION CAN EXCHANGE
SPACE OR TIME DURING WAR
•SHAPE
•WEATHER AND CLIMATE
8. SCIENTIFIC INTELLIGENCE – DEALS WITH THE PROGRESS OF
THE RESEARCH AND DEVELOPMENT AS IT AFFECTS THE
ECONOMIC AND MILITARY POTENTIAL OF A NATION.
2. COUNTER INTELLIGENCE – PHASE IF
INTELLIGENCE COVERING THE
ACTIVITY DEVOTED IN DESTROYING
THE EFFECTIVENESS OF HOSTILE
FOREIGN ACTIVITIES AND THE
PROTECTION OF INFORMATION
AGAINTST ESPIONAGE, SUBVERSION
AND SABOTAGE
TYPES OF COUNTER-INTELLIGENCE
•PASSIVE CI MEASURES – PROTECTION OF
CLASSIFIED AND SENSITIVE INFORMATION TO THE
UNAUTHORIZED THROUGH SECRECY
COMMUNICATION SECURITY AND OTHER VARIOUS
SAFEGUARDS.
•ACTIVE CI MEASURES – ARE THOSE MEASURES
WHICH SEEK ACTIVELY TO BLOCK THE ENEMIES
EFFORT TO GAIN INFORMATION OR ENGAGE IN
ESPIONAGE,SUBVERSION AND SABOTAGE.
CONCEPTS OF COUNTER-INTELLIGENCE
•DETECTION – KNOWING THE
CLANDESTINE OPERATION OF THE
ENEMY.
•PREVENTION – APPLICATION OF CI
MEASURES TO AVOID ENEMY
ACTIVITIES.
•NEUTRALIZATION – IT IS THE
CONTAINMENT OF ENEMY ACTIVITIES.
OBJECTIVES AND IMPORTANCE OF COUNTER-
INTELLIGENCE
•IT DENIES INFORMATION TO THE
ENEMY
•IT REDUCES THE RISK OF A COMMAND
•AIDS IN ACHIEVING SURPRISES
•INCREASES THE SECURITY OF THE
COMMAND
LINE OR TACTICAL INTELLIGENCE – IT IS THE
INTELLIGENCE ONFORMATION WHICH DIRECTLY
CONTRIBUTES TO THE ACCOMPLISHMENT OF
SPECIFIC OBJECTIVES AND IMMEDIATE IN
NATURE, NECESSARY FOR MORE EFFECTIVE
POLICE PLANNING AND OPERATION.
INTEL INFORMATION TO BE DETERMINED IN
LINE INTELLIGENCE (PWET)
FUNCTIONAL CLASSIFICATIONS OF
POLICE INTELLIGENCE
METHODS AND TECHNIQUES OF COLLECTING
INFORMATION
 INFORMATION - All evaluated materials of
every descriptions including those derived
from observation, reports rumors, imagery
and other sources from which intelligence is
produced.
TYPES OF AGENT USED IN COLLECTING OF
INFORMATION
•AGENT OF INFLUENCE
•AGENT IN PLACE
•PENETRATION AGENT
•EXPENDABLE AGENT
•DOUBLE AGENT
CLASSIFICATIONS OF SOURCES OF
INFORMATION
A. OPEN SOURCES - 99% Of the information collected are coming from
open sources or obtained from Overt Operation.
 OVERT OPERATION - Also known as Open Operation method is
collecting information openly regardless the subject is aware that we
are collecting information commonly is by use of
 Enemy Activities
Capture Documents
Map
Weather Forecast, Studies, Reports
Agencies
B. CLOSE SOURCES - Only 1% of
information are obtained from clandestine
operation.
 COVERT OPERATION - Also known as
Clandestine Operation of Close Operation,
method of collecting information secretly
or by using a cover without the knowledge
of the subject.
ELEMENTS OF COVERT OPERATION
1.SPONSOR – DIRECTS THE ORGANIZATION
CONDUCING THE CLANDESTINE ACTIVITY.
2. AGENT – IT REFERS TO A PERSON WHO
CONDUCTS THE CLANDESTINE OPERATION TO
INCLUDE PRINCIPLE AGENTS. ACTION AGENTS AND
SUPPORT AGENTS.
3. TARGET – PERSON,PLACE OR THINGS AGAINST
WHICH THE CLANDESTINE ACTIVITY IS TO BE
CONDUCTED.
• PRINCIPLE AGENT – LEADER OR MANAGEMENT AGENT IN
CLANDESTINE OPERATION USUALLY UNDERTAKEN BY THE CASE
OFFICER.
• ACTION AGENT – THE ONE WHO CONDUCTS THE CLANDESTINE
OPERATION THAT INCLUDES.
• ESPIONAGE AGENT – AGENT WHO CLANDESTINELY PROCURE OR
COLLECT INFORMATION.
• PROPAGANDIST – AGENTS WHO MOLDS THE ATTITUDES,OPINIONS
AND ACTIONS OF AN INDIVIDUAL GROUP OR NATION.
• SABOTEUR – AGENTS WHO UNDERTAKES POSITIVE ACTIONS
AGAINST AN UNFRIENDLY POWER, RESULTING IN THE LOSS OF USE
TEMPORARILY OR PERMANENTLY OF AN ARTICLE OR OTHER.
• SUPPORT AGENT – AGENT WHO IS ENGAGED IN ACTIVITIES WHICH SUPPORTS
THE CLANDESTINE OPERATIONS AND OR THE ACTION AGENT IN HIS OPERATIONS
THAT INCLUDES THE FOLLOWING
• SURVEILLANT – AGENT WHO OBSERVES PERSONS AND PLACES OF OPERATIONS
OF INTEREST.
• INVESTIGATOR – AGENT WHO UNDERTAKE TO PROCURE INFORMATION OR
THINGS OF CLANDESTINE OPERATION.
• PROCURER OF FUNDS – AGENT WHO OBTAIN MONEY WHEN NEEDE FOR
OPERATIONAL USE.
• SAFE HIUSE KEEPER – AGENTS WHO MANAGES AND MAINTAINS A SAFE HOUSE
FOR CLANDESTINE OPERATIONS LIKE MEETINGS, SAFE HEAVENS, TRAINING,
BRIEFING AND DEBRIEFING
• COMMUNICATION AGENT – AGENT WHO IS DETAILED AS SECURING OF
CLANDESTINE COMMUNICATIONS.
KINDS OF COVERT OPERATION
1.SURVEILLANCE
2.CASING
3.ELICITATION
4.EMPLOYMENT OF TECHNICAL MEANS
5.TACTICAL INTERROGATON
6.OBSERVATION AND DESCRIPTION
(ODEX)
OBJECTIVES OF SURVEILLANCE :
To identify persons involved in certain activities
To secure basis for securing search warrant
To obtain detailed information about the nature,scope
of subjects activities
To check on source of information
To develop leads to vital information
To confirm or deny allegations
To provide protection
TERMS TO PONDER IN SURVEILLANCE
1. SURVEILLANT - Is the plainclothes investigator assigned to make the
observation.
2. SUBJECT - Who is observed. It can be a person, place, property and
vehicle group of people, organization or object.
3. AREA TARGET STUDY - Refers to area of operation of surveillance
activities.
4. LOG - Chronological records of activities that took place in the
establishment under surveillance.
5. SAFE HOUSE - Refers to a place where agents meet each other for
purpose of de-briefing and reporting
6. LIVE DROP - Refers to a place where agents or informants leave their
message to the other agents.
7. DECOY - A person or object used by the subject in attemot to
elude surveillant.
8. CONVOY - An associate of the subject who follows him to
detect surveillance.
9. CONTACT - Any person whom the subjects picks or deals
with while he is under observation and identifies the observer.
10. MADE - When subject under surveillance becomes aware
that he is under observation and identities the observer also
known as “BURNT OUT”
11. LOST - When the surveillant does not know the
whereabouts of his subject or the subject had eluded the
surveillance.
WHAT ARE THE THINS SHOULD BE AVOIDED IN SURVEILLANCE
•DON’T MEET THE EYE OF THE SUBJECT
•DON’T ADOPT A STINKING,SLEUTING CREEPING
MANNER
•DON’T WEAR STORY BOOK DISGUISES
•DON’T CARRY NOTICEABLE ITEMS
•DON’T GREET FELLOW AGENTS
•DON’T MAKE ENTRIES IN YOUR NOTEBOOK IN PUBLIC
PLACE
•DON’T SPEND MONEY TO MUCH
ESSENTIAL REQUIREMENT AND APPEARANCE
•ALWAYS BE ALERT
•BE A GOOD TALKER
•BE RESOURCEFUL
•AVERAGE SIZE,BUILT AND GENERAL APPEARANCE
•HAVE NO PECULIARITIES IN APPEARANCE
•SHOULD HAVE PERSEVERANCE AND ABLE TO WAIT FOR
HOURS
2. CASING
• EXTERNAL - close observation and clear description of an area,
building or installation, particularly its location, approaches and
exits and its immediate vicinity.
• INTERNAL - Close observation and clear description of the layout
of a building, an office or a room etc.
=METHODS OF CASING=
• PERSONAL RECONNAISANCE - Most effective method and will
produced the most into since you know what you’re looking for.
• MAP RECONNAISSANCE - If may not sufficient but it can produce
a certain amount of usable information.
•RESEARCH - More information can be acquired best used
with other methods.
•PRIOR INFORMATION - Those records in your file unit
that may provide valuable information.
•HEARSAY - Information usually gain by the person
operating in the area and performing casing job.
3. ELICITATION - The process of extracting
information from a person believes to be in possession of
vital information without his knowledge or suspicion.
TWO DEVICES IN THE CONDUCT OF ELICITATION APPROACH
IT IS THE PROCESS OF SETTING PEOPLE TO START TALKING OR TO SHIFT
