Review Notes On Police Intelligence
Review Notes On Police Intelligence
Review Notes On Police Intelligence
INTELLIGENCE Defined:
The product resulting from the collection, evaluation, analysis, interpretation, integration of all the
available information which concerns one or more aspect of various human activities which should
be known in advance in order to initiate a particular course of action.
POLICE INTELLIGENCE
The product resulting from the collection, evaluation, analysis, integration, and interpretation, of all
the available information which concerns one or more aspect of criminal and subversive activities
which is immediately and potentially significant to police planning.
ALVIN TOFFLER
“A small bit of the right information can provide an immense strategic or tactical advantage, the denial of
a small bit of information can have catastrophic effects. “
his allies and mercenaries, he sought the truth, and got it by simplest expedient by devising the first
“letter sorting” and opening to obtain information.
2) Marcus Lucinius Crassus
The crowded and unsanitary conditions of ancient cities like Rome caused frequent and dangerous
fire. Crassus, a millionaire, employing slaves and freemen organized a complicated enterprise
consisting of a private fire brigade made into an intelligence unit.
Five hundred workmen, equipped with ropes, buckets, ladders and other equipped were ready until
one of Crassus roving agents tapped his vast communication system in reporting a fire. After a fire
alarm was sounded Crassus led his fire brigade to the scene, saw the direction of the wind and
interviewed people whose properties were endangered and offered to buy their properties at a very
low price. If the owners agreed to the sale, the fire brigade was called to stop the fire.
3) Frederick the great of Prussia
The is known as the Father of Military Intelligence because he was the first to classify his spies into 4
classes namely, (1) common spies, those recruited among poor folk, glad to earn a small sum or to
accommodate as military officer;(2) Double Spies, are unreliable renegades, chiefly involved in
spreading false information to the enemy; (3) spies of consequence, couriers and noblemen, staff
officers, and kindred conspirators, requiring a substantial bribe or bait (4) Person who are force to spy
against their will through threats, intimidation, blackmail, or death.
4) Genghis Khan
Renown as one of the great barbarian leaders of the world history. He achieved his victories not
through the untamed fury of his soldiers but through careful planning and organization. He was
known “The Great Mongol”, who used intelligence to conquer China and invade Cathay.
5) SunTzu
A Chinese Philosopher who wrote the book entitled “The Art of War” in 500 B.C. because a
successful general by applying the principles in his book. His book begins with this statement: “the
art of war is of vital importance to the state. It is a matter of life and death, a road either to safety or
to ruin. Hence, under no circumstance can it be neglected.
6) Hannibal
He was considered one of the brilliant military strategists in the history of military intelligence. He
had developed an effective intelligence system for 15 years in Rome. He usually roams around the
city often disguise himself as a beggar to gather firsthand information.
7) Schulmeister, Napoleon’s Eyes
Karl Schulmeister, Napoleon’s military secret, was born on August 5, 1770. He began his career in
offensive espionage. Under a cover role, he was able to infiltrate the Austrian General Staff.
8) Stieber
Incorporated intelligence in the General Staff support system. He further device military censorship
and organized military propaganda.
9) Alfred Redl
One of the most brilliant intelligence agent, though a homosexual. Become chief of the Austro-
Hungarian Secret Service, but in fact a double agent of Russia. In 1913, his treason lead to the death
of 500,000 agents and soldiers combine in his 13 years’ espionage episode.
10) Donovan
Major-General, organizer of the OSS, builder of a Central Intelligence System. The OSS whose
exploits, become legendary in World War II.
11) Battle of Midway
In June 1442, the turning point of the Naval in the Pacific. The victory gained by the American was
due to the disrupted messages from the Imperial Japanese Navy.
12) Admiral Isoroku Yamamoto
April 1943, the cryptoanalyst of the US Navy Communications Intelligence intercepted a top secret
signal relaying the travel of the Admiral. Enroute he was intercepted and crashed in the jungles of
Baugainville.
13) V2- Rackets
OSS agents working in conjunction with the British Intelligence, through penetration and technical
intelligence discovering Punemunde which was the V2 guide missile research project of Germany. It
resulted to its destruction and heavy bombing.
