Notes LEA 3.2
Notes LEA 3.2
July 5, 2009
Introduction to Intelligence
In this world, the importance of intelligence has become
increasingly emphasized. It is important that we gain an understanding
of the nature and scope of intelligence and its implications in this
time.
Intelligence and the need for intelligence is far from new.
However, these days of rapid communications, more powerful weapons,
ideological hot, warm and cold war emphasize the need for rapidly
acquired and processed accurate and detailed intelligence, timely, of
life and freedom which is valued so clearly.
History of Intelligence
1. Holy Bible- is here you can find the just recorded intelligence
operations in history.
Moses-One of the first recorded formalized intelligence efforts,
with format, can be found in the
The scripture also named the 12 intelligence agents when the Lord
directed Moses to send into the Land of Canaan and records that “all
those men were heads of the children of Israel”.
a. Rehab- “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered
and concealed the agents of Israel, made a covenant with the agent sand
duped their pursuers. She was not only an impromptu confederate of
immense value to the Jewish leaders of that far-distant day, but also
established a plot- pattern which is still of periodic relief to motion-
picture producers.
b. Delilah- a Palestine agent who used her charm to gain
information from the powerful enemy.
6. Lord Baden – Powell- Known as the founder of the Boy scout Movement
and was also active spy. Baden- Powell exploited his powers of tracking
and observation, coupled with his considerable skills as a Thespian, to
the benefit of the British Secret Service.
When World War I broke out, Mata Hari was in Berlin, where she had
recently befriended the Chief of police, who subsequently enlisted her
into the ranks of the German Secret Service. She carried on her life as
before dancing naked on the stage and dispensing her services liberally
to those who could afford her.
13. Alfred Red- One of the most brilliant intelligence agents, though he
was a homosexual. He rose to become chief of the Austro- Hungarian
Secret Service, or in other terms, director of their military
intelligence system. For more than half of his time as director of
intelligence, Red was acting as an intelligence agent of Russia.
Col. Rudolph Abel - (Russian) - was probably the highest ranking and
most successful spy whoever infiltrated the United States.
Definition of Intelligence:
a. First, Mr. Webster defines intelligence as:
1. Capacity for understanding and for other forms of adaptive
intellect of behavior; the mind in operation.
2. The power of meeting any situation, especially a novel
situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to
guide action toward goal.
3. Knowledge of an event, circumstances etc., received or imparted;
the gather or distribution of information; the staff of persons engaged
in obtaining such information.
b. In Psychology text:
Intelligence is the capacity of a person to adjust to new
situations through the use of what has been previously learned.
Principles of Intelligence
a. The Principle of Objectivity/Objectiveness
1. Intelligence must be based on the decision-makers own plans and
intentions as much as on consideration of the intelligence targets.
2. In intelligence, only well guided will succeed.
c. Principles of Continuity
It simply means that information, events, and reports must be
continuous and intelligence activities follow a simple continuous
intelligence cycle.
Intelligence coverage must be continues so that the shape of what
happened today could be studied in the light of what happened before,
which in turn would enable to predict the shape of things to come.
d. Principle of Communication
Intelligence adequate to their needs must be communicated to all
the decisions makers in a manner that they will understand and inform
that will permit its most effective use. Intelligence is useless if it
remains in the minds, or in the files of its collectors or its
producers.
e. Principle of Selection
Intelligence should be essential and pertinent to the purpose at
hand.
f. Principle of Timeliness
Intelligence must be communicated or must be available on time to
the decision maker to permit its most effective use.
h. Principle of Flexibility
i. Principle of Security
Security is achieved by measures which the intelligence takes to
protect and preserve the integrity of its organization personnel,
method, sources, information and results of its activities.
Intelligence Axioms:
1. Intelligence is crucial
2. Intelligence is essential to operations
3. Intelligence is a responsibility of all government operations.
4. Intelligence of the government should be superior to that of the
enemy.
Capabilities- Strengths
Vulnerabilities- Weaknesses
Security Measures:
1. Active control measures- to actively block the enemy effort to
gain information.
2. Passive control measures- to conceal information from the enemy.
3. Deception measures- to deceive the enemy.
1. Natural Barriers
2. Human Barriers
3. Animal Barriers
4. Energy Barriers Ex: Protective alarms system and Protective
Lighting system.
5. Structural Barriers- Ex: wall, fences, or blocks.
3. Operational Security
It is the measures taken in conducting operations or activities in a
secure and efficient manner.
4. Communication Security
It is protection resulting from all measures designed to deny
unauthorized persons information of value which might be derived from
the possession and study of telecommunications or to mislead
unauthorized persons in their interpretations of the result of such a
study.
Sources of Information
Source- it is where the information is obtained.
Organization- refers to the intelligence personnel or the intelligence
unit.
1. Persons (informant, syndicate, intelligence broker, double
agent)
2. Object
3. Records
2. Non- Open or Closed Sources- are those that are not obtainable
openly. They can be located inside building’s safe or vault, known
only in the minds of some scientist, or through the employment of
technical means.(Bugging and tapping)
Process of Information
1. Order of Battle- it is the summary recording of one’s specific
criminal activities with entries covering matters with intelligence and
tactical interest, enumeration of personalities involved in the
organization’s movement and activities.
2. Clandestine Operation- is a secret action undertaken by an
intelligence agent in behalf of an organization, the government and
other friendly forces.
3. Sketching – consist of putting ideas in an accurate pictorial form.
It is a means describing on object or area to satisfy a particular need.
4. Photography- is the process of producing image on a sensitized
material by variant form or radiant energy.
5. Provocation-is an action taken in order to incite reaction from a
know adversary or to observe reactions of adversaries.
6. Portrait Parle- a means of using descriptive terms in relation to the
personal features of individual and it can briefly describe as a word
description or spoken pictures.
1. Selection
2. Recording
3. Evaluation
3.1. Pertinence- usefulness of the information.
3.2. Reliability
3.3. Probability- is judged by its consistency within itself, its
circumstantially, its plausibility in view of general knowledge and
experience, and its consistency with other information or
intelligence on the same related subjects.
3.4. Credibility- refers to the probable truth of the information
1. Elicitation
A system or plan whereby information of intelligence value is
obtained through the process direct intercommunication in which one or
more of the parties to the community unaware of the specific purpose of
the conversation.
Types of Approach:
1. Flattery- people are susceptible to praise
Variants:
a. Teacher- Pupil approach- the subject is treated as an authority.
We request him/her to enlighten us and we solicit his viewpoint
and opinions. The collector builds the theme that he is an
ignorant student who wants to learn from the all knowing
teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal
having some specialized quality and you flatter him/ her by
showing enough concern for his/ her welfare to pay special
attention to his enjoyment. The collector attempts to build on
professional brotherhood and understanding of what the source of
information is going through and sharing the source’s
frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and
assistance are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration
of he source of information and express curiosity on how one could
achieve such greatness.
Types of Probe:
1. Competition Probe- this is effective when used in connection with the
teacher- pupil approach.
2. Clarity Probe- used to elicit additional information in an area which
the response is clear.
3. High Pressure Probe- it serves to pin down a subject in a specific
area or it maybe used to point out contradictions in what the subject
has said.
4. Hypothetical Probe- present a hypothetical situation and to get the
subject to react to the hypothetical situation.
2. Casing
It is the reconnaissance or surveillance of a building, place or
area to determine its suitability for intelligence operation or its
vulnerability in operations (position of the enemy)
3. Escape and Evasions- In case of compromise, the agent must get out
entirely from the target.
Stages of Casing:
1. Area familiarization
2. Actual inspection of the area
3. Re-casing
Surveillance
It is a process or act of keeping person, premises or vehicles
under observation in order to acquire detailed information concerning
the activities, identities and contact of the subject. It is concerned
primarily with persons. Places and objects can be closely watched by are
generally incident to the primary interest of seeking information about
people.
It involves many varied techniques and skills including
preparation, foot surveillance, automobile surveillance, stationary of
fixed surveillance, and reconnaissance. Also, tailing, shadowing,
trailing or keeping the subject under observation.
1. Wire tapping
2. Concealed Microphones
3. Tape recorder
4. Television(CCTV)
Kinds of Surveillance
a. Stake Out or Surveillance of Places
b. Tailing or shadowing
c. Undercover investigation or “Roping”
A. Surveillance of Places
B. Shadowing or Tailing
Don’ts in Shadowing:
1. Don’t make abrupt or unnatural movements.
2. Do not make use of disguise that will attract attention.
3. Don’t meet the eye of the subject. Doing so tends to fix the
shadower in the mind of the subject. If the subject turns and it seems
as if a face to face encounter will result, the shadower must look
anywhere except the subject’s face.
4. Don’t adopt a slinking, sleuthing, creeping, peeking manner. Don’t
slink in and out of doorways, sleuth behind the subject, creep from
around parked cars, peek for around corners, it is unnecessary,
ineffectual and above all attract attention.
5. Don’t wear story- book disguises. False whiskers, artificial noses,
simulated deformities and the like rarely. If ever, are convincing when
worn by an amateur and seldom convincing for any length of time even
when worn by a professional actor or when applied by a professional
make- up artist. These disguises maybe good for the theater by not for
the street.
6. Don’t carry briefcases, notebooks, papers or other noticeable
objects.
7. Don’t greet or never speak to fellow officers or allow them to greet
you. It must be an established policy that other officer in or out of
uniform do not greet each other on the streets if there is any
possibility that one may be on a job.
8. Don’t make notations or entries ostensibly. Strangely enough
sometimes, the more experience shadower fails to observe this
precaution. This is so to avoid suspicion of his mission.
9. Beware of bulging concealed weapons.
10. Don’t attempt to appear too innocent if accosted by the subject.
11. Maintain distance
12 Note taking should be done in safe areas.
Don’ts in Surveillance:
1. Window shopping
2. Use of convoys
3. Stopping immediately on blind corners.
4. Getting out immediately on public conveyances.
5. Retracing
6. Entering mobile housing.
Methods of Shadowing
a. Foot Surveillance
1. One- man shadow
2. Two- Man Shadow
3. Three- man Shadow or ABC method
C. Automobile Surveillance
This requires careful preparation, wherein the shadowers must use a
vehicle if the subject uses a vehicle. The vehicle used by the
shadowers must be non-descript, preferably rented vehicles since they
can be changed often. The license plates must be anonymous if the car
used in shadowing is official or government vehicles. The “tail” car
may be changed several times a day to lessen chances of being detected.
It is preferred that there be three men in shadow car. Number one man
is the driver, number two watches for a convoy, number three takes
notes. The notes include and place every act and every contact of the
subject vehicle and its passengers. Complete descriptions are made of
all persons contacted if their identities are unknown.
If number two catches a convoy, then the tail job is switched to
the convoy car. The driver will avoid attracting attention by deriving
at normal speed in reasonable manner. He will avoid unnecessary
turning, twisting, stating, stopping and other maneuvers.
When the subject leaves his vehicle, number two and three leave
the shadow car and take up the surveillance on foot. Number one remains
with the car.
In automobile surveillance, the vehicle used should conform to the
same characteristics as the investigation or surveillance. The make and
model of the car should not be spectacular or readily unidentifiable,
and it should not carry any distinctive license plates.
a. License Plate – a popular type of black color car should be used and
care must be taken that the license plates are not identified. This can
be remedied by the following:
1. Use of security plates
2. Use of “colorum cars” “drive-it- yourself” rented cars
3. Borrowing cars from friends.
Special Qualification
1. knowledge of the language
2. area background regarding events
3. knowledge about the customs and habits
4. physical appearance
Preparation of Assignments
a. Study of the subject
1. Name 7. Drug
2. Address 8. Hobbies
3. Description 9. Education
4. Family and relatives 10. Occupation and
5. Associates specialty
6. Character and temperament
c. Subversive Organizations
1. History and background of organization. Biography of the
official
2. Identity and background of members and former members.
3. Method of identification employed by members.
4. Files and records- nature , location, accessibility
5. Meeting- schedule and meeting place.
Hazard to Cover:
1. Passive opposition- refers to people who are not directly
involved insecurity and CI activities.
2. Friendly or not hostile opposition- refers to friendly
organizations that may hinder the operations.
3. Unfriendly or hostile active opposition- refers to the enemy
intelligence operations that may compromise the undercover.
Reconnaissance
To gather specific or detailed information at a particular time and
place.
Methods of Reconnaissance
Clandestine Operation
A secret action undertaken by an intelligence /counter intelligence
organization in behalf of the government or other friendly forces.
Motivation of an Agent
1. Ideology- believe in the principles of life
2. Patriotism
3. Remuneration- mercenary-the primary motive
4. Career development
5. Fear
“N e v e r, n e v e r l o v e y o u r a g e n t”
Termination problems:
1. Amount of knowledge the agent has in the operation and
personnel.
2. His inclination to use knowledge to the disadvantage of the
intelligence service.
Moral obligation to the agent.
INFORMANT MANAGEMENT
J.P.E
The End