Review Police Intelligence

Download as pdf or txt
Download as pdf or txt
You are on page 1of 116
At a glance
Powered by AI
The key takeaways are about definitions of intelligence terms and methods of intelligence gathering including surveillance.

The different types of surveillance are discreet surveillance and close surveillance.

The different methods of surveillance discussed are foot surveillance, one-man surveillance, two-man surveillance, three-man surveillance, progressive or 'leap frog' method, and combined foot-auto surveillance.

POLICE INTELLIGENCE

KRISTEN JOY G. PAGUD-MOSTER, Ph. D.


INTELLIGENCE
The end product resulting from the collection,
evaluation, analysis, integration, and interpretation of
all available information which may have immediate or
potential significance to the development and
execution of plan, policies and programs of the user
POLICE INTELLIGENCE
The end product resulting from the collection,
evaluation, analysis, integration and interpretation of
all available information regarding the activities of
criminals and other law violators for the purpose of
affecting their arrest, obtaining evidence, and
forestalling plan to commit crimes.

3
DEFINITION OF TERMS
1. Intelligence Agency - is a government agency
responsible for the collection, analysis or
exploitation of information and intelligence in
support of law enforcement, national security,
defense and foreign policy objectives.
2. Intelligence Officer - is a person employed by an
organization to collect, compile and analyze
information which is used to that organization.
DEFINITION OF TERMS
3. Counter Intelligence - refers to effort made by
intelligence organizations to prevent hostile or
enemy intelligence organization from successfully
gathering and collecting intelligence against them.
4. Human Intelligence - category of intelligence
derived from information collected and provided
by human sources.
DEFINITION OF TERMS
5. Dead Drop/Dead Letter Box - is a method of espionage
trade craft used to pass items between 2 individuals
using a secret location and thus not require to meet
directly.
6. Live Drop - 2 persons meet to exchange items or
information.
7. Dead Drop Spike - is a concealment device used to hide
money, maps, documents,microfilm and other items.
DEFINITION OF TERMS
8. Cut-Out - is a mutually trusted intermediary,
method or channel of communication, facilitating
the exchange of information between agents.
9. Espionage/Spying - involves a government or
individual obtaining information that is
considered secret of confidential without the
permission of the holder of the information.
DEFINITION OF TERMS
10. Agent Handling - is the management of agents,
principal agents and agent networks by
intelligence officers typically known as case
officers.
11. Case Officer - is an intelligence officer who is
trained specialist in the management of agents
and agent network.
DEFINITION OF TERMS
12. Agent - acts on behalf of another whether
individual, organization or foreign government,
works under the direction of a principal agent or
case officer.
13. Cryptography - is the practice and study of
techniques for secure communication in the
presence of third parties called adversaries.
DEFINITION OF TERMS
14. Flip- apprehended criminals who turn informants.
15. Snitches - jailhouse informants.
EVENTS AND PERSONALITIES IN THE
WORLD OF INTELLIGENCE
Number 13:17-32 Old Testament (Holy Bible) =
Moses sent twelve (12) scouts to the land of Canaan
where he detected directed them to spy the land, the
people and their location and the nature of their cities.
Sun Tzu "Those who know themselves as well they
know their enemies will never suffer defeat". In his
boon "Art of War".
Hannibal – one of the greatest strategist, cultivating a
network of informers among Gualish tribes in Po valley.
He often dresses as a beggar and went to the streets of
Rome to gather first hand information.
Frederick the Great – known as the “Father of
Organized Military Espionage”
4 CLASSES OF AGENTS ACCORDING
TO FREDERICK THE GREAT
1. Common Spies-recruited among poor folk, glad to earn a
small sum or to accommodate a military officer;
2. Double Spies-- the low informers and unreliable renegades of
value chiefly in spreading false information to the enemy;
3. Spies of Consequences -- courtier and noblemen, staff
officers and kindred conspirators invariably requiring a
substantial bribe or bat
4. Persons who are forced to undertake espionage against their
will.
Alexander the Great - A renowned Greek conqueror
had his share of advance information when rumors of
discontent circulated from among the ranks of his men.
He was able to identify those disloyal ones by devising
the first “letter sorting” and opening to obtain
information.
Frey Tomas de Toquemada - Master planner who
conducted espionage during the 15th Century under
the Inquisition wherein purging and ecclesiastical was
undertaken to fortify and solidify the Church.
 Delilah - A biblical personality who was able to gain
information by using her beauty and charm. She was
responsible for the fall of Samson a known Israelite
leader who terrorized the Philistines.
Sir Samuel Luke - Chief Scout of Oliver Cromwell who
was able to dethrone King Charles I in British Civil War
of 1640's. Sir Samuel Luke was said to be industrious in
snooping on the enemy.
John Churchill - first duke of Malborough, told critics