2 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
The first use of intelligence was in the concept of spying as attributed to Chapter 13 of the book of
Numbers in the Holy bible, yet it did not immediately developed into what is known today as police
intelligence.
What is known today as police intelligence had its own origin from military intelligence. The
development of a civilian police force did not brought with it the formation of an intelligence unit
within the force.
Because basically, the primary purpose of the police was the maintenance of peace and order,
enforcement of the laws and prevention of crime. The need for police intelligence was only realized
after the birth of organized crime in the United States of America.
Police Intelligence could be roughly estimated to have started in New York City in the early 1900’s
when “Italian Squad was form under the leadership of Joseph Petrosino.This is a police squad
credited for sending more or less five hundred men to prison and had complied extensive intelligence
data on members of the MAFIA and CAMORA which had slowly migrated from Sicily and Italy to
USA. Joseph Petrosino is a policeman of Italian origin who migrated to U.S.A. at the age of six. He
was killed in an ambushed in Plaza Marina Palermo. Sicily while obtaining criminal records of
suspected members of the Black HandSociety with the onset of organized crime. The need for
systematic police intelligence became a must for police forces in major cities of America.
AXIOM isan established principle which is universally accepted, a statement of self-evident truth. These are
facts that require no proof because truth of these statements is obvious.
INTELLIGENCE CYCLE
It is the process of developing raw information into finished intelligence for policymakers to use in
decision making and action. The process through which intelligence is obtained, produced, and made
available to users.It consists of four phases, namely;
1. The planning phase or Planning of collection Efforts
2. The Collection phase or the collection of information
3. The processing phase or the Processing of the Collected information into Intelligence
4. Dissemination of Intelligence
This phase is purposely to determine the Essential Elements of Information. The EEIs are categorized
according to the ff. used;
1. EXECUTIVE – It is required by executives in the government, military or police commanders
and is used as basis for policy and decision making.
2. CONTRIBUTORY – This is intelligence required to make staff plans and estimates which
contribute to decision and policy-making.
3. OPERATIONAL – This is additional intelligence required to carry out the effective
implementation of decision and policies.
4. COLLATERAL – Intelligence required by higher echelons of the government, military or
police establishments. Allies may also need this requirement.
1) Line intelligence
– this type of police intelligence is also known as intelligence of immediate value. It is needed daily for
police planning and operation. It contains the daily incidents of crime occurrence, the activities of the
different police units, and the reaction of the community in favor or against police performance or
operation.
2) Strategic Intelligence
– this intelligence operation is otherwise long range in nature and has little immediate value. This type
of intelligence operation is directed towards criminal organizations or syndicates, drug traffickers,
subversive organizations, terrorist organizations whose activities are hidden in the eyes of the public,
or the police.
3) Counter Intelligence
– this type of police intelligence operation is primarily concerned with defending the police
organization against the activities of criminal elements or any other groups which seeks to destroy the
integrity of police department.
4 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
2) The Modern or Technical Intelligence which employs machine such as satellites, electronic gadgets to
gather information.
SOURCES OF INFORMATION
One of the most important aspects of intelligence is information. Without it, there will be no
intelligence. Information, however, does not come in handily, that a great need for time, effort and
money is needed to gather it. It is also worthwhile to know and cultivate the different sources of
information, like people, records, events, objects, etc.
1) Overt Operations
this type of operations is done if the information or documents are procured openly without regard as
to whether the subject of investigation becomes knowledgeable of the purpose for which it is being
gathered. Gathering of information openly is usually done through open sources like public or
private records, newspaper, Tactical Intetc.
TACTICAL INTERROGATION
The need for obtaining information of the highest degree of credibility taken on the minimum of time
can be through interrogation which varies and dependent entirely on the situation. In tactical
interrogation, familiarization of the following is necessary:
Interrogation Techniques:
Techniques of Approach
the purpose is to gain the cooperation of the source and induce him to answer questions which will
follows.
another series of questioning (this is done repeatedly). After many repetitions, the interrogee
will be exasperated and will finally cooperate hoping that he can be allowed to rest or sleep.