THE DIRECTION OF AN EXISTING CONVERSATION.
TYPES OF APPROACH
A. FLATTERY – PEOPLE ARE SUSCEPTIBLE TO PRAISE SO USE THIS
WEAKNESSES AS A WAY OF APPROACHING THE SUBJECT FOR
ELICITATION.
• TEACHER-PUPIL APPROACH – THE SUBJECT IS TREARTED AS AN
AUTHORITY THAN SOLICITS HIS VIEW POINT AND OPINION ON A
SUBJECT MATTER,
• GOOD SAMARITAN APPROACH – IS THE SINCERE AND VALID OFFERS
OF HELP AND ASSISTANCE ARE MADE TO THE SUBJECT.
• KINDRED SOUL APPROACH – THE SUBJECT IS PLACED IN A PEDESTAL
HAVING SOME SPECIALIZED QUALITY THEN FLATTER HIM BY SHOWING
ENOUGH CONCERN FOR HIS WELFARE TO PAY SPECIAL ATTENTION TO
HIS EMPLOYMENT.
• PARTIAL DISAGREEMENT APPROACH – SEEK TO PRODUCE TALKING BY
THE WORD “I’M SURE IF I FULLY AGREE”
B. PROVOCATIVE APPROACH – THIS ARE DESIGNED TO INDUCE THE
SOURCE TO DEFEND A POSITION OR CORRECT A WRONG IMPRESSION.
• TEASER BELT APPROACH – THE ELICITOR ACCUMULATES SOURCES OF
KNOWLEDGE ABOUT A PARTICULAR SUBJECT TO TEMPT THE SUBJECT
TO GIVE HIS VIEWS.
• MANHATTAN FROM MISSOURI APPROACH – THE ELICITOR ADOPTS
AN UNBELIEVABLE ATTITUDE ABOVE ANYTHING HE QUESTIONS ALL
THE STATEMENT AND PROPOSITIONS.
• JOE BLOW APPROACH – IS “I” KNOW THE ANSWER TO EVERYTHING APPROACH
THE ELICITOR ADOPTS THE ATTITUDE OF BEING APPROACHABLE IN ANY FIELD.
• NATIONAL PRIDE APPROACH – NATURE PROPENSITY OF ALL PERSONS TO
DEFEND THEIR COUNTRY AND ITS POLICIES.
4. EMPLOYMENT OF TECHNICAL MEANS
1. BUGGING - The use or an equipment or tool to listen and
record discreetly conversations of other people.
2. WIRE TAPPING - A method of collecting information
through interception of telephone conversation.
5.TACTICAL INTERROGATION – The need for
obtaining information of the highest degree of credibility
taken on the minimum of time can be through interrogation
which varies and dependent entirely on the situation.
6.OBSERVATION AND DESCRIPTION
(ODEX)
OBSERVATION - A complete and accurate observation by an
individual of his surroundings and encompasses the use of all the
major sense to register and recognized its operation or intel
significance.
DESCRIPTION - The actual and factual reporting of ones’s
observation of he reported sensory experience recounted by
another.
PSYCHOLOGIST ESTIMATE THAT APPROXIMATELY
=COVER AND UNDERCOVER OPERATIONS=
UNDERCOVER IS DISGUISING ONE’S OWN IDENTITY OR USING AN ASSUMED IDENTITY
FOR THE PURPOSE OF GAINING THE TRUST OF AN INDIVIDUAL OR ORGANIZATION TO
LEARN SECRET INFORMATION OR TO GAIN THE TRUST OF TARGETED INDIVIDUALS IN
ORDER TO GAIN INFORMATION
1. COVER - The means by which an individual, group or organization
conceals the true nature of its acts or existence from the observer
2. COVER STORY - A biographic account true or fictious that will portray
The personality of the agent be assumed a scenario to cover up the
operation
3. COVER SUPPORT – An agent assigned in target areas with the primary
mission of supporting the cover story.
TYPES OF COVER
1.ARTIFICIAL – ALTERING THE
BACKGROUND THAT WILL
CORRESPOND TO THE
OPERATION
2.NATURAL – ACTUAL OR TRUE
BACKGROUND.
TYPES OF UNDERCOVER ASSIGNMENT
1. DWELLING – ONE IN WHICH THE AGENT ESTABLISHES RESIDENCE IN OR NEAR THE
DWELLING IN WHICH HOUSES THE SUBJECT.
2. WORK ASSIGNMENT – PLACES THE UNDERCOVER AGENT IN A TYPE OF
EMPLOYMENT WHERE HE CAN OBSERVE THE ACTIVITIES OF THE TARGET
3. SOCIAL ASSIGNMENT – REQUIRES TO FREQUENT PLACES OF ENTERTAINMENT AND
AMUSEMENT KNOWN TO BE HABITUALLY VISITED BY THE TARGET
4. MULTIPLE ASSIGNMENT – AGENT IS GIVEN THE TASK OF COVERING TWO OR MORE
OF THE ABOVE SPECIFIC ASSIGNMENT SIMULTNEOUSLY
5. PERSONAL CONTACT ASSIGNMENT OR ROPE JOB – AGENT IS REQUIRED TO
DEVELOP FRIENDSHIP AND TRUST WITH THE TARGET FOR PURPOSES OF OBTAINING
INFORMATION OR EVIDENCE.
6. SUBVERSIVE ORGANIZATION – THIS IS THE MOST DANGEROUS OF ALL
UNDERCOVER ASSIGNMENT, THE AGENT WILL JOIN THE ORGANIZATION OF THE
SUBJECT ITSELF HE MUST KNOW THE IDEOLOGIES OF THE GROUP AND ACTIONS
WHILE INSIDE SHOULD CONFORM TO THE ORGANIZATION TO AVOID ANY
SUSPICION.
INFORMANTS AND INFORMER
•INFORMANT NET - A controlled group
of people who work through the
direction of the agent handler
•INFORMANT - Perosn who give
information to the police voluntarily
•INFORMER - Persons who give
information for reward or price.
TYPES OF INFORMANTS
1. CONFIDENTIAL INFORMANT - An informant who gives
information to the police pertaining to the underworld about
organized criminals with the understanding that his identity will be
protected.
2. ANONYMOUS INFORMANT - Those who gives information
through telephone with the hope that the informant cannot be
identified.
3. VOLUNTARY INFORMANT - A type of informant who give
information freely and willingly as a witness to a certain act.
4. SPECIAL INFORMANT -Those who gives information concerning
specialized cases onlu and it is regarded a special treatment by the
operatives (ex.teachers,businessman etc.)
5. FALSE INFORMANT – REVEALS INFORMATION OF NO
CONSEQUENCES, VALUE OR STUFF CONNECTED WITHIN THIN AIR.
6. FRIGHTENED INFORMANTS – WEAKEST LINK IN CRIMINAL CHAIN,
MOTIVATED BY ANXIETY
7. SELF-AGGRANDIZING – MOVES AROUND THE CENTER OF CRIMINALS
DELIGHT IN SURPRISING THE POLICE ABOUT BITS OF INFORMATION
8. MERCENARY – INFORMATION FOR SALE NEEDED SOMETHING FOR
EXCHANGE OF INFORMATION.
9. DOUBLE-CROSSER – HE WANTS TO GET MORE INFORMATION FROM
THE POLICE MORE THAN HE GIVES.
10. WOMEN – MOST DANGEROUS
11. LEGITIMATE – OPERATORS OF BUSINESS DESIRE TO GIVE
INFORMATION FOR LEGITIMATE REASONS.
MOTIVES OF INFORMANTS
• VANITY – CONCEITED ACT/CHARACTER OF THE CRIMINAL RESULTING TO SELF-BETRAYAL
OR TANTAMOUNT TO GUILT,GAINING FAVORABLE ATTENTION AND IMPORTANCE BY
THE POLICE.
• CIVIC-MINDEDNESS – SENSE OF DUTY AND OBLIGATION TO ASSIST THE POLICE.
• FEAR – A PERSON UNDER AN ILLUSION OF OPPRESSION BY ENEMIES OR OF OTHER
IMPENDING DANGER.
• REPENTANCE – ONE WHO HAS A CHANGE OF HEART AND WISHES TO REPORT A CRIME
THAT IS PREYING ON HIS CONSCIENCE
• GRATITUDE OR GAIN – AN EXPRESSION OF APPRECIATION TO OBTAIN A PRIVILEGE OR
AN INTEREST IN THE WELFARE OH HIS FAMILY DURING HIS DETENTION.
• REVENGE – TO SETTLE A GRUDGE DUE TO SETTLE A PREVIOUS INJURY
• JEALOUSY – ENVIVOUS OF THE ACCOMPLISHMENTS OR POSSESSIONS OF ANOTHER
AND WISHES TO HUMILIATE HIM.
• REMUNERATION – A PERSON WHO INFORMS SOLELY FOR THE PECUNIARY OR OTHE
MATERIAL GAIN HE IS TO RECEIVE.
STEPS IN RECRUITMENT OF INFORMANT
• SELECTION – TO IDENTIFY AND RECRUIT AN INFORMANT WHO HAS ACCESS TO
SEVERAL SUBVERSIVE ORGANIZATIONS, ACCESS IS THE VALUABLE FACTOR IN
RECRUITING THE POTENTIAL INFORMANT
• INVESTIGATION – IT MUST ESTABLISHED POSSIBLE EXISTEING MOTIVES AS TO
THIS PERSON MIGHT ASSIST THE OFFICER, IF NECESSARY CONDUCT A COMPLETE
BACKGROUND INVESTIGATION TO THE POSSIBLE INFORMANT.
• APPROACH – IT MUST BE DONE IN A PLACE CONDUCIVE TO THE POSSIBLE
INFORMANT,AVOID PLACES WHICH MIGHT HAVE ANY PROBABILITY OF
COMPROMISE,APPROACH MUST BE DONE IN A FOREIGN TERRITORY
• TESTING – IT MUSR COMMERCE WITH LIMITED ASSIGNMENT WITH AGRADUAL
INTERGRATION INTO MORE IMPORTANT MISSION.
CRYPTOGRAPHY
THANK YOU AND GOD
BLESS!!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Technical English 1
Technical English 1Technical English 1
Technical English 1
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processing
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
POP Edited.pdf
POP Edited.pdfPOP Edited.pdf
POP Edited.pdf
 