of his enormous expenditure on espionage, that " No
war can be conducted successfully without early and
good intelligence, and such advices cannot be had but
a very great expense".
Edward I - An English monarch who started utilizing
English informants especially to determine seditious
writings against the crown and identify of his
enemies. Rewards are given towards or every useful
information gathered.
Sir Francis Walsingham of England - Protector of
Queen Elizabeth I who organized the secret police and
established a spy network to detect fleet movement of
enemies of the British Empire particularly the
Portuguese. Regarded as the "First Great Spymaster",
a ruthless in the cause, he was responsible for the
assassination, murdering and execution of people who
covertly betrayed the queen.
Karl Schulmeister - Renowned as "Napoleon's Eye".
He was credited for establishing counter intelligence
conducted against spies. He is a master of deceit who
used black mail to obtain vital information pertaining
to the personality and identify of the enemies of
Napoleon during the 18th Century.
 Sir Arthur Wellesly - Duke of Wellington, who defeated
Napoleon's at Waterloo in 1815. Regarded as the "Greatest
Military Spymaster at All Time". He live by the motto; "All the
business of war is to find out what you don’t know by what you
do." He always studied the enemy in depth, finding out not only
where the opposing army was and how strong it was, but the
character of it's commander, the spirit and training of its troops,
their battle experience, and how they were supplied with arms
and rations. He also studied and mapped the roads, rivers and
topography of the war theatre.
 Wilhelm Johann Karl Eduard Steiber - Known as the
Prussia's "King of Sleuthhounds" as minister of police he
studied the use of propaganda and censorship as well as
utilizing statistical intelligence accounting. Steiber's
thorough organization and ruthless, his sinister innovations
and cold, calculating manipulation of human weakness
made him the spymaster who most shape the course of the
20th century espionage.
 Alfred Redl - A homosexual Double Spy who while
working as intelligence direct proof Austria and Hungary,
spied the Russians. His treasons activities were discovered
and compelled to commit suicide. His spying led to the
death of over 500,000 agents and soldiers combined in his
13 years episode as a spy.
 William Stephenson - A film mogul in England who
founded the British Security Coordination in New York to
cooperate with American spy agencies on secret orders
from Winston Churchill in coordination with Franklin D.
Roosevelt.
 William "Wild Bill" Donovan - Headed the Office of
Strategic Service (OSS), the immediate forerunner of the
Central Intelligence Agency, a lawyer and millionaire
Republican, Donovan enjoyed Roosevelt's trust, friendship,
and most crucial of all direct access to the inner sanctums of
the White House. His jovial outgoing personality and his
upper class social background played a considerable part in
setting overall tone and style of "THE COMPANY"
Rahab - The Harlot of Jericho who sheltered and
concealed the agents of Israel, made a covenant with the
agents and duped their pursuers. She was not only an
impromptu confederate of immense value for the Jewish
leader of that far distant day, but also established a plot-
pattern which is still of periodic relief to motion picture
producers.
Gen. Romano Q. Sertorius - The Roman commander in
Spain who possessed a white fawn and allowed it to be
come widely known that he derived both secrets and
guidance from the fawn. His intelligence agents credited
their information to the supernatural power of animal.
Akbar - The "Great Mogul“. He was considered one of the
brilliant military strategists in the history of military
intelligence. He had developed an effective intelligence
system for 15 years in Rome, and he usually roam around
the City often disguise as a beggar to gather first hand
information.
Napoleon Bonaparte - "One Spy in the right place is
worth 20,000 men in the field". He organized two
Bureau of Interest.
JULIUS CEASAR - During his time, the staff of each legion
includes ten "speculators" who served as an information-
collecting agency. The "speculators" were the first
intelligence personnel to appear definitely in a military
organization. Military success of the Romans was aided by
communication system. Made use of carrier pigeons, which
made possible the amazing speed with which intelligence of
the Imperial Rome was transmitted. They also employed
ciphers to ensure secrecy of communications.
SUN —TZU
a Chinese philosopher who authored the “The Art of
War” is the favorite readings of the late Mao Tse Tung and
is a required reading material for the Chinese Communist
Tacticians.
“Know thy enemy and know yourself, you need not fear
the results of a hundred battles”“If you know yourself and
not the enemy, for every victory, you are a fool who will
meet defeat in every battle.”
NOTABLE INTELLIGENCE
ORGANIZATIONS
FEDERAL BUREAU OF
INVESTIGATION
First established in 1908 as an investigative arm of
the U.S. Department of Justice and became what is
known as the F.B.I. under its first director John Edgar
Hoover in 1924:
On September 6, 1939 by a presidential directive,
it came to its responsibility the task of a domestic
intelligence.

