Comprehensive Review in LEA

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 227

V.I.

P’s IN
LAW ENFORCEMENT ADMINISTRATION
By:
ROMMEL K. MANWONG, Ph.D.

www.rkmfiles.net Dr. Rommel K. Manwong 1


PRELIMINARY NOTES

LEA is the most comprehensive area in the


criminology board examination carrying a
weight of 20 % from the total percentage in
the scoring system.

www.rkmfiles.net Dr. Rommel K. Manwong 2


COVERAGE
 Police Org, Mgmt & Admin w/ special focus on
R.A 6975 and R.A 8551 (and new NCs)
 Personnel (Human Resources Management)
 Police Planning & Patrol Operations
 Police Communication Systems (PCS)
 Community Relations (PCR)
 Police Intelligence & Secret Service
 Security Management (Industrial Scty Mgmt)
 Comparative Police Systems

www.rkmfiles.net Dr. Rommel K. Manwong 3


PART ONE

THE DEVELOPMENT OF POLICE SYSTEMS

www.rkmfiles.net Dr. Rommel K. Manwong 4


POLICING SYSTEMS

Basic Concepts
Police – “Politeia” G, government of a city
“Politia” R, same meaning above
“Polizei” Gr, Safe keepers (territory)
“Police” F, persons to enforce law
**borrowed by the English and Americans to
refer to LAW ENFORCER.
** constable, patrol, F in origin

www.rkmfiles.net Dr. Rommel K. Manwong 5


Historical Background
 2300 B.C – Sumerians Lipithstar & Eshumma – set
standards on what constituted an offense against
society – the Sumerian Code
 2100 B.C – Babylonians – Code of King Hammurabi –
Principle LEX TALIONES – oldest harsh code.
 1500 B.C – Egyptians – Court system presided by
judges appointed by the Pharoah; Marine patrol &
custom house officers protecting commerce started;
first use of dog patrol; Medjays – civilian police under the
command of a military.
Ancient Greece – Ephori – law enforcers

www.rkmfiles.net Dr. Rommel K. Manwong 6


 Ancient Rome – 12 Tabulae (12 Tables) – the first writ-
ten laws, Emperor Augustus – created the
Praetorian Guard, Urban Cohorts (City Patrol),
and the Vigiles (fire fighters); Emperor Justinian – Jus-
tinian Code became known as
Corpus Juris Civilis (Body of Law)

**Vigiles –first civilian police force which keep the


peace very ruthlessly, hence the word vigilantes

www.rkmfiles.net Dr. Rommel K. Manwong 7


 Anglo-Saxon (England: 849-899) -Time of King Alfred
** Tun Policing – Tun (Town); Frankpledge system - 10
male residents as guardians of the town known
as tythings (10 families).
** Hue and Cry – Complainant shouts for the
mandatory assembly of men to catch the culprit,
horn – oldest known warning device
** Royal Judge – investigates and punishes
** Trial by Ordeal – painful test of guilt/innocence

www.rkmfiles.net Dr. Rommel K. Manwong 8


 Normal Period of Policing
**Shire-Rieve – shire (district/country) rieve (ruler)
later called Sheriff– England was divided into 55
military districts under the control of a rieve.
**Travelling Judge – renders judgment and gives
punishment
** Leges Henri – Law of King Henri I – policemen
were considered public officials
** Magna Carta – laws with the demand of the
Knights of the Round Table – beginning of national/lo-
cal government and legislation

www.rkmfiles.net Dr. Rommel K. Manwong 9


Winchester Period
**Statute of Winchester- 1285 – Watchmen
(16 heads) - **Statute of 1295 – gate of London
close at sundown – curfew system adopted
** Justice of the Peace – a position with power to ar-
rest, pursue and impose punishment
**Star Chamber Court – special court to try
offenses against the state.

www.rkmfiles.net Dr. Rommel K. Manwong 10


**Keepers of the Peace – time of King Richard
appoint – Knights to keep the King’s Peace
** The Charlies – time of King Charles – appoint – night
watchers known as Bellmen - on duty from sunset to
sunrise
** Bow Street Runner – time of Henry Fielding,
appointment of foot patrol, horse patrol
(mounted patrol).

www.rkmfiles.net Dr. Rommel K. Manwong 11


Modern Period of Policing
**Metropolitan Police Act of 1829 –
modernize the police system of England; creation
of Scotland Yard – Robert Peel
“Father of Modern Policing”

www.rkmfiles.net Dr. Rommel K. Manwong 12


In France
 16th Century - Paris had two patrols: Citizen Night Guard;
and the Royal Guard for the king’s protection. The Guard
motto that even today is on the French police emblem
“Vigilat ut Quiescant” - “He watches that they may sleep”
They were also called GENDARMIE – slang for police officers
 1791 - The position of “Officers de Paix” was formed
(origin of “Peace Officer”)
 The first French Police Officers - Sergent de Ville’ - servant
of the city
In Italy and Spain
 Italian – Carabinieri
 Spanish – Guardia Civil

www.rkmfiles.net Dr. Rommel K. Manwong 13


In the United States

 Boston, 1636 – formed the first “Night Watch” –


they were called “Leathermen”

 Philadelphia, 1833 – instituted the first daytime,


paid police service

 New York, 1844 – organized the first modern


American police force based on the English
Metropolitan police.

www.rkmfiles.net Dr. Rommel K. Manwong 14


Development of Policing in the Philippines

 Pre-Spanish – policing is tribal in nature


 1712 – Carabineros de Seguridad Publico –
the mounted police
 1836 – Guardrilleros – rural police
 1852 – Guardia Civil – town police
 1901 - Organic Act # 175 – Phil. Constabulary under
Capt. Henry T. Allen – first Chief
 1917 – PC Filipinization – Brig. Gen. Rafael
Crame – First Filipino Chief of PC

www.rkmfiles.net Dr. Rommel K. Manwong 15


 1935 – PC Personnel were absorbed by the
Philippine Army
 1936 – Commonwealth Act #88 created the
State Police
 1938 – Commonwealth Act #343 – reconstituted
the Philippine Constabulary – PC became an
independent National Police Force
 1939 - The Manila Police Department introduced
the bicycle patrol.

www.rkmfiles.net Dr. Rommel K. Manwong 16


Japanese Occupation
 1941 - The Japanese Military Police (Kempetai)
took over MPD.

Liberation Period
 1945 - The MPD was reconstituted and placed
under American control. Col. Marcus Ellis Jones be-
came the Chief of Police of the MPD.

www.rkmfiles.net Dr. Rommel K. Manwong 17



Aug. 1966 – RA 4864 – Police Act of 1966 –
Creation of the Police Commission - POLCOM
• 1975 – PD 765 – integration of the
national police - the PC/INP became the nucleus of a
united police force in the country

1990 – R.A. 6975 – Creation of the Philippine
National Police (PNP) that is civilian in character and
national in scope (Constitution)

www.rkmfiles.net Dr. Rommel K. Manwong 18


 1998 – RA 8551 – PNP Reform & Reorganization Act
dubbed as the “PNP Professionalization”.

Most Recent

www.rkmfiles.net Dr. Rommel K. Manwong 19


BOARD QUESTIONS

1. The law that provides the National Police


Commission to conduct Police examination is
A.R.A 2260 B. R.A 6040
C. R.A 4864 D. R.A 6141
2. Automobile patrol was introduced in the
Philippines on __
A. May 17, 1954 B. May 17, 1939
C. May 17, 1953 D. May 17, 1940

www.rkmfiles.net Dr. Rommel K. Manwong 20


PART TWO

CONCEPTS ON POLICE ORGANIZATION,


MANAGEMENT & ADMINISTRATION

www.rkmfiles.net Dr. Rommel K. Manwong 21


Organization – group – formal or informal
** Formal – structured
** Informal – non structured

Administration – process of POSDCRB


Management – resources (5Ms)

www.rkmfiles.net Dr. Rommel K. Manwong 22


Police Organization

A group of trained personnel in the field of


public safety administration engaged in the
achievement of goals and objectives that
promotes the maintenance of peace and
order, protection of life and property,
enforcement of the laws and the prevention of
crimes.

www.rkmfiles.net Dr. Rommel K. Manwong 23


Line Type Organization
(military type; simplest type)

www.rkmfiles.net Dr. Rommel K. Manwong 24


Functional Type Organization

(specialized; functional managers)

www.rkmfiles.net Dr. Rommel K. Manwong 25


Line and Staff Type Organization

combination of line & functional

www.rkmfiles.net Dr. Rommel K. Manwong 26


Police Management
Pertains to the utilization of available resources in an
organization. (5Ms)

Police administration
Refers to the processes used in the organiztion
(POSDCRB/POSDC)

www.rkmfiles.net Dr. Rommel K. Manwong 27


> POSDCRB

Planning - setting performance objectives


Organizing - dividing the work to be done
Staffing - filling the org with the right people/position
Directing - making decisions
Coordinating – interrelating various parts of work
Reporting – keeping executives informed
Budgeting – fiscal planning, accounting, and control

www.rkmfiles.net Dr. Rommel K. Manwong 28


Approaches in Managing
Police Organizations

Classical Approach

** Scientific Management - (F. Taylor) focus


on workers productivity
** Bureaucratic Management - (M.Weber)
focus on division of labor and hierarchy of
authority
** Administrative Mgmt - (H. Fayol)
the 14 management principles

www.rkmfiles.net Dr. Rommel K. Manwong 29


The 14 Management Principle (FAYOL)
 Division of Work
 Authority and Responsibility - right to command
 Discipline
 Unity of Command
 Unity of Direction
 Subordination of individual interest to general interest
 Remuneration of Personnel
 Centralization
 Scalar Chain
 Order
 Equity
 Stability of personnel tenure
 Initiative
 Espirit de Corps

www.rkmfiles.net Dr. Rommel K. Manwong 30


Human Relations Approach
(Elton Mayo) – increase productivity
Behavioral Science Approach
(A. Maslow) – Hierarchy of Needs theory
(McGregor) – Theory X & Y

X - (lazy) Y – (hard worker)

www.rkmfiles.net Dr. Rommel K. Manwong 31


Contemporary Approach
- looking at the organization as a system
(system theory)
- recognizing internal and external variables af-
fecting organization (contingency theory)

www.rkmfiles.net Dr. Rommel K. Manwong 32


PRINCIPLES of Police Organization

 Specialization - grouping of activities and


segregation of line, staff, and auxiliary functions.
 Hierarchy of Authority - formal relationship

among supers and subordinates in any organization


 Span of Control - maximum number of

subordinates at a given position


 Delegation of Authority - conferring of an amount of

authority by a superior position to a subordinate


 Unity of Command – command should come

from one superior only


www.rkmfiles.net Dr. Rommel K. Manwong 33
ORGANIZATIONAL TERMINOLOGIES

Functional Units
 Bureau – the largest organic functional unit within a large
department. It comprises of numbers of divisions.
Division – a primary subdivision of a bureau.
Section – functional unit within a division that is necessary
for specialization.
Unit – functional group within a section; or the smallest
functional group with in an organization.

www.rkmfiles.net Dr. Rommel K. Manwong 34


Territorial Units
 
Post – a fixed point or location to which an officer is assigned for duty,
such as a designated desk or office or an intersection or cross walk
from traffic duty. It is a spot location for general guard duty.
Route – a length of streets designated for patrol purposes. It is also
called LINE BEAT.
Beat – An area assigned for patrol purposes, whether foot or motorized.
Sector – An area containing two or more beats, routes, or posts.
District – a geographical subdivision of a city for patrol purposes, usually
with its own station.
Area – a section or territorial division of a large city each comprised of
designated districts.

www.rkmfiles.net Dr. Rommel K. Manwong 35


OTHER TERMINOLOGIES

 Sworn Officers – all personnel of the police department who have


oath and who posses the power to arrest.
 Superior Officer - one having supervisory responsibilities, either
temporarily or permanently, over officers of lower rank.
 Commanding Officer - an officer who is in command of the
department, a bureau, a division, an area, or a district.
 Ranking Officer - the officer who has the more senior rank/higher
rank in a team or group.
 Length of Service - the period of time that has elapsed since the
oath of office was administered.
 On Duty - the period when an officer is actively engaged in the per-
formance of his duty.