COMPARATIVE MODEL POLICING SYSTEMpptx
COMPARATIVE MODEL POLICING SYSTEMpptxCOMPARATIVE MODEL POLICING SYSTEMpptx
COMPARATIVE MODEL POLICING SYSTEMpptx
 
Chapter 1 the evolution of policing.ppt
Chapter 1 the evolution of policing.pptChapter 1 the evolution of policing.ppt
Chapter 1 the evolution of policing.ppt
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policing
 
Community Policing
Community PolicingCommunity Policing
Community Policing
 
Interpol
InterpolInterpol
Interpol
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Personnel security investigation
Personnel security investigationPersonnel security investigation
Personnel security investigation
 
INTERPOL
INTERPOLINTERPOL
INTERPOL
 
Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)
 
Arrest
ArrestArrest
Arrest
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
Group 1.pptx
Group 1.pptxGroup 1.pptx
Group 1.pptx
 
Lesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsLesson plan 2.1 police ethics
Lesson plan 2.1 police ethics
 
pnp-ethical-doctrine
pnp-ethical-doctrinepnp-ethical-doctrine
pnp-ethical-doctrine
 

Semelhante a POLICE INTELLIGENCE ppt.pptx

Semelhante a POLICE INTELLIGENCE ppt.pptx (17)

History 1301 11
History 1301 11History 1301 11
History 1301 11
 
Curator pocket-history-cia
Curator pocket-history-ciaCurator pocket-history-cia
Curator pocket-history-cia
 
Curator pocket-history-cia
Curator pocket-history-ciaCurator pocket-history-cia
Curator pocket-history-cia
 
Oss catalogue
Oss catalogueOss catalogue
Oss catalogue
 
Oss catalogue
Oss catalogueOss catalogue
Oss catalogue
 
Office of-strategic-services
Office of-strategic-servicesOffice of-strategic-services
Office of-strategic-services
 
Office of-strategic-services
Office of-strategic-servicesOffice of-strategic-services
Office of-strategic-services
 
Realism
RealismRealism
Realism
 
Intelligence Authorization Act For Fiscal Year 1995 Publi.docx
Intelligence Authorization Act For Fiscal Year 1995  Publi.docxIntelligence Authorization Act For Fiscal Year 1995  Publi.docx
Intelligence Authorization Act For Fiscal Year 1995 Publi.docx
 
Intelligence Authorization Act For Fiscal Year 1995 Publi.docx
Intelligence Authorization Act For Fiscal Year 1995  Publi.docxIntelligence Authorization Act For Fiscal Year 1995  Publi.docx
Intelligence Authorization Act For Fiscal Year 1995 Publi.docx
 
History quiz finals 2011
History quiz finals 2011History quiz finals 2011
History quiz finals 2011
 
Dr. benjamin franklin report
Dr. benjamin franklin reportDr. benjamin franklin report
Dr. benjamin franklin report
 
Sample Gmat Essay Questions
Sample Gmat Essay QuestionsSample Gmat Essay Questions
Sample Gmat Essay Questions
 
pdf_20230318_145146_0000.pdf
pdf_20230318_145146_0000.pdfpdf_20230318_145146_0000.pdf
pdf_20230318_145146_0000.pdf
 
Weapons of Mass Deception by David Moosa Pidcock, Leader of Islamic Party of ...
Weapons of Mass Deception by David Moosa Pidcock, Leader of Islamic Party of ...Weapons of Mass Deception by David Moosa Pidcock, Leader of Islamic Party of ...
Weapons of Mass Deception by David Moosa Pidcock, Leader of Islamic Party of ...
 