35
FEDERAL BUREAU OF
INVESTIGATION
First established in 1908 as an investigative arm of
the U.S. Department of Justice and became what is
known as the F.B.I. under its first director John Edgar
Hoover in 1924:
On September 6, 1939 by a presidential directive,
it came to its responsibility the task of a domestic
intelligence.

36
CENTRAL INTELLIGENCE AGENCY
The agency was created under the US National Security
Act of 1947. The law above the personnel of the Central
Intelligence group established by the late President Truman
in January 1946. The CIA is under the National Security
Council.

37
BRISTISH SECRET SERVICE (MI5/MI6)
Established in 1909 and was created as internal
departments under the control of the Secret Service
Bureau.
Military Intelligence Department 5, under the
command of Captain Vernon Kell, was then responsible
for exposing German spies.
MI6 under the command of Captain Mansfield
Cumming, was in charge of gathering foreign
intelligence.
BRISTISH SECRET SERVICE (MI5/MI6)
MI5 became the responsibility of the Home Secretary and
MI6 reported to the Foreign and Commonwealth Secretary.
MI5 today is still responsible for national security counter-
espionage activities, but it does not have the power to
arrest suspects.
M16 principal role is to provide intelligence gathered from
foreign sources in support of national security, defense and
foreign economic policies.
KGB
 Komitet Gosudarstvennoy Bezopasnosti, A Russian
Intelligence Agency named on 1954.

The most feared security service in the world was created


after the Russian Revolution in 1917.
MOSSAD
 Intelligence Agency of Israel and is considered the
best in the world.
The agency's motto is found in "Provers XI, 14"
Where no counsel is, the people fall, but in the
multitude of counselors there is safety.
REUVEN SHILOAH was the first Director of MOSSAD
MOSSAD
Mossad has two branches namely:
1. AMAN- Military Intelligence (Israels Defense
Forces)
2. SHABAK - GENERAL SECURITY SERVICE
(INTERNAL SECURITY); Shabak is form the word
"shin bet" that means a defender who shall not
be seen
MINISTRY OF STATE SECURITY (MSS)
Ministry of State Security, is the security agency of
the Peoples Republic of China.
NATIONAL INTELLIGENCE
COORDINATING AGENCY (NICA)
 The primary intelligence gathering arm of the
Philippines formed in 1949. Its motto is “Intelligence is
Security”.
 It is headed by a Director General and is assisted by a
Deputy Director General. (Alex Paul I Monteagudo)
The Director General reports directly to the President of
the Philippines.
BND
Intelligence agency of West Germany
Bundesnachrichtendienst which means Federal
Intelligence Service
INFORMATION
All evaluated materials of every description including
those derived from observation, reports, rumors,
imagery, and other sources from which intelligence is
produced.
TWO GENERAL CLASSIFICATIONS OF
SOURCES OF INFORMATION
OPEN SOURCES
99% of the information collected are coming from open
sources.
a. Enemy Activities
b. POW
c. Captured Documents
d. Map
e. Weather Forecast, Studies, Reports
f. Agencies
CLOSE SOURCES
1% of information from close sources.
Close/Covert Method
a. Surveillance f. Tactical Interrogation
b. Casing g. Observation and Description
c. Elicitation
d. Surreptitious Entry
e. Employment of Technical Means (Bugging and Tapping Devices)
CRITERIA OF INTELLIGENCE
1. Universality of application - it should apply to as many phases
and ‘aspects of intelligence as possible. It should guide not
only the production of intelligence but also the concomitant
activities essential to the process as well as the organization
and the thought and actions of the individual composing it.
2. It must be broad - truly a general rule. It should form the
basis for a formulation of corollary and subsidiary guides.

