Police Intelligence Reviewer
Police Intelligence Reviewer
Police Intelligence Reviewer
Police Intelligence
It is the end product resulting from the collection, evaluation, analysis, integration, and interpretation of all
available information regarding the activities of criminals and other law violators for the purpose of affecting
their arrest, obtaining evidence, and forestalling them to commit crime.
Historical Backgrounds
Delilah - a biblical personality, she was able to gain information by using her beauty and charm, she was
responsible for the fall of Samson, a known Israelite leader and enemy of the Philistines.
Frederick The Great - Father of organized military espionage. This Prussian master was able to classify his
agents into four classes: common spies, double spies, spies of consequence, and persons which are
involuntarily lead to undertake espionage.
Alexander The Great - A Greek Conqueror, was able to identify those who are disloyal to him by ordering the
opening of communication letter of his men and was successful in uplifting the esprit de corps and morale of
his men. He devised the first letter sorting and opening to obtain information.
Gen. Romano Sertorius- the Roman commander who possessed a white fawn and allowed it to become
widely known that he derived both secrets and guidance from the fawn. His intelligence agents credited their
information to the supernatural power of animals.
Abu'l-Fath Jalal-ud-din Muhammad Akbar- the “Great Mogul” and sagacious master of Hidustan employed
more than 4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon it.
Napoleon Bonaparte- according to him “one spy in the right place is equivalent to 20,000 men in the field.”
He maintained military intelligence and secret political police service in all over Europe.
Genghis Khan- a Mongol who used intelligence to conquer China and invade Cathay. He instructed his
generals to send out spies and used prisoners as sources of information. They collected information on the
weaknesses of rivals by posting themselves as disguised merchants.
Hannibal- known as one of the greatest Roman enemy who ruled and conquered Rome for 15 years by
obtaining common street knowledge by posing as a beggar to gather first hand information on the pulse of
the people. His famous feat was at the outbreak of the Second Punic War when he marched an army which
included was elephants from Iberia to Northern Italy. Military historians consider Hannibal as the “father of
strategy” because his greatest enemy, Rome, came to adopt the elements of his military tactics in its own
strategic arsenal.
Julius Caesar - in his time, the staff of each legion includes the speculators who served as an information
collecting agency. The Speculators were the first intelligence personnel to appear in a military organization.
Military success of the Romans was aided by the communication system. Made use of pigeons as carrier
which made intelligence transmittal very fast.
Karl Schulmeister - known as Napoleon's Eye, he was credited for establishing counter-intelligence against
spies. He is a master of deceit who used black mail to obtain vital information to identify the enemy's of
Napoleon.
Alfred Redl- one of the most brilliant, homosexual intelligence agent. A double spy who while working
as intelligence director of Austria and Hungary, spied for the Russians. In 1913, his treason was
discovered and he was forced to commit suicide. His treason lead to the death of 500,000 agents and soldiers
combined in his 13 years espionage episode.
Sun Tzu - author of the art of war. A Chinese philosopher who takes into account practical view in battle.
According to him foreknowledge cannot be elicited from spirits nor from gods nor from analogy with past
events nor from calculations. He further asserted that if you know thy enemy and know thyself, you need
not fear the results of a hundred of battles.
Principles of Intelligence
1. Objectivity- it is a basic intelligence concept that there be unity between knowledge and action.
Intelligence must be adapted to the needs of the decision.
2. Interdependence- intelligence is artificially subdivided into component elements to insure complete
coverage, eliminate duplication, and to reduce the overall task or manageable sizes. Each subdivision
remains as essential part of unity which will contribute proportionately to the end result.
3. Continuity- intelligence must be continuous. What happens today could be studied in the light of
what has happened before which in turn would enable us to predict the shape of the things to come.
4. Communication- intelligence must be communicated to all the decision makers in the manner that
they will understand and puts intelligence to its most effective use.
5. Usefulness- intelligence is useless if it remains in the minds or in the files of its collectors. The story
must be told.