Diplomat among warriors-robert_murphy-1964-497pgs-pol
Diplomat among warriors-robert_murphy-1964-497pgs-polDiplomat among warriors-robert_murphy-1964-497pgs-pol
Diplomat among warriors-robert_murphy-1964-497pgs-pol
 
Spies
SpiesSpies
Spies
 

Último

Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 

Último (20)

Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 

POLICE INTELLIGENCE ppt.pptx

  • 1. ‘’POLICE INTELLIGENCE’’ PREPARED BY: JHON MARK C. CUARTERO, RCRIM 1ST PLACER CLE DEC. 2021 (IV-A)
  • 2. • INTELLIGENCE was derived from the latin word INTELLIGERE which means to “pick out or discern” • ORGANIZATION – Institution composes of person who pursue preparing plans or formulating policies. • Activity – The organized effort to collect information, to assess it little by little and piece it together until it forms larger and clear patterns. • Product – The end product resulting from the collection, evaluation,analysis, integration and interpretation of all available information which may have immediate or potential significance to development and execution of plan ,policies and programs for the users
  • 3. 3 SOURCES OF INFORMATION •Regular Source •Cultivated •Grapevine
  • 4. • Sun Tzu – He is traditionally to be the author of “The Art of War” an extremely influential ancient Chinese book on Military strategy “Know yourself and your enemy. If you know yourself and not the enemy for every battle you will be a foul who will meet defeats, but if you know yourself and the enemy, you need not fear the result of a hundred battles” In his book. “Art of War” Delilah – A Biblical personality who was able to gain information by using her beauty and charm. She was responsible for the fall of Samson a known Israelite leader who terrorized the Philistines.  Sir Arthur Wellesly – One of the leading military and political figures of the 19th century. He often referred to as the “Duke of Wellington” He is regarded as the “Greatest Military Spymaster of All time” He live by the motto “All the business of war is to find out what you don’t know by what you do”
  • 5. • Frederick the Great – “Father of Organized Military Espionage” He divided his agents into four classes >Common Spies – Recruited among poor folk, glad to earn small sum or to accommodate a military officer. >Double Spies – The low informers and unreliable renegades of value chiefly in spreading false information to the enemy. >Spies of Consequences – Courtier and noblemen, staff officers and kindred conspirators always requiring a considerable bribe or bat >Intimidated Spies – Persons who are forced to undertake espionage against their will. Alexander the Great – A renowned Greek conqueror had his share of advance information when rumors of discontent circulated from among the ranks of his men and he was able to indentify those disloyal ones by ordering and was successful in curtailing the decline of Esprit De Corps and
  • 6. • Sir Francis Walsingham of England – Protector of Queen Elizabeth I who organized the secret police and established a spy network to detect fleet movement of enemies of the British Empire particularly the Portuguese. He is Regargded as the “1st Great Spymaster” a ruthless in the cause he was responsible for the assassination, murdering and execution of people who covertly betrayed the queen. • Karl Schulmeister – He was an Austrian double agent for France during the reign of NAPOLEON I >He is famous as “NAPOLEON’S EYE” >He acted as a General in Napoleon’s army, undertook espionage missions that took him into England and Ireland ans was appointed commissioner of police for Vienna during Napoleon’s 2nd occupation in 1809 >He was credited for establishing counter intelligence conducted against spies. >He is a MASTER OF DECEIT who used black mail to obtain vital information pertaining to the personality and Identity of the enemies of Napoleon during the 18th century .
  • 7. • Joseph Petrosino – Pioneer on the fight against organized crime. The various crime fighting techniques that Petrosino pioneered during his law enforcement career are still practiced by various in the fight against crime. > Member, New York Police Department in early 1900 he was the head of the Italian Squad > He is credited to smash the Black Society Joseph Fouche – The French statesman Joseph Fouche (1759-1820) Served as minister of police under Napoleon and was influential in the return of Louis XVIII to the throne in 1815. Admiral Yamamoto – He was a Japanese Marshal Admiral and the Commander-in-Chief of the combined fleet during World War II, a graduate of the imperial Japanese Naval Academy. > He was the Commander-in-chief during the decisive early years of the pacific war and so was responsible for the major battles such as Pearl Harbor and Midway.
  • 8. • Herbert Yardly – He was an American cryptologist best known for his book “ The American Black Chamber” > Yardly began his career as a code clerk in the U.S State Department. He accepted a signal corps reserve commission and served as cryptologic officer with the American Expeditionary forces in France during World War I. >His career in cryptology began with his work in the code room, as he broke the U.S government codes that crossed his desk. > Head of the MI-8 the forerunner of the Top Secret National Security Administration a.k.a Black Chamber a Cryptanalytic Organization. Napoleon Bonaparte – He was a French military and political leader who rose to prominence during the latter stages of the French Revolution and its associated wars in Europe. >”One Spy in the right place is worth 20,000 men in the field”
  • 9. • Akbar – Known as Akbar the Great was Mughai Emperor from 1556 until his death. > The “Great Mogul” and wise master of Hindustan employed more than 4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon it. Battle of Midway – One of the most important naval battles of the Pacific Campaign of World War II > June 1442 the turning point of the Naval in the Pacific the victory gained by the Americans was due to the disrupted messages from the imperial Japanese Navy. > Military Historian John Keegan called it “The most stunning and decisive blow in the history of naval warfare” > It was Japan’s worst naval defeat in 350 years.
  • 10. • Julius Caesar – During his time the staff of each legion includes “Ten Speculators” who served as an information collecting agency. > “Speculators” were the 1st intelligence personnel to appear definitely in a military organization. Wilhelm Johann Karl Eduard Steiber – Otto Von Bismarck’s master spay and director of the Prussian Feldgendarmarie. >Stieber was both an agent of domestic surveillance and an extermal agent. >Along with Joseph Fouche he invented modern information gathering. > He is known as the Prussia’s “King of Sleuthhounds” as minister of police he studied the use of propaganda and censorship as well as utilizing statistical intelligence accounting.
