0% found this document useful (0 votes)
44 views32 pages

FCII

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views32 pages

FCII

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

FUNDAMENTAL OF CRIMINAL INVESTIGATION AND INTELLIGENCE

MODULE 9
FORMS OF INTELLIGENCE

1 SOCIOLOGICAL INTELLIGENCE ~ DEALS WITH THE DEMOGRAPHIC AND


PSYCHOLOGICAL ASPECT OF GROUP OF PEOPLE

2 BIOGRAPHIC INTELLIGENCE ~ DEALS WITH INDIVIDUALS


PERSONALITIES

3 ARMED FORCE INTELLIGENCE ~ DEALS WITH THEBARMED FORCE OF


THE NATION

4 GEOGRAPHICAL INTELLIGENCE~ DEALS WITH THE PROGRESS OF


REASEARCH AND DEVELOPMENT

Functional Classification of Police Intelligence

Police Intelligence- It is defined as the end product resulting from the


collection, evaluation, analysis, integration and interpretation of all available
information regarding the activities of criminal a nd other law violators for the
purpose of affecting their arrest, obtaining evidence, and forestalling their
plans to commit crime.

Criminal Intelligence (CRIMINT) - refers to the knowledge essential to the


prevention of crimes and the investigation, arrest, and prosecution of
criminal offenders,

Internal Security Intelligence (INSINT) - refers to the knowledge


essential to the maintenance of peace and order

Public Safety Intelligence (PUSINT) - refers to the knowledge essential to


ensure the protection of Hives and properties.

KINDS OF INTELLIGENCE

A. Strategic Intelligence - it is an intelligence data that are not of an


immediate value. It is usually descriptive in nature, accumulation of physical
description of personalities modus operandit does not have immediate
operational value but rather send range that mad erstand rela To future
police operation

B.LINE INTELLIGENCE ~ it is the kind of intelligence required by the


commander to provide planning and conduc t
People - living condition of the people, sources of income, education of the
people, government livelihood projects, extent of enemy influence to the
people Weather - visibility, cloudy, temperature, precipitation (rain), wind

WEATHER~ visibility and cloudy, temperature

Enemy - location of the enemy, strength of the enemy, disposition, tactical


capabilly. enemy vulnerability

Terrain - relief and drainage system, vegetation, surface material, man


made features.

Counter Intelligence (CI) - this kind of intelligence covers the activity


devoted in destroying the effectiveness of hostile foreign activities and to the
protection of info against espionage, subversion and sabotage. Hence, the
three activities of Cl are:

activitiest

1. protection of information against espionage;

2. protection of personnel against subversion;

3. and protection of installation and material against sabotage.

Counter Intelligence is also known as negative intelligence.

That refers to the three-generic term:

Security Intelligence- the sum or the totar enoris to counsel the national
policies, diplomatic decisions, military data and any other information
affecting the security of the nation.

Counter Espionage- to investigate the actual or theoretical violation of


espionage laws to become shade nami and alive effort. purpose, to
coustigate anage, negore riviation

of espionage laws, to enforce those laws and to apprehend any violators.

Combat Intelligence- intelligence required by a commander to provide a


basis for the planning and conduct of tactical operations.

MEASURES IN CL MEASURE

Passive measures-are those measures which seek to conceal info from the
enemy,
Active measures - are those which seek actively to block the enemy's
effort to gain info or espionage in espionage, subversion or sabotage

Three Categories of Cl Measure

1. Denial Measure- secrecy discipline, document security, camouflage and


concealment, communication security, military censorship, counter
reconnaissance.

2. Detection Measure- PSI, security tag or pass card, challenge or


password reconnaissance.

3. Deception Measure- ruse-use of escape and evasion, dummy position ,


fabricated

information.

Categories & Functions of Cl Operation

1. Counter Human Intel (HUMINT)- seeks to overcome enemy attempts to


use human sources to collect information or to conduct sabotage and
subversion which includes Cl special operations, liaison, counter security,
and Cl screening.

2. Counter Imagery Intel (IMINT)- includes action taken to determine


enemy SIGINT and related enemy weaknesses, capabilities and activities.
These actions include surveillance radar, photo thermal and infrared
systems. Successful counter - IMINT operations rely heavily on pattern and
movement analysis and evaluation of the enemy.

sonegile

3. Counters Signal Intel (SIGINT)- determine enemy SIGINT and related


enemy weaknesses, capabilities and activities, assess friendly operations to
identity patterns, profiles and develop, recommend and analyze counter
measures.

Applicability of the Categories of Cl Operation

1. Military Security- this refers to the measures taken by a command to


protect itself against espionage, enemy operation, sabotage, subversion or
surprise.

2. Port Frontier and Travel Security- to control all ports of entry and
departure.
3. Civil Security- refers to the protection of people within the residing are
under military or police control

4. Censorship- is the control, examination and analysis of individuals, the


armed forces, field press, and POWs.