Ask a question, listen to a reply and then ask the same question repeatedly (use a tape
recorder if possible). The purpose is to bore the interrogee thoroughly until he begins to
answer questions freely to end the harassment.
5. Opposite Personality Technique
– also known as “Mutt and Jeff”, “Threat and Rescue”, “Bud Guy – God Guy’, “Sweet and
Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of two (2) interrogators playing opposite
roles.
6. Egotist Techniques (Pride and Ego)
– usually successful when employed against an interrogee who has displayed a weakness or a
feeling of insecurity. You may reverse the technique by complimenting the interrogee in
hopes of getting him to admit certain information to gain credit. Described him as the best
person, superior or comrade.
7. “Silent” Technique
– employed against nervous or the confident type of interrogee. Look out the interrogee
squarely in the eye with sarcastic smile (force him to break eye contact first). He may ask
questions but the interrogator must not answer. Patience is needed until the interrogator is
ready to break silence.
8. “Question Barrage” Technique (Rapid Fire Questioning)
– intended to confuse the interrogee and put him into a defensive position. The interrogee
become frustrated and confused, he will likely reveal more than he intended, thus creating
opening for further questioning.
2) Covert operations
This type of operations is done when the gathering of information or documents is secret or without
the knowledge of the person of organization to whom such information or documents are to be used.
The following are covert types of police intelligence operation;
a) Agent i) Use of Sound Equipment
b) Use of Informers or informants (bugging or wiretapping)
c) Surveillance j) Use or Radar or Sonar (use of
d) Casing Or Reconnaissance satellites).
e) OBSERVATION AND k) Crypt Analysis.
Description A.K.A (ODEX) l) Censorship
f) Undercover Operation m) Document Exploitation or
g) ELICITATION Exploitation of Captured
h) Surreptitious Entry material
AGENT
A person unofficially employed by an intelligence service, often as a source of information
6 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
a secret agent hired to incite suspected persons to some illegal action, outbreak, etc., that will make
them liable to punishment.
INFORMANTS/INFORMER
INFORMERS are those who give information in exchange of something, like money, goods,
accommodations or favor while INFORMANTS are those people who give information without
expecting rewards or favor.
Handling of informer/informants
Important points to consider in handling of informant/informer:
1) Supervisors or agent handler must always practice secrecy discipline and he must never tell the
identity of the informants or informer except to the commanding officer.
2) A code name or cone number should be assigned to each informer/informant and must be kept in a
safe privy available only to the handler and commanding officer;
3) An informant or informer should not be made to testify in court except in a very serious case wherein
his identity can be sacrificed for the successful of the prosecution of the accused;
4) Personal meetings, contacts or communication with the informer or informant must be planned in
advance, and should not be done in public or police office;
5) Regardless of occupation, education, or character they should be treated courteously and with justice
and fairness;
6) Be exact about monetary transaction and keep your promise;
7) Never use derogatory names or words and do not let your informants/informers know each other
8) Protect them and never let them down if they need your help;
9) Always maintain a regular contact with them;
10) Accept all information received at a face value subject to verification or evaluation;
7 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
11) Train them properly al all aspects of the tradecrafts and never let them run the show. Always be in
control; and
12) In sending them to a mission, give them specific assignment through proper briefing and upon return
they should undergo a debriefing.
SURVEILLANCE
It is the disguised or secret observation of places and things for the purposes of obtaining information
concerning the identities of activities of the target of the subject. A form of clandestine investigation
which consist of keeping persons, place or other targets under physical observation in order to obtain
evidence or information pertinent to an investigation.
Pre-surveillance Conference
a conference held among the team members, the police intelligence unit before surveillance is
conducted.
Surveillance plan
the plan must establish the required type of personnel, the general and specific instructions for
surveillance. Ensure that the overall objective or the surveillance is understood.
All participating personnel will have common understanding of the operational limitations, signals
and special instruction which have been improved.
Definitions of terms;
Agent
acts on behalf of another whether individual, organization or foreign government, works under the
direction of a principal agent or case officer.