  • 11. • Alfred Redl – He was one of the leading figures of Pre-World War I espionage > His term in office was marked by innovation and he used very high technology for the time to ensnare foreign intelligence agents. > A homosexual Spy > His treason activities were discovered and compelled to commit suicide > His spying led to the death of over 500,000 agents and soldiers combined in his 13 years episode as a spy.  Sir Samuel Luke – Chief scout of Oliver Cromwell who was able to dethrone King Charles I in British Civil War of 1640’s. John Churchill – His leadership of the allied armies consolidated Britain’s emergence as a front-rank power. > He told critics of his enormous expendure on espionage that “No war can be conducted successfully and such advices cannot be has but a very great
  • 12. • Edward I – Also known as Edward Longshanks and the Hammer of the Scots (Latin : Mallues Scotorum) Was king of England from 1272 to 1307 > He was temperamental and this along with his height mad him an intimidating man and he often instilled fear in his contemporaries. > Modern historians are divided on their assessment of the king, while some have praised him for his contribution to the law and administration. > He is credited with many accomplishment during his reign including restoring royal authority after the reign of Henry III > An English monarch who started utilizing English informants especially to determine seditious writings againts the crown and identity.
  • 13. • George Washington - As Grand Master in Intelligence mobilized the free masons of the colonies at the outbreak of the American war of Independence. > 1st President of the United States (1789-1797) the Commander-in-Chief of the continental Army during the American Revolutionary war and one of the founding father of the United States > Because if his strategy, Revolutionary forces captured major british army’s at Saratoga in 1777 and Yorktown in 1781 > Historians praise Washington for his selection and supervison of his generals, encouragement pf moale and ability to hold together the army coordination wit the state governors and state militia units, relations with congress and attention to supplies, logistics and training.
  • 14. •Hannibal - He was a Punic Carthaginian Military Commander, generally considered one of the greatest military commanders in history. > He was considered one of the brilliant millitary strategists in the history of military intelligence. > He had developed an effective intelligence system for 15 years in Rome. > He usually roam around the cuty often disguise himself as a beggar to gather first-hand information.
  • 15. MOST OUTSTANDING INTELLIGENCE AGENCIES • Intelligence Agency - It is a government agency responsible for the collection, analysis or exploitation of information and intelligence in support of law enforcement, national security defense and foreign policy objectives. > Effective instrument of a national power. > Aggressive Intelligence is its primary weapon to destabilize the target > Means of Information gathering are both overt and covert and may include espionage, communication, cooperation with other institution and evaluation of public sources. • Australian Secret Intelligence Services (ASIS) > Goverment intelligence of Australia which is responsible for collecting foreigh intelligence undertaking counter intelligence activities and cooperation with other intelligence agencies overseas. > Its primary responsibility is gathering intelligence from mainly Asian and Pacific interests using agents stationed in a wide variety of areas.
  • 16. • Research and Analysis Wing (R&AW or RAW) - Research and Analysis Wing is India’s external intelligence agency. > It was formed in September 1968 under the helmsman-ship of its first Director R, N. Kao Its creation was necessitated by the poor performance of the intelligence Bureau (which handled both internal and external intelligence) > Primary function is collection of external intelligence, counter terrorism and covert operations. In addition it is responsible for obtaining and analyzing information about foreign governments, corporations and persons in order to advise indian foreign policymakers. • General Directorate for external Security - Directorate general for External Security is FRANCE’S EXTERNAL INTELLIGENCE AGENGY >Operating under the direction of the French ministr of defense > Primary focus is to gather intelligence from foreign sources to assist in military and strategic decisions for the country. > Agency employs more than fice thousand people
  • 17. • Federal Security Service of Russian Federation - The Federal Security Service of Russian Federation (FSB) is the main domestic security agency of the Russian Federation and the main successor agency of the Soviet-era Cheka, NKVD AND KGB > FSB is involved in counter-intelligence, internal border security,counter-intelligence and surveillance > FSB is responsible for internal security of the Russian state counterespionage and the fight against organized crime, terrorism and drug smuggling > The number of FSB personnel and its budget remain state secret, although the budget was reported to jump nearly 40% in 2006 • Bundesnachrichtendienst (BND) - Foreign intelligence agency of the german government > The BND acts as an early warning system to alert the German government to threats to German interest from abroad. > It depends heavily on wiretapping and electronic surveillance of international comunications > It collects and evaluates information on a variety of areas such as international terrorism WMD proliferation and illegal transfer of technology organized crime, weapons and drug trafficking, money laundering, illegal migration and information warfare > Both military and civil intelligence.
  • 18. • Ministry of State Security (MSS) - Security agency of the People’s Republic of China > Article 4 of the Criminal Procedure Law gives the MSS the same authority to arrest or detaon people as regular police for crimes involving state security with identical supervision > One of the primary missions of the MSS is undoubtedly to gather foreign intelligence from targets in various countries overseas > Many MSS agents are said to have operated in the Greated China Region • Central Intelligence Agency (CIA) - It is an executive and reports directly to the Director of National Intelligence with responsibility for providing national security intelligence assessment to senior United States policmakers. > A predecessor of the Office of Strategic Service (OSS) which was formed in 1942 and renamed CIA in 1947 (William Donovan) > CIA is the largest of the intelligence agencies and is responsible for gathering data from other counteries that could impact U.S policy
  • 19. > It’s a civilian intelligence agency o the United States government responsible for providing national security intelligence to senior United States policymaker > CIA also engages in covert activities at the request of the President of the United States of America > It has failed to control terrorism activities including 9/11 not even a single top level Al- Qaeda leader captured own its own on the past 13 years > Highly founded and technologically most advanced intelligence set-up in the world > The 1st Director of the Agency was Rear Admiral Roscoe Hillenkoetter