4:1 National censorship - the total control and examination of


communication of the entire populace, purposely to prevent unusual
dissemination of information and intelligence to the enemy's hands.

4.2 Military censorship - control and examination of communication


intended for and coming from the military/police sources

4.3 Civil censorship - intended or coming from civilian populace.

4.4 Field Press censorship - security review of news materials and other
information

4.5 Prisoner of War censorship -control and examination of


communication intended to and from the Prisoner of War (POW) and civilian
internees (internee is someone from the enemy side held as a prisoner while
the war is going on).

5 Special Operation- uses active Counter Intelligence techniques while


conducting clandestine or covert operation against hostile and enemy
intelligence organization or agency it covers:

1. Counter terrorism

2. Counter sabotage

MODULE 10
I. PHASE 1- PLANNING THE COLLECTION EFFORT

This phase of the cycle involves the determination of the requirements of


intelligence. It is concerned with identliying the so-called Essential Elements
of Information (EEl) - an item of intelligence or information of the
characteristics of the area of operations and the enemy, which the
commander feels he needs before he can reasonably arrive at a decision.

With this, the intelligence officer must have a thorough knowledge of the
available source of information and the collecting agencies and type of info
the latter can provide.

Determination of Intelligence Requirements

Priority Intelligence Requirements/Elements of the Information (EEl's)


Priority Intelligence Requirements Essential - those intelligence
requirements for which a commander has an anticipated and stated priority
in his task of planning and decision-making. It is the highest Intelligence
requirement and is the basis for intelligence operations and is personally
approved by the commander.

Classification of Intelligence Requirements According to Use:

a.Executive - Intelligence is required by executive, government and military


commanders. The executive requirements are the basis for decisions and
national policy making.

b. Contributory - Intelligence is reguired to complete the staff process:

_make staff plans and estimates

that contribute to the decision and policy making.

c.Operational - Additional intelligence required in planning and carrying out


effectively the decision or policy announced . Decisions and policies require
implementation.

d.Collateral - Higher or adjacent echelons of the government or military


establishment

Classification of Intelligence Requirements According to Type:

Basic- are general reference materials to be used in planning regarding the


enemies or potential enemies, area of operations, capabilities-static
comprehensive.

Current - are temporary in nature and narrower in scope. Information


required to cope up with the current objectives.

Estimative - are those that determine the future courses of action; required
by the executives to plan future military operations and policies.

How this information shall be collected; and Why shall this information be
collected?

II. PHASE 2 - COLLECTION OF INFORMATION

This phase of the cycle is concerned with identification of the "collecting


agency", the formulation of procedures on the manner of collecting the
information in conjunction with the plans achieved in this phase.
Collection of Information - systematic exploitation of sources of
information by collection agencie and the delivery of the information
obtained to the proper intelligence unit or agency.

Collection Agency - is any person, unit, or activity that collects and/or


processes information by research, surveillance, or the exploitation of the
source of information.

Collection Plan -A dynamic tool used to coordinate and integrate the efforts
of all collection units and agencies

Assist the Collection Manager in organizing his thought processes

In collecting information, the following factors should be considered such as:

Who will collect the information;

What information will be collected;

Where are the places whereby information shall be collected;

When is the right time to gather the information;

How this information shall be collected; and

Why shall this information be collected?

CRITERIA IN THE SELECTION OF A COLLECTION PLAN

Suitability - the quality of having the properties that are right for a specific
purpose,The collection task assigned to a particular office must be
compatible with its "mission" in order to ensure that only the best suited
agencies are employed to furnish the information needed. Usually, the
requesting agency uses "suitability analyst" before deciding to choose its
counterpart in information gathering.
Suitability analysis - a process and procedure used to establish the
suitability of a system, that is, the ability of a system to meet the needs of
stakeholder or other users.

Multiplicity - the quality or state of being multiple or the number of


components in a system..

Normally, the evaluation of information requires that it must be compared


with the information received from other sources and agencies. Subject to
the consideration of suitability, more than one agency is

used

to obtain the information needed.

Balance - is usually used to describe a condition in which two different


things or variables are equal.

In the context of intelligence, the word balance refers to the relationship


between the workload and the number of agencies utilized to collect the
desired data.

Capability - refers to the quality of being able to perform something as


measured by the person's mental and physical fitness to perform the
assigned task and the resources available.

* It also refers to the ability to perform or achieve certain actions or


outcomes through a set of resources.

In intelligence, the word capability is used to describe the ability of the


collection agency to collect the required information based on its resources
and fitness of its people to perform the assigned task.

THE SYMBOLS OF SOURCE OF INFORMATION

In the collection process, it is necessary that the collection agency should


use a workable "system of identification" of sources. Usually, the collection
agency employs a system that uses letters with corresponding
METHODS OF GATHERING INGORMATION

Information simply refers to the different approaches as to how information


shall be gathered or collected.