Agent Handling
is the management of agents, principal agents and agent networks by intelligence officers typically
known as case officers.
Be made
to be detected or suspected of being a surveillant by the subject.
Bugging
eavesdropping by electronic means, such as hidden microphone or radiotransmitter; bug –a device
used for such eavesdropping.
Burn the surveillance
8 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
when a surveillants behavior causes the subject to surmise or know that he or she is under
surveillance.
Convoy
a countermeasure to detect a surveillance; a convoy, usually a person, is employed to determine
whether or not a subject is under surveillance.
Cut-Out
is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of
information between agents.
Dead Drop Spike
is a concealment device used to hide money, maps, documents, microfilm and other items.
Dead Drop/Dead Letter Box
is a method of espionage trade craft used to pass items between 2 individuals using a secret location
and thus not require to meet directly. A secret location where materials can be left for another party to
retrieve
Decoy
a cover supporting the surveillant who can become a convoy whenever surveillant is burned.
Drop
any person is a convenient, secure and unsuspecting place where police undercover men meet his
action agent for debriefing or reporting purposes.
Eaves Dropping
Is the act of secretly listening to the private conversation of others without their consent.
Espionage/Spying
involves a government or individual obtaining information that is considered secret of confidential
without the permission of the holder of the information.
Fixed surveillance
similar to stakeout.
Flip
apprehended criminals who turn informants.
Live Drop
2 persons meet to exchange items or information.
Mustard Plaster
a form of open surveillance; here, the subject is followed so closely that surveillant and subject are
almost I lock step. It is tantamount to protective custody.
Open surveillance
a surveillance with little or no attempt as concealment; also termed “rough surveillance”. The subject
is most likely aware of the surveillance, but must not be lost.
Plant
similar to stakeout and undercover.
Propaganda
is a form of communication that is aimed at influencing the attitude of a community toward some
cause or position.
Safehouse
is a place, building, enclosed mobile, or an apartment, where police undercover men meet for
debriefing or reporting purposes.
Shadow
to follow secretly; to place a person under surveillance.
Snitches
jailhouse informants.
Stakeout
also called a plant or fixed surveillance; here the surveillant remains essentially in one position or
locale.
Subject
the party under surveillance
Surveillant
the person conducting surveillance
Technical surveillance
9 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
Surveillance involving the use of scientific devices to enhance hearing or seeing the subject’s
activities.
Undercover
an undercover agent who often gets to know or work alongside the subject. The term “roping”
describes this situation, and the undercover agent is said to be planted.
Classification of Surveillance
B. According to Methods:
1) Stationary
This is termed as a "stakeout" or "plant." A fixed surveillance is conducted when a person or
activity remains in place. This is observation of place usually a gambling, joint, a residence
where illegal activities are going on (fixed position)
2) Moving
A mobile surveillance is sometimes termed "tailing" or "shadowing." A mobile
surveillance may be made on foot or by vehicle. When a mobile surveillance is made by vehicle,
it is term “Tailgating”. It is conducted when persons being observed move from point to point and
are followed by surveillants. surveillance follow the subject from the place to place to maintain
continuous watch of his activities
3) Technical
this is a surveillance by the use of communications and electronic hardware’s, gadgets, system
and equipment
Equipment
1) Camera with telephoto lens 5) Wiretapping device
2) Moving Picture Camera 6) Other instrument miniaturized one-way
3) Binoculars radio
4) Tape recording apparatus
Kinds of surveillance
1) Surveillance of places or Casing 3) Undercover Investigation/Operation or
2) Tailing or shadowing roping
CASING OR RECONNAISSANCE
Casing is the term use in the police organization while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building place or area to determine its suitability for
Intel use or its vulnerability in operations. It aids in the planning of an operation by providing needed
information. It assists the agent handler to install confidence in his agent during briefing phase by
being able to speak knowingly about the area of operation. Casing is also considered a security
measure because it offers some degree of protection for those operating in an area unfamiliar to them.
10 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
Methods of Casing
1) Personal Reconnaissance
A personal reconnaissance of an area is the most effective method and will produce the most
information since you know just what you are looking for.