  • 20. •Secret Intelligence Service (SIS) MI-6 - SIS supplies the British > Government with foreign intelligence > It operates under the formal direction of Joint Intelligence Committee (JIC) alongside the Internal Security Service (M15) the Government Communications Headquarters (GCHQ) and the defense Intelligence (DI) > It is frequently referred to by the name M16 a name used as a flag of convenience during the Second World War when it was known by many names >The existence of M16 was not officially acknowledged until 1994
  • 21. •Mossad - Responsible for intelligence collection and covert operations including paramilitaray activities. > It is one of the main entities in the Israeli intelligence Community along with Aman (Military intelligence) and Shin Bet (Internal Security) But its director reports directly to the prime minister 2 Branches of Mossad  Aman - Military Intelligence (Defense force) Shabak - General Security Service (Internal Service)
  • 22. • Inter-Service Intelligence (ISI) - WIth the lengthiest track record of success the best know intelligence so far on the scale of records is ISI > Inter-Services Intelligence was created as an independent unit in 1948 in order to strengthen the performance of Pakistan’s Military Intelligence during the Indo-Pakistani War of 1947 > The best of its time, failed to counter ISI and protect Soviet interest in Central Asia > It has protected its Nuclear Weapons since formed and it has failed indian attempts to attain ultimate supremacy in the South-Asian threaths through internal destabilization of India It is above all laws in its host country Pakistan “A state, with in a State” > Its personnel have never been caught on camera > It is believed to have the highest number of agents worldwide close to 10,000
  • 23. • National Intelligence Coordinating Agency (NICA) - It is the primary intelligence gathering and analysis arm of the Philippine government, which is under the Office of the National Security Adviser ; NICA is incharge of carrying out overt,covert and clandestine intelligence programs ; its motto is “Knowledge is Safety” Presently NICA is in close coordination with CIA,Mossad, Secret Intelligence Service and intelligence services is ASEAN countries to counter the threat of terrorism > The agency is led by the Diretor-General and is assisted by a Deputy Director-General. The former reports directly to the President. The NICA has a National Intelligence Board that serves as an advisory board to the Director General before he would submit his findings to the President relating to national security matters affecting the Philippines
  • 24. PRINCIPLE OF INTELLIGENCE A. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT B. INTELLIGENCE IS CONTINUOUS C. INTELLIGENCE MUST BE USEFUL D. INTELLIGENCE MUST BE AVAILABLE ONTIME E. INTELLIGENCE OPERATION REQUIRES IMAGINATION AND FORESIGHT F. INTELLIGENCE MUST BE FLEXIBLE G. INTELLIGENCE REQUIRES CONTINUOUS SECURITY MEASURES
  • 25. • A. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT – Intelligence provides valuable inputs for effectiveness of police operation on the other hand operation likewise is needed for continuity of intelligence activities.
  • 26. • B. INTELLIGENCE IS CONTINUOUS – The basic principle of intelligence operations is that intelligence activities follow a simple cycle which is continuous at the same time that new information is being collected in response to direction, other information is being processed and intelligence is being used.
  • 27. • C. INTELLIGENCE MUST BE USEFUL – It must serve the commander’s need and requirements so that effort will not be wasted. It should have an application and significance to the operation
  • 28. •D. INTELLIGENCE MUST BE AVAILABLE ONTIME – Intelligence must be communicated to the decision maker at the appropriate time to permit its most effective use. It must reach the user in time to serve as basis for appropriated action intel data must b disseminated on time because late arrival is as good as useless.
  • 29. •E. INTELLIGENCE OPERATION REQUIRES IMAGINATION AND FORESIGHT – The success of objective personnel are reminded to refrain from utilizing criminal elements in intel operation. They must use their resourcefulness to obtain more than what is normally.
  • 30. •F. INTELLIGENCE MUST BE FLEXIBLE – Intelligence Operations must be changeable according to the present situation condition and other factors, Intelligence Operations are based on reason and sound judgment. Procedures which do not readily adapt to a given situation are generally discarded.
  • 31. •G. INTELLIGENCE REQUIRES CONTINUOUS SECURITY MEASURES - Deny unauthorized personal information about operation and intelligence product, its source and organization itself.
  • 32. CATEGORIES OF INTELLIGENCE A. NATIONAL INTELLIGENCE - Integrated product of intelligence developed by all government departments concerning the broad aspect of national policy and national security 1. National Policy - Specific courses of action to achieve the national objectives. 2. National Security - This relate to the protection and preservation and a productive strength of a country including the security of the government and domestics anf foreign affairs against espionage sabotage and subversion.
  • 33. B. DEPARMENT OF INTELLIGENCE - The intelligence required by department or agencies of the government to execute its mission and discharge its responsibilities C. MILITARY INTELLIGENCE - Refers to the knowledge by the military institution essentia in the preparation and execution of military plans, policues and programs
  • 35.
  • 36. CATEGORIES OF POLICE INTELLIGENCE 1. STRATEGIC INTELLIGENCE – Knowledge pertaining to the capabilities and vulnerabilities of a foreign nation, which is required by the National Planners for the formulation of an adequate National defense in peace and forms the basis for, projected. This is Intelligence information which is not immediate operational but rather long range,
  • 37. COMPONENTS OF STRATEGIC INTELLIGENCE 1. POLITICAL INTELLIGENCE – Deals with Domestic and Foreign affairs and relation of government operations. • BASIC PRINCIPLES OF THE GOVERNMENT • GOVERNMENT STRUCTURES •PUBLIC ORDER ANS SAFETY •SUBVERSION •INTELLIGENCE AND SECURITY ORGANIZATION
  • 38. 2. ECONOMIC INTELLIGENCE – DEALS WITH THE EXTENT AND UTILIZATION OF NATURAL AND HUMAN RESOURCES TO THE INDUSTRIAL POTENTILA OF THE NATIONS 3. TRANSPORTATION AND TELECOMMUNICATION INTELLIGENCE – CONCERNED WITH THE OPERATIONS AND FACILITIES NOT ONLY THE MILITARY BUT ALSO THE CIVILIANS. 4. SOCIOLOGICAL INTELLIGENCE – DEALS WITH DEMOGRAPHIC AND PSYCHOLOGICAL ASPECTS OF GROUPS OF PEOPLE • POPULATION AND MANPOWER • CHARACTERISTICS OF THE PEOPLE • PUBLIC OPINION – ATTITUDES OF THE MAJORITY OF THE PEOPLE TOWARDS MATTERS OF PUBLIC POLICY. • EDUCATION – BASED ON THE HIERARCY RATE.
  • 39. 5. BIOGRAPHICAL INTELLIGENCE – DEALS WITH INDIVIDUAL PERSONALITIES WHO HAVE ACTUA POSSESSION OF POWER 6. ARMED FORCES INTELLIGENCE – DEALS WITH THE ARMED FORCES OF THE NATION. •POSITION OF THE ARMED FORCES – CONSTITUTIONAL AND LEGAL BASIS OF TS CREATION AND ACTUAL ROLE. •ORGANIZATION ANS STRUCTURE AND TERRITORIAL DISPOSITION •MILITRAY MANPOWER RECRUITEMENT •ORDER OF BATTLE – ARRANGEMENT OF MILITARY TROOPS FOR BATTLE