50
PRINCIPLES OF INTELLIGENCE
1. Intelligence and operation are interdependent
◦ -separate and distinct activities but compliment each other.
2. Intelligence requires continuous security measures
◦ -deny unauthorized personnel information about operation
and intelligence product.
3. Intelligence must be useful
◦ -must serve the commander’s need and requirements

51
PRINCIPLES OF INTELLIGENCE
4. Intelligence must be timely
◦- must reach the user in time to serve as basis for
appropriate action.
5. Intelligence must be flexible
6. Intelligence requires imagination and foresight

52
BROAD CATEGORIES OF INTELLIGENCE
1.National Intelligence – integrated product of intelligence
developed by all government departments concerning the
broad aspect of national policy and national security.
National Policy – specific courses of action to achieve the
national objectives.
National Security – this relate to the protection and
preservation of military, economic and a productive strength
of a country including the security of the government and
domestics and foreign affairs against espionage, sabotage and
subversion.

53
BROAD CATEGORIES OF INTELLIGENCE
2. Department of Intelligence – the intelligence
required by department or agencies of the government
to execute its mission and discharge its responsibilities.
3. Military Intelligence – used in the preparation and
execution of tactical plans.

54
FUNCTIONAL CLASSIFICATIONS OF
POLICE INTELLIGENCE
1. Criminal Intelligence – refers to the knowledge
essential to the prevention of crimes and the
investigation, arrest, and prosecution of criminal
offenders.
2. Internal Security Intelligence – refers to the knowledge
essential to the maintenance of peace and order.
3. Public Safety Intelligence – refers to the knowledge
essential to ensure the protection of lives and
properties.

55
FIELDS OF POLICE INTELLIGENCE

56
1. STRATEGIC INTELLIGENCE
knowledge pertaining to the capabilities and
vulnerabilities of a foreign nation, which is required by
the National Planners for the formulation of an
adequate National Defense in peace and forms the
basis for, projected military operations in time of war.
It does not have immediate operational value but
rather long range that may become relevant to future
police operations.
COMPONENTS OF STRATEGIC
INTELLIGENCE
a. Political Intelligence – deals with Domestic and Foreign
affairs and relation of government operations;
1. Basic Principles of the Government
2. Government Structures
3. Public Order and Safety
4. Subversion
5. Intelligence and Security Organization
COMPONENTS OF STRATEGIC
INTELLIGENCE
b. Economic Intelligence – deals with the extent and
utilization of Natural and Human resources to the
industrial potential of the Nations.

