0% found this document useful (0 votes)
223 views35 pages

CDI 1 Module 5 & 6

This document provides a history of notable figures and developments in criminal investigation and intelligence. It discusses pioneers like King Hammurabi who established one of the first written legal codes, and Allan Pinkerton who opened the first private detective agency in the US. Significant milestones are outlined, such as the establishment of the first modern police force in London by Sir Robert Peel in the 1820s, and the development of DNA fingerprinting in the 1980s. The document also discusses developments specific to the Philippines, such as the organization of the Manila Police Department in 1901.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
223 views35 pages

CDI 1 Module 5 & 6

This document provides a history of notable figures and developments in criminal investigation and intelligence. It discusses pioneers like King Hammurabi who established one of the first written legal codes, and Allan Pinkerton who opened the first private detective agency in the US. Significant milestones are outlined, such as the establishment of the first modern police force in London by Sir Robert Peel in the 1820s, and the development of DNA fingerprinting in the 1980s. The document also discusses developments specific to the Philippines, such as the organization of the Manila Police Department in 1901.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

MODULE

FUNDAMENTALS OF
CRIMINAL INVESTIGATION
AND INTELLIGENCE
CDI 1

SYRA B. ENRIQUEZ
Department of Criminal Justice Education
1 | P a g e Crime Detection and Investigation 1
Fundamentals of Criminal Investigation and Intelligence
Bataan Heroes College

CHAPTER V
NOTABLE ACCOUNTS AND HISTORY OF INVESTIGATION (Additional
Information)

I. Who are the pioneers in criminal investigation and what their significant
contributions in the development of crime detection and investigation?

1. KING HAMMURABI
• King of Babylon created one of the first bodies of written law
• The code was then implemented to detect those who refused to obey the law. It
imposes the LEX TALIONES (Law of Retribution)
• LEX TALIONES – It is a principle where punishment of an offender is equal to
what he did or known as (“An eye for an eye and a tooth for a tooth principle”)

2. ALFRED THE GREAT


• He established the system of “Mutual Pledge” (Social Control), which is organized
for the security of the country into several levels such as the following;

A. TEN TITHING – Grouping a 100 persons into one under the charge of the
High Constable. The constable is the first form of English Police deals with serious
breaches of the law.
B. TITHING – Grouping a ten persons together to protect one another and to
assume responsibility for the acts of the group’s members.

3. JONATHAN WILD (England)


• He was the most famous thief catch er
• “Employing a thief to catch a thief.”
• He became the London's most effective criminal investigator.
• His methods made popular the logic of “employing a thief to catch a thief
• He conceived the idea of charging a fee for locating and returning stolen property
to its rightful owners.
4. JOHN FIELDING (The Blind Beak)
• A younger half-brother of Henry Fielding, appointed as Henry’s personal assistant.
• He also introduced the practice of developing informants, printing wanted notices,
employing criminal raids and bearing firearms and handcuffs.
• Being able to recognize 3000 criminals by the sounds of their voices.

5. EUGENE “FRANCOIS” VIDOCQ


• Established a squad of ex-convicts to aid Paris police in investigation. • He worked
under the theory of “Employing a thief to catch a thief.”
Fundamentals of Investigation and Intelligence
Sy Benitez Enriquez
Bataan Heroes College

• Founder of LA SURETE, France's national detective organization.


• *FATHER OF MODERN CRIMINOLOGY IN FRANCE.

6. SIR ROBERT PEEL (BOBBIES OR PEELERS)


• “FATHER OF MODERN POLICING SYSTEM”
• Established the London Metropolitan Police which became the world’s first modern
organized police force.
• He introduced the techniques in detecting crimes such as detectives concealing
themselves, and secretly photographing and recording conversations.
• His memorable principle was “The Police are the Public and the Public are the
Police”
7. ALLAN PINKERTON
• America’s foremost private detective. He became the first detective of the Chicago
Police Department in 1849. He then opened his private detective agency in the
early 1850’s in partnership with Chicago attorney, EDWARD RUCKER. Their
business immediately became successful and formed the North-Western Police
Agency. (PINKERTON'S AGENCY)

8. KATE WAYNE
• First women detective in history criminal investigation that was hired by Pinkerton
Agency.

9. DR. HANS GROSS


• He is believed to be the creator of the field of Criminalistic and is to this day seen as
the father of Criminal Investigation

10. THOMAS BYRNES


• Chief of the detectives in New York City, was one of the famous investigators of
the nineteenth century.
• He trained his detectives in recognizing individual criminal techniques. This
method was later to be known as “modus operandi” or method of operation and is
considered an essential tool of investigation to this day.

11. PAUL LELAND KIRK


• A forensic chemist and scientist who pioneered the blood splatter analysis “blood
stain pattern analysis”

12. DR. ALEC JOHN JEFFREYS


• Invented the used of DNA fingerprinting or profiling.
He used this to identify Colin Pitchfork as the murderer of 2 young girls in England.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

13. ALPHONSE BERTILLON (France)


• He introduced the first systematic system based on the Anthropological
measurement.
• He was considered the “founder of Criminal Investigation”.
• He was also considered the ‘father of Personal Identification “
14. FLAVIANO GUERRERO
• the only Filipino member of United States Federal Bureau of
Investigation (FBI)

Other significant developments in the field of criminal investigation include, but are not
limited to, the following events:

15. 1248, China:


• A Chinese book SHI DUAN YU (the washing away of Wrongs) was written
containing a description on how to distinguish drowning from strangulation. This
was the first recorded application of medical knowledge to the solution of crime.

16. 1833, ENGLAND:


• The Scotland Yard employed the first undercover officer while in
17. 1835, USA:
• TEXAS RANGERS was organized as the first law enforcement agency with state
investigative authority, the forerunner of the Federal Bureau of Investigation.

18.1851. Boston, Massachusetts, USA.


• Multi-suspect IDENTIFICATION LINE-UP was employed for the first time.

19. 1852, USA: CHARLES DICKENS


• Through his story entitled BLEAK HOUSE, he introduced the term
DETECTIVE to the English language

20.1859, USA.
• USA Appellate courts recognized/accepted photograph as admissible evidence
when they are relevant and properly verified.

21. 1915, USA.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

• International Association for Criminal Identification (later named as International


Association of Identification-IAI) was organized in Oakland, California. 22. 1935,
USA.
• The Bureau of Investigation under the Justice Department became the Federal
Bureau of Investigation having J. EDGAR HOOVER as the first chief serving for
48 years.
23.1965, USA.
• The office of Law Enforcement Assistance (forerunner of the Law Enforcement
Assistance Administration-LEEA) was established to fund and coordinate
administration, research and training in criminal justice.
24.1977, USA.
• The FBI introduced the beginnings of the Automated Fingerprint Identification
System (AFIS) with the first computerized scan of fingerprints.

NEW YORK vs. CASTRO was the first case in which the admissibility of DNA was
seriously challenged. It set in a motion a string of events that culminated in a call for
certification, accreditation, standardization, and quality control guidelines for both DNA
laboratories and the general forensic community.

25.1999, USA.
• The FBI upgraded its computerized fingerprint database and implemented the
Integrated Automated Fingerprint Identification System (IAFIS), allowing
paperless submission, storage and search capabilities directly to the national
database maintained at the FBI.

Take note: the evolution of criminal investigation is closely similar with the historical
developments in Criminalistics. To enrich your knowledge in criminal investigation and
Criminalistics, research more on their historical background.

II. What were the significant developments of Investigation in PHILIPPINE


SETTING?

1. 1901, ACT. NO. 70


• This act is otherwise known as the CHAPTER OF MANILA creating the police
force for the city of Manila.

2. JANUARY 9, 1901
• The Manila Police Department was organized with Col. Matthew Harmon as the
first chief of police.

3. 1913

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

• The genesis of Criminal Investigation in the Manila Police Department, presently


known as the Western Police District took place.

4. 1966 MIRANDA RIGHTS


• It originated from the American jurisprudence. Mr. Ernesto Miranda, a
Latino accused of kidnapping and rape in the State of Arizona. The
Arizona Police leading to his confession interrogated him exhaustedly. Based on
his confession, he was charged, tried and convicted. Appeal of his conviction was
made before the Arizona Supreme Court but his conviction was affirmed. The
appeal was then elevated to the US Supreme Court where there was a reversal of
the decision and he was acquitted on Constitutional grounds.

5. 1985 – PEOPLE vs. GALIT (GR No. 51770; March 20,1985)


• The right to a counsel maybe waived but the waiver, to be valid, must be made with
assistance of a counsel.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

MODULE 6:
POLICE INTELLIGENCE

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

CHAPTER VI POLICE INTELLEGENCE

History of Intelligence

1. Holy Bible- where you can find the just recorded intelligence operations in history.
Moses-One of the first recorded formalized intelligence efforts, with format, can
also be found in the Holy Bible Numbers 13:17
The scripture also named the 12 intelligence agents when the Lord directed Moses
to send into the Land of Canaan and records that “all those men were heads of the children
of Israel”.

a. Rahab- “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and


concealed the agents of Israel, made a covenant with the agent sand duped their
pursuers. She was not only an impromptu confederate of immense value to the
Jewish leaders of that far-distant day, but also established a plot- pattern which
is still of periodic relief to motion- picture producers.

b. Delilah- She was an impromptu intelligence agent of the Philistines. She


allowed Philistine spies to hide in her house (Judges 16:9) and used her
feminity to gain intelligence from a powerful enemy. A biblical personality
who was able to gain information by using her beauty and charm. She was
responsible for the fall of Samson a known Israelite leader who terrorized the
Philistines

2. Sun Tzu- a Chinese- “Father of Intelligence” philosopher, in his book “PING


FA” (Art/Principles of War) - the earliest known textbook on the art of general warfare-
once said; “If you know your enemy and know yourself, you need not fear the result
of a hundred battles. If you know yourself but not your enemy, for every victory, you
will suffer defeat. If you know neither yourself nor your enemy, you are fool who will
meet defeat in every battle.”
Its lessons were applied by Mao- Tse-Tung during the long march and by the
Japanese prior to Pearl Harbor.
Sun Tzu believed that to wage war economically while defending the state against
other, it was necessary to employ a permanent espionage service spying on neighbors and
enemies.
Captured agents should be treated with benevolence, tempted with bribes, led away
and comfortably housed. He realized that if such mean could be turned, they would be in
position to report on their previous master strengths and weaknesses.
Condemned spies were less fortunate; Unknown to them they were fed completely
false information by Sun Tzu’s agents, sent into enemy territory and if necessary
compromised. When they were captured and tortured, the information that they were able
to divulge was wholly incorrect, leading the enemy to miscalculate his response. When the
enemy learned of his mistake the spy was put to death, but by then it was often too late.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

3. Alexander “The Great”- a “Renowned Greek Conqueror” Under the tutelage of


Aristotle, Alexander the Great King of Macedonia, became the first ruler to utilize
intelligence as a weapon of government. He divided a simple but highly effective system
of covert ciphers.
He introduced a primitive form of “Cabinet Noir” (Internal Monitoring) when he
instigated postal censorship into the army and investigated letters and malcontents.

4. Sir Francis Walsingham of England- He was credited with creating the first viable
secret service in England. He protected Queen Elizabeth I from countless assassins.
“Regarded as the “First Great Spymaster.”

5. Mata Hari (1876-1917) - Ironically, Mata Hari is one of the best known spies in
history, yet she was one of the worst.
When World War I broke out, Mata Hari was in Berlin, where she had recently
befriended the Chief of police, who subsequently enlisted her into the ranks of the German
Secret Service. She carried on her life as before dancing naked on the stage and dispensing
her services liberally to those who could afford her.

6. Frederick “the Great”


The “Father of Organized Military Espionage”.
▪ He divided his agents into for classes:
1. Common Spies- recruited among poor folk, glad to earn small sum or to
accommodate a military officer;
2. Double Spies- the low informers and unreliable renegades of value chiefly in
spreading false information to the enemy;
3. Spies of Consequence- courtiers and nobleman, staff officers and kindred
conspirators, invariably requiring a substantial bribe or bait;
4. Persons who are forced to undertake espionage against their will.

7.Hannibal- Known as one of the “Greatest Military Strategist. Hannibal’s invasion of


Italy, the most brilliant raid in history, gained him victories and nearly bleed Rome to
death, but the mere slaughter of Romans and a great city’s despair would not have
sustained him for fifteen years if he had not also made powerful allies and developed an
excellent intelligence system. He usually roams around the city often disguise himself as a
beggar to gather firsthand information.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

8. Karl Schulmeister, “Napoleon’s Eyes”- He was credited for establishing counter


intelligence conducted against spies. He was the master of deceit who used black mail to
obtain vital information pertaining to the personality of the enemies of Napoleon during
the 18th Century

9. Wilhelm Stieber- He made two major contributions to the sequence of military


intelligence, namely military censorship and organized military propaganda.

10. Alfred Redl- One of the most brilliant intelligence agents, though he was a
homosexual. He rose to become chief of the Austro- Hungarian Secret Service, or in other
terms, director of their military intelligence system. For more than half of his time as
director of intelligence, Redl was acting as an intelligence agent of Russia. “Homosexual
Double Spy”

11. William “Wild Bill’’ Denovan- headed the Office of Strategic Service
(OSS), the immediate forerunner of the Central Intelligence Agency (CIA).
A lawyer and millionaire Republican, Donovan enjoyed Roosevelt’s trust, friendship and
most crucial of all- direct access to the inner sanctums of the White House

12. Edward I - An English monarch who started utilizing state informants specially to
determine seditious writing against the crown and identify of his enemies.
Rewards are given to wards for every useful information gathered.

What are the sample of Intelligence Units?

1. Federal Bureau of Investigation


First established in 1908 as an investigative arm of the U.S. Department of Justice
and became what is known as the F.B.I. under its first director John Edgar Hoover in 1924.
On September 6, 1939 by a presidential directive, it came to its responsibility the task of a
domestic intelligence.

2. CIA - Central Intelligence Agency


Military intelligence agency of United States of America and engaged in many
undercover activities throughout the world. A predecessor of the Office of Strategic
Services (OSS), which was formed in 1942 and renamed CIA in 1947. It was the Central
Intelligence group established during the time of President Truman.

3. KGB- Komitet Gusodarstevenoy Bezopasnosti-


Intelligence Agency of Russia. Literally means The Committee for State Security
established in 1917 and became known as KGB in 1954.

4. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim M-eyudim)-“Central


Institute for Intelligence and Security”- Israel
Fundamentals of Investigation and Intelligence
Sy Benitez Enriquez
Bataan Heroes College

5. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known
by its wartime designation, “MI6”, equivalent to US’s CIA, in charge with gathering
information overseas and with other strategic services ranging from foreign espionage
to covert political intervention.

6. SDECE- (Secret de Documentation Exterieure et Contre- Espionage)- France

7. SAD- (Social Affairs Department)- China

Note:
The counterpart of these intelligence organizations in the Philippines is the National
Intelligence Coordinating Agency (NICA) which is under the Office of the National
Security Adviser

Col. Rudolph Abel - (Russian) - was probably the highest ranking and most successful
spy whoever infiltrated the United States.

Mathew Cevetic- a famous undercover assignment of FBI infiltrated the communist party.

What is Intelligence?

Definition of Intelligence:

Intelligence. A product created through the process of planning, directing, collecting,


collating, and analyzing data, for dissemination as usable information that typically
assesses events, locations of adversaries, to allow the appropriate deployment of resources
to reach a desired outcome.

In the Military parlance, it is the product resulting from the collection, evaluation,
analysis, integration, and interpretation of all available information which concerns one or
more aspect of foreign nations or are areas of operations and which is immediately or
potentially significant to planning.

In the Police parlance, it is the end-product resulting from the collection, evaluation,
analysis, integration, collation and interpretation of all available information which
concerns one or more aspects of criminal activity significant to police planning operation.

OBJECTIVE OF INTELLIGENCE
▪ The fundamental objective is to ensure rational and timely decisionmaking.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

What are the Purposes of Police Intelligence?


➢ Affect the arrest of criminal offenders and provide evidence to assist the
prosecution in their conviction.
➢ Identify criminal and subversive elements as well as their associates.
➢ Check the condition of the community relating to crimes, vices and juvenile
delinquency to help in crime prevention and control.
➢ Check on community condition of PNP personnel, funds, equipment and materials.
➢ Check on the effectiveness of the operations of PNP forces
➢ Serve as an indispensable tool for policy making and management planning of
the organization.

What are the FUNCTIONS OF INTELLIGENCE IN GENERAL?

Today all countries have their intelligence services so with all their various
government agencies. They may be different in their organization, efficiency and method
but they all have the basic functions:
1. The collection or procurement of information
2. The evaluation of the information which then become intelligence.
3. The dissemination of intelligence to those who need it.

What are the Principles of Intelligence?

a. The Principle of Objectivity/Objectiveness


Intelligence must be based on the decision-makers own plans and intentions as
much as on consideration of the intelligence targets. In intelligence, only well guided will
succeed.
b. The Principle of Interdependence (Mutually dependent)
Operation and intelligence planners work hand and hand to attain a greater
degree of success in their common effort. This goes also to logistics, personnel,
plans/programs, training and budget. c. Principles of Continuity
It simply means that information, events, and reports must be continuous and
intelligence activities follow a simple continuous intelligence cycle. Intelligence
coverage must be continuing so that the shape of what happened today could be studied
in the light of what happened before, which in turn would enable to predict the shape of
things to come. d. Principle of Communication
Intelligence adequate to their needs must be communicated to all the decisions
makers in a manner that they will understand and inform that will permit its most
Fundamentals of Investigation and Intelligence
Sy Benitez Enriquez
Bataan Heroes College

effective use. Intelligence is useless if it remains in the minds, or in the files of its
collectors or its producers. e. Principle of Selection
Intelligence should be essential and pertinent to the purpose at hand.
f. Principle of Timeliness
Intelligence must be communicated or must be available on time to the decision
maker to permit its most effective use. g. Principle of Usefulness (Use)
Intelligence must be adequate for the purpose for which it will be utilized.

h. Principle of Flexibility
Intelligence must have the ability to change or be changed according to
circumstances. Hench, alternatives must be drawn.

i. Principle of Security
Security is achieved by measures which the intelligence takes to protect and
preserve the integrity of its organization personnel, method, sources, information and
results of its activities.
j. Principle of imagination and foresight
The operator and the agent must be given the leeway to use his resourcefulness to
obtain more than what is normally required.

What are the Concept and Classification of Intelligence?

1. Intelligence as a process- is an activity which treats, processed information as a basis


for departmental policy and decision- making.
2. Intelligence as an organization- It is an institution composed of persons who pursue a
social kind of knowledge for the purpose of planning the collection of information,
processing and dissemination of intelligence relating to the area of interests.
3. Intelligence Community- is the conglomeration of all intelligence units and agencies
in a country composed of civilian, military and quasi-military organization.

What are the FACTORS IN CREATING INTELLIGENCE UNIT?


1. Size of the community
2. Extent of organized crime in the community
3. Probable frequency and seriousness of the activity of civil disturbances
4. Breaches of Integrity on the part of any member of the force or unit

Who is an INTELLIGENCE PERSONNEL?


Agent- an undercover operative that detect, observe, infiltrate and gathered
information regarding a particular target.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

Intelligence teams which is composed of specialized agents, translator teams and photo
interpreter team usually engaged in the following activities:

a. Interrogation of criminals and interview of civilians.


b. Translation of documents.
c. Interpretation of footage and photographs.

PHASES OF RECRUITMENT

1.Selection-process of choosing from available personnel the most qualified operative


fitted for police intelligence work.

2.Investigation- the process of determining the degree of qualification, personal


background of prospective agents.

3.Testing- a series of actual and theoretical assignment to determine the intellectual


capacity of component.

4. Appointment- issuance of order as an operative agent in a certain unit.

WHAT ARE THE ESSENTIAL QUALITIES OF AN INTELLIGENCE AGENT?


➢ Unquestioned loyalty to the state and allegiance to the constitution.
➢ Integrity and honesty indicating uprightness of character.
➢ Good moral character.
➢ Respect to authority and superiors.
➢ Common sense and wise use of judgment.
➢ Self-discipline.
➢ Good people skills.
➢ Self-confidence and inherent fortitude.

PHILPPINE INTELLIGENCE ORGANIZATIONS:

➢ Bureau of immigration and Deportation (intelligence Unit)


➢ Department of National Defense (intel. Division)
➢ Intelligence Security Group
➢ Intelligence Service of the Armed Formed (ISAF)
➢ J-2 Coordinating Staff
➢ Military Intelligence
➢ National Bureau of Investigation (NBI)
➢ National Intelligence Coordinating Council (NICC)
Fundamentals of Investigation and Intelligence
Sy Benitez Enriquez
Bataan Heroes College

➢ Philippine National Police (Intelligence Unit)


What is Military and Police Intelligence?

Police Intelligence- Are evaluated and interpreted information concerning organized


crime and other major police problems. It is an end product resulting from collection,
integration, collation and interpretation of available information which concerns one or
more aspects of criminal activity significant to police planning and operations.

What are the CARDINAL PRINCIPLE IN POLICE INTELLIGENCE?

The cardinal principle in Police intelligence at all levels is the proper, economical and
most productive use of personnel and equipment employed and/or utilized in planning the
collection of information and dissemination of intelligence

What are the Types of Police Intelligence?


1. Strategic Intelligence- Intelligence information which is primarily long- range in
nature with little or no immediate practical value.
2. Counter Intelligence- It deals with defending of the organization against it criminal
enemies (Defensive Effort)
3. Line Intelligence(combat)- The type of intelligence which is of an immediate nature
and necessary for more effective planning and operations. (Offensive Effort)
4. Undercover work - It is an investigative process in which disguises and pretext, cover
and deception is utilized

What are the Forms of Police Intelligence?


1. Overt- When the information or documents are procured openly without regard as to
whether the subject of investigation becomes knowledgeable of the purpose or
purposes for which it is being gathered.
2. Covert- When the information is obtained without the knowledge of the person against
whom the information or documents may be used.
3. Semi Overt/ Covert- When the information is obtained from open sources but the
person against whom the said information will be used do not have any knowledge
about it.

What is Military Intelligence? (Additional information only)

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

Military Intelligence- It is an evaluated and interpreted information concerning an actual


or possible enemy or treat operations including Weather and Terrain, together with the
conclusions withdrawn there from.
What are the Types of Military Intelligence?
1. Strategic Intelligence- is a type of intelligence which pertains to the capabilities,
vulnerabilities, and probable course of action of foreign nations.

What are the Components of Strategic Intelligence?


a. Political Intelligence- deals with the domestic and foreign relationships of
government operation.
b. Economic Intelligence- deals with the extent and utilization of natural and human
resources to the industrial potential nation.
c. Transportation and Communication Intelligence- concerned with operation and
facilities not only the military but also the civilians.
d. Sociological Intelligence- deals with the demographic and psychological aspect of
groups of people.
e. Biographical Intelligence- deals with the individual personalities having actual
possession of power. (Scientist)
f. Armed force Intelligence- deals with the Armed Forces of the nation.
g. Geographical Intelligence- deals with the natural as well as man-made features of
physical environment of man considered from the point of view of military
operation.
h. Scientific Intelligence- deals with the progress of research and development as it
affects the economic and military potential of a nation.

2. Combat Intelligence- is a type of intelligence that pertains to the knowledge of People,


Weather, Enemy and Terrain (PWET) used in planning and conducting tactical and
administrative operation in a counter insurgency. It provides the commander with
information and conclusions concerning the area of operations, enemy capabilities and
vulnerabilities in order to determine their probable effect on his course of action.
Combat intelligence is required by the commander in order to determine the best use of
his available firepower and maneuver forces, to accomplish his mission, and to
maintain the security of his command.

What is the intelligence information to be determined?


a. People (living conditions, sources of income, education of the people, livelihood,
extent of enemy influence)
b. Weather (Visibility, Cloudy, temperature, rain, wind)
c. Enemy (location, strength, tactical capability, enemy vulnerability)
d. Terrain (relief and drainage system, obstacle, critical terrain features, observation
and fields of fire)

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

OTHER FORMS OF INTELLIGENCE


1. Order of Battle Intelligence
▪ This concerns the manner in which military forces are organized and
disposed.
2. Counter intelligence
▪ Covers the activity devoted and destroying the effectiveness of hostile
foreign activities to the protection of information against espionage, and
sabotage.
▪ It is also known as negative intelligence because it is an activity
dedicated to the concealment and protection of one’s own information
from adversaries’ intelligence operation.

WHAT ARE THE FUNCTIONAL CLASSIFICATION OF POLICE


INTELLIGENCE?
1. Criminal Intelligence (CRIMINT) - production of intelligence essential to
the prevention of crime and the investigation, arrest and prosecution of criminal
offenders.
2. Internal Security Intelligence (INSIT) - knowledge essential to the
maintenance of peace and order.
3. Public Safety Intelligence (PUSINT) - knowledge essential to ensuring the
protection of lives and properties.

INFORMATION AND ITS SOURCES


Information – All raw data or evaluated materials of every description derived from
observation, communication, reports, rumors, imagination and other sources from which
intelligence is produced.
Intelligence Information – All evaluated information of every description including those
derived from observation, reports, rumors, imagery, and other source from which
intelligence is produced. Source – Where the information is obtained.

WHAT are the GENERAL CLASSIFICATION of SOURCES of INFORMATION?


1. OPEN SOURCES
▪ The information may be obtained from news files, libraries, magazines,
books, or non- classified files in certain public or private offices. 99% of
the information collected is coming from open sources. This can be from:
Enemy activity; POW; Civilians; Captured Documents; Map;
Weather forecast; Studies; researches; reports; etc.; Agencies;
Informants and informers.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

2. CLOSE SOURCES
▪ They can be located inside a building, safe or vaults. 1% of all
information is from close sources. This can be from: Surveillance;
Casing; Elicitation; Surreptitious entry; Employment of technical
means (bugging and tapping); Tactical interrogation; Observation
and description.

Bugging- it is the placement of a hidden microphone to the target to collect to telephone


conversation.
Wiretapping- a method of collecting information through interception of telephone
conversation.

Persons as source of Information:


1. Information Net – Controlled group of people who worked through the direction of
the agent handler. The informant’s principal or cutouts supply the agent handler
directly or indirectly with intelligence information.
2. Informant – refers to a person who gives information to the police voluntarily or
involuntarily without any consideration.
3. Informer – Those who gives information to the police for price or reward.

What are the PHASES OF THE INTELLIGENCE CYCLE?

PHASE 1 – DIRECTING COLLECTION EFFORT


▪ In this phase, the Intel Staff Officer or Unit commander determines the
required or important information relevant to mission. Then these requirements will be
distributed to the different collection agencies by direction or by request. A.
Determination of requirements:
a. Enemy capabilities including time, place, strength or other details.
b. Enemy vulnerabilities including the nature, extent permanence or other
details.
c. Enemy order of battle
d. Terrain including natural and artificial obstacle and weather
e. Information desired by higher, lower or adjacent headquarters.
B. Determination of the essential elements of information (EEI)
EEI
➢ An item of intelligence or information of the characteristics of the area of
operations and the enemy, which the commander feels needed before he can
reasonably arrive at a decision.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

➢ These are evaluation based on the existing situation, current domestic and foreign
situations, national objectives, etc. In here, there is no set formula but judgment
and experience are necessary.
3. Establishment of priorities (P.I.R’s)
➢ This is necessary to decide which items of information are more important – a
system of priority is needed; critical importance and lesser importance; EEI –
highest priority intelligence requirements essential to planning.

PHASE 2 – COLLECTING THEINFORMATION


➢ In this phase, the collecting agency determines what specific information is to be
collected, by whom and from whom. After the collecting activity is carried out, the
collected information is then submitted for processing.

Criteria or Collecting Agencies/Units:


a. Capability
b. Balance/Suitability
c. Multiplicity
Two basic Collection Strategies:
a. Resource integration – one agent
b. Agent Mixed Redundancy – 3 or more agents assessing for
the same assignment Collecting Agencies:
a. Government agencies/offices – variety of information
b. intelligence units/agencies
c. organizations
Who is Task to Collect Information?
a. Intelligence officers/agents – regular members
b. Civilian agents – informers and informants
Methods of Collection
a. overt – open
b. covert – secret
COLLECTION PLANNING
➢ The continuous process which ultimately coordinate and integrate the efforts of all
collecting Agencies/Units.

PHASE 3 – PROCESSING THE COLLECTED INFORMATION


A. Recording
• The reduction of information into writing or some other form of geographical
representation and the arranging of this information into groups of related items.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

B. Evaluation
• The determination of the pertinence of the information to the Operation reliability
of the source or of the agency the accuracy of the information; or examination of
raw information to determine intelligence value.

Evaluation to Determine:
a. Pertinence (usefulness) - Does it hold some value to current operation?
Is it needed?
b. Reliability (dependable) -Judging the source of information
c. Credibility (truth of information)
▪ Is it possible for the reported fact or event to have taken place? Is the
report is consistent within itself? Is the report is confirmed or
corroborated by information from different sources or agencies? If the
report does not agree with information from other sources, which one
is more likely to be true?

EVALUATION GUIDE

RELIABILITY ACCURACY OF SOURCES OF INFORMATION


OF INFORMATION
IFORMATION
A– Completely 1–Confirmed by T– Direct observation by the commander
other sources and chief of a unit U– Reports by
reliable B– 2– Probably penetration agent or resident agent
Usually true V–Report by PNP/AFP troops
reliable involved in encounter
C– Fairly 3–Possibly true 4– W– Interrogation of captured enemy
reliable Doubtfully true agent/foreigner
D– Not usually 5 –Improbable 6– X–Observation of government and civilian
reliable Truth cannot employee or official
E–Unreliable F-- be judged Y– Observation by a member of the
Reliability populace Z - Documentary
cannot be
judged (CProPDIT)

(CUFNUR)

C. Interpretation
• It is establishing the meaning and significance of information. It involves the
following:

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

1. Analysis - The determination of significance of information relative to the information


and intelligence already known and drawing deductions about probable meaning of the
evaluated information. It is done by shifting and isolating those elements that have
significance in light of the mission or national objective.
2. Integration - It is combination of the elements stated in assessment with other known
information or intelligence to form a logical feature or hypothesis for enemy activities
or the information of the operational area and characteristics of the omission of the
command.
3. Deduction - The formulation of conclusions from the theory developed, tested and
considered valid; determination of effort and meaning of the information.

PHASE 4 – DISSEMINATION AND USE


➢ Final phase of the cycle. Processed information is disseminated to the agency, unit
or command to effect or implement the mission. Dissemination is through:

Criteria of Dissemination:

1. Timeliness - must reach the users in time to be of value


2. Propriety - The message must be clear, concise and complete, as well as in the
proper form for the receiver to readily understand its contents. It must be disseminated to
the correct user, presented in a form that leads itself to immediate use and distributed by
the most effective means appropriate to the both time and security requirements.

INTELLIGENCE OPERATION
➢ It is the result of intelligence planning. Planning is always ahead of operation
although an operation can be made without a plan. It is usually due to sudden and
inevitable situations but definitely, this is poor intelligence management.
Infiltration - the insertion of action agent inside the target organization
Penetration- recruitment of action agent inside the target organization

OVERT OR OPEN METHOD (Overt Intelligence)


➢ The information of documents is produced openly without regards as to whether
the subject of the investigation becomes knowledgeable of the purpose for which it
is being gathered.

OVERT METHODS OF GATHERING INFORMATION


1. Interview 4. Research
2. Interrogation 5. Investigation
3. Instrumentation 6. Debriefing

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

COVERT METHOD (Covert Intelligence)


➢ The information is obtained without the knowledge of the person against whom the
information or documents may be used, or if the methods of procurement are done
in an open manner.

COVERT EQUIPMENT (Familiarize and do memorize):

1. Body wire/voice transmitter- such materials are usually hidden in a brief case, attached
to
the agents clothing or disguised as a cigarette case, a ball pen, any ordinary functional item
or the packages and the likes.

2.Tracking Devices- it is attached to a vehicle, the subject or the undercover agent w/c
transmit signal to a receiver and specifically indicates location.

3. Surveillance vans- expensive to operate due to the number of equipment installed


and
necessary for operation such as several power outlets, air conditioning and heating system,
portable toilets, carbon monoxide sensor and alarm, insulation from cold and head, video
and audio equipment, transmitter and receiver, recorder and such other items necessary in
setting up a mobile nerve center for intelligence gathering and operations.

4. Low light photograph equipment- normally attached to weapon, videos, camera,


and hand
held light intensifier w/c allows footages to be taken in extreme lighting conditions
particularly in complete darkness w/out alarming the attention of the subject. This also
includes telephoto lens, night super scope M-2, Binocular adaptor sequence photo camera.

5. Covert Packages- installed w/ the photographic, audio visual equipment concealed


and disguised to hide its true purpose.

6.Audio electronic devices- such as buried mikes, aero bat, micro eye TV camera,
parabolic and shotgun microphone.

METHODS OF COVERT OPERATION Elicitation


➢ It is a system or plan whereby information of intelligence value is obtained through
the process of direct communication where one or more of the parties to the
communication is /are unaware of the specific purpose of the conversation.
Two devices in the conduct of Elicitation:
1. Approach- the process of setting people to start talking.
2. Probe- the process to keep the person talking incessantly.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

Types of Approach:
1. Flattery- people are susceptible to praise Variants:
a. Teacher- Pupil approach- the subject is treated as an authority. We request
him/her to enlighten us and we solicit his viewpoint and opinions. The collector
builds the theme that he is an ignorant student who wants to learn from the all
knowing teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal having some
specialized quality and you flatter him/ her by showing enough concern for his/
her welfare to pay special attention to his enjoyment. The collector attempts to
build on professional brotherhood and understanding of what the source of
information is going through and sharing the source’s frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and assistance
are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration of he source
of information and express curiosity on how one could achieve such greatness.

2. Provocative approach-discover a wide range of


conversational gambits. Variants:
a. Teaser Bait Approach- the collector will direct the conversation and to a
certain topic and throw out a provocative statement that may be incorrect,
which will in effect force the source to correct the collector.
b. Man from Missouri Approach- The collector will disbelieve what the source
is saying to a point where the source is force or prove the accuracy of his words
through additional information. The elicitor adopts unbelievable attitudes above
anything. He questions all statements and oppositions.
c. Joe Blow Approach (Know it all) –The collector will become arrogant and
project a message that he/she knows it all. Eventually, the source of
information starts to show the intelligence collector, how much he doesn’t
know by divulging additional information, generally prefaced by “Well if you
know everything, did you know……?
d. National Pride Approach- nature propensity of all people to defend their
country and its policies. The collector will tie the required information to
national pride in an attempt to get the source to confirm, deny or elaborate on
information.
e. Partial- Disagreement approach- seek to produce talking by the word “I’m
sure if I fully agree”.

What are the types of Probe?

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

1. Competition Probe- this is effective when used in connection with the teacher- pupil
approach.
2. Clarity Probe- used to elicit additional information in an area which the response is
clear.
3. High Pressure Probe- it serves to pin down a subject in a specific area or it maybe
used to point out contradictions in what the subject has said.
4. Hypothetical Probe- present a hypothetical situation and to get the subject to react to
the hypothetical situation.

What is Casing?
➢ Literally means putting a thing, or place in a case. As used in intelligence operation
– the continuous monitoring of a place or area at a given period of time.
➢ In intelligence operation, it is reconnaissance or surveillance of a building, place or
area to determine its suitability for intelligence use or its vulnerability in operations.

What are the Information desired in Casing ?


1. Area Condition and Habits
a. Detailed sketch and photograph of the area.
b. Customs, habits, language and dress in order to be able to blend with the
community.
c. Transportation facilities, the fare, station, in order not to ask questions.
d. Knowledge of establishments determine what are desirable, if are free from raids
anytime to avoid compromise.
e. You must know what kind of people residing in the neighborhood so that agent will
know what appropriate actions he takes.
f. Restrictions
g. Description of the subject

2. Active Opposition (capabilities, People they employ, intentions, fear, vulnerabilities)


3. Escape and Evasions- In case of compromise, the agent must get out entirely from the
target. Stages of Casing:
1. Area familiarization
2. Actual inspection of the area
3. Re-casing

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

What is Surveillance?
It is a process or act of keeping person, premises or vehicles under observation in
order to acquire detailed information concerning the activities, identities and contact of the
subject. It is concerned primarily with persons. It involves many varied techniques and
skills including preparation, foot surveillance, automobile surveillance, stationary of fixed
surveillance, and reconnaissance. Also, tailing, shadowing, trailing or keeping the subject
under observation.

An objective of Surveillance is to disclose or divulge the existence of illegal criminal


activities and to reveal the identities of those engaged in such activities.

TERMS USED (Please Memorize):


• Pre-surveillance Conference - A conference held among the team members,
police intelligence unit before a surveillance is conducted.
• Stake out - The observation of places or areas from a fixed-out point.
• Tailing or Shadowing - It is the observation of a person’s movement.
• Undercover Man - A person trained to observe and penetrate certain organization
suspected of illegal activities and the later reports the observation and information
so that proper operational action can be made.
• Liaison Program - This is the assignment of trained intelligence personnel to other
agencies I obtain information of police intelligence value.
• Safe House - It is place, building, enclosed mobile, or an apartment, where police
undercover men meet his action agent for debriefing or reporting purposes.
• Drop - It is a convenient, secure, and unsuspecting place where a police,
undercover man, informer, or informant by a pre-arrangement leaves a note, a small
package, an envelope to item for the action agent, supervisor or another agent.
• Convoy - An accomplice or associate of the subject.
• Decoy - Any person almost similar to the subject used to avoid or elude
surveillance.
• Contact - Any person or subject picks or deals with while he is under surveillance.
• Made (burn out) -When subject under surveillance becomes aware that he is under
observation and identifies the observer
• Lost - When the surveillants do not know the where about of their subject or the
subject had eluded the surveillants.
• Rabbit (hare) - Term referring to the subject of shadowing and tailing.
• Test for tailing - The common trick of the subject (rabbit) when he becomes
conscious that he is being tailed. The rabbit usually boards a public conveyance
then jumping off the vehicle then he looks about quickly to determine if any
another person jumps off also.
Fundamentals of Investigation and Intelligence
Sy Benitez Enriquez
Bataan Heroes College

• Finger man- an individual who can positively point the subject.


• Put the finger on- to identify the subject by pointing him out in person or in
photograph.
• Put to bed- when the subject under surveillance returns to quarter and apparently
retire for the night.

What are the Classification of Surveillance according to intensity?


1. Discreet- one in which every effort is made to ensure that the subject is unaware that
he is under observation/surveillance.
2. Close Surveillance- one in which maintaining constant observation of the subject is
the objective regardless of whether or not he becomes aware of the surveillant.
3. Loose- one in which may be applied frequently or infrequently with the period of
observation varied of each occasion.

What are the Classification according to method?


1. Fixed or Stationary method (Stake out/ Plant) Observation of place usually a bookie
stall, gambling joint, or a residence where illegal activities are committed (fixed point
position).
2. Moving Surveillance - Surveillants follow the subject from place to place to maintain
continuous watch/ observation of his/ her activities.
3. Technical and Audio- visual surveillance Uses communication and electronic
hardware’s, gadgets, systems and equipments. Ex: taps and bugs

What are the kinds of surveillance?


a. Stake Out or Surveillance of Places
b. Tailing or shadowing
c. Undercover investigation or “Roping”

A. What is surveillance of places?


Two types of place surveillance
1. Using a room in a nearby house or business establishment and remaining
undercover.
2. Remaining outdoors and posing as a person who would normally conduct his
business in such an area, ex. A laborer, carpenter, street vendor, etc.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

Equipment used in the surveillance of a place: Ex: camera w/telephoto lens etc.

B. What is Shadowing or Tailing?


▪ It is the act of the following a person
What are the Methods of Shadowing /Tailing by foot?
1. One-man shadow
2. Two- man shadow
3. Three-man shadow or ABC method

What are the Particular Tactics and Techniques of Shadowing?

1. Turning Corner- If the subject turns a corner, the surveillant should not hurry. If
the subject is lost, the nature of the neighborhood will determine the subsequent procedure.
In most cases, it is preferable to lose the suspect than to alert him to the tail.
2. Entering a Building- If the building is a store, the surveillant should wait until the
subject comes out. In buildings having a number of exits, it is necessary to follow him
inside. If the subject enters an elevator, the surveillant should board the same elevator.
The surveillant may tell the elevator boy that his destination is the same floor as the
subject, or he may proceed to the top floor, if there are more than one surveillant, one
should alight at the subject’s floor and should proceed in a different direction then the
latter can return to the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and
on the same side. If he misses the bus, he should hire a taxi and board the bus at a point
ahead.
4. Taking a taxi- When the subject takes a cab, the surveillant records the time, place
and name of the taxi’s company and license. He should endeavor to follow in another taxi.
If this results in failure, he should trace the taxi by means of recorded information and
ascertain the destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant
should endeavor to get in line behind him with one person intervening. If he hears the
destination requested by the subject he may buy a similar ticket. In the event that he is
unable to hear the destination, he should merely request for a timetable.
6. In a restaurant - The surveillant should allow a few minutes to elapse before
following the subject into a restaurant. He should then take an obscure sect and arrange to
finish his meal at the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he
registered, the surveillant can take the adjoining room.
8. In a telephone booth- The surveillant should either go into the next booth or stand
near enough to hear. He should note the telephone book use and the page at which it was
left open.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

9. In the Theater- The surveillant should sit behind the subject and take not of the
various exits which are available.

What is Observation and Descriptions (Odex)?


OBSERVATION


The complete and accurate awareness by an individual of his surroundings and
encompasses the use of all major senses to register and recognize its operational or
intelligence significance.
DESCRIPTION
▪ The factual reporting of what is observes. Or, it is the actual and factual reporting
of one's observation or the reported sensory experience recounted by another.

Psychologists estimate that approximately:


1. 85% of your knowledge is gathered through sight.
2. 13% of your hearing.
3. 2% through the three senses.

Clandestine Operation
➢ Clandestine operation is a secret action undertaken by an intelligence/counter -
intelligence organization in behalf of the Government or other friendly forces.

What are the Classification of Clandestine Agent?

1. PRINCIPAL AGENT is a managerial agent and in most cases the leader of the
agent network..
2. ACTION AGENT- is the doer of the clandestine task and further classified
according to the task that he was assigned. (e.g. Espionage, Saboteur, Strongman,
Propagandist, Provacateur)
3. SUPPORT AGENT - an agent who engages in activities which support the
clandestine operation. This agent performs all types of auxiliary services at the
direction of the case or project officer.

What is Cover and Undercover/Roping?

Undercover/ Roping Operation- an intelligence/ investigation technique in which the


investigator conceals his true identity and adopts an assumed role to accomplish an
intelligence/ investigation mission.
Fundamentals of Investigation and Intelligence
Sy Benitez Enriquez
Bataan Heroes College

COVER - Any device by person, organization to insure that one who does not have the
right to know must be aware of the real purpose of the mission. Or it is a means by which
an individual group or organization conceals the true nature of its acts and or existence
from the observer.

COVER STORY - A biographical data through fictional, which will portray the
personality of the agent he assumed: any scenario to cover up the operation.

COVER SUPPORT - An agent assigned in target areas with the primary mission of
supporting the cover story.

What are the Essential Types of Cover?


1. Natural cover - using actual or true background
2. Artificial - using biographical data adopted for the purpose
3. Cover within a Cover -Justification of existence.
4. Multiple cover - Any cover you wish.
ORGANIZATIONAL COVER
➢ Any abound consisting of biographical data which when adopted by an
individual will assume the personality he wants to adopt.
Objectives of Organizational Cover
1. To camouflage and protect operational personnel and their activities.
2. To protect installation in which clandestine activities are based.

UNDERCOVER ASSIGNMENT
➢ It is an investigation technique in which an agent conceals his official identity
to obtain information from that organization.
What are the Types of Undercover Assignment?

a. Dwelling Assignment-to reside in or near the dwelling of target to maintain


constant contact with the home life of the subject.
b. Work Assignment- getting employed where the investigator can observe the
activities of the subject at his place of work.
c. Social Assignment- frequent places of entertainment and amusement habitually
being visited by the target.
d. Personal Contact Assignment- the investigator is required to develop the
friendship and trust of the target.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

e. Multiple Assignment – the investigator is tasked to cover two or more of the


above specific assignments simultaneously; it can produce extensive information
with minimum expenses but more prone to compromise.
f. Rope job - striking up friendship with the subject.

What are the Golden Rules of an Undercover agent?


1. Don’t drink while working as under cover. Drink is a great tongue looser. But
it is well to get the subject.
2. Don’t court women. Usually, the less contact the agent has with women, the
greater is the chance of success. The investigator cannot afford to incur the
enmity or jealousy of a subject who might think that the investigator is “making
time” with his girlfriend.
3. Don’t take woman on an undercover assignment. The subject may become
interested in the woman. If this happens, the subject attention is diverted from
those things in which the investigator’s interests lie. The woman maybe placed
in an embarrassing or impossible situation form which extrication may disclose
the identity of the undercover investigator.
4. Don’t claim to be a “big shot”. It is too easy to identify a big shot. It will cause
more inquiries to be made in the place. It is better to assume a character of
average status or less.
5. Don’t fail to provide persons in the place who can vouch for the investigator
6. Don’t spend too much money. Expenditure maybe in keeping with the part, if
not, suspicion is aroused. Many agents have given themselves away by
spending more money than the amount justified.

What is COUNTER INTELLIGENCE?

COUNTER INTELLIGENCE DEFINED


➢ Aspect of intelligence which in peace or in war is concerned with the detection
prevention and neutralization or espionage, sabotaged subversion or other inimical
foreign intelligence activities, by planning and developing suitable
countermeasures to what such hostile activities.
➢ Covers the activity denotes and destroying the effectiveness of. Hostile foreign
activities and to the protection of information against espionage, subversion, and
sabotage

Counter intelligence – is also known as negative intelligence

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

What are the THREE ACTIVITY OF COUNTER INTELLIGENCE?


1. Protection of information against espionage.
2. Protection of personnel against subversion.
3. Protection of installation and materials against sabotage.

Espionage- is the act or practice of spying. The use of spy by a government in order to
discover the military or political secret of other nations.
Sabotage- destruction of property or obstruction of public service to undermine a
government, police, or military effort.
Subversion- is an act that seeks to overthrow a constituted government it is also an act
or instance of subverting.

What are the GENERAL TYPES OF CI?


1. Passive Measures (offensive)- Those measures which seek to conceal
information from the enemy.
2. Active Measures (defensive)- Those measure which seeks active block to the
enemies’ effort to gain information or engage in espionage, subversion or
sabotage.
3. Deception Measures - To deceive the enemy.

COUNTER-INTELLIGENCE INVESTIGATION
➢ It is an activity which constitutes the value of work load and includes
specific investigation of individual and incidence which for the most part
are conducted in an overt but discrete manner.

SECURITY SURVEY VS SECURITY INSPECTION

1. SECURITY SURVEY
➢ A counterintelligence service conducted in order to assist the chiefs of
office in determining the security measures required to protect key
installations from possible sabotage, espionage, subversion and
unauthorized disclosure of or access to- classified defense information or
materials.
2. SECURITY INSPECTION
➢ A counterintelligence service conducted in order to determine degree of
compliance with established security policies and procedures.

DEFINITION OF TERMS (Familiarize and do memorize!)

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

1. Security
➢ It is the protection of classified information, materials and equipment from
disclosure to unauthorized person.

2. Document Security
➢ The placements of security classification, handling and use of classified
information.

3. Classified Information
➢ This includes all information concerning document cryptographic devices,
development project and materials following on the categories of Top
Secret Confidential or Restricted.

4. Classified Matter
➢ Any information in materials in any form or any nature, the safeguarding of
which is necessary in their interest of Natural
Security and which is classified of such purpose by
the responsible classification authority.

5. Classify
➢ This refers to the assigning of information or material, one of the four
security categories after determination been made that the information
requires the security protection as provided.

6. Declassify
➢ The act of removing the security classification from classified information
or matter.

7. Reclassifying or Regarding
➢ Refers to the act of changing the assigned classification of the classified
information or matter.

8. Upgrading
➢ Refers to the act of assigning the information or matter to the higher
classification than that previously assigned to it.

9. Certification of Destruction
➢ It is a certification by a witnessing officer that the classified matters
described therein has been disposed of in his presence in approved
destruction methods.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

10. Compartmenting (compartmentation)


➢ Refers to the grant of access to classified matter only properly cleared
person when such classified information is required in the performance of
their official’s duties.

11. Need to Know


➢ It is the dissemination of classified information or matter to be limited
strictly to those person whose duties requires knowledge or possession
thereof; it is the principle whereby access to classified mater may only be
given to those persons to whom it is necessary for the fulfillment of their
duties.

12. Security Clearance


➢ It is the certification by a responsible authority that the person described is
cleared for access to classified matter in the appropriate level.

13. Unauthorized
➢ Refers to person not authorized to have access on classified matters.

14. Compromise
➢ Takes place through the loss of security, which results from unauthorized
persons, obtained knowledge of classified matters.

15. Damage to National Security


➢ Refers to the prejudice, embarrassment or jury to the country resulting from
act or omission.

What are the FOUR CLASSIFIED MATTERS?

1. Top Secret (Green Color code)


Any information and materials, the authorized disclosure of it would cause
exceptionally grave damage to the nation, politically, economically or militarily.

Authority to Classify Top Secret Matters:


a. Secretary of National Defense
b. Chief of Staff and its equivalent to the PNP.
c. Major services commanders.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

d. Area and Unified Commands of the PA, PNP, and its equivalent to the PAF and
PN.
2. Secret (Red Color Code)
Any information and materials, the unauthorized disclosure of which endanger
National Security, causes serious injury to the interest and prestige of the nation or of
any government activity or of great advantage to foreign nation.

Authority of Classify Secret Materials:


a. Commanders of Infantry Battalion
b. Person enumerated under Top Secret
c. Special and Personnel staff of GHQ
d. General and Special staff of Major Service areas and unit commanders
e. Superintendent of the PMA and PNPA
f. Commanders of post, depots, station of separate units
g. Chief of Military mission or group
h. Armed Forces Attaches
i. Commandants of service Schools

3. Confidential (Blue Color Code)


Any information and material the unauthorized disclosure of which would be
prejudicial to the interests and prestige to the national or governmental activity or
would cause administrative embarrassment or unwanted injury to and or would be of
advantage to foreign nations.

4. Restricted (White or No Color Code)


Any information and material which requires special protection other than those
determined to be confidential, secret, and top secret. Yet prior to release require
clearance with the records custodian.

FUNDAMENTAL OF CRYPTOGRAPHY, ENCODING AND DECODING


DEFINITION OF TERMS (Please memorize):
1. Cryptography - Study/science of encoding information in the form of codes and
ciphers; the act in writing in cipher or secret character or the particular used.
2. Codes - A system on which arbitrary group of symbols represented by other letter
rather than by a complete words, phrases or sentences.

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez
Bataan Heroes College

3. Cipher - A system in which individual letters of a message are represented by other


letter than by a complete words, phases or sentences; the secret manner of writing
the key to its code.
4. Cryptogram - Encrypted text/message complete with heading of message written
in unintelligence text or language which implies/convey-hidden meaning.
5. Decoding - To retranslate a message into ordinary language from cipher or code.

6. Document - Any recorded information regardless of its physical form or


Characteristic and includes but not limited to the following:

a. Written matters whether handwritten, printed or type


b. All painted, drawn, or engraved matter.
c. All sound and voice recording.
d. All printed photographs, exposed or printed film, skill or moving
e. All reproduction if the foregoing.

7. Encoding - To convert a message to a code.


8. Translation - The transformation/conversion of one language to another. There are
three types: Full — everything is translated or forwarded; Extract - only portion of
it is translated; and summary - translate only main part.

Deuteronomy 31:6

Be strong and of a good courage, fear not, nor be afraid of them: for the LORD your God,
he it is that does go with you; he will not fail you, nor forsake you.

-END OF MODULE-

Department of Criminal Justice Education

Fundamentals of Investigation and Intelligence


Sy Benitez Enriquez

You might also like