  • 40. 7. GEOGRAPHICAL INTELLIGENCE – DEALS WOTH THE NATURAL AS WELL AS MANMADE FEATURES OF THE PHYSICAL ENVIRONMENT OF MAN CONSIDERED FROM THE POINT IN VIEW OF MILITARY OPERATIONS. •LOCATION – MILITARY AND ECONOMIC IMPORTANCE •SIZE – MEASUREMENT OF WHICH A NATION CAN EXCHANGE SPACE OR TIME DURING WAR •SHAPE •WEATHER AND CLIMATE 8. SCIENTIFIC INTELLIGENCE – DEALS WITH THE PROGRESS OF THE RESEARCH AND DEVELOPMENT AS IT AFFECTS THE ECONOMIC AND MILITARY POTENTIAL OF A NATION.
  • 41. 2. COUNTER INTELLIGENCE – PHASE IF INTELLIGENCE COVERING THE ACTIVITY DEVOTED IN DESTROYING THE EFFECTIVENESS OF HOSTILE FOREIGN ACTIVITIES AND THE PROTECTION OF INFORMATION AGAINTST ESPIONAGE, SUBVERSION AND SABOTAGE
  • 42. TYPES OF COUNTER-INTELLIGENCE •PASSIVE CI MEASURES – PROTECTION OF CLASSIFIED AND SENSITIVE INFORMATION TO THE UNAUTHORIZED THROUGH SECRECY COMMUNICATION SECURITY AND OTHER VARIOUS SAFEGUARDS. •ACTIVE CI MEASURES – ARE THOSE MEASURES WHICH SEEK ACTIVELY TO BLOCK THE ENEMIES EFFORT TO GAIN INFORMATION OR ENGAGE IN ESPIONAGE,SUBVERSION AND SABOTAGE.
  • 43. CONCEPTS OF COUNTER-INTELLIGENCE •DETECTION – KNOWING THE CLANDESTINE OPERATION OF THE ENEMY. •PREVENTION – APPLICATION OF CI MEASURES TO AVOID ENEMY ACTIVITIES. •NEUTRALIZATION – IT IS THE CONTAINMENT OF ENEMY ACTIVITIES.
  • 44. OBJECTIVES AND IMPORTANCE OF COUNTER- INTELLIGENCE •IT DENIES INFORMATION TO THE ENEMY •IT REDUCES THE RISK OF A COMMAND •AIDS IN ACHIEVING SURPRISES •INCREASES THE SECURITY OF THE COMMAND
  • 45. LINE OR TACTICAL INTELLIGENCE – IT IS THE INTELLIGENCE ONFORMATION WHICH DIRECTLY CONTRIBUTES TO THE ACCOMPLISHMENT OF SPECIFIC OBJECTIVES AND IMMEDIATE IN NATURE, NECESSARY FOR MORE EFFECTIVE POLICE PLANNING AND OPERATION. INTEL INFORMATION TO BE DETERMINED IN LINE INTELLIGENCE (PWET)
  • 47. METHODS AND TECHNIQUES OF COLLECTING INFORMATION  INFORMATION - All evaluated materials of every descriptions including those derived from observation, reports rumors, imagery and other sources from which intelligence is produced.
  • 48. TYPES OF AGENT USED IN COLLECTING OF INFORMATION •AGENT OF INFLUENCE •AGENT IN PLACE •PENETRATION AGENT •EXPENDABLE AGENT •DOUBLE AGENT
  • 49. CLASSIFICATIONS OF SOURCES OF INFORMATION A. OPEN SOURCES - 99% Of the information collected are coming from open sources or obtained from Overt Operation.  OVERT OPERATION - Also known as Open Operation method is collecting information openly regardless the subject is aware that we are collecting information commonly is by use of  Enemy Activities Capture Documents Map Weather Forecast, Studies, Reports Agencies
  • 50. B. CLOSE SOURCES - Only 1% of information are obtained from clandestine operation.  COVERT OPERATION - Also known as Clandestine Operation of Close Operation, method of collecting information secretly or by using a cover without the knowledge of the subject.
  • 51. ELEMENTS OF COVERT OPERATION 1.SPONSOR – DIRECTS THE ORGANIZATION CONDUCING THE CLANDESTINE ACTIVITY. 2. AGENT – IT REFERS TO A PERSON WHO CONDUCTS THE CLANDESTINE OPERATION TO INCLUDE PRINCIPLE AGENTS. ACTION AGENTS AND SUPPORT AGENTS. 3. TARGET – PERSON,PLACE OR THINGS AGAINST WHICH THE CLANDESTINE ACTIVITY IS TO BE CONDUCTED.
  • 52. • PRINCIPLE AGENT – LEADER OR MANAGEMENT AGENT IN CLANDESTINE OPERATION USUALLY UNDERTAKEN BY THE CASE OFFICER. • ACTION AGENT – THE ONE WHO CONDUCTS THE CLANDESTINE OPERATION THAT INCLUDES. • ESPIONAGE AGENT – AGENT WHO CLANDESTINELY PROCURE OR COLLECT INFORMATION. • PROPAGANDIST – AGENTS WHO MOLDS THE ATTITUDES,OPINIONS AND ACTIONS OF AN INDIVIDUAL GROUP OR NATION. • SABOTEUR – AGENTS WHO UNDERTAKES POSITIVE ACTIONS AGAINST AN UNFRIENDLY POWER, RESULTING IN THE LOSS OF USE TEMPORARILY OR PERMANENTLY OF AN ARTICLE OR OTHER.
  • 53. • SUPPORT AGENT – AGENT WHO IS ENGAGED IN ACTIVITIES WHICH SUPPORTS THE CLANDESTINE OPERATIONS AND OR THE ACTION AGENT IN HIS OPERATIONS THAT INCLUDES THE FOLLOWING • SURVEILLANT – AGENT WHO OBSERVES PERSONS AND PLACES OF OPERATIONS OF INTEREST. • INVESTIGATOR – AGENT WHO UNDERTAKE TO PROCURE INFORMATION OR THINGS OF CLANDESTINE OPERATION. • PROCURER OF FUNDS – AGENT WHO OBTAIN MONEY WHEN NEEDE FOR OPERATIONAL USE. • SAFE HIUSE KEEPER – AGENTS WHO MANAGES AND MAINTAINS A SAFE HOUSE FOR CLANDESTINE OPERATIONS LIKE MEETINGS, SAFE HEAVENS, TRAINING, BRIEFING AND DEBRIEFING • COMMUNICATION AGENT – AGENT WHO IS DETAILED AS SECURING OF CLANDESTINE COMMUNICATIONS.
  • 54. KINDS OF COVERT OPERATION 1.SURVEILLANCE 2.CASING 3.ELICITATION 4.EMPLOYMENT OF TECHNICAL MEANS 5.TACTICAL INTERROGATON 6.OBSERVATION AND DESCRIPTION (ODEX)
  • 55. OBJECTIVES OF SURVEILLANCE : To identify persons involved in certain activities To secure basis for securing search warrant To obtain detailed information about the nature,scope of subjects activities To check on source of information To develop leads to vital information To confirm or deny allegations To provide protection
  • 56. TERMS TO PONDER IN SURVEILLANCE 1. SURVEILLANT - Is the plainclothes investigator assigned to make the observation. 2. SUBJECT - Who is observed. It can be a person, place, property and vehicle group of people, organization or object. 3. AREA TARGET STUDY - Refers to area of operation of surveillance activities. 4. LOG - Chronological records of activities that took place in the establishment under surveillance. 5. SAFE HOUSE - Refers to a place where agents meet each other for purpose of de-briefing and reporting 6. LIVE DROP - Refers to a place where agents or informants leave their message to the other agents.
  • 57. 7. DECOY - A person or object used by the subject in attemot to elude surveillant. 8. CONVOY - An associate of the subject who follows him to detect surveillance. 9. CONTACT - Any person whom the subjects picks or deals with while he is under observation and identifies the observer. 10. MADE - When subject under surveillance becomes aware that he is under observation and identities the observer also known as “BURNT OUT” 11. LOST - When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.
  • 58. WHAT ARE THE THINS SHOULD BE AVOIDED IN SURVEILLANCE •DON’T MEET THE EYE OF THE SUBJECT •DON’T ADOPT A STINKING,SLEUTING CREEPING MANNER •DON’T WEAR STORY BOOK DISGUISES •DON’T CARRY NOTICEABLE ITEMS •DON’T GREET FELLOW AGENTS •DON’T MAKE ENTRIES IN YOUR NOTEBOOK IN PUBLIC PLACE •DON’T SPEND MONEY TO MUCH
  • 59. ESSENTIAL REQUIREMENT AND APPEARANCE •ALWAYS BE ALERT •BE A GOOD TALKER •BE RESOURCEFUL •AVERAGE SIZE,BUILT AND GENERAL APPEARANCE •HAVE NO PECULIARITIES IN APPEARANCE •SHOULD HAVE PERSEVERANCE AND ABLE TO WAIT FOR HOURS
  • 60. 2. CASING • EXTERNAL - close observation and clear description of an area, building or installation, particularly its location, approaches and exits and its immediate vicinity. • INTERNAL - Close observation and clear description of the layout of a building, an office or a room etc. =METHODS OF CASING= • PERSONAL RECONNAISANCE - Most effective method and will produced the most into since you know what you’re looking for. • MAP RECONNAISSANCE - If may not sufficient but it can produce a certain amount of usable information.
  • 61. •RESEARCH - More information can be acquired best used with other methods. •PRIOR INFORMATION - Those records in your file unit that may provide valuable information. •HEARSAY - Information usually gain by the person operating in the area and performing casing job. 3. ELICITATION - The process of extracting information from a person believes to be in possession of vital information without his knowledge or suspicion.