2) Map Reconnaissance
A map reconnaissance alone may not be sufficient but it can produce a certain amount of usable
information. From a map, it is possible to get a good survey of road and street network.
3) Research
Such information can be acquired through research. Research normally entails a study of
unclassified sources such as local newspapers, periodicals, public bulletins, telephone and city
directories, radio and television broadcasts, and other available references.
4) Prior Information
Your unit will have on file reports from other activities within your unit, and also from other
intelligence units that may provide you with information. In addition, town studies, geodetic
surveys, etc., can provide you with valuable information.
5) Hearsay
This type of information is usually gained by the person operating in the area of performing the
casing job. Casing should always be done with your ears open when visiting such places as
restaurants, bars, places of amusement, and while riding on a public transport facility. Some
hearsay information may be gained by discreet questioning of the people in the area.
Observation
a complete and accurate observation by an individual of his surroundings an encompasses the use of
all the major sense to register and recognized its operational or Intel significance
Description
the actual and factual reporting of one’s observation of he reported sensory experience recounted by
another Psychologist estimate that approximately 85% of our knowledge is gathered through sight,
13% from sense of hearing and only 2% through the three other senses
SHADOWING OR TAILING
It is the act of following a person overtly or covertly.
11 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
e) Progressive Surveillance.
The Progressive technique of surveillance is used when extreme caution is mandatory. It can be
presupposed by the surveillants that the subject will resort to every method it elude possible
surveillance. It is a slow technique and limited to subject that follow habitual daily routines.
Undercover Assignments
it is form of investigation in which the operatives assumes a cover in order to obtain information.
COVER
It is a means by which an individual, group or organization conceals the true nature of its activities
and existence from the observer.
Functions of cover
a) Offensive – Gives access to the target and facilities the achievement of clandestine objectives.
12 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
Types of cover
1) Natural cover
Using true or actual personal background to fit the purpose.
2) Artificial cover
A cover using biographical data adopted for a fictitious purpose.
3) Cover within a cover
Use of secondary cover in case of compromise which necessitates the admission of a lesser crime.
4) Multiple cover
Any cover identity wished.
ELICITATION
It is a system or plan whereby information of intelligence value is obtained through the process direct
intercommunication in which one or more of the parties to the common are unaware of the specific
purpose of the conversation. The three phases are determination of the mission, selection of the
subject, and accomplishment of the mission.
IMPORTANT TERMINOLOGIES:
1) COMPARTMENTALIZATIONof Information means
to limit access to information to persons who directly need to know certain information in order
to perform certain tasks. The idea is that the fewer people know, the better, because as the number
of people “in the know” grows, so does the risk or likelihood that such information could be
compromised or fall into the hands of the opposition.
2) DECLASSIFY
the removal of security classification from classified matter.
3) RECLASSIFY/REGRADING
the act of changing the assigned classification of matter.
4) UPGRADING
is the act of assigning to a matter of higher classification to a classified document
5) DOWNGRADING
is the act of assigning to a matter of Lower classification to a classified document
TOP SECRET
These are information and materials, the unauthorized disclosure of which would result cause
exceptionally grave damage to the nation, politically, economically, or from a security aspect. This
category is reserved for the nations’ closest secretes and is to be used with great reserve. It is covered
with legal size bond paper lined with a ½ - inch green border.
Ex.
a) Very important political documents containing negotiations for major alliances.
b) Scientific developments in methods of warfare, e.g., vital matters relating to atomic warfare,
defense against biological warfare, or matters affecting future strategies.
A. Classification Authority
Rest exclusively to the head of the Department. This may be delegated to authorized officers in
instances when necessary.
13 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
B. Reproduction
May be copied, extracted or reproduced only when classifying authority has authorized such action.
Permission to reproduce shall not extend beyond a specified number of copies which are treated the
same as the original.
At the time of issuance, each document must contain a notation as follows;
Reproduction of this document contain in whole or in part is prohibited except with the
permission of the issuing office or higher authority;
Reproduction of paragraph(s), i.e, 1&2, of this document is prohibited except with the
permission of the issuing office or higher authority;
Shall be carried out under the supervision of an authorized officer. All materials and waste incidental
to the reproduction shall be accounted for and disposed of.