c. Transportation and Telecommunication Intelligence


- concerned with the operations and facilities not only
the Military but also the Civilians.
COMPONENTS OF STRATEGIC
INTELLIGENCE
d. Sociological Intelligence – deals with the demographic
and psychological aspects of groups of people.
1. Population and Manpower
2. Characteristics of the People
3. Public Opinion – attitudes of the majority of the people
towards matters of public policy.
4. Education – based on literacy rate
COMPONENTS OF STRATEGIC
INTELLIGENCE
e. Biographical Intelligence – deals with individual personalities who
have actual possession of power.
f. Armed Forces Intelligence – deals with the armed forces of the
Nation.
1. Position of the Armed Forces – constitutional and legal basis of its
creation and actual role.
2. Organization and structure and territorial disposition
3. Military Manpower Recruitment
4. Order of Battle
COMPONENTS OF STRATEGIC
INTELLIGENCE
g. Geographical Intelligence – deals with the natural as well as
man made features of the physical environment of man
considered from the point in view of military operations.
1. Location – military and economic importance
2. Size – measurement of which a nation can exchange space or
time during war.
3. Shape
4. Weather and Climate
COMPONENTS OF STRATEGIC
INTELLIGENCE
h. Scientific Intelligence – deals with the progress of
the research and development as it affects the
economic and military potential of a nation.
2. LINE INTELLIGENCE (TACTICAL AND
COMBAT)
It is the kind of intelligence required by the
commander to provide for planning and conduct
tactical and administrative operation in counter
insurgency. This pertains to knowledge of People,
Weather, Enemy and Terrain (PWET) used in planning
and conducting tactical and administrative operation
in a counter insurgency.
WHAT ARE THE INTELLIGENCE
INFORMATION TO BE DETERMINED?
a. People
living condition of the people
sources of income
education of the people
government livelihood of the people
extent of enemy influence to the people
WHAT ARE THE INTELLIGENCE
INFORMATION TO BE DETERMINED?
b. Weather
visibility
cloudy
temperature
precipitation(rain)
wind
WHAT ARE THE INTELLIGENCE
INFORMATION TO BE DETERMINED?
b. Weather
visibility
cloudy
temperature
precipitation(rain)
wind
WHAT ARE THE INTELLIGENCE
INFORMATION TO BE DETERMINED?
c. Enemy
location of the enemy
strength of the enemy
disposition
tactical capability
enemy vulnerability
WHAT ARE THE INTELLIGENCE
INFORMATION TO BE DETERMINED?
d. Terrain
relief and drainage system
vegetation
surface material
man made features
3. Counter Intelligence (CI)
This kind of intelligence covers the activity
devoted in destroying the effectiveness of hostile
foreign activities and to the protection of info against
espionage, subversion and sabotage.

70
THREE ACTIVITIES OF CI
1. Protection of information against espionage;
2. Protection of personnel against subversion;
and
3. Protection of installations and material against
sabotage

71
ESPIONAGE - involves a government or individual obtaining
information that is considered secret of confidential without the
permission of the holder of the information
SUBVERSION –act of overthrowing a government
SABOTAGE - s a deliberate action aimed at weakening a polity,
effort, or organization through subversion, obstruction,
disruption, or destruction. One who engages in sabotage is
a saboteur
TWO GENERAL TYPES OF
COUNTERINTELLIGENCE
a. Passive Measures – are those measures, which
seek to conceal information from the enemy.
b. Active Measures – are those measures, which
seek actively to block the enemies’ effort to gain
information or engage in espionage, subversion,
and sabotage.

73
FIVE IMPORTANCE OF EFFECTIVE
COUNTERINTELLIGENCE
a. Denies information to the enemy
b. Reduces the risk of a command
c. Aids in achieving surprises
d. Increases the security of the command
e. Decreases the enemy ability to create information
about the forces.

