You are on page 1of 154

POLICE INTELLIGENCE AND

SECRET
SERVICE
BY:HARRISON B.ROJAS
Topics
I. Nature and History of Intelligence
II. Police Intelligence Operations
III. Undercover Investigation
IV.Fundamentals of Cryptography:
Encoding and Decoding
V. Introduction to National Security
09/06/17 John B. David, Ph.D. 2
Introduction
Whatever I see or hear of a confidential
nature or that is confided to me in my
official capacity will be kept ever secret
unless revelation is necessary in the
performance of my duty.

(Excerpt from the Law Enforcement Code of Ethics)

09/06/17 John B. David, Ph.D. 3


Introduction
One of the secret strengths of the Intelligence Unit
lies NOT ON WHAT THE UNIT CAN DO, BUT
RATHER WHAT THE HOODLUMS BELIEVE IT CAN
DO.
The fostering of this image is essential in certain
quarters of the hoodlum activities. Strange as it
may seem, LIP SERVICE AND RUMORS plays a
major role. The primary purpose of Intelligence
Unit is to gather information. It is not a Law
Enforcement Unit.
09/06/17 John B. David, Ph.D. 4
Introduction
Know thy enemy and know yourself.
You need not fear the results of a
hundred battles. If you know yourself
and not the enemy, for every victory,
you are a fool who will meet defeat
in every battle.
Sun Tzu

09/06/17 John B. David, Ph.D. 5


Topic I:

Nature and History of


Intelligence

09/06/17 John B. David, Ph.D. 6


Intelligence
Intelligence means the collection, processing,
collation, interpretation, evaluation and
dissemination of information, with references
to national security. In certain context, it may
also mean the network or the system for the
collection, collation, interpretation,
evaluation, processing, and dissemination of
information.

09/06/17 John B. David, Ph.D. 7


Intelligence
Based on military terms, Intelligence is the
end product resulting from the collection,
evaluation, analysis, integration and
interpretation of all available information
which my have immediate or potential
significance to the development and execution
of plans, policies and programs of the users.

09/06/17 John B. David, Ph.D. 8


Functions of Intelligence in General
1. The collection or procurement of
information
2. The evaluation of the information
which then become intelligence
3. The dissemination of intelligence to
those who need it.
4. Counter intelligence- It is a defensive
function of intelligence.
09/06/17 John B. David, Ph.D. 9
Principles of Intelligence
1. Principle of Objectivity
2. Principle of Interdependence
3. Principle of Continuity
4. Principle of Communication
5. Principle of Usefulness
6. Principle of Selection
7. Principle of Timeliness
8. Principle of Security
09/06/17 John B. David, Ph.D. 10
The principle of objectivity
In intelligence, only the well guided succeed. It
is a basic intelligence concept that there be
unity between knowledge and action. It
follows therefore that intelligence should
interact and condition the decision.
Intelligence must be adapted to the needs of
the decision; it is both giver and taker. Action
or decision is planned by knowledge and
guided by it at every step.

09/06/17 John B. David, Ph.D. 11


The principle of Interdependence
Intelligence is artificially subdivided into
component elements to insure complete
coverage, eliminate duplication and to reduce
the overall task to manageable sizes.
Nevertheless, each subdivision remain as
essential part of unity; contributes
proportionately to the end result; possesses a
precise interrelationship; and interacts with
each other so as to achieve a balanced and
harmonious whole.
09/06/17 John B. David, Ph.D. 12
The Principle of Continuity
Intelligence must be continuous. It is
necessary that coverage be
continuous so that the shape of what
happens today could be studied in
the light of what was happened
before, which in turn would enable
us to predict the shape of things to
come.
09/06/17 John B. David, Ph.D. 13
The Principle of Communication
Intelligence adequate to their needs
must be communicated to all the
decision makers in manner that they
will understand and form that will
permit its most effective use. Above
all, it must be understood for
without understanding there is no
communication.
09/06/17 John B. David, Ph.D. 14
The Principle of Usefulness
Intelligence is useless if it remains in
the minds, or in the files of its
collectors or its producers. The story
must be told and it must be told well.
The story must be convincing and to
be convincing it must not only be
plausible or factual but its
significance must be shown.
09/06/17 John B. David, Ph.D. 15
The Principle of Selection
Intelligence involves the plowing through a
maze of information, the considering and
innumerable number of means or of picking
the most promising of a multitude of leads.
The requirement of decision-making covers
very nearly the entire span of human
knowledge. Unless there is selection of only
the most essential and the pertinent,
intelligence will go off in all directions in one
monumental waste of effort.
09/06/17 John B. David, Ph.D. 16
The Principle of Timeliness
Intelligence must be communicated to
the decision-maker at the appropriate
time to permit its most effective use.
This is one of the most important and
most obvious, for Intelligence that is
too soon or too late is equally useless.
Timeliness is one principle that
complements all the others.
09/06/17 John B. David, Ph.D. 17
The Principles of Security
Security is achieved by the measures
which intelligence takes to protect
and preserve the integrity of its
activities. If intelligence has no
security, it might be as well being run
like a newspaper to which it is
similar.

