Police Intelligence (Lea 24)
Police Intelligence (Lea 24)
Police Intelligence (Lea 24)
Intelligence
BY : REMARK M. GALAN, RCrim
Top 5 LEC
April 2016
Historical Background
MOSES
2. Bureau of Intelligence
– consolidated all incoming information
regarding the enemy.
ALFRED REDL
Founded on 1949.
NATURE OF INTELLIGENCE
Intelligence
National Intelligence
Criminal Intelligence(CRIMINT)
– essential to the prevention of crimes,
investigation, arrest and prosecution of criminal.
Denial measures
– Secrecy discipline, document security,
camouflage and concealment and counter
reconnaissance efforts.
Detection measures
– PSI, Security tag or password,
Reconnaissance.
Deception measures
– use of escape and evasion, dummy position,
fabricated information.
Intelligence Cycle
Law
Evaluation & Enforcement
1.Planning &
Feedback Community
Direction
Crime
Problem
5. Intelligence
2.Information Dissemination
Collection Info
Network
&
Sources
1. Determination of Intelligence
Requirements.
3. Establishment of Priorities.
PHASE 2 – Collection
2. Evaluation
it is determining the reliability of the
source and accuracy of the information.
A – COMPLETELY 1 – CONFIRMED BY
RELIABLE OTHER SOURCES
B – USUALLY 2 – PROBABLY TRUE
RELIABLE
C – FAIRLY RELIABLE 3 – POSSIBLY TRUE
Maintain distance.
Plan ahead and be aware on changes of
action.
Take down notes safely.
Make use of street furniture ( telephone
booth, sidewalk vendors, waiting shades,
etc.)
2. Casing
reconnaissance or surveillance of a
building, place or area to determine its
suitability for intelligence use or its
vulnerabilities.
Methods of Casing
Is a communicated knowledge by
others obtaining by personal study,
investigation, research, analysis,
observation.
Persons as Sources of Information
2. Anonymous Informant
– those who gives information through
telephone call with the hope that the
informant cannot be identified.
3. False Informant – reveals information
usually of no consequences, or stuff
concocted in thin air.
Reward
Revenge
Fear and avoidance of punishment
Friendship/ Career development
Patriotism
Vanity
Civic mindedness
Repentance
Competition
Steps of Informant Processing
1. Jargon Code
Wherein:
85772 – Boxer Seven – Intelligence Unit
24799 – Seek – pursue
10090 – Tiger5 – Abu Sayyaf Group
12487 – Red Coral – Basilan
Plaintext: ABCDEFGHIJKLMN
OPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQ
RSTUVWXYZABC
Example:
MARIA OZAWA IS HOT.
PDULD RCDZD LV KRW.
Transposition Cipher – shuffles the letters
around.
Tips in preparing:
Changed the order of plaintext letters to
derive the ciphertext.
EXAMPLE:
MARIA OZAWA IS HOT.
TOH SI AWAZO AIRAM
Write the message without word divisions in
rows of letters arranged in a rectangular
block.
EXAMPLE:
MARIAOZAWAISHOT
Transpose the letters in a prearranged
order, such as by vertical columns,
diagonals, or spirals or by more
complicated system.
EXAMPLE:
MAR
IAO
ZAWAI
SHOT
The arrangement of the letters in the
enciphered message depends upon the
size of the block of code words used.