74
FIVE CATEGORIES OF
COUNTERINTELLIGENCE
OPERATION

75
MILITARY SECURITY
it encompasses the measures taken by a command
to protect itself against espionage, enemy operation,
sabotage, subversion or surprise.
MILITARY SECURITY
Ex.
secrecy discipline
special safeguarding of classified information
security of troop movement
special handling of weather and escapees
counter subversion within the armed forces
tactical measures in combat area
PORT FRONTIER AND TRAVEL SECURITY
has to do with the application of both military and civil security
measures for counterintelligence control at point of entry and
departure, international borders and boundaries.
Ex.
scty control of merchants, seamen and crew of commercial aircraft
scty screening and control of frontier
scty control of seaports
scty control of frontier crossing point
CIVIL SECURITY
it encompasses active and passive
counterintelligence measures affecting the non-
military nationals permanently or temporarily
residing in an area under military jurisdiction.
CIVIL SECURITY
Ex.
systematic registration of civilians and aliens
control of circulation
curfew
surveillance of suspected political organization
scty screening of labor
issuance of passes and permits
control of internal commerce
CENSORSHIP
it is the control and examination of the following;
a. civil
b. national
c. armed forces
d. field press
e. POW
SPECIAL OPERATIONS
counter subversion, sabotage and espionage
EIGHT BASIC PRINCIPLES OF
COUNTERINTELLIGENCE OPERATIONS
a. Conformity to mission
b. Avoidance of publicity
c. Objectivity
d. Confirmation
e. Offense
f. Flexibility
g. Continuity
h. Coordination
COUNTERINTELLIGENCE
INVESTIGATION
is an activity, which constitute the value of the
counterintelligence workload, worldwide and includes
specific investigation of individual and incidence, which
for the most part are conducted in an overt but
discreet manner.
THREE CATEGORIES OF
COUNTERINTELLIGENCE MEASURES
1. Denial Measures
a. secrecy discipline
b. document scty
c. camouflage and concealment
d. communication scty
e. military censorship
f. counter reconnaissance effort
THREE CATEGORIES OF
COUNTERINTELLIGENCE MEASURES
2. Detection Measures
a. PSI
b. scty tag or pass card
c. challenge or password
d. reconnaissance
THREE CATEGORIES OF
COUNTERINTELLIGENCE MEASURES
3. Deception Measures
a. ruse – use of escape and evasion
b. dummy position
c. fabricated information
PHASES OF INTELLIGENCE
CYCLE
PHASE I - PLANNING THE COLLECTION EFFORT

This phase of the cycle is involved in the


determination of the requirements of Intelligence. It is
concerned with identifying the so called ESSENTIAL
ELEMENT OF Information (EEl) - an item of intelligence
or information of the characteristics of the area of
operations and the enemy, which the commander feels
he needs before he can reasonably arrive at a decision.
PHASE I - PLANNING THE COLLECTION EFFORT

This phase of the cycle is involved in the


determination of the requirements of Intelligence. It is
concerned with identifying the so called ESSENTIAL
ELEMENT OF Information (EEl).
ESSENTIAL ELEMENT OF INFORMATION
(EEI)
an item of intelligence or information of the
characteristics of the area of operations and the
enemy, which the commander feels he needs before
he can reasonably arrive at a decision
1. The intelligence officer must have a thorough knowledge
of the available sources of information, the collecting
agencies and type of information the latter can provide.
2. He must understand the operations of the command in
order to provide the particular intelligence required for
success.
3. He must have a thorough knowledge of the tactics,
organizations and characteristics of the enemy.
4. He must be especially competent in the fields of
surveillance, reconnaissance, counter-
reconnaissance, and acquisition of operations.
5. He should also have a basic understanding of the
weather elements and their influence upon
personnel, material and terrain.
PHASE 2 - COLLECTION OF
INFORMATION
This phase of the cycle is concerned with
identification of the collecting agency, the formulation
of procedures on the manner of collecting the
information in conjunction with the plans as achieved
in phase one.
FACTORS IN CHOOSING COLLECTION AGENTS