09/06/17 John B. David, Ph.D. 18


Historical Development of
Police and Military
Intelligence

(Selected Items)

09/06/17 John B. David, Ph.D. 19


Moses
One of the first recorded formalized intelligence efforts,
with format, can also be found in the Holy Bible Numbers
3:17. The scriptures also named the twelve intelligence
agents whom the Lord directed Moses to sent into the
land of Canaan and records that all those men were
heads of the children of Israel.
Rahab
The Harlot of Jericho (Joshua 2:1-21) who sheltered and
concealed the agents of Israel
Delilah
(Judges 16:9). Delilah was an impromptu intelligence
agent. Apart from her tonsorial specialty, she also allowed
sex to gain intelligence from a powerful enemy.

09/06/17 John B. David, Ph.D. 20


Sun Tzu
Sun Tzus book The Art of War was then a favorite
readings of Chinese Communist Tacticians. He further
wrote the saying in which most people in the intelligence
service believe became a parlance in the world of
intelligence.
Alexander the Great
He device the first letter sorting and opening to obtain
information.
Sertorius
The Roman commander in Spain who possessed a white
fawn and allowed it to be come widely known that he
derived both secrets and guidance from the fawn. His
intelligence agents credited their information to the
supernatural power of animals.
09/06/17 John B. David, Ph.D. 21
Akbar
The sagacious master of Hindustan employed more than
4,000 agents for the sole purpose of bringing him the
truth that his throne might rest upon it.
Genghis Khan
A Mongol who used intelligence to conquer China and
invade Cathay. He instructed his Generals to send out
spies and used prisoners as sources of information. The
leader of the so-called MONGOL CONQUERORS - made
use of effective propaganda machine by spreading
rumors of Mongol Terror. They collected information on
weaknesses and rivalries of Europe. They usually
disguised as merchants.

09/06/17 John B. David, Ph.D. 22


In England, SIR FRANCIS WALSINGHAM, Under
Queen Elizabeth, organized the first National
Intelligence Service. He employed spies on the staff
of the Admiral in Command of the Spanish Army and
able to obtain information regarding Spanish Army as
to their Ships, equipment, forces and stores. He
protected Queen Elizabeth I from countless
assassins.
In France, RICHLIEU introduced the network of
covert collectors who transmitted prompt and
accurate information to Paris regarding the activities
of the rebels and dissidents of the kingdom.

09/06/17 John B. David, Ph.D. 23


NAPOLEON BONAPARTE One Spy in the right place
is worth 20,000 men in the field Spy against spy was
of high proportion during his time wherein
counterespionage came into popular usage.
Hannibal
Disguise as a beggar to gather first hand
information.
Karl Schulmeister
Napoleons eye, Napoleons military secret, was
born on August 5, 1770. He began his career in
offensive espionage. Under a cover role, he was
able to infiltrate the Austrian General Staff.
09/06/17 John B. David, Ph.D. 24
Frederick the Great
Father of Organized Military Espionage. He has divided
his agents into four classes:
1. Common spies recruited among poor folk, glad to earn a
small sum or to accommodate a military officer.
2. Double spies, the low informers and unreliable
renegades of value chiefly in spreading false information
to the enemy.
3. Spies of Consequences couriers and noblemen, staff
officers, and kindred conspirators, invariable requiring a
substantial bribe or bait,
4. Persons who are forced to undertake espionage against
his will.
09/06/17 John B. David, Ph.D. 25
JULIUS CEASAR
During his time, the staff of each legion includes ten
speculators who served as an information-collecting
agency. The speculators were the first intelligence
personnel to appear definitely in a military organization.
Military success of the Romans was aided by
communication system. Made use of carrier pigeons,
which made possible the amazing speed with which
intelligence of Imperial Rome was transmitted. They also
employed ciphers to ensure secrecy of communications.
Wilhelm Stieber
Introduced military censorship and organized military
propaganda. He works as a census taker and developed an
informal form in the gathering of data.

09/06/17 John B. David, Ph.D. 26


Alfred Redl
Chief of the Austro Hungarian Secret Service - but in fact a
double agent of Russia. In 1913, his treason was discovered and
he was forced to commit suicide. His treason lead to the death
of 500,000 agents and soldiers combine in his 13 year espionage
episode.
Brahma Kautilya
In Ancient India, he overthrew the NANDA dynasty and
established the first MAYURYAN king in the Indian throne. He
recommended to his king that for the ruler to succeed, the ruler
should strike at his enemys weak points by means of spies.
Donovan
Major-General, organizer of the OSS, builder of a central
intelligence system. The OSS whose exploits become legendary
in World War II.

09/06/17 John B. David, Ph.D. 27


Battle of Midway
In June 1442, the turning point of the Naval in the Pacific. The
victory gained by the Americans was due to the disrupted
messages from the Imperial Japanese Navy.
Admiral Isoroku Yamamoto
April 1943, the Cryptoanalyst of the U.S. Navy
Communications Intelligence intercepted a top-secret signal
relaying the travel of the Admiral. En route he was intercepted
and crashed in the Jungles of Baungainville.
V2 Rackets
OSS agents working in conjunction with the British
Intelligence, through penetration and technical intelligence
discovered Punemundo which was the V2 guide missile
research project of Nazi Germany. It resulted to its destruction
and heavy bombing.
09/06/17 John B. David, Ph.D. 28
Fouche of France
The most feared and respected intelligence
director in French history. He created a network of
agent and founded the modern system of spying
on spies, which later was known as counter
espionage.
Joseph Petrosino
Member, New York Police Department in early
1900, he was the head of the Italian Squad.
Through extensive intelligence network, he is
credited to smash the Black Society.

09/06/17 John B. David, Ph.D. 29


Famous Intelligence Agencies in the World
1. Federal Bureau of Investigation
First established in 1908 as an investigative arm of the
U.S. Department of Justice. It becomes what is known as
the F.B.I. under its first director John Edgar Hoover in
1924. On September 6, 1939 by a presidential directive, it
came to its responsibility the task of a domestic
intelligence.
2. Central Intelligence Agency
The agency was created under the US National Security
Act of 1947. The law above the personnel of the Central
Intelligence group established by the late President
Truman in January 1946. The CIA is under the National
Security Council.
09/06/17 John B. David, Ph.D. 30
Famous Intelligence Agencies in the World
3. Committee for State Security of Russia: The
Intelligence agency known as the KGB - Komitet
Gosudarstvennoy Bezopasnosti (KGB),
counterpart of the CIA
4. Security Service (M15) and Secret Intelligence
Service (M16) of the United Kingdom
5. British Secret Service Great Britain
6. Mossad (The Institute for Intelligence and
Special Tasks) of Israel.

09/06/17 John B. David, Ph.D. 31


Famous Intelligence Agencies in the World
7. BND (Bundesnachrichtendienst) of West
Germany
8. KCIA or the Korean Central Intelligence
Agency of South Korea
9. RAW (Research and Analysis Wing) of India
10.CSIS (Canadian Security Intelligence Service)
11.ASIS (Australian Security Intelligence Service)
12.CNI (Centro Nacional de Inteligencia) of Spain

09/06/17 John B. David, Ph.D. 32


Famous Intelligence Agencies in the World

13.RED GESTAPO security service organized by


East Germany to combat the Covert activities
of the West Germany Group when it was still
divided by the Berlin Walls.
14.SOVIET INTELLIGENCE AMTORG was
organized for the purpose of purchasing all
kinds of materials for the Soviet Union.
15.DGSE (Direction Generale de la Securite
Exterieure) of France
09/06/17 John B. David, Ph.D. 33
Famous Intelligence Agencies in the World
16.ISI (Inter-Service Intelligence) of Pakistan
17.MSS (Ministry of State Security) of China
18.GID (General Intelligence Department) of
Japan
19.NICA (National Intelligence Coordinating
Agency) of the Philippines under E.O. 247,
July 24, 1987.