The police department collects information in response to the intelligence


requirements of its head of office through "police routine activities" These
activities include but are not limited to patrol, use of informants, criminal
investigation, community relations, checkpoints, searches and seizures,
surveillance operations, and coordination with other agencies. Whatever
activities are maintained by the police in the collection of

information.
COVERT METHOD

It is a clandestine or secret means of obtaining information regarding


criminals, organized crimes, subversive elements, and activities of foreign
nations. The most common techniques of covert operations include
"infiltration" and "surveillance"

Infiltration - is a secret and gradual penetration into the enemy


organization, domain, and territory in order to acquire information.

Surveillance - is an act of monitoring the behavior and activities of the


people or a group of individuals and others with great interest to the police
or the collection agency.

Surveillance is used by the government for the prevention of crime, the


protection of a process, person, group or object, or for the investigation of
hostile activities

OVERT METHOD

The act of obtaining information through the use of open methods or through
the employment of open source data is known as overt method. It involves
the collection of information from open sources such as government records,
census and statistics, commercial and business listings and other printed
materials available to the public such as newspapers publications.

III. PHASE 3 - COLLATION (PROCESSING)

In the intelligence cycle, collation refers to the process involved in evaluating


the accuracy and reliability of the information collected.
Reliability means JUDGING THE SOURCE of information while accuracy
simply means the level of TRUTHFULNESS of the information collected.

In collation stage, all collected information will undergo the following:

Recording - Reduction of information to writing or some other form of


graphical representation and the arranging of information into groups of
related items

Analysis - the collected information is broken into different components and


isolates those that are relevant to the mission or those that have intelligence
value which includes looking into the source of information, truthfulness of
information and who provides the information.

• Evaluation - determination of the pertinence, reliability, and accuracy or


truth of the information.

Determination of the pertinence or significance of the information relative to


the operation or current situation, reliability of the sources or agency and

accuracy of the information.

Example of evaluation rating (the information is completely reliable and


confirmed by other sources)
The evaluation rating is A1

Integration - is the combination of all that isolated information from various


sources to produce new information necessary for the success of the mission.

Interpretation- is the process involved in providing meaning and


significance of new information

Synthesis -provides a conclusion based on the new information generated


in relation to the current situation.

IV. PHASE 4 - DISSEMINATION OF INTELLIGENCE

In the intelligence cycle, dissemination refers to the actions taken to transfer


processed information to the appropriate person. Extra care should be
considered in disseminating processed information and should be based on
the "need to know principle." Meaning information or those that have already
intelligence value should be passed, handled or disseminated among people
who have the personality to know or acquire the same.

Criteria in Dissemination

1. Timeliness - the timely conveyance of intelligence to the end users in


appropriate form and by any suitable means

2. Propriety - in dissemination of intelligence, it must be clear, concise and


complete. It must be disseminated to the right user in the most effective way
and in accordance with the security requirements of the office.

MODULE 11

METHODS USED IN ACQUIRING INFORMATION


1. INFORMANT AND INFORMER
A. INFORMANTS

Informants- refer to a person who gives information to the


police voluntarily or without any consideration.

Informant Net - it is a controlled group of people who


worked through the direction of the agent handler. The
informant's principal or cut-outs supply the agent handler
directly or indirectly of intelligence information

Types of Informants
1. Criminal informant - an informant who gives information
to the police pertaining to the underworld about organized
criminals with the understanding that his identity will be
protected.
2.Confidential informant- is similar to the former but he
gives the information to violate the law to include crimes
and criminals.
3. Voluntary informant- a type of informant who gives
information freely and willfully as a witness to a certain
act.
4. Special informant- those who give information
concerning specialized cases only and it regarded a
special treatment by the operatives (ex. Teachers,
businessmen).
5.Anonymous informant- those who give information
through telephone with the hope that the informant
cannot be identified.
Reliable informant - a type of informant whose credibility
has been established and documented. This includes
information previously given and recorded which leads to
the arrest of criminals or recovery of stolen property.

Classification of Informants

According to Motive
A person who provides useful information about a case or
crime is usually motivated by various factors or reasons.
The following are the types of informants classified
according to motive
1.Rival-elimination Informant - an informant is usually an
anonymous caller who tries to inform the police regarding
a particular criminal activity to eliminate a rival or
competitor. The elimination of rivals can provide an
opportunity to a group of individuals to monopolize an
illegal business in order to increase their income.
2. False Informant - an informant who reveals information
usually of no consequence or untrue in order to mislead
the police or investigation of the case at hand.
3.Frightened informant - an informant who gives
information to the police because of the belief that his
safety and the safety of his loved ones might be
compromised. This frightened informant is usually molded
by fear of self-interest.
4. Self-aggrandizing Informant - an informant who has
many contacts in criminal circles and feels importance by
giving information to the police. A type of informant
surprisingly provides information regarding a crime to win
favorable attention from the media which could put him in
the spotlight, making him an instant celebrity.
5. Mercenary Informant - an informant who has something
to sell.
In return for any information,
a mercenary informant receives monetary reward or
material gain.
6 Double-Crosser Informant - an informant uses his
seeming desire to give information as an excuse to talk to
the police in order to get information from them than he
give, a type of informant who knows how to manipulate
the police by giving a bit of information with the intention
to acquire information with great interest.

7. Legitimate Informant - an informant those covertly and


overtly provide information to law enforcers about
criminal activity in a legitimate establishment. Legitimate
informants mainly include operators of licensed premises
who do not want their place of business to become
hangouts of dangerous criminals.

Categories of Informants
Concerned individuals or agencies.
Recruited Informant - an informant who is selected,
trained, and utilized as a continuous or covert source of
information concerning specific intelligence targets.

Types of recruited informants


a) Ordinary informants - individuals who perform counter-
intelligence activities under the control of a particular
agency such as police or military.
b)Penetration Informants - are recruited, selected, and
trained to disguise or to use an assumed identity for the
purpose of gaining the trust of the intelligence target in
order to gather information.
C)Full-time Informants - informants who are available for
counterintelligence missions at all times and who may
derive the major part of their income from their work as
informants of the police or military.
d)Double Agents - are individuals who are simultaneously
employed by to "opposing groups" or intelligence agencies
with one of the agencies being aware of his dual role.

e)Dual Agents - are individuals who are simultaneously


and independently employed by two or more "friendly
intelligence" agencies or units and do not show preference
to either office or group of individuals. These agents are
normally motivated by material gain or monetary reward
and will be working with two different groups of people
B. INFORMER
is a person who provides information to the police on a
regular basis, They are either paid regularly or in a case-
to-case basis, or none at all.
2. ELICITATION
- Obtain information through the process of direct
communication.
- One or more of the parties to the communication is/are
unaware of the specific purpose of the conversation.
Phases:
C..Determination of the mission.
b. Selection of the subject.
C. Accomplishment of the mission.
Devices in the Conduct of Elicitation
Approach- is the process of setting people to start
talking.
1. Flattery - people are susceptible to praise.
Variants:
1.1. Teacher-pupil approach - subject is treated as an
authority..
1.2. Kindred Soul approach - subject is placed in a
pedestal having some specialized quality
1.3. Good Samaritan approach - sincere and valid offers
of helpand assistance are made to the subject.
1.4. Partial disagreement approach -produce talking by
the word "I'm sure" if I fully agree
2. Provocative approach- utilization of conversational
gambits.
Variants:
2.2 Teaser Bait Approach - elicitor accumulates the
sources of knowledge about a particular subject.
2.3 Manhattan from Missouri Approach - elicitor adapts
an unbelievable attitude above anything.
2.4 Joe Blow Approach - it is "I know the answer to
everything" approach.
2.5 National Pride Approach - defend their country and
its policies.

B. Probe- is the process to keep the person or subject


talking incessantly.
Types:
a. Competition Probe- used in connection with the
teacher-pupil approach
b. Clarity probe used to elicit information in an area
which the response is not clear.
c.High Pressure probe- it serves to pin down a subject in
a specific area
d. Hypothetical probe- it presents hypothetical
situation.

OBSERVATION AND DESCRIPTIONS


Observation- is the complete and accurate awareness
by an individual of his surroundings.
Description- is the factual reporting of what is
observed.

Psychological Processes for Accurate Observation a.


a.Attention
b. Perception
c. Reporting
Types of Attention
A.Involuntary
b.Voluntary
c.Habitual
FACTORS GOVERNING REPORT
a.vocabulary
b.time log
c.recurrence of similar incidents

CLANDESTINE OPERATION- COVERT/DISCREEL


A secret action undertaken in behalf of the government or
other friendly forces.

Basic Organizational Elements


a. Sponsor
b. Target or rabbit
C. Agent or asset

Classification of Clandestine Agent


1. Principal Agent
2. Action Agent
2.2. Spy- is the primary and the most important human
collector
2.3. Propagandist- mold the attitudes, opinions and
actions of an individual group
2.4. Saboteur- undertake positive actions against
unfriendly power resulting in the loss of an article,
material or facility.
2.5Guerilla- is a member of paramilitary group organized
to grass the enemy..
2.6Strongman- is an agent available to provide special
protection.
2.7Provocateur- induces an opponent to act to his own
detriment.
2.8Cover Action- exert influence from foreign government
upon discretion of the sponsor.
3. Support Agent
5.UNDERCOVER ASSIGNMENT 6.COVER AND UNDERCOVER
7.SURVEILLANCE
8.CASING

MODULE 12
REQUIREMENTS (PROCESS) FOR SURVEILLANCE
1. Surveillance Plan - It must establish the required type of personnel, and the
general and specific instructions for surveillance. Ensure that the overall
objectives of the surveillance are understood.
All participating personnel must have a common understanding of the
operational limitations, signals, and special instructions that have been
improved.
2. Area and Target Study - all available information about the area should be
collected and analyzed.
a. Basic Preparation in Surveillance
1. Study the subject - name, address, description, family and relatives,
associates, character and temperament, vibe, hobbies, education, others
Points to Consider are:
1. Target's Name, Nick-name or Aliases
2. His address and associated addresses
Telephone Number/Contact Number
1. Description
2. Mode of Transportation
3. Employment
4. Habits or Routines
5. Others.
1. Knowledge of the area and terrain - maps, national and religious
backgrounds, transportation, and public utilities.
2. Subversive organization - history and background, biography of the
official, identity, and background of members and former members,
method of identification employed by the members, file and records,
nature, location and accessibility, meeting.
Cover story - the scenario must be appropriate to cover up the operation
and avoid identification of the mission
b.Consider also your place of surveillance:
Careful survey of the surrounding area should be made. The character of the
neighborhood, the residents and the transients should be noted. The observation
point should be selected. The following may be considered:

1. Using a room in a nearby house or business establishment and remaining


undercover
2. Remaining outdoors and posing who would normally conduct his business
in such an area, i.e.; laborer, carpenter street vendor, etc.

CONSIDERATIONS IN SURVEILLANCE PLANNING


1. Pre-Surveillance Conference - a conference held among the team members,
and the potice intelligence unit before surveillance is conducted.
2. Surveillance Plan - a plan established as required according to the type of
personnel, and the general and specific instructions for surveillance.
3. Area target study - refers to the area of operation of surveillance activites.
4. Surveillant - a person who conducts surveillance with includes only
observations.
5. Stakeout or Plant - the observation of a place or area from a fixed point.
6. Tailing or Shadowing -it is the observation of a person's movement.
7. Undercover Man refers to a person trained to observe and penetrate certain
organizations.
Suspected of illegal activities and later reports the observation and
information so that proper operational action can be made.
8. Liaison Program - the assignment of trained intelligence personnel to other
agencies to obtain information on police intelligence value. (Agencies like the
press, credit agencies, labor unions, telephone companies).
1. Safe house - a place, building, enclosed mobile, or apartment, where police
undercover men meet for debriefing or reporting purposes.
2. Drop - any person is a convenient, secure, and unsuspecting place where
police undercover men meet their action agent for debriefing or reporting
purposes.
3. Convoy - an accomplice or associate of the subject used to avoid or elude
the surveillant.
4. Decoy - a cover supporting the surveillant who can become a convoy
whenever surveillant is burned.
5. Contact - any persons whom the subject picks or deals with while he is
under observation and identifies the observer.
6. Made - when the subject under surveillance becomes aware that he is
under observation and identifies the observer.
7. Lost - when the surveillant does not know the where about of his subiect or
the subject had eluded the surveillance

CLASSIFICATION OF SURVEILLANCE

Surveillance of persons is called Tailing or Shadowing


Surveillance of place is called Casing or Reconnaissance
Surveillance of other things, events, and activities is called Roping.

TYPES OF SURVEILLANCE
A. ACCORDING TO INTENSITY AND SENSITIVITY
1. Discreet - The subject person to be watched is unaware that he is under
observation.
2. Close - The subject is aware that he is under observation varied on each
occasion.
3. Loose - applied frequently or infrequently, period of observation varied on
each occasion
B. ACCORDING TO METHODS
1. STATIONARY (STATIC SURVEILLANCE) - this is the observation of a place
usually a bookie stall, a gambling, joint, or a residence where illegal activities are
going on (fixed position).

FACTORS CONSIDERED IN FIXED SURVEILLANCE

a.Determine base of operation


b.Maintain a thorough, cautious reconnaissance of the area
c.Obtain necessary equipment
d.Assignments of specific duties to each member of the teamnoiat
e.Prepare alternative course of action
f.Provide for relief teams
g.Arrange for communication signals.
h.Arrange for inconspicuous arrival and departure of equipment as well as
personnel of the base of operation

CASING OR RECONNAISSANCE
Casing is the term used in the police organization while reconnaissance is used
in military terms..
Casing or reconnaissance is the surveillance of a building place or area to
determine its suitability for intel use or its vulnerability in operations. It assists
the agent handler in instilling confidence in his agent during the briefing phase
by being able to speak knowingly about the area of operation. Casing is also
considered a security measure because it offers some degree of protection for
those operating in an area unfamiliar to them.
GENERAL PRINCIPLES IN CASING
1. Knowing the best route to take to get there
2. Knowing how to conduct yourself without attracting attention
3. know what security hazards are in the area and how can they be avoided or
minimized

INFORMATION DESIRED IN CASING


1. Area condition and Habit- a description of the locality as whether the place
is residentiat, commercial, highly urbanized, or rural. The living conditions,
income of the population, operational data (time where the area seemed to
be useful-closing time). It includes the amount/ fare description of the area
during the different weather conditions. What transportation is available in
the area to include the amount/fare? Habits refer to the route activities of
the people in the area dialect and different beliefs are also considered.
2. Active Opposition- means all organs of every security system whose task it
to prevent intelligence activity in a given area. This also includes not only
the enemy but also the efforts of neutral or allied countries to discover and
observe our intelligence activities and learn its objectives.
Remember that a country which either neutral or ally today may any time in the
future become the ally of the opposition.
1. Disposal plan-disposal of the information in case of possible compromise
disposal of information and materials.
2. Escape and Evasion-the existing planning in case of emergencies, from the
immediate focal point, the general area, and completely from the area.

GUIDELINES IN THE CONDUCT OF CASING


1. To gain contact as soon as possible and maintain continuously
2. Maneuver freely in conformity with the operation (dry run)
3.To fight only when necessary
4.To report all items of info
5. To develop the situation

BASIC PROCEDURE IN THE CONDUCT OF CASING


1. Preparation of a general location map,
2. Sketch of the adjoining establishment and prominent features
3. Specific sketch or floor plan of the main target
4. Detailed features of the inner portion of the target and its description
5. Photograph of the casing target (from general to specific points)

TYPES OF CASING
a. Exterior Casing
iypes cite observation of the whole area, bulding or instalaton, possible exits and
approachaion. lypes or vicinity that may be rutalearea, bulding or instalesion or
counter intellgence operation.
b. Interior Casing
• It is the close observation of the layoutorio building Inaluded are ters which are
of initeligence and counter-intelligence value.

METHODS OF CASING
a.Personal reconnaissance- the most effective method and will produce the most
info since you know just what you're looking for.
b.Map reconnaissance-it may not be sufficient but it can produce a certain
amount of usable information
C. Research- much info can be acquired through research
d. Prior information- unit and of the unit will have a file report that they may
provide you with info . Hearsay- info usually gain by the person operating in the
area and performing a casing jou.
2. MOVING - The surveillant will follow the subject from place to place to maintain
continuous watch of
his activities.
a. SHADOWING OR TAILING - (surveillance of persons) Itis the act of following a
person with the following purposes;
a. To detect evidence of criminal activities;
b.To establish the associations ef a suspect:
c. Te find a wanted person;
d.To protect a witness or other persons;
e.To discover the associations, amusements, and habits of an employee
f.who is considered for a sensitive position; and
g.To check the loyalties of employees.

Shadowing or Tailing BY FOOT (Foot Surveillance)


a.oreman shadow - commonly used because of the least number of men involved.
Two-Man Shadow - This is more advantageous because it permits immediate
change and is less likely to be recognized One officer will follow the subject and
the other will keep abreast or on the opposite side of the street.
Three-Man Shadow or ABC Method

3.TECHNICAL (TECHNICAL SURVILLANCE)- this is survillance by the use of


communications and electronic hardware gadgets syestem and equipment

SPECIAL EQUIPMENT
A.camera with telephoto lens
B. moving picture camera
C.binoculars
D.tape recording apparatus
E.wire taping device
F. another instrument miniaturized one way radio camera with telephoto lens

TYPES OF TARGET WHO UNDER SURVEILLANCE

.AWARE~ the aware target discipline and trains him to look for watchers and
followers
.UNWARE~ this target does not consider or think about being watched or
followed
.SEMI AWARE~the target categorized as being semi aware would expect to be
followed or watched as they have reason for doing so
.HIDDEN ~ the target we consider hidden is more likely to be hard criminal such
as a drug trafficker or terrorist

METHODS TO DETECT SURVEILLANCE (COUNTER ~SURVILLANCE)

1winddow shopping
2 use of convoys
3 stopping immediately on blind corners
4 getting out immediately on public conveyances
5 retracing the course
6 entering mobile housing
7 paper drop

COVER AND UNDERCOVER OPERATIONS


A. COVER - how an individual group or organization conceals the true nature of
its acts and or existence from the observer.
Organizational Cover -is an account consisting of biographical which when
adopted by an individual will assume the personality, he wants to adopt.
Objectives: To camouflage and protect operational personnel and their activities
Protect installation will assume the personality he wants to adopt. al
Cover story- biological data through fictional that will portray the personality of
the agent he re assumed, a scenario to cover up the operation. c

Cover Support - agent assigned in target areas with the primary mission of
supporting the cover story.

IMPORTANCE OF COVER
1. secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have a"need to
know"
3. Successful accomplishment of the mission o si air

FUNCTIONS OF A COVER
1. Offensive - gives access to the target and facilitates the achievement of
clandestine objectives.
2. Defensive - serves to prevent detection

TYPES OF COVER
1 NATURAL~ using actual or true background
2 ARTIFICIAL COVER~ using biographical data adopted for the purpose
3 COVER WHITIN A COVER~ justification of existence
4 MULTIPLE COVER~ any cover you wish

HAZARD OF COVER
1. Static or dormant opposition - refers to people who are not directly
involved in security and CI activity.
Example: bystanders, ordinary citizens
2. Friendly or Unhostile Opposition - refers to friendly organizations that may
hinder the operations.
Example: Police, Security Agencies
3. Unfriendly or Hostile Active Opposition - refers to the enemy intelligence
operations that may compromise the undercover operations.
B. UNDERCOVER ASSIGNMENT
Undercover assignment - is an investigative technique in which an agent
conceals his official identity an obtains information from that organization
PLANNING UNDERCOVER ASSIGNMENT
1. Determine the level on which the investigation is intended
2. . Develop an appropriate cover and cover story
3. Selection or qualified personnel
TYPES OF UNCOVER ASSIGNMENT

1. Dwelling – “a residence in or near the dwelling house of the subject or the


target area.
2. Work assignment - places the UI in a type of employment where he can
observe the subject at his place of work.
3. Social assignment - requires the UI to frequent the places of entertainment and
amusement frequented by targets
4.Multiple assignments - 2 or more assignments covered simultaneously.
5.Rope Job/personal contact assignment - striking up a friendship with the
subject.

MODULE 13

CRYPTOGRAPHY
The process of hiding or coding information so that only the person a message
was intended for

can read it
Any method used to change the form of a written message to make it difficult or
impossible for anyone except the targeted receiver.
Modem cryptography techniques include algorithms and ciphers that enable the
encryption and decryption of information.
The practice of coding information to ensure only the person that a message was
written for can read and process the information.

CODE~Refers to a system that uses words as the smallest element.


A word or phrase chosen in place of another word or phrase to communicate an
attitude or meaning without stating it explicitly (Merriam-Webster Dictionary).

CIPHER
~Refers to the system that manipulates one, two, or three characters at a time
frequently used algorithm in cryptology, a subject of cryptographic algorithms. It
is a method of encrypting and decrypting data.
concerned with the study
Ciphers have traditionally employed two basic forms of transformation:
Transposition ciphers- maintain all of the original bits of data in a byte but
reverse their order.
Substitution ciphers- substitute specified data sequences with alternative data
sequenees. For example, one type of replacement would be to convert all bits
with a value of 1 to bits with a value of 0, and vice versa.
Note: The data generated by any method is known as the ciphertext.
Types of Ciphers
Ciphers can be classified in a variety of ways, including the following:
Block ciphers- encrypt data in equally sized blocks.
Stream ciphers- can be used on data streams that are often received and
transferred via a network.
Categories of Cipher:
Concealment- the simplest and the most primitive, a concealment system
attempts to hide the secret message, most often within another seemingly
harmless message.
b.Transposition- the elements of the plaintext message, that is, the letters or symbols in the
original text, are manipulated out of their normal order- they are jumbled and rearranged.
C.Substitution- A method of encoding using the replacement of the elements in the plain text by
other letters, numbers, symbols or by a combination of other elements

Definition of terms
1. Encode (Encipher)- To process a message into a code or cipher. The
message would then be called the code text or cipher test.
2. Decode (Decipher)- The reverse of the encoding process that is performed
by a receiver who knows the decoding method or holds the proper key.
3. Key- Elements of the message that control the system's variables.
4. Null- A word, letter, or other symbol that has no meaning that is used only
to fill the space in the message.
5. Plaintext- The message before it is encoded.
MAIN TYPES OF SOURCES OF INFORMATION
a. Open Source
- It is an information that is publiely available. It can consist of research,
technical, and economic reports. "white papers" conference documentation,
dissertations and theses, discussion papers, subject-related newsletters, etc.
One of the main difficulties in working with this type of source is evaluation as
information available in the public domain can frequently be biased, inaccurate or
sensationalized.
1. Closed Source
It is an information collected for a specific purpose with limited access and
availability to the general public. is often found in the form of structured
databases. In the context of criminal intelligence analysis, these databases
will largely include personal date collected as part of ongoing targeting
operations, or broader criminal records, vehicle registration data, weapons
licensing, etc.
2. Classified Source
- It is an information collected by specifically tasked covert means including the
use of human and technical (image and signals intelligence resources. The use of
classified information can significantly enhance the quality of an analytical
product, as it is usually highly accurate; however, it can also make an analytical
product significantly less actionable due to restrictions on dissemination.
CLASSIFICATION OF INTELLIGENCE INFORMATION
1. Top Secret (Green Color)
 It refers to information and materials that require the highest degree of
protection.
 Unauthorized disclosure would cause exceptionally grave damage or
danger to the nation, politically, economically, and to the nation's peace
and order and security.
2. Secret (Red Color)
- It refers to those information and materials whose unauthorized disclosure
would endanger national security, cause serious injury (serious damage) to the
interest or prestige of the nation or any governmental activity, or would be of
great advantage to a foreign nation.

3. Confidential (Blue Color)


- If refers to information and material whose unauthorized disclosure of which,
while not endangering national security, would be prejudicial to the interest and
prestige of the nation or any governmental activity or would cause
(damage))administrative embarrassment or unwarranted injury to individual or
would be advantage to a foreign nation.
4. Restrictive (White Color)
- It refers to information and material (other than Top Secret, Secret, or
Confidential) that should not be published or communicated to anyone except for
official purposes. Restricted material would cause undesirable effects if publicly
available.