C. Inventory
Physical inventory is required by the head of the department twice a year. Appropriate action on
custodial deficiencies shall be made.
D. Transmission
TOP SECRET matter shall be transmitted by any of the following means:
By direct contact of the officer’s concern
By the officially designated courier
By accompanied diplomatic pouch
TOP SECRET matter shall not be transmitted by mail, express, or electrical means, unless in
cryptographic form.
E. Storage
Safe, steel filing cabinet or other steel container equipped with a built-in, three-position, and dial-type
combination lock.
In secure open room or vault which is approve for such use by the head concerned.
F. Destruction
by burning or pulping by the custodian in the presence of witnessing officer designated by the
responsible head. The witnessing head must have a TOP SECRET clearance.
SECRET
These are information and materials, the unauthorized disclosure of which would endanger national
security, cause serious injury to the interest or prestige of the nation or of any government activity or
would be of great advantage to a foreign land. It is covered with legal size bond paper lined with a ½
-inch red border.
Ex:
a) Matters relating to new methods of warfare or defense, including scientific and technical
developments, not classified as TOP SECRET, e.g., new designs for service aircraft, guided
projectiles, tanks, radar and anti-submarine devices.
A. Classification Authority
Same as TOP SECRET
B. Reproduction
Same as TOP SECRET
C. Inventory
Physical inventory is required by the head of the department twice a year. Appropriate action on
custodial deficiencies shall be made.
D. Transmission
Between points within the Philippines:
Direct contact with officers concerned
Electrical means in cryptographic
Courier specifically authorized by the transmitting agency
Philippine Registered mail
Between points from within and outside the Philippines, and vice Versa:
14 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
CONFIDENTIAL
These are information and materials, the unauthorized disclosure of which while not endangering the
national security would be prejudicial to the interest or prestige of the nation or any governmental
activity, or would cause administrative embarrassment or unwarranted injury to an individual or
would be of advantage to a foreign nation. It is covered with legal sized bond paper lined with a ½ -
inch blue border.
Ex:
a) Routine Intelligence Reports
b) Plans of government projects such as land development, hydroelectric schemes, road
development, or development of areas
A. Classification Authority
Commissioned officers of the PNP, and their counterparts in the AFP and government agencies
B. Reproduction
It is authorized except when the classification authority specifically denied it.
C. Inventory
Physical inventory is not required. However, proper custody and maintenance of the documents are
required, based on the existing rules and regulations or records management and administration.
D. Transmission
Same as secret matter
E. Storage
Same as secret matter
F. Destruction
Same as secret matter
Except no witnessing officer and record of destruction
RESTRICTED
Information and material which requires special protection other than that determined to be TOP
SECRET, SECRET, or CONFIDENTIAL. Cover sheet is not necessary, what is important is a bold
“RESTRICTED” word at the top and at the bottom of the bond paper.
Ex:
a) Department books of instruction and training and technical documents intended for official
use only or not intended for release to the public.
b) Routine information relating to the supply and procurement of military supplies.
A. Classification Authority
Authority to classify shall be the same as CONFIDENTIAL matter.
B. Reproduction
Authorized
C. Transmission
Shall be through normal dissemination system
SECURITY CLEARANCE
2) The certification issued by a responsible authority stating that the person described therein is cleared
for access to classified matters at the appropriate level.
CERTIFICATE OF DESTRUCTION
3) The certification by a witnessing officer that the classified matter described therein has been disposed
of in his presence, approved destruction methods.
Types of PSI
1) National Agency Check (NAC)
This is an investigation of an individual made on the basis of written information supplied by him
in response to an official inquiry, and can be used as reference by the appropriate agencies. It is
simply a check on the files and records of national agencies. The NACE under this type are as
follows:
a) NICA d) DI, NHQ, PNP
b) NBI e) CIDG, NHQ, PNP
c) Intelligence service, AFP or J2 f) G2 Division, PA
Division
2) Local Agency Check
16 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
This type of investigation consists of written inquiries sent to appropriate local government
agencies, former employees, character references and schools listed by the person under
investigation. The local agencies normally check besides past employment, schools and character
references, such as follows;
a) The locality where the individual is a resident
b) Mayor of the locality where the individual is a resident
c) City or municipal police station
d) Provincial or city prosecutor’s office
e) City or municipal Judge
3) Background Investigation
This is a much more comprehensive investigation than the NAC or LAC. A thorough and
complete investigation of all or some of the circumstances of a person’s life is conducted.
Type of BI
1) PBI
Consists of the investigation of the background of the individual, but limited only to some of the
circumstances of his personal life which are deemed pertinent to the investigation. The inquiry
specifically pertinent to individual life history including LAC, contact with references and former
employers.
2) CBI
Consists of the investigation of the background of the individual, including all the circumstances of
his personal life. LAC and NAC.
Wanted List
a list consisting of persons who are subjected for arrest. For a person to be included on the most
wanted list, the latter must have an issued Warrant of Arrest and accused of either organized or
heinous crime.
Mechanics for Removal and Downgrading of Entries from Wanted List or Watch List:
Watch List
It consists of persons suspected to have committed organized or heinous crimes based from
unverified reports and are subject for further monitoring, investigation and case build-up.
Persons to be included in this category are those who have been implicated in:
a) Sworn Statements of victims, witnesses and arrested suspects
b) Tactical Interrogation/Debriefing Reports
c) Intelligence Reports, Information Reports, Agents Reports
d) Signed Letter Complaints
17 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
Mechanics for Removal and Upgrading of Entries from Watch List to Wanted List:
Target List
It serves as master/reference list outlining pertinent data on organized crime groups/criminal gangs.
Persons to be included in this category are those who have been included in the priority list/Watch
List and who are at the same time members of organized groups/gangs. The purpose of this list is to
provide a consolidated reference containing data on organized crime groups for operational purposes.
Based on the Memorandum released by DIDM on June 22, 2000 re defining Organized Crime Groups
18 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
Phase 3. The processing Phase or the processing of theCollected information into Intelligence
It is the phase in intelligence cycle wherein information becomes intelligence. The conversation of
raw data into a usable product known as intelligence is the most expensive and time-consuming
activity. The following are steps in the processing of information;
1) Recording – Intelligence recording is the reduction of all information or data into writing or other form
which is capable of being stored for future use.
2) Evaluation – The examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source or agency and credibility or the truth of the information. Reliability
of the source is represented by letters A to F. While credibility or the truth of information is represented
by number 1-6. The table of evaluation is as follows. The table of evaluation is as follows;
19 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
FUNDAMENTAL OF CRYPTOLOGY
Cryptology is the science dealing with the disguised or secret communication and is concerned with
methods and devices employed to camouflage communications (or even their existence) and to
20 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
penetrate such communications contrived by others. Although cryptology was concerned initially
with secrecy of written messages, its principles apply not only to enciphered or encoded messages
(cryptograms) but also to enciphered speech, facsimile and enciphered television transmission.
1. SUBSTITUTION SYSTEMS
This is an ancient system attributed to many persons. It is known that Julius Caesar used it. He
merely shifted the alphabet three letters forward, writing D in place of A, E for B, F for C, and so
forth. Using this method out clear test cipher alphabets would appear like this:
Enciphering
It is accomplished by proceeding along the top horizontal row until appropriate clear text letter is
found directly under the clear text letter. This is repeated until all clear text letters have been end
ciphered.
Deciphering
Deciphering the cipher text is done by merely reversing the procedure in enciphering by using the
same substitution system.
Organized Crime
It is the combination of two or more persons for the purposed of establishing by terrors, threats,
intimidation or conception in the city or community section of either monopoly or virtual monopoly
or criminal activities in a field that provides continuing financial profit.
The following are common example but not limited to MAFIA, YAKUZA, Hong Kong triad and
Chinese triad and etc;
Most authorities point to Sicily and Italy and the development of Camora and Mafia as the beginning
of the techniques and methods used by organized crime. The historical development has some
significant to the intelligence organization in that it reflects the close knot family ties of the ruling
hierarchy of organized crime.