09/06/17 John B. David, Ph.D. 34


The Great Betrayals
JUDITH COPLON A political analyst of the Department
of Justice was accused of taking unlawful possession of
government documents and spying for a foreign power.
DR. EMIL JULIUS KLAUS FUCHS was accused of
releasing American Atomic Secrets to the Soviet in 1945
and British in 1947. He detailed knowledge of the
construction of Atomic bombs.
ERNST HILDING ANDERSON In 1951, a Royal Swedish
Navy provided military secrets to a foreign power and
was found guilty and sentences to life imprisonment.

09/06/17 John B. David, Ph.D. 35


Police Intelligence Defined
The end product resulting from the
collection, evaluation, analysis, integration
and interpretation of al available
information regarding the activities of
criminal and other law violators for the
purpose of affecting criminals and other
law violators for the purpose of affecting
their arrest, obtaining evidence, and
forestalling plan to commit crime.
09/06/17 John B. David, Ph.D. 36
Purposes of Police Intelligence
Check the condition of the community relating to
crime, vice, juvenile delinquency and indications of
subversion and insurgency.
Determine through counter intelligence applicant
matters pertaining to personnel security, physical
security and document security of the police
organization.
Determines the follow-up leads and helps in the
solution of individual criminal cases.
Identify criminal elements and other law breakers as
well as their associates.

09/06/17 John B. David, Ph.D. 37


Purposes of Police Intelligence
Assists in the arrest of wanted criminals and those
wanted under RA 1700 otherwise known as the Anti-
Subversion Law.
Check on the quality and effectiveness of the operation
of the police (PNP) forces.
Check on the security conditions of PNP Personnel,
funds, equipment and materials.
Help in crime control prevention.
Serve as a tool of management for planning and
organizational employment purposes.

09/06/17 John B. David, Ph.D. 38


The Principal Areas of Interest in Intelligence
Military offensive and defensive tactics, war
plans, strategic concepts and tactical principles,
organizations, installations, industrial lease,
armed forces, command structure, command
personnel, material, tactics, morale,
General topographical and hydrographic
characteristics, historical backgrounds
Diplomatic foreign policies, alliances,
diplomatic establishment, foreign service
personnel, technique of conducting foreign
relations
09/06/17 John B. David, Ph.D. 39
The Principal Areas of Interest in Intelligence
Economic
Financial Monetary policies, Currency structure,
Transactions, Institutions, Personalities
Commercial trade policies, markets, trading methods,
price policies, personalities
Industrial structure of Capacity, manufacturing plants
and processes, raw material, energy rotations, labor
relations, personalities
Mining Mineral Resources, Production method,
Output
Agriculture policies, crop structure, cultivation
method, mechanization, financing, specific
characteristics of rural population
09/06/17 John B. David, Ph.D. 40
The Principal Areas of Interest in Intelligence

Political ideology, traditions,


institutions, personalities, area of
friction
Communications and Transportation
telephones, telegraphs, wireless,
railways, shipping, automobiles and
trucks, highways, aviation, ownership,
policies, organization, personnel.
09/06/17 John B. David, Ph.D. 41
The Principal Areas of Interest in Intelligence

Social nationality structure, classes and


caste, historical factors, census, personal
aspects, characteristics and mentality of
people forces, social legislation, radio,
television, press, motion picture
Intelligence Organizations, Methods
and Personnel of Competing Intelligence
system

09/06/17 John B. David, Ph.D. 42


General Activities in Police Intelligence

Strategic Intelligence the intelligence


information which primarily long range in
nature with little practical immediate
operation value.
Line Intelligence which is of an
immediate nature and necessary for
more effective police planning and
operation.

