Presented by:
MAQUISO
TUBORO
CANONIGO
DELOS REYES
EMUY
REBULDAD
DELA CRUZ
Chapter 1
Definition of Terms and
Historical Setting
This chapter presents the important
operational definition of terminologies
used in the context of this subject and
the historical development of intelligence
and secret service. It is in this chapter
that the reader can be able to trace and
understand the importance of intelligence
in nation building and security in both
DEFINITION OF TERMS
National Intelligence- refers to
the total product of intelligence
developed by all governmental
agencies that covers the broad
aspects of national policy and
security.
Vulnerabilities- A nations
vulnerabilities
are
the
weaknesses, which make it
susceptible to any action,
which
reduces
its
war,
potential, and or its will to
fight.
HISTORICAL SETTING
The desire for advance information is
no doubt a manifestation of our
instinct for survival. A ruler may ask
himself: What will happen next?
What course of action should I take?
How strong are my enemies? What
are they planning against me?
BIBLICAL BEGINNINGS
The earliest sources of intelligence, in the
MOSES
One of the first recorded formalized
intelligence efforts, with format, can also
be found in the Holy Bible (Numbers
13:17). And Moses sent them to spy out
the land of Canaan.
RAHAB
The Harlot of Jericho (Joshua 2:1-21) who
sheltered and concealed the agents of
Israel, made a covenant with the agents
and duped their pursuers.
DELILAH
The Philistine used her when she allowed
Philistine spies to hide in her house
(Judges 16:1-19). And she also allowed
sex to gain intelligence from a powerful
enemy.
SUN TZU
The father of The Art of War, and he
believe in his saying that:
If you know thy enemy and know yourself,
you need not fear the results of a
hundred of battles
AKBAR
The Great Mogul and sagacious master of
Hindustan employed more than 4,000
agents for the sole purpose of bringing
him the truth that his throne might rest
upon it.
GENGHIS KHAN
A Mongol who used intelligence to conquer
China and invade Cathay. He instructed
his Generals to send out spies and used
prisoners as sources of information.
RENAISSANCE PERIOD
With rise of Nationalism and
Development of modern Armies,
Intelligence became apparent to
large states.
LOUIS XIV
He systematized political policy, continuous
surveillance,
postal
censorship
and
military intelligence organization.
NAPOLEON BONAPARTE
One spy in the right place is worth 20,000
men in the field. He organized two
Bureau of Interest:
Bureau of Intelligence
Topographic Bureau
HANNIBAL
Considered one of the brilliant military
strategies in history. He had developed an
effective intelligence system for 15 years
in Rome, and he usually roam around the
City often disguise as a beggar to gather
first hand information.
JULIUS CEASAR
During his time, the staff of each legion
includes ten Speculators who served as
an information collecting agency. They
also employed ciphers to ensure secrecy
of communications.
GEORGE WASHINGTON
He has the Grand Master mobilized the free
masons of the colonies at the outbreak of
the American war of Independence.
KARL SCHULMEISTER
He is the Napoleons eye, Napoleons
military secret, was born on August 5,
1770. He began his career in offensive
espionage. Under a cover role, he was
able to infiltrate Austrian General Staff.
ALFRED REDL
One of the most brilliant intelligent agent,
though a homosexual. Become chief of
the Austro-Hungarian Secret Service, but
in fact a double agent in Russia.
WILLIAM DONOVAN
Major General, organizer of the OSS
(Office of the Strategic Service, US),
builder of a central intelligence system.
The OSS whose exploits become
legendary in World War II.
Herbert Yardley
Head of the MI-8, The forerunner of the
Top Secret National Security
Administration a.k.a. Black Chamber, a
Crypanalytic Organization.
Battle of Midway
V2- Rackets
OSS agents working in conjunction with
the British Intelligence, through
penetration and technical intelligence
discovered Pneumundo, which was the V2
guide missile research project of Nazi
Germany. It resulted to its destruction
JOSEPH FOUCHE
The French statesman Joseph Fouche
(1759-1820) served as minister of police
under Napoleon and was influential in the
return of Louis XVIII to the throne in 1815.
Bonapartes Head of Internal Security. He
created a network of agent. His
assistance founded to the modern system
of spying on spies, which later was known
as counter espionage.
JOSEPH PETROSINO
Member, New York Police Department in
early 1900, he was the head of the Italian
Squad. Through extensive intelligence
network, he is credited to smash the
Black Society.
BRITISH INTELLIGENCE
succeeded greatly by means of
censorship and its CODE ROOM combined
with skillfull use of COVERT agents.
US expanded their NAVAL INTELLIGENCE
wherein DOMESTIC
COUNTERINTELLIGENCE became a
principal activity.
WORLD WAR II
GERMAN INTELLIGENCE- started the war
JAPANESE INTELLIGENCE
failed because it was not provided with
sufficient number of trained personnel to
assemble and evaluate the means of
materials which were collected although
Japanese Intelligence was involved in
short war and defensive in nature.
BRITISH INTELLIGENCE
Its achievement was the delay in the use
of German V-BOMB against them.
CHINESE INTELLIGENCE
In 1932, TAI LI- organized the Chinas
Secret Police (the BIS) to conduct
espionage and counterespionage against
Japanese Spies and Chinese communist.
SOVIET INTELLIGENCE
AMTORG was organized for the purpose
of purchasing all kinds of materials for
the SOVIET UNIONS.
CHAPTER FOUR
INFORMATION COLLECTION AND ITS SOURCES
INFORMATION
All
evaluated
materials
of
every
description including those derived from
observation, reports, rumors, imagery,
and other sources from which intelligence
in produced.
Overt Intelligence
is the gathering of information or
documents procured openly without
regard as to whether the subject or
targets become knowledgeable of
the purpose.
Covert Intelligence
Informant Net
It is a controlled group of people who
worked through the direction of the
direction of the agent handler. The
informants, principal or cutouts supply
the agent handler directly or indirectly
with Intel information.
Informants (Asset)
People selected as sources of
information, which could be
voluntary, or in consideration of
a price.
Informant
Refers to a person who gives
information to the police voluntarily or
involuntarily without any consideration.
Informer
Those who give information to the
police for price or reward.
Types of Informants
Criminal Informant
An informant who gives information
to the police pertaining to the
underworld about organized
criminals with the understanding
that his identity will be protected.
Confidential Informant
Is similar to the former but he
gives information violate of the
law to include crimes and
criminals.
Voluntary Informant
A type of informant who give
information freely and wilfully as a
witness to a certain act.
Special Informant
Those who gives information
concerning specialized cases only and
it is regarded a special treatment by
the operatives (ex. teachers,
businessmen)
Anonymous Informant
Those who gives information
through telephone with the hope
that the informant cannot be
identified.
Sub-type of Informant
Incident Informant
A person who casually imparts
information to an officer with no
intention
of
providing
subsequent information.
Recruited Informant
A person who is selected
cultivated and developed into
a continuous source of info.
Categories of Recruited
Informants
Spontaneous or Automatic Informant
Informants who by the nature of
their work or position in society
have a certain legal, moral or ethical
responsibilities to report info to the
police.
Other classification of
Informant
Automatic Penetration
Full time
Rival Elimination
False Informant Frightened
Informant
Self Aggrandizing Informant
Mercenary Informant
Common Motives of
Informants
Reward
Revenge
Fear and avoidance of punishment
Friendship
Patriotism
Vanity
Civic Mindedness
Repentance
Competition
Other motives
Basic to Informant
Recruitment
Selection
It is particularly desirable to be able to
identity and recruit an informant who
has access to many criminal in-group or
subversive organization. Wide access is
probably the single most important
feature in the consideration of recruiting
the potential informant.
Investigation
The investigation of the potential
informants that has tentatively
identified as a probable must be as
thorough as possible. It must
establish possible existing motives as
to this person might assist the police
Intel community. Failure to do so will
deny this office who must perform
the approach and persuasion phase
with little more that a guess. If
Approach
Approach must be done in a setting
from which might include pleasant
surroundings, perhaps a confidential
apartment, preferably in an adjacent
city or a remote area foreign to the
informants living pattern.
Testing
The testing program should
begin, of course, with the limited
assignment, with a gradual
integration
into
the
more
important areas. The occasional
testing of an informant should
continue through the entire
affiliation.
General Treatment of
Informant
1.Avoid the use of derogatory terms in
referring to informants of any type.
2.Avoid disclosing the identity of the
informant which will in most cases ruin
his potential.
3.Protect the interest of the informant;
remember an investigator is usually just
as good as his sources of information.
THE COLLECTION OF
INFORMANTION
HUMINT
Human
Intelligence;
the
collection and processing of raw
intelligence from a clandestine
agent working in the field.
IMINT
Imagery
Intelligence;
the
collection,
mapping,
and
interpretation of photographs
from aerial units or satellites.
Sometimes this specialty is
also called PHOTINT.
MASINT
Measurement and Signature Intelligence; a
collective term bringing together disparate
elements that do not fit within the definitions of
Signals Intelligence, Imagery Intelligence, or
Human Intelligence. This category usually
consists of acoustic intelligence; radar
intelligence; nuclear radiation detection
infrared intelligence; electro-optical
intelligence; radio frequency, unintentional
radiation; materials, effluent, and debris
sampling; and electro optical and spectroradiometric sources.
OSINT
Open Source Intelligence; more than just
newspaper clippings and the Internet, OSINT
involves inventories of the full range of
accessible, acknowledgeable, and unclassified
private sector information sources. Some 80%
of OSINT is not online, not available in English,
and not available in the U.S. The purpose is to
produce Just in Time: Just Enough intelligence,
and the process involves discovery, discovery,
discrimination, distillation, and delivery.
SIGINT
Signals Intelligence; consisting of 4 subfields:
(1) communications intelligence (COMINT),
which deals with electronic signals which
contain speech or text; (2) electronics signals
analysis, primarily ELINT and RADINT, which
deal with emitters such as beacons, jammers,
navigational signals, and radars, with the
former divided into two branches, technical
and operational, the latter forming electronic
orders of battle and called tactical ELINT;
Spies are the basic collection platform for any wellrounded intelligence system. Much of intelligence
gathering at the clandestine level is a lot like
undercover police work. Like the policemans attitude
toward the stool pigeon or snitch, its important
to note that to intelligence professionals (case
officers or case handlers), an agent is a foreign
national, an informant, someone committed to
treason and spying on his own country.
The
theory
behind
working
undercover is that it removes any
impediments
to
acquiring
information, and allows a number
of activities such as surveillance,
eavesdropping, use of informants,
and espionage. It typically involves
an assumed identify for a defined
and considerable amount of time.
Recruiting Infiltrators
The smartest and safest way to steal anything is
to recruit someone who can steal it for you and
who never knows your true identity. This works
for just about anything you want to do thats
illegal and you dont want to get caught for it.
One may balk at the ethical implications of this,
but once someone is properly recruited, you can
use them for just about anything. They can be
used for sabotage, deception, covert operations,
assassination, or just about anything.
Many
intelligence
operations are built on lies,
deception,
and
using
people, generally foolish
people.
Using
people
generally follows a pattern:
Steps of Recruiting
Infiltrators
PHASE ONE consists of Spotting,
Evaluating,
and
actual
Recruiting. PHASE TWO consists
of Testing, Training, Handling,
and Terminating the recruit.
SPOTTING
means looking for people who have access.
Handlers look for angry or desperate people in
mid-level management positions. The best
prospects are the ambitious and disgruntled.
Secondarily, handlers look for clerks,
secretaries, or invisible people in the
organization. Often, they have personal
problems or vices that can be worked as well as
anger and desperation. In many cases, the case
officer will have to settle for an access agent
who can plant electronic surveillance devices.
EVALUATION
means personality profiling. The
prospect should be thoroughly and
evaluated in order to determine
their motives mental health. A
sufficient cover story is usually
created at this step. An adequate
cover story involves layers of
deception.
RECRUITING
Takes the form of meeting and getting to
know the target. A close, personal
relationship is cultivated, and trust is
built. It starts with small, personal
favors, an increase in rewards, and then
the final step of asking someone to
clearly betray their employer,
government, coworker, lover, etc...
Blackmail is used as a last resort if
psychological ploys fail.
TRAINING
involves teaching the spy how to use
specialized equipment and codes.
One of the other important things
the spy will want training in is
escape and evasion tactics. Training
should also involve coaching the
person in how to spend money.
HANDLING
is a term short for psychological handling
which usually involves the passing of control
from you to another, usually superior, case
officer. The handling off of spies is done for
several reasons: so they dont get too close to
their original recruiter; to make feel they are
getting better protection; and to make them
feel they are getting promoted. Often, it has
been your agency which has generated some
fear, convincing the spy that their mother or
other relative needs protection.
TERMINATION
is always done by the agency. The
most common reason given for
termination is budget problems.
Usually, the person is allowed to
immigrate and is given a new
identity, a desk job, and sometimes
a pension. Other times, they are
allowed to get caught or killed
Heterosexual Compromise
Homosexual Compromise
Nonsexual Compromise
CHAPTER FIVE
INTELLIGENCE OPERATIONS
INTELLIGENCE OPERATION
Its is result of intelligence planning,
planning is always ahead of
operation although an operation
although an operation can be made
without a plan, it is usually due to
sudden and inevitable situations but
definitely this is poor intelligence
management.
THE 14 OPERATIONAL
CYCLES
1.Mission and Target
Infiltration the insertion of action agent inside
the target organization Penetration recruitment
of action agent inside the target organization
2.Planning
3.Spotting
4.Investigation PBI/CBI
5. Recruitment the only qualification of an
agent is to have an access to the target
Training
7.Briefing
8.Dispatch
9.Communication Technical telephone/
radio, Non-technical personal meeting,
live drop/dead drop
10.Debriefing
Importance of Cover
1.Secrecy of operation against enemy
intelligence
2.Secrecy of operation against friendly
agencies who do not have the need to
know
3.Successful accomplishment of the
mission
Types of Cover
1.Natural Cover using actual or true
background
2.Artificial using biographical data
adopted for the purpose
3.Cover with in a Cover justification
of existence
4.Multiple Cover any cover you wish.
Hazards of Cover
1.Static
or
dormant
opposition
(ordinary citizen)
2.Unhostile
active
opposition
(Political Security agencies)
3.Hostile active opposition (enemy
intl. operatives)
Precautions in case of
Compromise
1.Move out immediately
2.Start new facility for operation and
develop it
3.Build entirely new cover
4.Use circuitous routes and provide
careful counter surveillance measures
5.Be specifically careful o former
contacts with non-intelligence personnel
ORGANIZATIONAL COVER
is an account consisting of
biographical which when adopted by
an individual will assume the
personality he wants to adopt.
Objectives: To camouflage and protect
operational personnel and their
activities Protect installation on which
clandestine activities are based.
UNDERCOVER ASSIGNMENT
is an investigation technique in
which agent conceal his official
identity an obtain information
from that organization.
Planning Undercover
Assignment
1.Determine level on which investigation
is intended
2.Develop appropriate cover and cover
story
3.Selection of qualified personnel
4.Consideration of all operational details
to include documentation, contract
reporting, housing and coverage
5.Briefing, coaching and rehearsals
Uses of Undercover
Assignment
1.Use independently to get first hand info
about the subject of investigation
Ex.
a)Security evaluation of every installation
b)Gain confidence of suspended persons
c)Agent penetration
d)Verify info from human resources
e)Undercover concealed identify
Types of Undercover
Assignment
1.Dwelling
2.Work
3.Social
4.Jurisdictional assignment
5.Combinational assignment
6.Rope job striking up friendship
with the subject
UNDERCOVER AGENT
special
qualifications:
Knowledge of the language,
Area background regarding
events, Knowledge about the
custom and habits, Physical
appearance, an artist.
Motivating Agents
1.Ideology believes in the principle
of lives
2.Patriotism
3. Remuneration
4. Career development
5. Fear
CONTROL
Agent Termination
Problems involve:
1.Amount of knowledge the agent has in
the operation and personnel
2.His inclination to use knowledge to the
disadvantages of the intelligence service
3.Moral obligation to the agent the
causes of loss incurred by him as a result
of his connection with the Intel service
Procuring Agents