6. Selection- an intelligence should be essential and pertinent to the purpose at hand.
7. Timeliness- intelligence must be communicated at the appropriate time to permit its most effective
use.
9. General Directorate For External Security - France external intelligence agency, operating under
the direction of the French Ministry of Defense.
10. National Intelligence Coordinating Agency (NICA) is the primary intelligence gathering and
analysis arm of the Philippine government, in charge of carrying out overt,covert,
and clandestine intelligence programs. Its motto is: Kaalaman ay Kaligtasan (translated: "Intelligence
is Security").[Presently, NICA is in close coordination with the CIA, Mossad, Secret Intelligence
Service and intelligence services of ASEANcountries to counter the threat of terrorism.
1. Police Strategic Intelligence- is processed information which is long ranged in nature. It is used to
describe and define criminals and their activities as well as provide insight of their Modus Operandi.
2. Police Line Intelligence- an intelligence that is immediate in nature. Such information must be
updated to provide effective aids in police operations.
3. Police Counter Intelligence- it is an activity which is intended to build an organization against the
enemy by ensuring loyalty of its members through stringent background investigation. It also seeks
to deny the enemy of any information consisting of passive and active intelligence measures. This is
also known as Negative Intelligence. - phase of intelligence covering the activity devoted in
destroying the effectiveness of hostile foreign activities and the protection of information against
espionage, subversion and sabotage.
4. National Intelligence- it is the integrated product of intelligence developed by all governmental
branches and departments concerning the broad aspect of national security and policy. It is used to
coordinate all the activities of the government in developing and executing integrated and national
policies and plans.
5. Undercover Works- is an investigative process in which disguises and pretext cover and deception
are used to gain the confidence of criminal suspects for the purpose of determining the nature and
extent of any criminal activities that maybe contemplating or perpetuating.
1. College graduate
2. Passed prescribed test for intelligence officer
3. Passed background investigation
4. Good moral character
5. Loyal to the Republic of the Philippines
6. No undesirable traits (gambling, drug addiction, etc)
7. Passed the standards set by the screening committee
Phases of Recruitment
1. Selection- process of choosing from available personnel the most qualified operative fitted for police
intelligence work.
2. Investigation- the process of determining the degree of qualification, personal background of
prospective agents.
3. Testing- a series of actual and theoretical assignment to determine the intellectual capacity of the
prospect.
4. Appointment- issuance of order as an operative intelligence agent in a certain unit.
COUNTER INTELLIGENCE
1. Passive CI Measures - protection of classified and sensitive information against unauthorized access
through secrecy communication security and other safeguards.
2. Active CI Measures - are those measures which seek actively to block enemies effort to gain information
or engage in espionage, subversion and sabotage.
1. Military Security - it encompasses the measures taken by a command to protect itself against espionage,
enemy operation sabotage, subversion, or surprise.
2. Port Boundary and Travel Security - application of both military and civil security measures for
counter-intelligence control at point of entry and departure, international borders and boundaries.
3. Civil Security - active and passive counter-intelligence measures affecting the non-military nationals
permanently or temporarily residing in an area under military jurisdiction.
4. Special Operations - counter subversion, sabotage and espionage.
5. Combat Intelligence- A kind of intelligence required by the commander to provide for planning and
conduct tactical and administrative operation in counter insurgency. This pertains to knowledge of People,
weather, enemy and Terrain (PWET) used in planning and conducting tactical and administrative operation
in a counter insurgency.
Categories of CI Operation
1. Counter Human Intelligence (HUMINT)- seeks to overcome enemy attempts to use human sources
to collect information or to conduct sabotage and subversion which includes CI Special Operations,
Liaison, Counter Security, CI Screening.
2. Counter Imagery Intelligence (IMINT)- includes action taken to determine enemy signal
intelligence and related capabilities and activities. These actions include surveillance radar, photo
thermal and infrared systems. This primarily includes interpretation of photographs from aerial
units. Sometimes this is termed as PHOTINT.
3. Counter Signal Intelligence (SIGINT)- determines enemy signal intelligence and related electronic
warfare capabilities. It also assesses friendly operations to identify patterns, profiles, and develop
and recommend counter measures.
PLANNING
The intelligence officer must have a thorough knowledge of the available sources of information, the
collecting agencies and type of information the latter can provide.
Priority Intelligence Requirement- an item of intelligence or information of the characteristics of the area of
operations and the enemy which the commander feels he needs before he can reasonably arrive at a decision.
Also known as Essential Element of Information.
Examples:
Information Requirement- information regarding the enemy and its environment which needs to be
collected and processed in order to meet the PIR of a chief.
Examples:
COLLECTION
The intelligence officer must have thorough knowledge of the available sources of information and collecting
agencies and the type of information they can provide and consider the following:
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or techniques in collection
e. Ensure timely collection
1. Overt- open sources. 99% of the information collected are coming from open sources.
Examples: Information taken from enemy activity, civilians, captured documents, etc.
Informant Net- a controlled group of people who worked through the direction of the agent handler.
Types of Informants
1. Anonymous – those who gives information through telephone with the hope that the informant
cannot be identified.
2. False Informant - reveals information of no consequences or value.
3. Self-Aggrandizing - moves around the center of criminals delight in surprising the police about bits
of information.
4. Double Crosser - wants to get more information from the police more than what he gives.
5. Special/legitimate informant- those who gives information concerning specialized cases. Usually
they are regarded with a special treatment by the operatives.
6. Voluntary informant- gives information freely and willfully as a witness to a certain act.
7. Recruited informant- a person who is selected, cultivated, and developed into a continuous source
of information.
8. Rival elimination informant- an informant who gives information to eliminated rivalry.
9. Mercenary informant – informant who gives information for remuneration or compensation.
Mole - also known as sleeper agent. Tasked with monitoring an organization or individual. A mole can spend
years in the same place only responding to missions when assigned. They are trained to be visible but to keep
their motives unknown.
In any clandestine operation, the upper echelon of a spy bureaucracy consists of:
1. Regional desk officer- who oversees all HUMINT operations in that region of the world.
2. Watch officers- who staffs a 24 hour crisis center.
3. Counterintelligence officer- who oversees clandestine meetings between officers and agents.
4. Report officer- who acts as a liaison between officers in the field and analysts at headquarters.
The spies themselves are mostly considered as traitors, and traitors come in amazing variety of forms:
False Flag- a pretension on the part of the case officer where he holds a nationality whom the target expects
to be friendly to the targets own interest.
Example: a Chinese businessman thinks he is working for the Republic of China when he is really spying for
Taiwan.
Dead Drop- a place usually a dumpster or public garbage can where materials are discarded and later picked
up.
Techniques in Blackmailing
1. Black mail marketing- targets are threatened with exposure for buying contraband goods and
services in the black market.
2. Currency violations- targets are threatened with exposure for violating currency laws of the host
nation.
3. Security violations- targets are threatened with exposure for violating no trespassing zones or
being on government property of the host nation.
4. Criminal law violations- targets are threatened for prosecution for various criminal offenses that
they have been set up in.
PROCESSING/ANALYSIS
Steps in Processing
1. Collation- organization of raw data and information into usable form, grouping similar items of
information so that they will be readily accessible.
2. Recording- is the reduction of info writing or some other form of graphical representation and the
arranging of this into groups of related items.
3. Evaluation- examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source of information and its credibility.
4. Analysis - is the stage in which the collected information is subjected to review in order to satisfy
significant facts and derive conclusions there from.
5. Integration - the combination of the elements isolated analysis with other known information
related to the operation.
6. Interpretation - process of determining the significance of new information and its meaning.
7. Deduction- the formulation of conclusions from the theory developed.
Example: SPO3 Juan Cruz evaluated the information gathered as “completely reliable, source probably true”.
What is the information`s evaluation rating?
Answer: A-2
PO1 Juan Cruz submitted an intelligence report evaluated as B-5. What is the interpretation of this evaluated
intelligence report?
DISSEMINATION
Processed information or intelligence data are disseminated to end users, common methods of disseminating
intel data are conferences, briefing and person to person exchanges.In this process, consider the factors of
timeliness, correctness and security.
1. SURVEILLANCE - is the covert, discreet observation of people and places for the purpose of obtaining
information concerning the identities or activities of subjects.
Methods of Surveillance
1. Stationary Surveillance - also referred to as Fixed or Stakeout Surveillance - is used when you
know or suspect that a person is at or will come to a known location, when you suspect that stolen
goods are to be dropped or when informants have told you that a crime is going to be committed.
2. Technical- surveillance by the use of communications and electronic hardware, gadgets, etc.
3. Moving Surveillance/Shadowing/Tailing - simply the act of following a person.
Forms of Shadowing/Tailing
1. Loose Tail - employed where a general impression of the subject's habits and associates is required. It can
be applied frequently or infrequently, or in varied occasions.
2. Rough Shadowing - employed without special precautions, subject maybe aware of the surveillance,
employed also when the subject is a material witness and must be protected from harm or other undesirable
influences.
3. Close Tail - extreme precautions are taken against losing the subject is employed where constant
surveillance is necessary.
2. CASING - it is the careful inspection of a place to determine its suitability for a particular operational
purpose.
1. Area condition and habit- whether the place is a residential, commercial, highly urbanized, or rural.
2. Active opposition- means all organs of every security system whose task is to prevent intelligence
activity in a given area.
3. Disposal plan- disposal of the information in case of possible compromise.
4. Escape and evasion- the exit planning in case of emergencies from immediate focal point to the
general area.
3. ELICITATION - the process of extracting information from a person believe to be in possession of vital
information without his knowledge or suspicion. It is a system whereby information of intelligence value is
obtained through the process of direct intercommunication with one or more parties who are unaware of the
purpose of the conversation.
Teacher/Pupil- make the person express topics about him. Most people like to talk about themselves.
Kindred Sole- “misery loves company”. People express a need for recognition, particularly the lonely, the
neglected, the vain and those with feelings of inferiority.
Good Samaritan- do good deeds or favors for the source.
Partial- Disagreement Approach- seeks to produce talking by the word “I am not sure if I fully agree”
Teaser-bait – make the source believe you know more than he knows on the topic.
National Pride Approach- natural propensity of all persons to defend their country and its policies.
2. Probes- an attempt to obtain more information after the subject gives a vague, incomplete general
response. It is used to sustain the conversation.
Completion- by inserting bits of factual information on a particular topic, the source may be influenced to
confirm and further expand on the topic.
Clarity- a request for additional information where the source`s response is unclear. Like “whay do you mean
by….”
Hypothetical- can be associated with a thought or idea expressed by the source. Many people who might not
make a comment concerning an actual event may express an opinion on a hypothetical situation.
High Pressure Probe- it serves to pin down a subject in a specific area or it may be used to point out
contradictions in what the subject has said.
Bugging - the use of an equipment or tool to listen and record discreetly conversation of other people.
5. TACTICAL INTERROGATION - it is the process or method of obtaining information from a captured enemy
who is reluctant to divulge information.
Interrogation Techniques
a. Open Technique- the interrogator is open and direct in his approach and makes no attempts to
conceal the purpose of the interrogator. This is best employed when the interrogee is cooperative.
b. Common interest technique- the interrogator exerts effort to impress the interrogee of their
common interest. The interrogator points out the advantages if interrogee will cooperate.
c. Record file or “we know all” technique- the interrogator may ask about a subject, if the interrogee
refuses to cooperate, the interrogator may provide the answer in order to impress the interrogee
that the interrogator knows him very well.
d. Exasperation- effectively employed against hostile type of interrogee. Subject is placed in a longer
period of interrogation without rest or sleep. The interrogator permits the source to go to sleep and
subsequently awaken for another series of repeated questioning. After many repetitions the
interrogee will be exasperated and will finally cooperate hoping that he can be allowed to rest or
sleep. The purpose is to bore the interrogee.
e. Opposite personality technique (mutt and Jeff)- two interrogators playing opposite roles.
f. Egotist technique- employed to an interrogee who displays insecurity. The interrogee is
complimented in hopes of getting him to admit certain information to gain credit. Described him as
the best effective source who have been looked down upon by his superiors.
g. Silent technique- employed against nervous or the confident type of interrogee. Look out the
interrogee squarely in the eye with sarcastic smile. Force him to break eye contact first. he may ask
questions but the interrogator must not answer. Patience is needed. When the interrogator is ready
to break silence, he may do so with a quietly and non chalantly idea that the interrogee is surely
being part of the crime.
h. Question Barrage or rapid Fire Questioning- intended to confuse the interrogee and put him into a
defensive position. The interrogee become frustrated and confused, he will likely reveal more than
he intended.
6. OBSERVATION AND DESCRIPTION - it is a method of collecting information by just merely using the
different senses.
8. UNDERCOVER OPERATION - also called Roping - is disguising one's own identity or using an assumed
identity for the purpose of gaining the trust of an individual or organization to learn secret information or to
gain the trust of targeted individuals in order to gain information or evidence.
Cover - it refers to the changing, forging, or falsifying agent' real personality including but not limited to
things, location, job and others that will be used in undercover assignments.
Types of Cover
1. Artificial -altering the background that will correspond to the operation.
2. Multiple - includes different cover
3. Natural - actual or true background
Coding - the changing of message from plain clear text to unintelligible form, also known as encrypting.
Decoding - transforming of coded message into plain text, also known as decrypting.
Cryptographer - refers to a person who is highly skilled in converting message from clear to unintelligible
forms by use of codes and ciphers.
SECURITY CLEARANCE - is a certification by a responsible authority that the person described is clear to
access and classify matters at appropriate levels.
2. Secret - unauthorized disclosure of this documents or things may put at risk the national security, cause
serious injury to the reputation of the nation.
Examples: info about intelligence operations, troop movements, order of battle, etc.
3. Confidential - Unauthorized revelation of which may be injurious to the reputation of the nation or
governmental activity or will cause administrative humiliation or unnecessary injury.
Examples: plans of government projects, routine intelligence reports, personnel records, etc.
4. Restricted - this are information which should not be published or communicated to anyone except for
official purposes. These records are daily files, routine in nature even if lost or destroyed will not affect
operation or administration.
Examples: blotters, daily logbook file, etc.
2. Communication Security - the protection resulting from the application of various measures which
prevent or delay the enemy or unauthorized person in gaining information through communication. This
includes transmission, cryptographic and physical security.
3. Documentary Security - protection of documents, classified matters and vital records from loss, access to
unauthorized persons, damage, theft and compromise through proper storage and procedure.
4. Personnel security - the sum total procedures followed, inquiries conducted and criteria applied to
determine the work suitable to a particular applicant or the retention or transfer of a particular employee
Personnel Security Investigation - is an inquiry into the character, reputation, discretion, integrity, morals
and loyalty of an individual in order to determine a person's suitability for appointment and access to
classified matters.
Types of PSI
1. Local Agency Check - refers to the investigation of the records and files of agency in the area of principal
residence of the individual being investigated: Mayor, Police, Fiscal where the individual is a resident.
2. National Agency Check - it consist of LAC supplemented by investigation of the records and files of the
following agencies: PNP. ISAFP, NBI, CSC, Bureau of Immigration and other agencies.
3. Background Investigation - a check made on an individual usually seeking employment through subject's
records in the police files, educational institutions, place of residence and former employers.
Partial Background Investigation - investigation of the background of an individual but limited only to
some of the circumstances.
“If you have questions- ASK; If you don’t understand- SPEAK; It`s okay to let people know that you don’t know” ----Cueno, 2016