MODULE 15
CRIME SCENE INVESTIGATION
Procedures in Criminal Investigation
As a general rule, all crime scene investigations must be done by the police
station that has the territorial jurisdiction of the crime incident unless otherwise
specified by the higher authorities to be investigated by some other unit or
agencies and must be recorded in the official police blotter.
Territorial jurisdiction means that the crime incident happens
within the area or place that a certain police station holds or covers.
Police station - refers to the office of local police that has a jurisdiction within the
area and exercises control over the community and persons movement by
enforcing the laws necessary for the Maintenance of peace and order.
The same is responsible in providing immediate response to the
Community as the need arises,
As a general rule, all crime incidents must be recorded in the official police
blotter.
Police Blotter- js an 18" x 12" logbook with hard-bound cover that contains the
daily register of all crime. incident reperts, official summary of arrests, and other
significant events reported in a police station.
In the case of VAWC- Violence Against Women and Children Act of 2004 or RA
9262 and Juvenile
Justice and Welfare Act of 2006, a separate Police Blotter shall be maintained for
these kind of offenses requiring confidentiality and to protect their privacy.
Crime scene - also known as the "treasure island" in criminal investigation It is
because several pieces of evidences can be found in the crime scene which
relevant to the solution of the case.
Crime scene - is a place or venue where the ingredients of the criminal act took
place.
The police officer on duty must record in the police blotter the nature of the
incident containing the five "Ws" (who, what, where, when and Why) and one "H"
(how)
Crime incident - refers to the occurrence of a certain crime
Types of Crime Scenes as to Location
1. Indoor Crime Scene - the offender committed the erime in an enclosed
place like a room or inside the house but not necessarily the house of the
victim.
2. Outdoor Crime Scene - it is located in an open area.

3. CONTINUING RUNNING CRIME SCENE OR CONVEYANCE ~ has mixed


location from indoor to outdoor or vice versa of continuing outdoor alone
INDOOR CRIME SCENE compare to an outdoor scene evidence at an indoor
scene is generally less susceptible to environ loss and deleterious change
OUTDOOR CRIME SCENE the most vulnerable to loss contamination and
damaging effect on biological evidence
CONVEYANCE a means of transportationtypes of crimes committed in
conveyances include car theft
CRIME SCENE PROCESSING is very crucial part of the investigation of
crime incidents since it is where an investigator establishes

MODULE 8
HISTORICAL BACKGROUND OF GATHERING INFORMATION

⚫️MOSES one of the first recorded formalized intelligence efforts


⚫️RAHAB who sheltered and conceal the agents of israel
⚫️DELILAH the Philistine used her when she allowed Philistine spies to hide
~ Delilah was an impromptu intelligence agent
OTHERS EVENTS AND PERSONALITIES
• SUN-TZU
The East was ahead of the West in the raft of intelligence in 400 B.C. rejecting the
oracles and the seers.
o ALEXANDER THE GREAT
When Alexander the Great was marching to Asia, were rumors of disaffection
growing among his allies and mercenaries,
SERTORIUS (Gen. Romano Q. Sertorious)
He was the Roman Commander in Spain Who possessed a White Fawn and
allowed
⚫️AKBAR the great mogul and sagacious master of Hindustan who employed
⚫️GENGHIS KHAN he was know the great monggol who used intelligence
⚫️RENAISSANCE PERIOD with the rise of nationalism and development of modern
armies
⚫️SIR FRANCIS WALSINGHAM under Queen Elizabeth organized the first national
intelligence service
⚫️RICHELIEU introduce the network of covert collectors who transmitted
⚫️LOUIS XIV ~ systematized political policy continuous surveillance
⚫️NAPOLEON BONAPARTE one spy in the right place is worth 20,000 men in the field
BUREAU OF INTELLIGENCE - which consolidate all incoming information
regarding the enemy for presentation to the emperor and to obtain information as
desired.
TOPOGRAPHIC BUREAU - This maintains a large map which covers the latest
information regarding both enemy and friendly forces. He maintained Military
Intelligence and Secret Political Police Service all over Europe. His main arm
was "Spy against spy" concept.
• FREDERICK THE GREAT
He was known as "Father of Organized Military Espionage". He has divided his agents
into four classes:
a. common spies - those recruited among poor folk glad to eafn. a small sum or to
accommodate as military officer
b.Double spies - are unreliable renegades. Chiefly involved in spreading false
information to the enemy
c.Spies of consequences - couriers and noblemen, staff officers, and kindred
conspirators, requiring a substantial bribe or bait.
d. intemedated spies
HANNIBAL he was considered one of the brilliant military
JULIUS CAESAR were the first intelligence personnel to appear an information collecting
agency
GEORGE WASHINGTON grand master intelligence
KARL SCHULMEISTER was napoleon military secret agent born on August 5 1770
~ he was able to infiltrate the Austria general staff

INFORMATION it refers to an organized or structured data


INTELLIGENCE it is product resulting from the collection evaluation collation
interpretation

You might also like