1. Capability – agents placement or access to other


target
2. Multiplicity – more agents
3. Balance
PHASE 3 - PROCESSING THE COLLECTED
INFORMATION
This phase of the cycle is concerned with the
examination and collation of all collected information.
STAGE IN PROCESSING THE COLLECTED
INFORMATION
1. Recording – is the reduction of information into
writing or some other form of graphical representation
and the arranging of this information into groups
related items.
2. Evaluation – is the determination of the pertinence
of the information to the operation, reliability of the
source of or agency and the accuracy of the
information.
EVALUATION TO DETERMINE
1. Pertinence – does it holds some value to current
operation is it needed immediately
2. Reliability – judging the source of information or
agency
3. Credibility – truth of information
JUDGING CREDIBILITY
1. It is possible for the reported fact or event to have
taken place.
2. Is the report consistent within itself?
3. Is the report confirmed or corroborated by
information from different sources or agencies.
4. If the report does not agree with information from
other sources which one is more likely to be true.
INTERPRETATION OF INFORMATION TO
DETERMINE
a. Meaning
b. Significance
STAGE IN PROCESSING THE COLLECTED
INFORMATION
3. Analysis – it is the determination of the
significance of the information relative to the
information and intelligence already known and
drawing deductions about probable meaning of the
evaluated information.
TWO DISTINCT PHASES
a. Assessment
b. Integration – it is the combination of the elements
stated in assessment with other known information
or intelligence to form a logical feature or hypothesis
of enemy activities or information of the operational
area characteristics of the mission of the command.
PHASE 4 - DISSEMINATION AND USE OF
INFORMATION
This phase of the cycle refers to the activities of
transferring the processed information to the proper
users, most particularly the authority that requires the
activity. Processed information can be disseminated
through Annexes, Estimates, Briefing, Message,
Reports, Overlays, and or Summaries.
Processed information are disseminated through:
Annexes Briefing Reports
Situations Estimates Message
Overlays Summaries
EVALUATION GUIDE
RELIABILITY ACCURACY OF INFORMATION
A – Completely Reliable 1 – Confirmed By Other Sources
B – Usually Reliable 2 – Probably True
C – Fairly Reliable 3 – Possibly True
D – Not Usually Reliable 4 – Doubtfully True
E – Unreliable 5 – Improbable
F – Reliability Cannot be 6 – Truth Cannot Be Judged
Judged
SOURCES OF INFORMATION
SYMBOL INTERPRETATION
S Signal Intercept
T Direct Observation by Commander/Chief of Unit
U Report by Penetration Agent or Resident Agent
V Report by PNP/AFP Troops Involved in Encounter
W Interrogation of Captured Enemy Agent/Foreigner
X Observation of Government/Civilian Employee or Officials
Y Observation by a Member of the Populace
Z Documentary
SURVEILLANCE
Surveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an investigation.
Surveillance of persons is called Tailing or Shadowing,
Surveillance of place is called Casing or Reconnaissance,
and Surveillance of other things, events, and activities
is called Roping.

107
1. Surveillance — is form of investigative activity which
consists of keeping a person, place or other target under
physical observation in order to obtain information
concerning the activities, identities, and contacts made by or
at such targets..
2. Surveillant.- the person who performs and maintains the
surveillance.
3. Subject-the person, place, organization or target being
observed.
TYPES OF SURVEILLANCE
1. Discreet Surveillance-the subject is unaware that he
is under surveillance; to conceal the fact that he is
under observation.
2. Close Surveillance.-is conducted without regard for
the fact that Subject may become, or his aware of
the surveillance.
Surveillance may be conducted:
1. On foot
2. Use of vehicle, air or watercraft
3. From a fixed place of observation or by
4. A combination of any of those means.

110
METHODS OF SURVEILLANCE
1. Foot Surveillance. -
depends on the number of
surveillants available,
volume of pedestrian
traffic and the importance
of concealing the
surveillance.
METHODS OF SURVEILLANCE
2. One-man Surveillance. — extremely difficult and
should be avoided. If unavoidable, keep subject in
view at all times.
METHODS OF SURVEILLANCE
3. Two-man Surveillance.
- affords greater
security to agents
against detection
compared to one man
surveillance. two
agents are employed
to follow the subject.
METHODS OF SURVEILLANCE
4. Three-man
Surveillance.
- (ABC Method). —
reduces the risk of losing
the subject, affords
greater security to agents
and eliminate possible
METHODS OF SURVEILLANCE
5. Progressive or “Leap Frog” Method- pre-
arrangement or signal, the two or more
surveillants will change places with each other
and is used when extreme caution is mandatory.
6. Combined Foot-Auto Surveillance. - -involves
surveillance on foot by one, two or three Agents
and’ at the same time by one or two Agents in an
automobile.
THAT’S ALL FOLKS!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy