Intelligence and Secret Service
Intelligence and Secret Service
Intelligence and Secret Service
1.Overt
2. Covert
Definition of Terms:
Intelligence Cycle - is the process of developing
Intelligence Agency - is a government agency
unrefined data into polished intelligence for the use of
responsible for the collection, analysis or exploitation of
policy makers.
information and intelligence in support of law
1. Direction - intelligence requirements are
enforcement, national security, defense and foreign
determined by a decision maker to meet his/her
policy objectives.
objective.
2. Collection - is the gathering of raw information
Intelligence Officer - is a person employed by an
based on requirements.
organization to collect, compile and analyze information
3. Processing - converting the vast amount of
which is used to that organization.
information collected into a form usable by
analyst.
Counter Intelligence - refers to effort made by
4. Analysis - conversion of raw information into
intelligence organizations to prevent hostile or enemy
intelligence. It includes:
intelligence organization from successfully gathering and
(1) integrating
collecting intelligence against them.
(2) evaluating
(3) analyzing data and preparing intelligence
Human Intelligence - category of intelligence derived
product.
from information collected and provided by human
5. Dissemination - is the distribution of raw or
sources.
finished intelligence to the consumer whose needs
initiated the intelligence requirement.
Dead Drop/Dead Letter Box - is a method of
6. Feedback - is received from the decision maker
espionage trade craft used to pass items between 2
and revised requirement issued.
individuals using a secret location and thus not require
to meet directly.
Evaluation - systematic determination of merit, worth
and significance of something or someone using criteria
Live Drop - 2 persons meet to exchange items or
against a set of standards.
information.
Collation - is the assembly of written information into a
Dead Drop Spike - is a concealment device used to
standard order.
hide money, maps, documents, microfilm and other
items.
Crime Triangle
1. the offender
Cut-Out - is a mutually trusted intermediary, method or
2. the victim
channel of communication, facilitating the exchange of
3. the location
information between agents.
Crime Intelligence - information compiled, analyzed
Espionage/Spying - involves a government or
and/or disseminated in an effort to anticipate, prevent,
individual obtaining information that is considered secret
or monitor criminal activity.
of confidential without the permission of the holder of
the information.
Strategic Intelligence - information concerning
existing patterns or emerging trends of criminal activity
Agent Handling - is the management of agents,
designed to assist in criminal apprehension and crime
principal agents and agent networks by intelligence
control strategies for both short and long term
officers typically known as case officers.
investigative tools.
Case Officer - is an intelligence officer who is trained
Tactical Intelligence - information regarding a specific
specialist in the management of agents and agent
criminal event that can be used immediately by
network.
operational units to further a criminal investigation plan
tactical operations and provide for officer safety.
Agent - acts on behalf of another whether individual,
organization or foreign government, works under the
Open Source - refers to any information that can be
direction of a principal agent or case officer.
legitimately obtained e. free on request, payment of a
fee.
Cryptography - is the practice and study of techniques
for secure communication in the presence of third
Source - the place or person from which information is
parties called adversaries.
obtained.
Eaves Dropping - Is the act of secretly listening to the
Intelligence Assessment - is the development of
private conversation of others without their consent.
forecasts of behavior or recommended courses of action
to the leadership of an organization based on a wide
Propaganda - is a form of communication that is aimed
range of available information sources both overt and
at influencing the attitude of a community toward some
covert.
cause or position.
Intelligence Analysis - is the process of taking known
Flip - apprehended criminals who turn informants.
information about situations and entities of strategic,
operational, or tactical importance, characterizing the
Snitches - jail house informants.
known and with appropriate statements of probability.
the future actions in those situations and by those
entities. D. Angelito Pacia
1. Sun Tzu - The Chinese general who wrote The Art of 1. To assist the commander in the success of the team
War in about 400 b.c.
2. Discover and Identify criminal activities
2. Smoking-bolt operation - A covert snatch
operation in which a special entry team breaks into an 3. To assist in the apprehension of criminals
enemy installation and steals a high-security device, like
a code machine, leaving nothing but the "smoking
3 Types of Channels in Special Communication Systems
bolts."
8. Terms:
4. Testing
1. Wanted list - It is for crime suspects with warrant
of arrest.
2. Watch list - It is for those without warrant of Area of Interest subject of information gathering (person, place,
arrest.
Briefs the form in which the finished product of intelligence is pres
3. Target list - It is for organized crime groups.
4. PIR - Priority Intelligence requirement Bugging the placement of a hidden microphone in a particular roo
5. OIR - Other intelligence requirements
6. SOR - Specific order request Burned the agent was identified and known.
9. R.A. 8551 - Placed PNP as support to the AFP in CIA established in 1946.
Counter insurgency operations thru intelligence
Ciples are fundamental guides to action, broad statement of truth from which others are derived.
Integrate to make the entire or all the information the subject ma
Classification/Types Of Police Intelligence
Interpret to explain the meaning or to expand the information fro
1. Strategic Intelligence
Intelligence product resulting from the collecting information conc
Kinds Of Surveillance
Coding is the process of putting the codes and ciphers to plain text message.
1.
Collate to bring together and compare the truthfulness of the information. Surveillance of place
Cooperative Members of the Community - a rich source of information on criminals, criminal activities and even subversive groups.
3. Undercover investigation or Roping
Criminal Syndicate it is a stable business with violence applied and directed at unwelcome competitors.
Line Intelligence types of intelligence which is of immediate natu
Criminal World the social organization of criminals having its own social classes.
Method of Casing
Cryptoanalysis is the process of putting the plain text message to codes and cipher.
1. Personal Reconnaissance the most effective
Cryptograph the art and science of making, devising, inventing, or protecting codes and cipher.
2. Map
Counter Intelligence type of intelligence activity which deals with defending Reading
the organization against it criminal activities.
3. NeedorTo
Operational Security measures taken in conducting operations Know
action in Principle inefficient
a secure and intelligence dissemination, even a ran
manner.