www.rkmfiles.net Dr. Rommel K. Manwong 36


 Leave of Absence - period, which an officer is excused from active duty by
any valid/acceptable reason, approved by higher authority.
 Sick Leave - period which an officer is excused from active duty by reason
of illness or injury.
 Suspension - a consequence of an act which temporarily deprives an
officer from the privilege of performing his duties as result of violating
directives or other department regulations.
 Department Rules - rules established by department directors/supervisors
to control the conduct of the members of the police force.
 Duty Manual - describes the procedures and defines the duties of officers
assigned to specified post or position.
 Order - an instruction given by a ranking officer to a subordinate, either a.
General Order, b. Special, or c. Personal
 Report - usually a written communication unless otherwise specifies to be
verbal reports; verbal reports should be confirmed by written
communication.

www.rkmfiles.net Dr. Rommel K. Manwong 37


THE PNP ORGANIZATIONAL SET UP

PNP Staff and Support Units

 The Chief of the Philippine National Police  


 Deputy Chief of Philippine National Police for Administration
 Deputy Chief of Philippine National Police for Operations
 The Chief of Directorial Staff

www.rkmfiles.net Dr. Rommel K. Manwong 38


Directorial Staff (Functional Staff)
 
1.      Directorate for Personnel - Record Management
2.      Directorate for Intelligence
3.      Directorate for Operations
4.      Directorate for Investigation
5.      Directorate for Logistics
6.      Directorate for Plans
7.      Directorate for Comptrollership
8.      Directorate for Police Community Relations
9.      Directorate for Human Resources and Doctrine Development
10.    Directorate for Research and Development

www.rkmfiles.net Dr. Rommel K. Manwong 39


Administrative Support Units
 
1.      Logistic Support Service Legal Service
2.      Medical and Dental Service
3.      Computer Service
4.      Crime Laboratory Support Service
5.      Engineering Service
6.      Headquarters Support Service
7.      Finance Service
8.      Communications-Electronics Service
9.      Captain Service

www.rkmfiles.net Dr. Rommel K. Manwong 40


Operational Support Units
 
1.      Criminal Investigation
2.      Narcotics Command absorbed into the PDEA
3.      Traffic Management
4.      Intelligence
5.      Special Action Force
6.      Security
7.      Civil Security Force
8.      Maritime
9.      Police Community Relations
10.    Aviation Security
 

www.rkmfiles.net Dr. Rommel K. Manwong 41


Ranking System
COMMISSIONED OFFICERS

Director General (DG) General


Deputy Director General (DDG) Lt General
Director (DIR) Maj General
Chief Superintendent (CSUPT) Brig.Gen.
Senior Superintendent (SR SUPT) Colonel
Superintendent (SUPT) Lt Colonel
Chief Inspector (CINSP) Major
Senior Inspector (SR INSP) Captain
Inspector (INSP) Lieutenant

www.rkmfiles.net Dr. Rommel K. Manwong 42


NCOs
Senior Police Officer IV (SPO IV) Master Sergeant
Senior Police Officer III (SPO III) Tech. Sergeant
Senior Police Officer II (SPO II) Staff Sergeant
Senior Police Officer I (SPO I) Sergeant
Police Officer III (PO III) Corporal
Police Officer II (PO II) Private 1st Class
Police Officer I (PO I) Private

Cadets of the Philippine National Police Academy (PNPA) are clas-


sified above the Senior Police Officer IV and below the
Inspector rank in the PNP.

www.rkmfiles.net Dr. Rommel K. Manwong 43


The OLD vs. the NEW

What is Traditional Policing?


The old system or concept of policing whereby po-
licemen are looked upon as an authority
representing the government it serve rather
than as a servant of the community. Here, The police
organization is used as protector of
“the few” instead of “the many”.

www.rkmfiles.net Dr. Rommel K. Manwong 44


Yardstick of Police Efficiency
and Effectiveness

The main traditional purpose of the police is to


protect the authority (the government).

Hence, the yardstick of measuring police efficiency


under this kind of policing is the number of people
arrested of crimes and the number of people jailed.
“The more people arrested and thrown to jail, the more the
police organization is effective and efficient”.

www.rkmfiles.net Dr. Rommel K. Manwong 45


Comparing the old and new concepts …
 The Political Era

 The Reform Era

 The Community Era

www.rkmfiles.net Dr. Rommel K. Manwong 46


The Political Era (1840-1930)
The police forces were characterized by:
 Authority coming from politicians and the law

 A broad social service function

 Decentralized organization

 An intimate relationship with the community

 Extensive use of foot patrol

www.rkmfiles.net Dr. Rommel K. Manwong 47


The Reform Era (1930-1980)

The police forces were characterized by:


 Authority coming from the law and professional-
ism
 Crime control as their primary function
 A centralized and efficient organization
 Emphasis on preventive motorized patrol and
rapid response to crime

www.rkmfiles.net Dr. Rommel K. Manwong 48


The Community Era (1980’s-present)

Under this era of policing, police forces are


characterized by:
 Authority coming from community support,

law and professionalism


 Provision of broad range of police services, including

crime control
 Decentralized organization

 An intimate relationship with the community

 Use of problem-solving approach

www.rkmfiles.net Dr. Rommel K. Manwong 49


Traditional vs Community Policing

Who are the Police?


Traditional Community

A government agency Police are the public


for law enforcement and the public are the
police

www.rkmfiles.net Dr. Rommel K. Manwong 50


The Traditionalist The Community Oriented

www.rkmfiles.net Dr. Rommel K. Manwong 51


PART THREE

PERSONNEL MANAGEMENT
(HUMAN RESOURCES MANAGEMENT)

www.rkmfiles.net Dr. Rommel K. Manwong 52


POLICE PERSONNEL
IN RE: R.A 8551

Flow of Personnel Career Pointers:


RECRUITMENT PROCESS - Citizenship
Note: Qualifications - Morality
- Eligibility
- Education
SELECTION PROCESS - Age
Note: Procedures/Tests - Height Pointers:
- Weight
- Agility
- Medical
- NP
- Interview

www.rkmfiles.net Dr. Rommel K. Manwong 53


APPOINTMENT
Note: Nature of Appointment
Appointing Authorities
TRAINING
Note: Standards of Training
Field Training
In Service Training
APPRAISAL
Note: Purposes
Standards of Evaluation

www.rkmfiles.net Dr. Rommel K. Manwong 54


PROMOTION
Note: System of
promotion
Kinds of Promotion
ASSIGNMENT
Note: Purpose
Powers/Authorities

Salaries, Benefits, Privileges


Note: Incentives/Awards
Pays/Allowances
Retirement Benefit

www.rkmfiles.net Dr. Rommel K. Manwong 55


INSPECTION
Note: Types
Powers/Authorities to Inspect
DISCIPLINARY MECHANISMS
Note: LCE, PLEB, IAS,
COP, RD, C/PNP
Admin Offenses Impossable

RETIREMENT
Note: Nature of
Retirement

www.rkmfiles.net Dr. Rommel K. Manwong 56


PART FOUR

POLICE PATROL
(Management and Operations)

www.rkmfiles.net Dr. Rommel K. Manwong 57


Why is patrol referred to as the “backbone” of police
organization?

…because it serves as the organizational


foundation from which other specialization branch
out like traffic, investigation, vice control, etc.
It is also the only division within a department
which cannot be eliminated.

..patrol activities is about 50% of all police functions

www.rkmfiles.net Dr. Rommel K. Manwong 58


What is police patrol?
…the regular and repeated circuit of guarding a
beat, normally performed by the police in a given
area either on foot, mobile of other methods of
patrol for the purpose of enforcing the law and crime
prevention and suppression.

VIP: Patterns of Patrolling:


..clockwise, counter-clockwise, zigzag, straightway,
cloverleaf

www.rkmfiles.net Dr. Rommel K. Manwong 59


What is Reactive Patrol?

…the old system of police patrol activity which


consist of continuously driving around the area of pa-
trol waiting for something to happen and to
react accordingly in case something does
happen.

Note: Low Visibility Theory

www.rkmfiles.net Dr. Rommel K. Manwong 60


What is Proactive Patrol?

It is the more economical alternative patrol


system, which has an objective approach against crim-
inality as much as practicable. It addresses
crime at its very root before it is able to develop
into a felonious act.

Note: >> High Visibility Theory


>> Theory of Omnipresence

www.rkmfiles.net Dr. Rommel K. Manwong 61


What is participative law enforcement?

It is a system where the citizenry and the police


work together to reduce crime, prevent juvenile
delinquency and criminal behavior, maintain the peace
& reduce local problems which are the
mutual responsibility of the police & the people.

Note:
- The Peel Principle
- Koban System, COPS, Community-Oriented

www.rkmfiles.net Dr. Rommel K. Manwong 62


Prevention v.s. Repression
• Prevention is the objective aimed towards ways and
means to reduce the desire of the human
being to commit crime. (proactive)

• Repression, is the act of preventing the actual


commission of crimes. Repression is leveled on the
prevention of the very act itself which
constitutes crimes. (reactive)

www.rkmfiles.net Dr. Rommel K. Manwong 63


What is the purpose of Police Uniform?

As with any other occupation, the police uniform


is intended to separate policemen from everyone who
are not in the same line of work to avoid
confusion and to assure others of his authority
and his presence.

Note:
• Proactive measure (assurance of omnipresence)

Police Visibility

www.rkmfiles.net Dr. Rommel K. Manwong 64


What are the Methods of Patrol?
Beat Patrol

Foot Patrol VIPs

Bicycle Patrol  Advantages & Disadvantages of
each patrol method
Sector Patrol (Motorized Patrol)
 Practical Applications

Automobile Patrol
 Related name/terminology

Motorcycle Patrol
 Historical events

Aircraft Patrol (Helicopter and Fixed Wing)

Note
Specialized Patrol Methods
 10 million smell cell of dogs

Horse (mounted) Patrol
 German Shepherds
• Marine (water) Patrol

Canine (K-9) Assisted Patrol

Special Terrain Patrol

TV Patrol (Surveillance Cam)

www.rkmfiles.net Dr. Rommel K. Manwong 65


What are the basic types of Police calls?

• ROUTINE CALL – mobile car is required to observe


all traffic laws and rules and does not normally use its
flashing lights and siren while on its way to the scene

URGENT CALL – also requires the responding police car
to observe all traffic rules and does not use its
flashing lights or siren.
• EMERGENCY CALL – In most cases, this category
requires the use of the flashing light and fluctuating
siren although there are exceptions which include the at-
tempt to surprise criminals in the act.

www.rkmfiles.net Dr. Rommel K. Manwong 66


Police/Patrol Communication Systems

VIPs
 Police Com – backbone of “police tactics”
 Walkie talkie – slang for HHR
 Horn – oldest communication device
 Cuneiform – first form of writing
 dyad –most basic form of interpersonal comm
 Telegraph – first electronic medium of comm (W. Cook)
 10 Codes – 10-4 (positive); 10-20 (loc); 10-35 (red alert); 10-74 (negative)

www.rkmfiles.net Dr. Rommel K. Manwong 67


PART FIVE

POLICE
OPERATIONAL
PLANNING

www.rkmfiles.net Dr. Rommel K. Manwong 68


KEY CONCEPTS
PLANNING is a management function concerned with:
 visualizing future situations
 making estimates concerning them
 identifying issues
 analyzing and evaluating the alternative ways for reaching de-
sired goals
 estimating the necessary funds and resources to do the
work
 initiating action to cope with the changing
conditions and contingent events.

www.rkmfiles.net Dr. Rommel K. Manwong 69


Plan - an organize schedule or sequence by
methodical activities intended to attain goals and ob-
jectives for the accomplishments of mission or as-
signment.

It is a method or way of doing something in order to


attain objectives.

Plan provides answer to 5W’s and 1H questions.

www.rkmfiles.net Dr. Rommel K. Manwong 70


Police Operational Planning - the act of
determining policies and guidelines for police
activities or operations and providing controls
and safeguards for such activities.
It may also be the process of formulating
coordinated sequence of methodical activities
and the allocation of resources to the line units of the
police organization for the attainment of the
mandated goals and objectives.

www.rkmfiles.net Dr. Rommel K. Manwong 71


Objective – is a specific commitment to
achieve a measurable result within a specific
period of time.

Goal – is a general statement of purpose typically with


time horizon. It is an achievable end state
that can be measured and observed.

www.rkmfiles.net Dr. Rommel K. Manwong 72


Strategy – is a broad design, method; a plan to
attain a stated goal or objectives.

Tactic – a specific design, method or course of


action to attain a particular objective in consonance with strategy.

Procedure – a sequence of activities to reach a


point or to attain what is desired.

Policy – a product of prudence or wisdom in the


management of human affairs.

www.rkmfiles.net Dr. Rommel K. Manwong 73


Guidelines – a rule of action for the rank and file to show
them how they are expected to obtain the
desired effect.

Alternatives - are means by which goals and


objectives can be attained. They maybe policies,
strategies or actions aimed at eliminating a problem

www.rkmfiles.net Dr. Rommel K. Manwong 74


Strategic Planning - is a series of preliminary
decisions on a framework, which in turn guides
subsequent decisions that generate the nature
and direction of an organization.

www.rkmfiles.net Dr. Rommel K. Manwong 75


The Strategic Planning Process

TASK 1 - Develop Mission and Objectives


TASK 2 - Diagnose Environmental Threats & Opportunities
TASK 3 - Assess Organizational Strengths & Weaknesses
TASK 4 - Generate Alternative Strategies
TASK 5 - Develop Strategic Plan
TASK 6 - Develop Tactical Plan
TASK 7 - Assess Results of Strategic & Tactical Plan
TASK 8 - Repeat Planning Process

Note: SWOT Analysis

www.rkmfiles.net Dr. Rommel K. Manwong 76


Policy Making and Planning

Broad External Policy Planning

 the responsibility of the legislative branch of the government.


 the main concern of the police in this broad external policy
planning is assisting the legislature in determining police
guideline through the passage of appropriate laws or ordinances
for the police to enforce.

Internal Policy Planning

 the responsibility of the C/PNP and other chiefs of the different units or
headquarters within their area of jurisdiction to achieve the
objectives or mission of the police organization.

www.rkmfiles.net Dr. Rommel K. Manwong 77


What are the basic considerations
in Police Planning?
Primary Doctrines

FUNDAMENTAL DOCTRINE – Is the basic principle in planning, orga-


nization and management of the PNP in support of the overall pursuits of
the PNP Vision, mission and strategic action plan of the attainment of the
national objectives.

OPERATIONAL DOCTRINE – Are the principles and rules governing the


planning, organization and direction and employment of the PNP forces in
the accomplishment of basic security operational mission in the mainte-
nance of peace and order, crime prevention and suppression, internal secu-
rity and public safety operation.

FUNCTIONAL DOCTRINE – This provides guidance for specialized ac-


tivities of the PNP in the broad field of interest such as personnel, intelli-
gence, operations, logistics, planning, etc.

www.rkmfiles.net Dr. Rommel K. Manwong 78


Secondary Doctrines

COMPLIMENTARY DOCTRINE – Doctrines for-


mulated jointly by two or more bureaus in order to ef-
fect a certain operation with regard to public safety
and peace and order. This essentially involves the
participation of the other bureaus of the BJMP, BFP,
PPSC, NBI and other law enforcement agencies.

ETHICAL DOCTRINE – That defines the fundamen-


tal principles governing the rules of conduct, attitude,
behavior and ethical norm of the PNP.

www.rkmfiles.net Dr. Rommel K. Manwong 79


Four Primal Conditions of the
Police Organization

 AUTHORITY – The right to exercise, decide and


command by virtue of rank and position.
 DOCTRINE – It provides for the organizations

objectives. It provides the various actions. It is


where procedures/plans are based.
 COOPERATION/COORDINATION

 DISCIPLINE – It is imposed by command or self-re-

straint to insure supportive behavior.

www.rkmfiles.net Dr. Rommel K. Manwong 80


Classifications of Police Plans

According to coverage
 Local Plan

 Regional Plan

 National Plan

www.rkmfiles.net Dr. Rommel K. Manwong 81


According to Time

Strategic or Long Range Plan

It relates to plans which are strategic or long range in


application, it determine the organization’s
original goals and strategy.

Examples
Police Action Plan on the Strategy DREAMS
P-O-L-I-C-E 2000

www.rkmfiles.net Dr. Rommel K. Manwong 82


Intermediate or Medium Range Planning
It relates to plans, which determine quantity and quality
efforts and accomplishments. It refers to the process of
determining the contribution on efforts that can make or
provide with allocated resources.

Examples

Master Plan Sandigan-Milenyo (Anti-Crime Master Plan)

Master Plan Sandugo (Internal Security Operations)

Master Plan Banat (Anti-Illegal Drugs Master Plan)

Master Plan Sang-ingat (Security Operations Master Plan)

Master Plan Saklolo (Disaster Management Master Plan)

Sangyaman (Protection and Preservation of Environment, Cul-
tural Properties, and Natural Resources Master Plan)

www.rkmfiles.net Dr. Rommel K. Manwong 83


Operational or Short Range Planning

It refers to the production of plans, which


determine the schedule of special activity and
are applicable from one week or less than year
duration. Plan that addresses immediate need
which are specific and how it can be accomplished on
time with available allocated resources.
Example
OPLAN BANAT

www.rkmfiles.net Dr. Rommel K. Manwong 84


TYPES OF POLICE PLAN
• Reactive Plans are developed as a result of
crisis. A particular problem may occur for
which the department has no plan and must
quickly develop one, sometimes without
careful preparation.

Proactive Plans are developed in anticipation of
problems. Although not all police problems are
predictable, many are, and it is possible
for a police department to prepare a response in
advance.
www.rkmfiles.net Dr. Rommel K. Manwong 85
Visionary Plans - statement of values to be used to guide
the decision making process.

Operational Plans are designed to meet the specific tasks


required to implement strategic plan.

Standing Plans provide the basic framework for responding to organizational


problems.

Functional Plans - include the framework for the operation of the major func-
tional units in the organization, such as patrol and investigations.

www.rkmfiles.net Dr. Rommel K. Manwong 86


Operational-efficiency, effectiveness, and
productivity plans are essentially the measures or
comparisons to be used to assess police activities and be-
havior (outputs) and results (outcomes).
Time-specific Plans are concerned with a specific pur-
pose and conclude when an objective is
accomplished or a problem is solved.
Procedural Plan – guides routine and field
Operations (Ex. Field Procedures/HQ Procedures)

www.rkmfiles.net Dr. Rommel K. Manwong 87


Tactical Plans – these are the procedures for
coping with specific situations at known locations such
as plans for dealing with an attack against buildings,
attack against the PNP headquarters by lawless ele-
ments. Plans shall be likewise be made for blockade
and jail emergencies and for special community
events, such as longer public meetings, athletic con-
tests, parades, religious activities, carnivals, strikes,
demonstrations, and other street affairs.

www.rkmfiles.net Dr. Rommel K. Manwong 88


Operational Plans – These are plans for the operations of spe-
cial divisions like the patrol, detective, traffic, fire and juve-
nile control divisions.
Extra-office Plans – Plans made to organize the
community to assist in the accomplishment of objectives in
the fields of traffic control, organized crime, and
juvenile delinquency prevention.

www.rkmfiles.net Dr. Rommel K. Manwong 89


Field Operations

FIELD OPERATIONS - are operations in the


field directed by the police commander and the
subordinate commanders aimed at the
accomplishment of the primary tasks of –

TRAFFIC – PATROL- INVESTIGATION


(Plus Vice Control and Juvenile Control)

www.rkmfiles.net Dr. Rommel K. Manwong 90


The Special Operating Procedures

SOP #01 – POLICE BEAT PATROL PROCEDURES –
SOP #02 – BANTAY KALYE

SOP #03 – SIYASAT – conduct of inspections to ensure police
visibility.

SOP #4 – REACT 166 - prescribes the procedures in detail of
Duty Officers, Telephone Operators and Radio Operators.

SOP #5 – LIGTAS (ANTI-KIDNAPPING)

SOP #6 – ANTI-CARNAPPING
• SOP #7 – ANTI-TERRORISM
• SOP #8 – JOINT ANTI-BANK ROBBERY ACTION COM-
MITTEE (ANTI-BANK ROBBERY)
• SOP #9 – ANTI-HIJACKING/HIGHWAY ROBBERY

www.rkmfiles.net Dr. Rommel K. Manwong 91


 SOP #10 – PAGLALANSAG/PAGAAYOS-HOPE
 SOP # 11 – MANHUNT BRAVO (NEUTRALIZATION OF
WANTED PERSONS)
 SOP #12 – ANTI-ILLEGAL GAMBLING

SOP #13 – ANTI-SQUATTING

SOP #14 – JERICHO - quick reaction group

SOP #15 – NENA (ANTI-PROSTITUTION/VAGRANCY)

SOP #16 – ANTI-PORNOGRAPHY

SOP #17 – GUIDELINES IN THE CONDUCT OF
ARREST, SEARCH, AND SEIZURE

SOP #18 – SANDIGAN MASTER PLAN

SOP #19 – ANTI-ILLEGAL LOGGING

SOP #20 – ANTI-ILLEGAL FISHING

www.rkmfiles.net Dr. Rommel K. Manwong 92



Oplan Jumbo – Aviation Security Group Strategic Plan against terrorist attacks


Oplan Salikop – CIDG Strategic Plan against Organized Crime Groups (OCG)


OPLAN BANTAY DALAMPASIGAN that sets forth the operational guidelines on the
heightened security measures and sea borne security patrols. 


NAPOLCOM MC No. 95-03 – “Institutionalization of the Doctrine of Command
Responsibility at all levels of Command in the PNP


EO No. 226 - “Institutionalization of the Doctrine of Command Responsibility in
all Government offices

www.rkmfiles.net Dr. Rommel K. Manwong 93


Samples of the PNP
Programs and Strategies

POLICE 2000
 P-REVENTION and suppression of crime through COPS
 O-RDER, maintenance, peacekeeping and internal
security
 L-AW enforcement without fear or favor
 I-MAGE, credibility and commonly support
 C-OORDINATION with other government agencies and
non-government agencies organizations and
international securities
 E-FFICIENCY and effectiveness in the development and man-
agement of human and material resources

www.rkmfiles.net Dr. Rommel K. Manwong 94


DREAMS


D-ISPERSAL of policeman from the headquarters to the street
and enhancement of crime prevention program

R-ESTORATION of trust and confidence of the people on their
police and gain community support

E-LIMINATION of street and neighborhood crimes and improvement
of public safety

A-RREST of all criminal elements common or organized in
coordination with the pillars of the CJS and other law
enforcement agencies

M-APPING up and removal of scalawags from the pole of ranks

S-TRENGTHENING the management and capability of the PNP to
undertake/support the dreams operations and activities

www.rkmfiles.net Dr. Rommel K. Manwong 95


PART SIX

POLICE INTELLIGENCE
AND SECRET SERVICE

www.rkmfiles.net Dr. Rommel K. Manwong 96


“If you know the enemy and know yourself, you need not fear the
result of a hundred battles.”
“If you know yourself and not the enemy, for every victory, you are a fool
who will meet defeat in every battle” - SUN TZU

“Against organized crime, internal affairs


in my defensive arm; Intelligence is my offensive arm.” – W. Parker
Definition of Terms


National Intelligence – the total product of intelligence developed by all
governmental agencies that cover the broad aspects of national
policy and security.

Military Intelligence – it is used in the preparation of military policies,
plans and programs. It includes the strategic and combat intelligence.

Strategic Intelligence – that knowledge pertaining to the capabilities and
probable courses of action of foreign nations.

Combat Intelligence – is required by the commander in order to determine
the best use of his available firepower and maneuver forces, to accomplish
his mission, and to maintain the security of his command.

Counter Intelligence – an integral part of all intelligence operations and as
such can’t be separated from combat and strategic intelligence. Its objective
is to safeguard information against espionage, material and installations
against sabotage, and personnel against subversive

Technical Intelligence – concerns foreign technical developments, which have a practi-
cal military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.


Area of Operation – those aspects of the operational environment exclusive of
the military/police forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment of an area
in which military/police operations are taking place or planned.


Capabilities – form a police/military standpoint, enemy capabilities are courses of ac-
tion which the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader national
standpoint, capabilities of a nation are the available, workable, courses of action to ac-
complish national objectives.


Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it suscepti-
ble to any action, which reduces its war, potential, and or its will to fight.
HISTORICAL FEATURES

MOSES
One of the first recorded formalized intelligence efforts, with format,
can also be found in the Holy Bible Numbers 13:17

“And Moses sent them to spy out the land of Canaan and said unto
them, get you up this way southward, and go up into the mountain;
and see the lands, what it is; and the people that dwell therein,
whether they are strong or weak, few or many; and what the land they
dwelt in, whether in tents, or in strongholds; and what land is;
whether it be fat or lean, whether there be wood therein, or not. And
be of good courage and bring of the fruit of the land.” The scriptures
also named the twelve intelligence agents whom the Lord directed
Moses to sent into the land of Canaan and records that “all those men
were heads of the children of Israel.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN

SHAMMUA THE SON OF ZACCUR – Tribe of Reuben


SHAPAT THE SON OF HORI – Tribe of Simeon
CALEB THE SON OF JEPHUNNEH – Tribe of Judah
IGAL THE SON OF JOSEPH – Tribe of Issachar
HOSHEA THE SON OF NUN – Tribe of Ephraim
PALTI THE SON OF RAPHU – Tribe of Benjamin
GADDIEL THE SON OF SODI – Tribe of Zebulun
GADDI THE SON OF SUSI – Tribe of Joseph, that is from the Tribe of Manasseh
AMMIEL THE SON OF GEMALLI – Tribe of Dan
SETHUR THE SON OF MICHAEL – Tribe of Asher
NAHBI THE SON OF VOPSHI – Tribe of Napthali
GEUEL THE SON OF MACHI – Tribe of Gad
RAHAB
The Harlot of Jericho (Joshua 2:1-21)” who shel-
tered and concealed the agents of Israel, made a
covenant with the agents and duped their pursuers.
She was not only an impromptu confederate of
immense value for the Jewish leader of that far
distant day, but also established a plot-pattern
which is still of periodic relief to motion picture
producers.
DELILAH
The Philistine used her when she allowed Philis-
tine spies to hide in her house (Judges 16). Delilah
was an impromptu intelligence agent. Apart from
her tonsorial specialty, she also allowed sex to
gain intelligence from a powerful enemy. She
achieved the largest effective force of her em-
ployer’s adversaries and contriving the stroke
which put that force out of
action”.
IMPORTANT EVENTS AND PERSONALITIES
IN THE WORLD OF INTELLIGENCE

Sun –Tzu
A Chinese philosopher, creator of the “The Art of
War”
“Information must be obtained from men who
knew the enemy situation.”
“Know thy enemy and know yourself, you need not
fear the results of a hundred battles”
“If you know yourself and not the enemy, for every
victory, you are a fool who will meet defeat in ev-
ery battle.”
Alexander the Great

When Alexander the Great was marching to Asia,


were rumors of disaffection growing among his al-
lies and mercenaries, he sought the truth, and got
it by simplest expedient by devising the first “let-
ter sorting” and opening to obtain information.
Sertorius
He was the Roman Commander in Spain who possessed a White Fawn
and allowed it to become widely known - that he derived secrets and
guidance from the fawn. His intelligence agents credited their informa-
tion to the supernatural power of animals.

Akbar
He was known to be the sagacious master of the Hindustan. He em-
ployed more than 4,000 agents for the sole purpose of bringing him
the truth that his throne might rest upon it.
Genghis Khan

He was known “The Great Mongol”, who used intelligence


to conquer China and invade Cathay. He instructed his
Generals to send out spies and used prisoners as sources of
information. The leader of the so-called MONGOL CON-
QUERORS - made use of effective propaganda machine
by spreading rumors of Mongol Terror, they collected in-
formation on weaknesses and rivalries of Europe. The
leaders usually disguised as merchants.

RENAISSANCE PERIOD

With the rise of Nationalism and development of modern armies, intelligence be-
came apparent to large states. In England, Sir Francis Walsingham, under Queen
Elizabeth, organized the first National Intelligence Service. He employed spies on
the staff of the Admiral in Command of the Spanish Army and able to obtain in-
formation regarding Spanish Army as to their ships, equipment, forces and stores.
He protected Queen Elizabeth I from countless assassins.

In France, Richlieu – introduced the network of covert collectors who transmitted


prompt and accurate information to Paris regarding the activities of the rebels and
dissidents of the kingdom.

Louis XIV – systematized political policy, continuous surveillance, postal censor-


ship and military intelligence organization were his contributions.
The French Intelligence System continued since 15th Century.

Napoleon Bonaparte once said, “One Spy in the right place is worth
20,000 men in the field”. He organized two Bureaus of Interest: Bu-
reau of Intelligence – which consolidate all incoming information re-
garding the enemy for presentation to the emperor and to obtain in-
formation as desired, and Topographic Bureau – which maintains a
large map which covers the latest information regarding both enemy
and friendly forces. He maintained Military Intelligence and Secret Po-
litical Police Service all over Europe. His main arm was “Spy against
spy” concept.
Frederick the Great

He was known as the “Father of Organized Military Espionage”

He has divided his agents into four classes:


• Common spies – those recruited among poor folk, glad to earn a small
sum or to accommodate as military officer.
• Double spies – are unreliable renegades, chiefly involved in spreading
false information to the enemy.
• Spies of Consequences – couriers and noblemen, staff officers, and kin-
dred conspirators, requiring a substantial bribe or bait,
• Persons who were forced to undertake espionage against their own will.
Hannibal
He was considered one of the brilliant military strategists in the history of
military intelligence. He had developed an effective intelligence system
for 15 years in Rome. He usually roam around the city often disguise
himself as a beggar to gather first hand information.
Julius Caesar
During his time, the staff of each Roman Legion includes ten “specu-
lators” who served as an information-collecting agency. The “specula-
tors” were the first intelligence personnel to appear definitely in a mili-
tary organization. Military success of the Romans was aided by commu-
nication system. Made use of carrier pigeons, which made possible the
amazing speed with which intelligence of Imperial Rome was transmit-
ted. They also employed ciphers to ensure secrecy of communications.

George Washington
Conspirator under oath abounds in the history of every nation. George Washington
was grand master in intelligence. He mobilized the Free Masons of the colonies at
the outbreak of the American war of Independence.

• Karl Schulmeister
He was Napoleon’s eye, Napoleon’s military secret, born on August 5, 1770. He be-
gan his career in offensive espionage under a cover role. He was able to infiltrate the
Austrian General Staff.

• Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further device
military censorship and organized military propaganda. He introduced military cen-
sorship and organized military propaganda. He works as a census taker and devel-
oped informal gathering of data.

• Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he be-
came Chief of the Austro – Hungarian Secret Service. He became a double agent of
Russia.
Brahma Kautilya

In Ancient India, he overthrew the Nanda Dynasty and established the


first MAYURYAN king in the Indian throne. He recommended to his
king that for the ruler to succeed, the ruler should strike at his enemy’s
weak points by means of spies. He proposed the following means to
conquer enemy’s stronghold: Intrigues and spies - Winning over en-
emy’s people - Siege and assault - Before beginning military opera-
tion, a conqueror should know the comparative strength and weak-
nesses of himself and his enemy. No war should be undertaken with-
out careful examination of all factors reported by the kings’ spies.

Maj. General Donovan
He was the organizer of the OSS, builder of a central intelligence system -
OSS whose exploits become legendary in World War II.
• V2 – Rackets - OSS agents working in conjunction with the British Intelli-
gence, through penetration and technical intelligence discovered Punemundo
which was the V2 guide missile research project of Nazi Germany. It resulted
to its destruction and heavy bombing.
• Battle of Midway
In June 1442, the turning point of the Naval in the Pacific, the victory gained
by the Americans was due to the disrupted messages from the Imperial Japa-
nese Navy.
• Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of the U.S. Navy Communications In-
telligence intercepted a top-secret signal relaying the travel of the Admiral. En
route, he was intercepted and crashed in the Jungles of Baungainville.
• State Informer
Edward I, King of England in 1725 organized a systematic police system so
called Witch and Ward. By Royal proclamation, the profession “State In-
former “was created in 1734 enjoining all informers to expose criminal activ-
ities and be compensated.
• Joseph Fouche
“Father of Police Intelligence Operations”. A Frenchman born in 1759, rose
to become the most feared and respected intelligence director in French his-
tory. He created a network of agent. His assistance founded the modern sys-
tem of spying on spies, which later was known as counter espionage.
• Joseph Petrosino
He was member of the New York Police Department in early 1900, he was
the head of the Italian Squad. Through extensive intelligence network, he
was credited to smash and neutralization of the Black Society.

Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of Justice and became
what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On September 6,
1939 by a presidential directive, it came to its responsibility the task of a domestic intelligence.

• Central Intelligence Agency - The agency was created under the US National Security Act of
1947. It was the Central Intelligence group established during the time of President Truman in
January 1946. The CIA was under the National Security Council.

• Committee for State Security - Russia - The Intelligence agency known as the KGB - Komitet
Gosudarstvennoy Bezopasnosti (KGB)

• British Secret Service – Great Britain

• Mossad – Israel

• Britain: Scotland Yard, London Metropolitan Police Force


It was established by Sir Robert Peel in 1829 which signaled the beginning of a colorful leg-
endary police force and considered one of the most efficient in the world today.
Intelligence and the World Wars
WORLD WAR 1

• 1900 – Europe powers developed modern staff systems and place intelligence on the same level with
personnel, operations and logistics. Intelligence then functioned in time of peace and war. Intelli-
gence during this period, concentrated on information about the armed forces of the enemy and their
capabilities. AIRCRAFT was introduced as a method of conducting aerial reconnaissance. WIRE-
LESS TELEGRAPH was used wherein CODES AND CIPHERS were applied. ARMY INTELLI-
GENCE rapidly expanded during this period.

• GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness throughout Eu-
rope but declined at the outset of the war.

• BRITISH INTELLIGENCE – succeeded greatly by means of censorship and its CODE ROOM
combined with skillful use of COVERT agents.

• US expanded their NAVAL INTELLIGENCE wherein DOMESTIC COUNTERINTELLIGENCE


became a principal activity. At this time US created three branches of its Intelligence System: POSI-
TIVE BRANCH – function of collecting evaluating and disseminating intelligence. Prepare situa-
tion estimate and translate documents; NEGATIVE BRANCH – it is the counterintelligence func-
tions which involve in investigating disloyalty and sedition, investigate enemy activities, investigate
graft and fraud in organization; GEOGRAPHIC BRANCH – Produces maps, photographs, and ter-
rain studies. SECTIONS - Administration, Collection by attaches and troops, Codes and ciphers
WORLD WAR II

• GERMAN INTELLIGENCE – started the war with the world’s best organized intelli-
gence service through advance preparation of intelligence accompanied by troop move-
ments. GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer Group
wherein they subordinated intelligence to operation and did not regard intelligence as-
signment worthy of a soldier.

• JAPANESE INTELLIGENCE – failed because it was not provided with sufficient num-
ber of trained personnel to assemble and evaluate the mass of materials which were col-
lected although Japanese Intelligence was involved in short war and defensive in nature.

• BRITISH INTELLIGENCE – the delay in the use of German V-BOMB against them
was their main achievement during this time.

• In 1942 – a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Penemuenda. Its intelligence
failed in the defeat of GENERAL MONTGOMERY’S forces at ANNHEIM.

US INTELLIGENCE – In 1941, The US Strategic Service was established to research and analyze
military, political and economic information as it affected the security of the country. US JOINT
CHIEFS OF STAFFS – was organized to act in support of the army and the navy in the collection
and analysis of strategic information and to be responsible for the planning and operation of special
services. US greatest contribution to intelligence was the development of the AMPHIBIOUS WAR-
FARE where coordination of many types of intelligence activities was required to provide adequate
knowledge of the successful operation of a complex military force transported over water with the
objective of establishing itself on an enemy – held shore against opposition. US successes in WW II
were based on personnel drawn from CIVILIAN POPULACE, BUSINESS AND PROFESSIONAL
MEN AND WOMEN.


CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police to conduct es-
pionage and counterespionage against Japanese Spies and Chinese communist.


SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds of
materials for the Soviet Union.


SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence concerned
with disaffection among Soviet troops and anti-communism in any form. Its five major divisions are:
Administration, Operation, Investigation, Prosecution, and Personnel.
POST WAR PERIOD: The superpowers

• Soviet Intelligence System


It was described as omnipotent and omnipresent for its vast intricate organization involving millions
of people. SOVIET COUNTERINTELLIGENCE known as “IRON CURTAIN” signified that no one
may cross the borders of the USSR without being detected. This means that all communications are
rigidly controlled. Its contribution to modern intelligence was the dissemination of false information
designed to mislead and confuse opponents and prospective victims. The MGB – MILITARY IN-
TELLIGENCE AND THE MINISTRY OF STATE SECURITY formerly NKGB was concerned on
political espionage and propaganda abroad and for the control of espionage activities of foreign
communist countries. The KGB resumed the former function of the old MGB. It is now the official
secret police agency of the Soviet Union, in charge of the state security KGB means (Commission of
State Security) K- Omissija G- Osudarstyennoj B – Ezopasnosti or Komitet Gosudarstvennoy Be-
zopasnosti

• British Intelligence System


It is composed of several intelligence agencies such as the BRITISH MILITARY INTELLIGENCE
DIVISION (MID) which is divided into 20 different departments. The M15 – devoted to counteres-
pionage and security. It is the special branch of the SCOTLAND YARD charged with guarding the
Royal Family and important British officials and Visiting Foreign Dignitaries.

French Intelligence System
The SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE ESPI-
ONAGE (SDECE-FOREIGN Intelligence and counterintelligence Service) was under
the office of the Prime Minister. GENERAL CHARLES DE GAULLE set up the Bureau
Central de Renseignements et d’ Action (BCRA Central Office for Intelligence and Ac-
tion in London in 1940. It is an expansion of the Service De Reassignments (SR-Intelli-
gence Service which is a part of the Old Renzieme Bureau (Second Bureau) of the
French General Staff. SDECE concerned on Strategic and Counterintelligence while
SURETE NATIONALE became part of French Intelligence Service.

• German Intelligence System


The RED GESTAPO which serves as security service organized by East Germany to
combat the covert activities of West Germany Group when Germany was still divided by
the Berlin Walls.

• United States Intelligence System


The CIA and the FBI – the CIA is one among the biggest in the world in terms of intelli-
gence networking. CIA and the FBI and the other state/ federal units of intelligence ser-
vices were US main intelligence agencies.
Agents of Betrayal
Intelligence is sometimes described as a “world of deceit and betrayal”.
Some of the high personalities which evidence this description are:

 JUDITH COPLON, a political analyst of a Department of Justice, was ac-


cused of taking unlawful possession of government documents and spying
for a foreign power.
 DR. EMIL JULIUS KLAUS FUCHS was accused of releasing American
Atomic Secrets to the Soviet in 1945 and to the British in 1947. He detailed
knowledge of the construction of atomic bombs.
 ERNST HILDING ANDERSON was a Royal Swedish Navy who provided
military secrets to a foreign power and was found guilty and sentences to life
imprisonment in 1951.
ESSENTIAL INTERESTS IN INTELLIGENCE

Intelligence Defined

• Webster defines intelligence as the capacity for understanding and for other forms of
adaptive intellect of behavior; the mind in operation; the power of meeting any situation,
especially a novel situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to guide action to-
wards goal; knowledge of an event, circumstances, etc., received or imparted; the gather-
ing or distribution of information; the staff of persons engaged in obtaining such informa-
tion.

• Base on Psychology- Intelligence is the capacity of a person to adjust to new situations


through the use of what has been previously learned.

• According to Government - Commission Task Force - It means the collection, processing,


collation, interpretation, evaluation and dissemination of information, with references to
national security. In certain context, it may also mean the network or the system for the
collection, collation, interpretation, evaluation, processing, and dissemination of informa-
tion. “The term as used here doesn’t include any police powers or authorities, any inves-
tigative function other than those involve in the collection of information nor any func-
tion involved in the enforcement of laws, orders, or regulation.
According to Military Terminologies - Intelligence is the end product
resulting from the collection, evaluation, analysis, integration and in-
terpretation of all available information which my have immediate or
potential significance to the development and execution of plans,
policies and programs of the users.

• According to Police Parlance - The end product resulting from the


collection, evaluation, analysis, integration and interpretation of al
available information regarding the activities of criminal and other
law violators for the purpose of affecting criminals and other law vio-
lators for the purpose of affecting their arrest, obtaining evidence,
and forestalling plan to commit crime.
The Principal Areas of Interest
• Military – offensive and defensive tactics, war plans, strategic concepts
and tactical principles, organizations, installations, industrial lease, armed
forces, command structure, command personnel, material, tactics, morale,
• General – topographical and hydrographic characteristics, historical back-
grounds
• Diplomatic – foreign policies, alliances, diplomatic establishment, foreign
service personnel, technique of conducting foreign relations
• Political – ideology, traditions, institutions, personalities, area of friction
• Communications and Transportation – telephones, telegraphs, wireless,
railways, shipping, automobiles and trucks, highways, aviation, owner-
ship, policies, organization, personnel

Social – nationality structure, classes and caste, historical factors, census,
personal aspects, characteristics and mentality of people forces, social legis-
lation, radio, television, press, motion picture


Intelligence – organizations, methods and personnel of competing intelli-
gence system

• Economic - On economics, the areas are on:

Financial – Monetary policies, Currency structure, Transactions, Institutions,


Personalities
Commercial – trade policies, markets, trading methods, price policies, person-
alities
Industrial – structure of Capacity, manufacturing plants and processes, raw
material, energy rotations, labor relations, personalities
Mining – Mineral Resources, Production method, Output
Agriculture – policies, crop structure, cultivation method, mechanization, financ-
ing, specific characteristics of rural population
Principles of Intelligence

Objectivity - in intelligence, only the well guided succeed. It is a basic intelli-
gence concept that there must be unity between knowledge and action. It fol-
lows therefore that intelligence should interact and condition the decision. In-
telligence must be adapted to the needs of the decision; it is both giver and
taker. Action or decision is planned by knowledge and guided by it at every
step.


Interdependence - Intelligence is artificially subdivided into component ele-
ments to insure complete coverage, eliminate duplication and to reduce the
overall task or manageable sizes. Nevertheless, each subdivision remains as
essential part of unity; contributes proportionately to the end result; possesses
a precise interrelationship; and interacts with each other so as to achieve a bal-
anced and harmonious whole.


Continuity - Intelligence must be continuous. It is necessary that coverage be
continuous so that the shape of what happens today could be studied in the
light of what happened before, which in turn would enable us to predict the
shape of things to come.

Communication - Intelligence adequate to their needs must be communicated
to all the decision makers in manner that they will understand and form that
will permit its most effective use.


Usefulness - Intelligence is useless if it remains in the minds, or in the files of
its collectors or its producers. The story must be told and it must be told well.
The story must be convincing and to be convincing it must not only be plausi-
ble or factual but its significance must be shown.


Selection - Intelligence should be essential and pertinent to the purpose at
hand. Intelligence involves the plowing through a maze of information, con-
sidering innumerable number of means or of picking the most promising of a
multitude of leads. The requirement of decision-making covers very nearly the
entire span of human knowledge. Unless there is selection of only the most es-
sential and the pertinent, intelligence will go off in all directions in one mon-
umental waste of effort.
• Timeliness - Intelligence must be communicated to the de-
cision maker at the appropriate time to permit its most ef-
fective use. This is one of the most important and most ob-
vious, for Intelligence that is too soon or too late are
equally useless. Timeliness is one principle that comple-
ments all the others.

• Security - Security is achieved by the measures which in-


telligence takes to protect and preserve the integrity of its
activities. If intelligence has no security, it might be as
well being run like a newspaper to which it is similar.
General Activities


Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with
little practical immediate operation value.


Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary
for more effective police planning and operation.


National Intelligence - it is the integrated product of intelligence developed by all the govern-
mental branches, departments concerning the broad aspect of national security and policy. It is
concerned to more than one department or agency and it is not produced by single entity. It is
used to coordinate all the activities of the government in developing and executing integrated and
national policies and plans.


Counter-Intelligence – phase of intelligence covering the activity devoted in destroying the ef-
fectiveness of hostile foreign activities and to the protection of info against espionage, subversion
and sabotage.


Undercover Work – is an investigative process in which disguises and pretext cover and decep-
tion are used to gain the confidence of criminal suspects for the purpose of determining the nature
and extent of any criminal activities that maybe contemplating or perpetuating.
Functional Classification
of Police Intelligence

• Criminal Intelligence – refers to the knowledge essential to


the prevention of crimes and the investigation, arrest, and
prosecution of criminal offenders.
• Internal Security Intelligence – refers to the knowledge es-
sential to the maintenance of peace and order.
• Public Safety Intelligence – refers to the knowledge essen-
tial to ensure the protection of lives and properties.
Forms of Intelligence

• Sociological Intelligence – deals with the demographic and psychological aspects of


groups of people. It includes the population and manpower and the characteristics of
the people, public opinion – attitude of the majority of the people towards matter of
public policy and education.

• Biographical Intelligence – deals with individual’s personalities who have actual pos-
session of power.

• Armed Force Intelligence – deals with the armed forces of the nation. It includes the
position of the armed forces, the constitutional and legal basis of its creation and actual
role, the organizational structure and territorial disposition, and the military manpower
recruitment and Order of Battle

• Geographical Intelligence – deals with the progress of research and development as it


affects the economic and military potential of a nation.
THREE KINDS OF INTELLIGENCE

 Strategic Intelligence – as defined earlier, it is an intelligence data that are


not of an immediate value. It is usually descriptive in nature, accumulation
of physical description of personalities, modus operandi. It does not have
immediate operational value but rather long range that may become relevant
to future police operations.

 Line Intelligence – It is the kind of intelligence required by the commander


to provide for planning and conduct tactical and administrative operation in
counter insurgency. This pertains to knowledge of People, Weather, Enemy
and Terrain (PWET) used in planning and conducting tactical and adminis-
trative operation in a counter insurgency.
Intelligence information to be determined in Line Intelligence are:

• People - living condition of the people, sources of income, education of


the people, government livelihood projects, extent of enemy influence to
the people
• Weather – visibility, cloudy, temperature, precipitation (rain), wind
• Enemy - location of the enemy, strength of the enemy, disposition, tacti-
cal capability, enemy vulnerability
• Terrain - relief and drainage system, vegetation, surface material, man
made features. There are military aspects of terrain which includes cover
and concealment, obstacle, critical key terrain features, observation and
fields of fire, and avenues of approach.
• Counter Intelligence (CI) - this kind of intelligence covers the activ-
ity devoted in destroying the effectiveness of hostile foreign activities
and to the protection of info against espionage, subversion and sabo-
tage. Hence, the three activities of CI are: protection of information
against espionage; protection of personnel against subversion; and pro-
tection of installations and material against sabotage.

Measures in CI must be both passive and active. Passive measures are


those measures which seek to conceal info from the enemy while ac-
tive measures are those which seek actively to block the enemy’s ef-
forts to gain info or engage in espionage, subversion or sabotage.
Counter Intelligence is also known as Negative Intelligence - a generic term meaning three different
things;

• Security Intelligence – means that the total sum of efforts to counsel the national policies, diplo-
matic decisions, military data, and any other information of a secret nature affecting the security of
the nation form unauthorized persons. It is an effort to deny information to unauthorized persons by
restricting to those who are explicitly authorized to possess it.

• Counter-Intelligence - counter intelligence is the organized effort to protect specific data that might
be of value to the opponent’s own intelligence organization. Some of its functions are: Censorship –
of the following: correspondence, broadcast, telecast, telephone conversations, telegrams and cables,
etc., prevention of the dissemination of any information that might aid an opponent; maintenance of
files of suspect; surveillance of suspects; mail reading, wire tapping and recording; infiltration of the
enemy intelligence organized to procure information about its method, personal, specific operations
and interest.

• Counter-Espionage - In counter-espionage, negative intelligence becomes a dynamic and active ef-


fort. Its purpose is to investigate actual or theoretical violation of espionage laws, to enforce those
laws and to apprehend any violators.
Five Categories of CI Operation
• Military Security – it encompasses the measures taken by a com-
mand to protect itself against espionage, enemy operation, sabotage,
subversion or surprise. Examples are:
Secrecy discipline - Special safeguarding of classified information -
Security of troop movement - Special handling of weather & escapes
- Counter subversion with in the armed forces - Tactical measures in
combat area

• Port Frontier and Travel Security – has to do with the application


of both military and civil security measures for CI control at point of
entry and departure, international borders or boundaries. Examples
are:Security screening and control of frontier Security control of
merchants, seaman and crew of commercial aircraft, Security control
of frontier crossing point
Security control of seaports
• Civil Security – it encompasses active and passive CI measures affect-
ing the non-military nationals permanently or temporarily residing in
an area under military jurisdiction. Examples are: Systematic registra-
tion of civilians and aliens
Control of circulation, Curfew, Surveillance of suspected political or-
ganizations, Security screening of labor, Issuance of passes and per-
mits, Control of internal commerce

• Censorship – it is the control and examination of the civil, national,


armed forces, field press, and POWs.

• Special Operations – counter subversion, sabotage and espionage


Categories of CI Operation

Counter Human Intel (HUMINT) – seeks to overcome enemy at-
tempts to use human sources to collect information or to conduct
sabotage and subversion which includes CI special operations, liai-
son, counter security, and CI screening.


Counter Imagery Intel (IMINT) - includes action taken to determine
enemy SIGINT and related enemy weaknesses, capabilities and ac-
tivities. These actions include surveillance radar, photo thermal and
infrared systems. Successful counter – IMINT operations rely heav-
ily on pattern and movement analysis and evaluation of the enemy.

• Counter Signal Intel (SIGINT) – determine enemy SIGINT and re-


lated enemy weaknesses, capabilities and activities, assess friendly
operations to identify patterns, profiles and develop, recommend and
analyze counter measures.
THE INTELLIGENCE CYCLE

PHASE 1

PLANNING THE COLLECTION EF-


FORT
PHASE 2

COLLECTION OF INFORMA-
TION

PHASE 4 MIS-
SION
DISSEMINATION AND
USE OF INFORMATION

PHASE 3

PROCESSING THE COL-


LECTED INFORMATION
PHASE 1
Planning the Collection Effort

This phase of the cycle involve the determination


of the requirements of intelligence. It is concerned
with identifying the so called Essential Element of
Information (EEI) - an item of intelligence or in-
formation of the characteristics of the area of oper-
ations and the enemy, which the commander feels
he needs before he needs before he can reasonably
arrive at a decision.

What are their capabilities and vulnerabilities?
• What are the physical characteristics of the probable area
of operation?

What major policies, plans and decisions must be made
in the near future?

What step must be taken to preserve the security of the
nation?
• What is the information required by the higher, lower or
adjacent echelons within the government or armed
forces?
PHASE 2
Collection of information

This phase of the cycle is concerned with identification of the collect-


ing agency, the formulation of procedures on the manner of collecting
the information in conjunction with the plans as achieved in phase one.

• Methods of Collection – information can be collected through overt


method (open system) or covert method (secret/clandestine).
• Collecting Agencies – depending on the type of operation, the collect-
ing agency could be Government Agencies, Intelligence units, or Or-
ganizations
• Trade Crafts – includes the use of photography, investigations / elicita-
tion / interrogation, surveillance, sound equipment, surreptitious entry
– keys and locks, use of an artist, communication
PHASE 3
Processing the Collected Information

This phase of the cycle is concerned with the examination and collation of all collected
information.

Steps in Processing Raw Information

Collection – organization of raw data and information into usable form; grouping similar
items of information so that they will be readily accessible.

Recording – is the reduction of info into writing or some other form of graphical representa-
tion and the arranging or this info into writing or some form of graphical representation
and the arranging of this into groups of related items. Police log book and Journal, Intel-
work Sheet - Intel Files, Situation Maps - Rouges Gallery, Modus Operandi Files Evalu-
ation – examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source and agency, and its credibility or truth of informa-
tion.

Evaluation is the determination of the pertinence of the info to the operation, reliability of
the source of or agency and the accuracy of the info.
RELIABILITY ACCURACY
A - Completely reli- 1 - Confirmed by
able other
B - Usually reliable 2 - Probably true
C - Fairly reliable 3 - Possibly true
D - Not usually reli- 4 - Doubtfully true
able 5 - Improbable
E - Unreliable 6 - Truth cannot be
F - Reliability cannot judged
be judged
As to Source of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured Enemy
X- Observation of gov’t/civilian employee
Y – Observation from populace
Z- Documentary
PHASE 4
Dissemination & Use of Information

This phase of the cycle refers to the activities of


transferring the processed information to the
proper users, most particularly the authority that
requires the activity. Processed information can be
disseminated through annexes, estimates, briefing,
message, reports, overlays, and or summaries.
Methods of Dissemination
• Fragmentary orders from top to bottom of the
command
• Memorandum, circulars, special orders
• Operations order, oral or written
• Conference – staff members
• Other report and intelligence documents
• Personal Contact
Who are the users of intelligence?
• National leaders and military commanders – formulation and
implementation of national policies.
• Advisors and Staff – preparations of plans and estimates
• Friendly nations or other branches of the armed forces.
• Processor – basis for evaluation and interpretation.
• Head / chairman of an organization
• Any person with authority for purposes of planning.
INFORMATION
AND ITS SOURCES

INFORMATION IS THE LIFE-BLOOD


OF INTELLIGENCE

NO INFORMATION = NO INTELLIGENCE

Intelligence is Knowledge = Knowledge is


POWER!
INFORMATION

Information refers to all evaluated materials of every description


including those derived from observation, reports, rumors,
imagery, and other sources from which intelligence in produced.
Information is a communicated knowledge by others obtaining by per-
sonal study, investigation, research, analysis, observation.

Two General classifications of sources of information:

• Open Sources – 99% of the information collected are coming


from open sources.
• Close Sources – 1% of information are collected from close
sources.

Overt Intelligence – is the gathering of information or documents
procured openly without regard as to whether the subject or target
become knowledgeable of the purpose
Open Sources: Includes information taken from

Enemy activity

POW and Civilians

Captured documents

Map - Weather, forecast, studies, report - Agencies

• Covert Intelligence – is the secret procurement of information, which is ob-


tained without the knowledge of the person or persons safeguarding
vital intelligence interest.
Close Sources: Include information which maybe taken through:

Surveillance

Casing and Elicitation

Surreptitious entry

Employment of technical means (Bugging and Tapping device)

Tactical Interrogation

Observation and Description (ODEX)
PERSONS AS SOURCES OF INFORMATION

Informant Net – It is a controlled group of people who


worked through the direction of the agent handler. The
informants, principal or cutouts supply the agent handler di-
rectly or indirectly with Intel information

Informants (Asset) – people selected as sources of


information, which could be voluntary, or in consideration of a
price.

Informant – refers to a person who gives information to the po-
lice voluntarily or involuntarily with out any consideration

Informer – those who give information to the police for
price or reward
Types of Informants

• Criminal Informant – an informant who give information to the police


pertaining to the underworld about organized criminals with the under-
standing that his identity will be protected

• Confidential Informant – is similar to the former but he gives informa-


tion violate of the law to includes crimes and criminals

• Voluntary Informant – a type of informant who give information freely


and willfully as a witness to a certain act

• Special Informant – those who gives information concerning specialized


cases only and it is regarded a special treatment by the operatives (ex.
teachers, businessmen)

• Anonymous Informant – those who gives information through telephone


with the hope that the informant can not be identified
Sub-type of Informant
• Incidental Informant – a person who casually imparts information
to an officer with no intention of providing subsequent information
• Recruited Informant – A person who is selected cultivated
and developed into a continuous source of info

Categories of Recruited Informants:


• Spontaneous or Automatic Informant – Informants who by
the nature of their work or position in society have a certain
legal, moral or ethical responsibilities to report info to the police
• Ordinary (out-of-their-will) Informants – those under the
compulsion to report info to the police
• Special Employee – informants who are of a specific operational
nature
Other Classification of Informant
Other terms related to people who gives informa-
tion are Automatic Informant, Penetrating Agent ,
Infiltrating Agent , Full time Informant , Rival –
Elimination Informant, False Informant, Fright-
ened Informant, Self- aggrandizing Informant,
Mercenary Informant , Double Crosser Informant ,
Woman Informant , Legitimate Informant.
Motives of Informants
People give information to the police due to
various reasons. Their motives include reward, re-
venge, fear and avoidance of punishment,
friendship, patriotism, vanity, civic-mindedness, re-
pentance, competition, and other motives.
INFROMANT RECRUITMENT

• Selection – it is particularly desirable to be able to identity and recruit an in-


formant who has access to many criminal in-group or subversive organization.
Wide access is probably the single most important feature in the consideration
of recruiting the potential informant
• Investigation – the investigation of the potential informants that has tenta-
tively identified as a “probable” must be as thorough as possible. It must es-
tablish possible existing motives as to this person might assist the police Intel
community. Failure to do so will deny this office who must perform the ap-
proach and persuasion phase with little more that a guess. If necessary, con-
duct complete background investigation (CBI)
• Approach – must be done in a setting from which might include pleasant sur-
roundings, perhaps a confidential apartment, completely free form any proba-
bility of compromise, preferably in an adjacent city or a remote area foreign to
the informants living pattern.
• Testing – the testing program should begin, of course, with the limited as-
signment, with a gradual integration into the more important areas. The occa-
sional testing of an informant should continue through the entire affiliation
INTELLIGENCE OPERATIONS

Intelligence Operations is the result of intelligence plan-


ning, planning is always ahead of operation
although an operation can be made without a plan, it is
usually due to sudden and inevitable situations but defi-
nitely this is poor intelligence management
THE 14 OPERATIONAL CYCLES

• Mission and Target


Infiltration – the insertion of action agent inside the target organization
Penetration – recruitment of action agent inside the target organization
• Planning
• Spotting
• Partial Background Investigation (PBI) or Complete Background Investigation
• Recruitment - the only qualification of an agent is to have an access to the target
• Training
• Briefing
• Dispatch
• Communication - technical method like telephone/radio, non-technical method like personal meeting,
live drop or dead drop
• Debriefing
• Payments – depends upon the motivation of informant
• Disposition – involve activity on rerouting, retraining, retesting, termination
• Reporting
• Operational Testing
COVER AND UNDERCOVER

• Cover - the means by which an individual group of


organization conceals the true nature of its
acts and or existence from the observer.
• Cover story – a biographical data through
fictional that will portray the personality of the
agent he assumed, a scenario to cover up the
operation
• Cover Support – an agent assigned in target
areas with the primary mission of supporting the
cover story.

Undercover Assignment – is an investigative technique in which agent conceal his offi-
cial identity an obtain information from that organization

Uses of Undercover Assignment


Use independently to get first hand info about the subject of investigation like:
a) Security evaluation of every installation
b) Gain confidence of suspended persons
c) Agent penetration
d) Verify info from human resources
e) Uncover concealed identity

Supplement other investigative techniques like:


a) Playing ground works for raids and searches by going entry
b) To assist in locating evidence
c) To install, maintain investigative equipments of undercover assignment
THE UNDECOVER AGENT
Special qualifications include knowledge of the language, area
background regarding events, knowledge about the custom and habits,
physical appearance, and must be an artist.

Factors considered in Selecting Cover Story



Mutual Point of Interest

Justification of presents

Previous and permanent address

Efficiency of role and freedom from the movement

Means of communication

Social and financial status

Optional alternate plan

Safe departure
Selecting Action Agents

• Placement – location of prospective agent with respect to


the target
• Access – it is the capability of a prospective agent to ob-
tain the desired info for the Intel organization or to per-
form to Intel collection mission in the area.

Primary Access – it is the access to the desired info

Secondary Access – it is the access to the desired info
through a principal source where the latter has the direct ac-
cess

Outside Access – the agent is employed outside the target
and merely monitor info from a third person who is monitor-
ing info n the area
CONTROL – authority to direct the agent to carryout task or requirement on be-
half of the clandestine organization in an acceptable manner and security

Two Categories of Control


• Positive Control – is characterized by professionalism and rapport like
Agent motivation and Psychological control
• Negative Control – characterized by threat and it include the following:

Disciplinary Action – includes verbal reprimand for poor performance or in-
secure actions withholding certain material rewards, reduction of agents
salary or in extreme situation the threat of terminating professional relation-
ship

Escrow Account – control of an agent by putting hi salary in a bank to be
withdrawn only after a fulfillment of a condition

Blackmail
Procuring Different Type of Agents

• Agent in Place – an agent who has been recruited by an intelligence


service within a highly sensitive target, who is just beginning a ca-
reer or have been long or (outside) insider.
• Double Agent – an enemy agent who has been captured, turned
around and sent back where he came from as an agent of his captors
• Expandable Agent – an agent whom false information is leaked to
the enemy.
• Penetration Agent – an agent who has such reached the enemy gets
information and would manage to get back alive.
• Agent of Influence – an agent who uses influence to gain informa-
tion
• Agent of Provocation – one who provoke the enemy to give informa-
tion
METHODS OF COVERT INTELLIGENCE

Concept of Surveillance
Surveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an investigation.
Surveillance of persons is called Tailing or Shadowing, Sur-
veillance of place is called Casing or Reconnaissance, and
Surveillance of other things, events, & activities is called
Roping.
In Surveillance, the following are considered:

Pre-Surveillance Conference – a conference
held among the team members, the police
intelligence unit before surveillance is conducted.

Surveillance Plan – a plan established the as
required according to type of personnel, and the
general and specific instructions for surveillance.
• Area Target Study – refers to the area of
operation (AOR) of surveillance activities.

Surveillant – a person who conducts surveillance with includes only
observations.

Stakeout or Plant – is the observation of places or areas from a fixed
point.

Tailing or Shadowing – it is the observation of a person’s movement.

Undercover Man – it refers to a person trained to observe and penetrate certain
organization suspected of illegal activities and later reports the
observation and information’s that proper operational action can be made

Liason Program – the assignment of trained intelligence personnel to
other agencies in order to obtain information of police intelligence value.
(Agencies like the press, credit agencies, labor unions, telephone companies)

Safehouse – is a place, building, enclosed mobile, or an apartment,
where police undercover men meet for debriefing or reporting purposes.
• Drop – any person is a convenient, secure and unsuspecting place
where police undercover men meet his action agent for debriefing
or reporting purposes.
• Convoy – an accomplice or associate of the subject used to avoid
or elude surveillant.
• Decoy – a cover supporting the surveillant who can become a
convoy whenever surveillant is burned.
• Contact – any persons whom the subject picks or deals
with while he is under observation & identifies the observer.
• Made – when subject under surveillance becomes aware
that he is under observation and identifies the observer.
• Lost – when the surveillant does not know the whereabouts of his
subject or the subject had eluded the surveillance.
SURVEILLANCE ACTIVITIES

• According to Intensity and Sensitivity



Discreet –subject person to be watch is unaware that he is under observation

Close – subject is aware that he is under observation varied on each occasions

Loose – applied frequently or infrequently, period of observation varied on
each occasion
• According to Methods

Stationary – this is observation of place usually a bookie stall, a gambling,
joint, a residence where illegal activities are going on (fixed position)

Moving – surveillance follow the subject from the place to place to maintain
continuous watch of his activities

Technical – this is a surveillance by the use of communications and electronic
hardware’s, gadgets, system and equipment
Special Equipment (Technical Supports)
• Camera with telephoto lens
• Moving Picture camera
• Binoculars
• Tape recording apparatus
• Wire taping device
• Other instrument – miniaturized one-way radio

Methods available to employ in Surveillance


Ordinarily, the methods are surveillance of place, tailing or
shadowing (1-2-3 man shadow), undercover investigation,
special methods includes: wire tapping - concealed
microphones - tape recorder -television - electric gadgets
Counter Surveillance – the conduct of
operation is coupled with counter intelligence
measures such as window shopping, use of
convoys and decoys, stopping immediately on
blind corners, getting out immediately on
public conveyances, retracing, entering mobile
housing
CASING OR RECONNAISSANCE
Casing is the term use in the police organization
while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building
place or area to determine its suitability for Intel use or its
vulnerability in operations. It aids in the planning of an
operation by providing needed information. It assists the
agent handler to install confidence in his agent during
briefing phase by being able to speak knowingly about the
area of operation.
Casing is also considered a security measure because it of-
fers some degree of protection for those operating in an
area unfamiliar to them.
Method of Casing

Personal Reconnaissance – the most effective method and will
produced the most info since you know just what you’re look-
ing for.

Map Reconnaissance – it may not sufficient but it can produce
a certain amount of usable information
• Research - much info can be acquired through research

Prior Information – your unit and of the unit will have file re-
port that they may provide you with info

Hearsay –info usually gain by the person operating in the area
and performing casing job
OBSERVATION AND DECRIPTION (ODEX)

Observation – a complete and accurate observation by


an individual of his surroundings an encompasses the
use of all the major sense to register and recognized its
operational or Intel significance

Description – the actual and factual reporting of one’s


observation of he reported sensory experience re-
counted by another
ELICITATION
It is a system or plan whereby information of intelligence
value is obtained through the process direct intercommuni-
cation in which one or more of he parties to the common is
unaware of the specific purpose of the conservation. The
three phases are determination of the mission, selection of
the subject, and accomplishment of the mission.

Two Devices in the conduct of Elicitation


Approach – process of setting people to start talking
Probe – to keep the people taking incessantly
Example of Approach:
Teacher – Pupil Approach – the subject is treated
as an authority then solicit his view point and
opinion on a subject matter.
Good Samaritan Approach – is the sincere and
valid offers of help and assistance are made to
the subject
PORTRAIT PARLE (P/P)
It is a means of using descriptive terms in
relation to the personal features of an individual and
it can be briefly described as a word
description or a spoken picture.
(Anthropometry - no two human beings has the same
body measurement)
BACKGROUND CHECKS AND INVESTIGATION
(BI- PSI or CBI)
Information needed:
• Domestic Background
• Personal Habit
• Business History
• Social or Business Associates
• Medical History
• Educational Background
• Family History
TACTICAL INTERROGATION

The need for obtaining information of the highest


degree of credibility taken on the minimum of
time can be through interrogation which varies
and dependent entirely on the situation.
Types of Interrogation

• Screening - usually accomplished as soon as after capture, appre-


hension or arrest of an interrogee. The objective is to obtain back-
ground information about the interrogee and determine his area of
knowledge and ability.
• Formal Interrogation (Detailed) –the systematic attempt to exploit
to an appropriate depth those areas of the interrogee’s knowledge,
which have been identified in the screening process
• Debriefing – a form of eliciting information, which is generally
used when the area of intellectual capability of the interrogee is
known. Maximum use of the narrative and not try to trap the person
being debriefed with leading question. The debriefer/interrogator
must be familiar with the subject in which the interrogation is being
conducted.
• Interrogation of Lay Personnel (Specific Type) – the techniques
used are the same as in the interrogations, however, especial effort
must be made to established a common frame of reference between the
interrogator and the interrogee. The amount of information obtained
from this type will depend on the interrogator’s inequity in establish-
ing common terminology on the source can understand which will en-
able the interrogator to get the desired information.

• Technical Interrogation – the level of interrogation where the source


has specific and such detailed information that requires a trained ex-
pert in the subject matter to be explored. It usually covers the specific
subject and time is not as limited as during other interrogation.
Phases of Interrogation

• Planning and Preparation


• Approach (Meeting the Interrogee) Questioning
• Termination
• Recording Reporting
INTERROGATION TECHNIQUES:

• Techniques of Approach – the purpose is to gain the cooperation of the source and
induce him to answer questions which will follows.
• The “Open Techniques” – the interrogator is open and direct in his approach and
makes no attempts to conceal the purpose of the interrogator. It is best employed when
the interrogee is cooperative. It is frequently used at the tactical level where time is a
major interrogator.
• The “Common Interest” Technique – the interrogator must exert effort to impress
the interrogee of their common interest. The interrogator must look for he point out
the real advantages the interrogee will receive if he cooperates
• Record File (we know all technique) – the interrogator prepare a file on the source
listing all known information (record should be padded to make it appear to be very
extensive). The information must contain the life history of he interrogee to include
his activities and known associates (Party- bio-data of the interrogee is important).
The “we know all” s used in conjunction with the record file. During the approach, the
interrogator may ask the interrogee about a subject, if he refuses to cooperate, the in-
terrogator may provide the answer in order to impress him that the interrogator knows
him very well (all is known).

Exasperation – Techniques (Harassment) – effectively employed against hostile type in-
terrogee. The interrogator must be alert because the interrogee may fabricate information
to gain relief from irritation (monotype). Subject Interrogee is placed in a longer period
of interrogation without rest or sleep. The interrogator permits the source to go to sleep
and subsequently awaken for another series of questioning (this is done repeatedly). Af-
ter many repetitions, the interrogee will be exasperated and will finally cooperate hoping
that he can be allowed to rest or sleep. Ask a question, listen to a reply and then ask the
same question repeatedly (use a tape recorder if possible). The purpose is to bore the in-
terrogee thoroughly until he begins to answer questions freely to end the harassment.


Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and
Rescue”, “Bud Guy – God Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and
Angel”. Use of two (2) interrogators playing opposite roles.


Egotist Techniques (Pride and Ego) – usually successful when employed against an in-
terrogee who has displayed a weakness or a feeling of insecurity. You may reverse the
technique by complimenting the interrogee in hopes of getting him to admit certain in-
formation to gain credit. Described him as the best person, superior or comrade.

“Silent” Technique – employed against nervous or the confident
type of interrogee. Look out the interrogee squarely in the eye
with sarcastic smile (force him to break eye contact first). He may
ask questions but the interrogator must not answer. Patience is
needed until the interrogator is ready to break silence.


“Question Barrage” Technique (Rapid Fire Questioning) – in-
tended to confuse the interrogee and put him into a defensive posi-
tion. The interrogee become frustrated and confused, he will likely
reveal more than he intended, thus creating opening for further
questioning.
PART SEVEN

INDUSTRIAL
SECURITY MANAGEMENT
(WITH R.A 5487)

www.rkmfiles.net Dr. Rommel K. Manwong 188


FOCUS / VIP’S
PADPAO – stands for the Philippine Association of Detec-
tive and Protective Agency Operators. It is a non-stock
private organization, and it was
formed in May 1958.

R.A. 5487 – an act that regulates the organization and oper-


ation of the private detective, watchmen or security guard
agencies. It is known as
Private Security Agency Law.

Note: Prior to R.A. 5487 there was no law, what was


needed was only a permit from the city or
municipal mayor to hire a security guard.

PCSUSIA – Philippine Constabulary Supervisory Unit for Security
and Investigation Agencies – formed as a result of the approval of
R.A. 5487, which directs the Chief PC to issue rules and regulations con-
cerning the implementation of R.A. 5487. Later was change to
PNPSOSIA- when the Philippine Constabulary was dissolved and
the personnel was merged to the PNP.


PNPSOSIA – PNP Supervisory Office for Security and Investigation Agen-
cies – responsible for the issuance of implementing orders
regarding the rules & regulations affecting security agencies
operation.
At present


PNPSAG/SD – PNP Security Agency Guards/ Supervi-
sion Division – for national and

PNP FE/SAGS – PNP Firearm and Explosives/ Security
Agency
Guard Services – for local - it directs the Chief of PNP
to issue rules and regulations concerning the implement-
ing rules of
R.A. 5487 - 2003 Revised Rules and Regulations Im-
plementing R.A. 5487 as amended.

www.rkmfiles.net Dr. Rommel K. Manwong 191


BASIC CONCEPTS OF SECURITY
• Purpose of Security – is to protect the establishment
from any form of losses as a result of theft, robbery,
pilferage, sabotage, espionage, accident, fire and
subversive activities.
• Security – means the defense against crime or a state
of being secured or free from hazard.
Types of Security
1.Physical Security – is a system of barriers placed between the
potential intruder and the matter to be protected. It is concerned with
the physical measures adopted to prevent unauthorized access to
equipment, facilities, material, and documents, and to safeguard them
against espionage, sabotage, damage and theft.

2. Communication Security – is the protection resulting from the


application of various measures which prevents or delay the enemy
or unauthorized person in giving information through the
communication system.
3.Hotel Security – is the protection resulting from the application of
measures which safeguards hotel guests and personnel, hotel
property, and functions in hotel restaurants, bars and clubs.
4. Bank Security – is the protection resulting from the application of
various measures which safeguards cash and assets which are in
storage in transit and during transactions.
5. Document Security – is physical security that involves the protection of
documents and classified papers from loss, access to unauthorized person,
damage, theft and compromised through disclosure.
6. Personal and VIP Security – involve in the protection of top ranking offi-
cial the government, visiting persons of illustrious standing and
foreign dignitaries.
8. Industrial Security- various measures to safeguard
factories,manufacturing establishment, etc.
9. Operational Security- deals with the protection of processes,
formulas, patents and other activities.
10. Other special type of security- these type of security are adap-
tations, variations, innovations and modifications of physical
security which are follows, to wit:

Air cargo security

Supermarket

School Security

Personnel security- involves the background
check of persons

Security Hazard- is any act or condition, which may
result in the compromise of information, loss of life, loss or
destruction of property, or disruption of the objectives of the
installations.

Natural Hazards- types of hazard, cause is natural
phenomenon. Ex. Storm, earthquake, typhoons, floods,
fire, lightning etc.

Human/Manmade Hazard - which is actually the act of
omission or commission both overt/covert by an
individual or by group of an individual?
Ex. Espionage and sabotage-because of the state of mind of an
individual

Different types of barriers/Obstacles - Natural- mountain, forest,
water or in nature – Human – Animals - Structural- man made
obstacles - Energy- alarm system


Different factors that to be considered in providing the amount of
security.

Criticality- the importance of the product or services that the company is
giving or producing.

Vulnerability – how susceptible the establishment for the particular sabo-
tage, espionage, etc.


Different factors that to be considered in providing security in the
establishment. Size, shape and location, Number and character of
people, and Kind of product
• Espionage- an act of gathering information
• Espion – French word- that means spy

This is used to estimate or determine the best
possible means of sabotage.
• Spy – is the agent of Espionage. They are very dangerous because of
their skill in deception and undercover works.

• Methods used by the Agents of Espionage.


• Stealing or buying information from the employees.
• By using various form of threats or extorting information’s.
• By means of blackmail.
• Obtaining or gaining information from social gathering.
• By the use of fake organization as a front.
• Stealing records or documents.
• By means of subversive activities.

Sabotage – is an act of destroying, damaging or any evil mo-
tives that will lead to stoppage of the normal operation of the
company, factory, plant and or establishment.

Sabot- French word – that means Wooden Slipper.

Saboteur – is the agent of sabotage.


Enemy agent

Traitorous person

Irresponsible person

Types of Sabotage

Mechanical Sabotage

Psychological Sabotage

Mechanical Sabotage – is an act wherein they used the object or
substance within the area of an establishment.


Types of Mechanical Sabotage

Contamination – is a type where they used foreign materials to apply in
the establishment.

Breakage – destroying the vital parts of a machine.

Substitution – Substitution or changing of formula to another, which will
cause damage or destructions.

Omission – this is committed by means of a doing by an individual, which
can cause destruction inside of the company or establishment

Abrasive – a special type of contamination, by using a type of material
that will grind metals.

Explosives – substances that are easily exploded by means of heat, fric-
tion, jarring or sparks. They are highly dangerous because of its damaging
effect.
• Subversive activities- are dealing with the weakness of a person.
• Economic sabotage- activities of the business establishment against the
government.
• Objectives of Subversive activities:
• to determine the authority; to under weaken the organization;
to take over the organization.
• Parts of Subversive activities:
• Rumor mongering
• Propaganda
• Legal Action
• Arm threats – used of force
• Murder, Kidnapping, corruption of a certain employee or employees
• Riot- refers to the unlawful assembly that resulted to violent disturbance of
peace.
Causes of riot: Panic, Strike

• Mob- a promiscuous multitude of people, rude and disorderly.


Types of mob: Aggressive mob, Escape mob, Acquisitive mob
Expressive mob

• Crowd – Temporary congregation of people.


Physical crowd – temporary congregation of people
without interest
2. Psychological crowd- temporary congregation of people with
common interest in a certain thing.
Types:

a. Casual psychological – common interest only for short duration

b. International Psychological- common interest in a long duration

Pilferage- Petty theft



Types of pilferage:

Casual pilferage- one who steal due to inability to resist the
unexpected opportunity or has little fear that there is detection
for souvenir

Systematic pilferage – one who steal with preconceived plan and
take away things for all types of goods, supplies or
merchandise for economic gain
• PROTECTIVE BARRIERS AND SECURITY LIGHTING:
• PERIMETER SECURITY- is the first line of security or defense.
• by establishing structural barriers fence, to protect the entire establishment.
• Different enclosures used in the perimeter security.
• Solid – they cannot see what is in the inside and those who are in the inside
they cannot see also what is in the outside.
• Full View- you can see through the fences, or what’s going on inside and
out.
• Safety measures to be used.
• 7 feet minimum height of the fence, on top is a barbwire.
• Security Guard- to check the in and out of building and the people.
• Protective lighting for safety protection.
 Poor lighting – indirect action- lack of protection
 Well lighted- psychological barriers- it gives more

protection.
 so that they can notice and familiarize, they can im-

mediately detect the particular intruder.


 Different factors that to be considered in protective

lighting.
 Size, shape and location

 Kind of product-variable, critical or plenty of loses

 Protective advantage

 Management policy-for security consciousness



Types of lighting system:

Continuous- non-stop

Stand by- operated manual by security guard or operated by an alarm sys-
tem

Movable- search light

Emergency- use in case of emergency

Position of the protective lighting

Always focus on the approach

Must focus on the people not on the guard

Preventive measures- is the best approach.

Perimeter security

Carefully select the workers and employees;

Initial security

Background investigation

Analysis of previous employment or employment history

Personal investigation

Establishing rules and regulation

Regularly check the pulse of your workers

Preventing measures to help in the establishment

Intelligence

Solved Grievance

Prevent the organization of opposition

Develop working relation with other local authorities.

Different entries that are need to be controlled by the security guards.

Restricted area- is an area access to which is subject to special restriction
to the flow of pedestrian or vehicular traffic to safeguard property or ma-
terial.

Limited area- a restricted area containing a security interest or other mat-
ter in which uncontrolled movement will permit access to such security in-
terest or matter; but within which and controlled.

Exclusive area- a restricted area containing a security interest or matter,
which is of such nature or of such vital importance that access to the area
of proximity resulting from access to the area, constitutes access to the se-
curity interest or matter.

Clear zones- the exterior and interior parallel area near perimeter
barriers of an industrial compound to afford better observation and
patrol movements.


Perimeter barriers- is a system of protection designed to restricted
areas by unauthorized person.

Purposes of perimeter barrier:

Outline the perimeter of the area to be protected.

Create a physical and psychological deterrent to unauthorized entry.

Delay intrusion, thus facilitating apprehension of intruders

Assist in a more efficient and economical employment of guards

Facilitate and improve the control of pedestrian and vehicular traf-
fic.

Openings in perimeter barriers.

The number necessary to handle peak loads of pedestrian and vehicular
traffic

Gates- locks (seals) and seals

Frequent inspection by guards

Key control

Windows

Other openings

Sewer

Air and water intake

Exhaust tunnels

Electrical and common tunnels

Clear zones- exterior – 20 feet

Interior- 50 feet

If minimum clear zones is not possible

raise height of fence

add more lights

increase patrol
 Types of physical barriers
◦ Natural barriers- mountain, rivers, seas and terrain

◦ Man made barriers- structural construction, like fences,

walls, floors, muffs and grills



Common types of physical barriers are;
◦ Wire fences

◦ Building walls

◦ Bodies of water

Types of fencing
 solid
 full view- chain-link, barbwire

Security Planning:

Security Planning- is a corporate and executive responsibility. It involves
knowing the objectives of security and the means and methods to reach
those objectives or goals must then be evolved. In short, security planning
is a decision-making process.

Contents of Security planning:

The situation- this part of security planning explains the historical back-
ground of the organization of its security picture

The mission- this part of security will cover what the plan is all about and
what it intends to do, This mission is further subdivided into:
◦ Purpose

◦ Goals

◦ Objectives

Execution- this part of security plan will explains and outline the concept of
the security project

Administrative and Logistics- This part of the security plan involves listing
of security equipment

Command and signal- this last portion of the security plan pertains to the
channel of communication needed, when implementing to the project until
in full view.

SECURITY SURVEY

Security Survey- is the process of conducting an exhaustive physical exam-
ination and thorough inspection of all operational systems and procedures
of a facility.

Purposes of Security Survey

To determine existing state of security

To locate weaknesses in defenses

To determine degree of protection required.

To produce recommendations, establishing a total security program

Persons responsible to conduct security survey

Staff security personnel

Qualified security specialist

A Security Survey is known by a number of different terms such as;

Risk analysis

Risk assessment

Key step in a risk assessment process;

to determine value, impact and cost of any asset should it be lost due to nat-
ural or man-made forces.

To determine the degree of probability that natural or man-made forces will
strike at any given facility.


Information necessary in conducting a survey:

A plot plan of the area to be surveyed

A map of the city or locality in which the facility is located, this becomes
very important if the facility consist of more than one location.

The number of employees working on each shift by category

The operational flow plans of the facility if they are available in writing

Maps and description of guard tours and stations if available

Guard orders and the facility’s security manuals if there are such

Locations of the nearest fire department and police headquarters

Security Inspection- is a process of conducting physical ex-
amination to determine compliance with established security
policies and procedures as a result of a security survey.


Comparison made between Security Survey and Security
Inspection.

Security Survey.

Defensive type process/service

Detailed study of the existing security measures

Conducted to determine the level of security required consis-
tent with the mission

Broader in scope

Non-recurring type of service

Security Inspection.
• Defensive type service
• Limited check of the security measures already adopted
• Conducted to determine the degree of compliance with directed security
measures
• Limited in scope

Recurring type of service

Types of Guard Forces

Company guard- proprietary or in house security, and they are di-
rectly under the payroll of the company.

Agency guard- they are hired by an agency, and they are paid by con-
tract
• Government Guard Forces- they are considered as government em-
ployees and paid by the government

Security Guard Forces- maybe define as a group of forces of men
selected, trained and organized into a functional group for the pur-
pose of protecting operational processes from those disruption
which impede efficiency or halt operations at a particular plant, fa-
cility, institution or special activity.

The Essential Qualities of Security Guards:

Alertness
• Judgment

Confidence

Physical Fitness

Self-control

SECURITY COMMUNICATION SYSTEM – facilities
provided for signaling, alerting or alarming workers at any lo-
cation through out the installation as occasion demands. These
include the use of telephone and radio.

PROTECTIVE ALARM SYSTEM- provide an electrical
and mechanical means of detecting and announcing proximity
of intrusion which endanger the security of a restricted area, a
facility of an installation, or its components.
• Kinds of Lock:

• Warded lock- old type where the key is open and be seen through
• Disc tumbler lock- used in car doors, desk, drawers, etc.
• Pin tumbler lock –widely used I doors of offices and houses irregular in
shape and the key
• Lever lock- used in locker
• Combination lock- has 3 deals which must be aligned in proper order be-
fore the lock will be open
• Code-operated lock- this opens by pressing a series of numbers buttons in
proper sequence
• Card-operated lock- coded cards whether notched, embossed or embedded
with magnetic-fuels are inserted to open
• Padlock- a pad and a lock combination

Terminologies:

Private Detective – is refers to any person who is not a mem-
ber of a regular police agency or the Armed Forces of the
Philippines who does detective work for hire, reward, or
commission.

Persons – as used in this act, shall include not only natural
persons but also judicial persons such as corporation, partner-
ship, company or association duly registered with the Securi-
ties and Exchange Commission (SEC) and Bureau of Com-
merce.
 Private Detective Agency – refers to any organization or cor-
poration who is not a member as regular police agency or of
the AFP.
 Watchmen/Security Agency – Any persons, associations,
partnership or corporation who recruits training, masters, fur-
nishes, and solicits individuals or business firms, private or
government owned corporation, engaging his services those of
its watchmen either residential or business premises, or both
for hire or compensation thru subscription shall be known as
watchmen or security agency.
 License or License Certificate – a document issued to a per-
son by competent authority allowing such person to established
direct, manage, or operate detective or intelligence and private
watchmen/security agency.

Advantages of an Agency Guard Services;

More economical

Security administrative problems are reduced

Problems related to recruiting, pre-employment inves-
tigation and training are eliminated

Absenteeism and vacation leaves are eliminated

Security personnel are separated from co-employees

Incase of emergencies, extra guards are easily avail-
able

Incase of company strike, the agency guards will be
on duty to carry out their assigned duties.
• Disadvantages of Agency Guard Services;
• Lack of training

Low caliber employees
• No company loyalty

Project poor image

Large turn-over

Not familiar with plans
• Advantages of a company Guard Forces:
• Generally higher caliber as they can receive higher wage
• Generally they provide better services
• Can be trained to handle of the more complex security duties
• Less turn-over
• Are more familiar with facilities they protect
• Tend to be more loyal to the company
• Disadvantages of Company Guard Forces:
• Cost more
• Maybe required to join guard force
• Problem of ensuring availability of back-up personnel

Control of authorized entry:

Screening of personnel

Identification of personnel

Identification of visitors

Control of truck/vehicle

Control of packages

Container control

What is the purpose of Key Control?

To control the issue, use and storage of keys and reserve key
locks

To control reproduction of duplicate keys

to control lock rotation and or replacement

To maintain record on all of the above

To ensures proper supervisions of key control measures by re-
sponsible persons.

The following areas needs to be inspected, to determine the
degree of protection to be applied in the establishment
• Perimeter

Building Security

Key Control
• Protective lighting
• Communication and alarm system
• Personnel identification and control

Vehicular identification and control
• Safety for personnel

Adequacy of existing guard forces
• SURVEY REPORTS – itemizes the condition which are con-
ducive to breaches of security, records the preventive measures currently in
effect, and when required--- makes specific practical and reasonable rec-
ommendations to bring the physical security to the desired standard.

You might also like