Subversive Organization
It is an organized and systematic conspiracy to overthrow a duly constituted authority or government.
One of the common is the communist party of the Philippines, CCP, NPA, and NDF.
The communist movement had split into three factions, the Re- Affirmists group headed by Jose
Maria Sison alias Armando Liwanag, the Revisionist Group led by Felimon Lagman alias Carlos
Forte or Popoy Lagman, and the New Bloc which is led by a conveyor.
22 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
Sison founded the CCP in December 26, 1968 is presently living in exile in Utrecht, Holand.
Communism
It is a social and political movement which is based on Karl Marx’s interpretation of history and
which seeks to achieve communism by revolutionary means through the dictatorship of the
proletariat.It advocates that the ownership of property or means of production, distribution and
supply, by the whole of classless society, with wealth shared on the principle of “to echo according to
his need” each yielding fully according to his ability. Originated in “communist Manifesto” in 1848
by Karl Max and Friedrich Engels, both German philosophers who were considered as political
outcast during their time. In Rusia, It was Vladimir Llyich UlynovLenin together Leon Trotsky,
implemented the concept of a revolutionary party as part of communism (Bolshevik Part) which led
to the establishment of the Union of Soviet Socialist Republic (USSR). Later, the theory called
Marxist-Leninism
In 1921, Mao Zedong, founded Shanghai Communist Party and led the Autumn Harvest uprising
which was crushed by the Koumintang militia. He fled to the mountains and built the Red Army.
After World War II Mao Zedong’s forces expelled Chiang Kai-Shek’s Koumintang to Taiwan. Mao
Zedong then established the People’s Republic of China.
The first communist party in the Philippines was organized by the group of Luis Taruc during the
Japanese occupation of the Philippines. Their original purpose was to fight the Japanese but after the
war, they continued their insurrection against the government. President Ramon Magsaysay was
credited for the demise of the communist party which was built along the Soviet line of communism.
In December 26, 1968, the CCP organized by Jose Maria Sison along the Mao Zedong thought came
into existence with 25 full-pledge members.
March 28, 1969, the CPP organized the New People’s Army (NPA) with 9 squads as its armed
component. In the early 1970’s, the National Democratic Front (NDF), the united front of the CPP
was organized and became the umbrella organization of those fighting the government after Martial
Law was declared in September 21, 1972 by President Ferdinand Marcos. The CPP/NPA/NDF
strength was estimated to have reached from 23,000 to 25,000 in 1988 and the protracted war that
was on-going had greatly affected the government.
Terrorism
Terrorism is defined as the unlawful use of force or violence against persons or property to intimidate
or coerce government, the civilian population, or any segment thereof, furtherance of political or
social objectives.
1. Mossad
the national intelligence agency of Israel, one of the top 10 countries with the most powerful nuclear
weapons in the world. It is one of the three branches of the Israeli Intelligence Community – the other
two being Shin Bet and Aman, which handles internal security and military intelligence, respectively.
23 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
24 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
The MSS plays a central role in censoring the internet in China, cutting off the population from the
outside world and allowing the government to control what influences the Chinese people. The
agency is also responsible for handling internal dissent and anything that might cause citizens to rebel
against the ruling Communist Party.
1) Mossad (Israel)
2) Inter-Services Intelligence(ISI) ( Pakistan)
3) Secret Intelligence Service(MI6) (UK)
4) Central Intelligence Agency(CIA) ( USA)
5) Federal Intelligence Service (BND)
( Germany)
6) Research And Analysis Wing (India)
7) Directorate-General for External Security
(France)
8) Canadian Security Intelligence Service or
CSIS (Canada)
9) Australian Secret Intelligence Service
(Australia)
10) Ministry of State Security (China)
25 | LEA – 4
Capiz Government & Business Center, Roxas City, Capiz
26 | LEA – 5
Capiz Government & Business Center, Roxas City, Capiz
Safety Administration
27 | LEA – 5