  • 62. TWO DEVICES IN THE CONDUCT OF ELICITATION APPROACH IT IS THE PROCESS OF SETTING PEOPLE TO START TALKING OR TO SHIFT THE DIRECTION OF AN EXISTING CONVERSATION. TYPES OF APPROACH A. FLATTERY – PEOPLE ARE SUSCEPTIBLE TO PRAISE SO USE THIS WEAKNESSES AS A WAY OF APPROACHING THE SUBJECT FOR ELICITATION. • TEACHER-PUPIL APPROACH – THE SUBJECT IS TREARTED AS AN AUTHORITY THAN SOLICITS HIS VIEW POINT AND OPINION ON A SUBJECT MATTER, • GOOD SAMARITAN APPROACH – IS THE SINCERE AND VALID OFFERS OF HELP AND ASSISTANCE ARE MADE TO THE SUBJECT.
  • 63. • KINDRED SOUL APPROACH – THE SUBJECT IS PLACED IN A PEDESTAL HAVING SOME SPECIALIZED QUALITY THEN FLATTER HIM BY SHOWING ENOUGH CONCERN FOR HIS WELFARE TO PAY SPECIAL ATTENTION TO HIS EMPLOYMENT. • PARTIAL DISAGREEMENT APPROACH – SEEK TO PRODUCE TALKING BY THE WORD “I’M SURE IF I FULLY AGREE” B. PROVOCATIVE APPROACH – THIS ARE DESIGNED TO INDUCE THE SOURCE TO DEFEND A POSITION OR CORRECT A WRONG IMPRESSION. • TEASER BELT APPROACH – THE ELICITOR ACCUMULATES SOURCES OF KNOWLEDGE ABOUT A PARTICULAR SUBJECT TO TEMPT THE SUBJECT TO GIVE HIS VIEWS. • MANHATTAN FROM MISSOURI APPROACH – THE ELICITOR ADOPTS AN UNBELIEVABLE ATTITUDE ABOVE ANYTHING HE QUESTIONS ALL THE STATEMENT AND PROPOSITIONS.
  • 64. • JOE BLOW APPROACH – IS “I” KNOW THE ANSWER TO EVERYTHING APPROACH THE ELICITOR ADOPTS THE ATTITUDE OF BEING APPROACHABLE IN ANY FIELD. • NATIONAL PRIDE APPROACH – NATURE PROPENSITY OF ALL PERSONS TO DEFEND THEIR COUNTRY AND ITS POLICIES.
  • 65. 4. EMPLOYMENT OF TECHNICAL MEANS 1. BUGGING - The use or an equipment or tool to listen and record discreetly conversations of other people. 2. WIRE TAPPING - A method of collecting information through interception of telephone conversation. 5.TACTICAL INTERROGATION – The need for obtaining information of the highest degree of credibility taken on the minimum of time can be through interrogation which varies and dependent entirely on the situation.
  • 66. 6.OBSERVATION AND DESCRIPTION (ODEX) OBSERVATION - A complete and accurate observation by an individual of his surroundings and encompasses the use of all the major sense to register and recognized its operation or intel significance. DESCRIPTION - The actual and factual reporting of ones’s observation of he reported sensory experience recounted by another. PSYCHOLOGIST ESTIMATE THAT APPROXIMATELY
  • 67. =COVER AND UNDERCOVER OPERATIONS= UNDERCOVER IS DISGUISING ONE’S OWN IDENTITY OR USING AN ASSUMED IDENTITY FOR THE PURPOSE OF GAINING THE TRUST OF AN INDIVIDUAL OR ORGANIZATION TO LEARN SECRET INFORMATION OR TO GAIN THE TRUST OF TARGETED INDIVIDUALS IN ORDER TO GAIN INFORMATION 1. COVER - The means by which an individual, group or organization conceals the true nature of its acts or existence from the observer 2. COVER STORY - A biographic account true or fictious that will portray The personality of the agent be assumed a scenario to cover up the operation 3. COVER SUPPORT – An agent assigned in target areas with the primary mission of supporting the cover story.
  • 68. TYPES OF COVER 1.ARTIFICIAL – ALTERING THE BACKGROUND THAT WILL CORRESPOND TO THE OPERATION 2.NATURAL – ACTUAL OR TRUE BACKGROUND.
  • 69. TYPES OF UNDERCOVER ASSIGNMENT 1. DWELLING – ONE IN WHICH THE AGENT ESTABLISHES RESIDENCE IN OR NEAR THE DWELLING IN WHICH HOUSES THE SUBJECT. 2. WORK ASSIGNMENT – PLACES THE UNDERCOVER AGENT IN A TYPE OF EMPLOYMENT WHERE HE CAN OBSERVE THE ACTIVITIES OF THE TARGET 3. SOCIAL ASSIGNMENT – REQUIRES TO FREQUENT PLACES OF ENTERTAINMENT AND AMUSEMENT KNOWN TO BE HABITUALLY VISITED BY THE TARGET 4. MULTIPLE ASSIGNMENT – AGENT IS GIVEN THE TASK OF COVERING TWO OR MORE OF THE ABOVE SPECIFIC ASSIGNMENT SIMULTNEOUSLY 5. PERSONAL CONTACT ASSIGNMENT OR ROPE JOB – AGENT IS REQUIRED TO DEVELOP FRIENDSHIP AND TRUST WITH THE TARGET FOR PURPOSES OF OBTAINING INFORMATION OR EVIDENCE. 6. SUBVERSIVE ORGANIZATION – THIS IS THE MOST DANGEROUS OF ALL UNDERCOVER ASSIGNMENT, THE AGENT WILL JOIN THE ORGANIZATION OF THE SUBJECT ITSELF HE MUST KNOW THE IDEOLOGIES OF THE GROUP AND ACTIONS WHILE INSIDE SHOULD CONFORM TO THE ORGANIZATION TO AVOID ANY SUSPICION.
  • 70. INFORMANTS AND INFORMER •INFORMANT NET - A controlled group of people who work through the direction of the agent handler •INFORMANT - Perosn who give information to the police voluntarily •INFORMER - Persons who give information for reward or price.
  • 71. TYPES OF INFORMANTS 1. CONFIDENTIAL INFORMANT - An informant who gives information to the police pertaining to the underworld about organized criminals with the understanding that his identity will be protected. 2. ANONYMOUS INFORMANT - Those who gives information through telephone with the hope that the informant cannot be identified. 3. VOLUNTARY INFORMANT - A type of informant who give information freely and willingly as a witness to a certain act. 4. SPECIAL INFORMANT -Those who gives information concerning specialized cases onlu and it is regarded a special treatment by the operatives (ex.teachers,businessman etc.)
  • 72. 5. FALSE INFORMANT – REVEALS INFORMATION OF NO CONSEQUENCES, VALUE OR STUFF CONNECTED WITHIN THIN AIR. 6. FRIGHTENED INFORMANTS – WEAKEST LINK IN CRIMINAL CHAIN, MOTIVATED BY ANXIETY 7. SELF-AGGRANDIZING – MOVES AROUND THE CENTER OF CRIMINALS DELIGHT IN SURPRISING THE POLICE ABOUT BITS OF INFORMATION 8. MERCENARY – INFORMATION FOR SALE NEEDED SOMETHING FOR EXCHANGE OF INFORMATION. 9. DOUBLE-CROSSER – HE WANTS TO GET MORE INFORMATION FROM THE POLICE MORE THAN HE GIVES. 10. WOMEN – MOST DANGEROUS 11. LEGITIMATE – OPERATORS OF BUSINESS DESIRE TO GIVE INFORMATION FOR LEGITIMATE REASONS.
  • 73. MOTIVES OF INFORMANTS • VANITY – CONCEITED ACT/CHARACTER OF THE CRIMINAL RESULTING TO SELF-BETRAYAL OR TANTAMOUNT TO GUILT,GAINING FAVORABLE ATTENTION AND IMPORTANCE BY THE POLICE. • CIVIC-MINDEDNESS – SENSE OF DUTY AND OBLIGATION TO ASSIST THE POLICE. • FEAR – A PERSON UNDER AN ILLUSION OF OPPRESSION BY ENEMIES OR OF OTHER IMPENDING DANGER. • REPENTANCE – ONE WHO HAS A CHANGE OF HEART AND WISHES TO REPORT A CRIME THAT IS PREYING ON HIS CONSCIENCE • GRATITUDE OR GAIN – AN EXPRESSION OF APPRECIATION TO OBTAIN A PRIVILEGE OR AN INTEREST IN THE WELFARE OH HIS FAMILY DURING HIS DETENTION. • REVENGE – TO SETTLE A GRUDGE DUE TO SETTLE A PREVIOUS INJURY • JEALOUSY – ENVIVOUS OF THE ACCOMPLISHMENTS OR POSSESSIONS OF ANOTHER AND WISHES TO HUMILIATE HIM. • REMUNERATION – A PERSON WHO INFORMS SOLELY FOR THE PECUNIARY OR OTHE MATERIAL GAIN HE IS TO RECEIVE.
  • 74. STEPS IN RECRUITMENT OF INFORMANT • SELECTION – TO IDENTIFY AND RECRUIT AN INFORMANT WHO HAS ACCESS TO SEVERAL SUBVERSIVE ORGANIZATIONS, ACCESS IS THE VALUABLE FACTOR IN RECRUITING THE POTENTIAL INFORMANT • INVESTIGATION – IT MUST ESTABLISHED POSSIBLE EXISTEING MOTIVES AS TO THIS PERSON MIGHT ASSIST THE OFFICER, IF NECESSARY CONDUCT A COMPLETE BACKGROUND INVESTIGATION TO THE POSSIBLE INFORMANT. • APPROACH – IT MUST BE DONE IN A PLACE CONDUCIVE TO THE POSSIBLE INFORMANT,AVOID PLACES WHICH MIGHT HAVE ANY PROBABILITY OF COMPROMISE,APPROACH MUST BE DONE IN A FOREIGN TERRITORY • TESTING – IT MUSR COMMERCE WITH LIMITED ASSIGNMENT WITH AGRADUAL INTERGRATION INTO MORE IMPORTANT MISSION.
  • 76.
  • 77. THANK YOU AND GOD BLESS!!