09/06/17 John B. David, Ph.D. 43


General Activities in Police Intelligence
National Intelligence - it is the integrated
product of intelligence developed by all the
governmental branches, departments
concerning the broad aspect of national
security and policy. It is concerned to more
than one department or agency and it is not
produced by single entity. It is used to
coordinate all the activities of the government
in developing and executing integrated and
national policies and plans.
09/06/17 John B. David, Ph.D. 44
General Activities in Police Intelligence
Counter Intelligence phase of Intel covering the
activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of
info against espionage, subversion and sabotage.
Undercover Work is an investigative process in
which disguises and pretext cover and deception
are used to gain the confidence of criminal
suspects for the purpose of determining the
nature and extent of any criminal activities that
maybe contemplating or perpetuating.

09/06/17 John B. David, Ph.D. 45


Forms of Intelligence
Sociological Intelligence deals with the
demographic and psychological aspects of groups of
people.
Population and manpower
Characteristics of the people
Public opinion attitude of the majority of the
people towards matter of public policy.
Education based of literacy rate
Biographical Intelligence deals with individuals
personalities who have actual possession of power.

09/06/17 John B. David, Ph.D. 46


Forms of Intelligence
Armed Force Intelligence deals with the armed
forces of the Nation.
Position of the Armed Forces Constitutional and
legal basis of its creation and actual role.
Organizational structure and territorial disposition
Military manpower recruitment.
Order of Battle
Geographical Intelligence Deal with the progress of
research and development as it affects the economic
and military potential of a nation.

09/06/17 John B. David, Ph.D. 47


Types or Kinds of Intelligence
STRATEGIC INTELLIGENCE - An
intelligence data that are not of an
immediate value. It is usually descriptive
in nature, accumulation of physical
description of personalities, modus
operandi. It does not have immediate
operational value but rather long range
that may become relevant to future
police operations.
09/06/17 John B. David, Ph.D. 48
Types or Kinds of Intelligence
LINE INTELLIGENCE It is the kind of
intelligence required by the commander
to provide for planning and conduct
tactical and administrative operation in
counter insurgency. This pertains to
knowledge of People, Weather, Enemy,
Terrain (PWET) used in planning and
conducting tactical and administrative
operation in a counter insurgency.
09/06/17 John B. David, Ph.D. 49
Types or Kinds of Intelligence
Knowledge of People, Weather, Enemy, Terrain (PWET)
used in planning and conducting tactical and administrative
operation in a counter insurgency.
PEOPLE - Living condition of the people, Sources of
income, Education of the people, Govt livelihood
projects, Extent of enemy influence to the people
WEATHER Visibility, Cloudy, Temperature, Precipitation
(rain), Wind
ENEMY - Location of the enemy, Strength of the enemy,
Disposition, tactical capability, Enemy vulnerability
TERRAIN - Relief and drainage system, Vegetation,
Surface material, Man made features

09/06/17 John B. David, Ph.D. 50


Types or Kinds of Intelligence
COUNTER INTELLIGENCE (CI) (Negative Intel)
This kind of intelligence covers the activity
devoted in destroying the effectiveness of hostile
foreign activities and to the protection of info
against espionage, subversion and sabotage.
Three Activity of CI
Protection of information against espionage
Protection of personnel against subversion
Protection of installations and material against
sabotage

09/06/17 John B. David, Ph.D. 51


COUNTER INTELLIGENCE (Negative Intelligence)

Negative Intelligence is a generic


term meaning three different things;
1. Security Intelligence
2. Counter Intelligence
3. Counter-Espionage

09/06/17 John B. David, Ph.D. 52


COUNTER INTELLIGENCE (Negative Intelligence)

Security Intelligence means that the total sum of


efforts to counsel the following National Policies,
Diplomatic decisions, Military data, and any other
information of a secret nature affecting the
security of the nation form unauthorized persons.
The basics of security intelligence is concealment in
general
Counter Intelligence - Counter Intelligence is the
organized effort to protect specific data that might
be of value to the opponents own intelligence
organization.
09/06/17 John B. David, Ph.D. 53
COUNTER INTELLIGENCE (Negative Intelligence)
Counter-Espionage - In counter-espionage, negative
intelligence becomes a dynamic and active effort. Its purpose
is to investigate actual or theoretical violation of espionage
laws, to enforce those laws and to apprehend any violators. It
is a job to catch spies. It is basically a police function. A basic
requirement of the secret agent is disguise himself and his
mission. Much of his training and basic skill is dedicated to
concealment. He is supposed to be supplied with a foolproof
cover story and good documents. He must be a man of
exception ability or else he would not be chosen for this
intricate job. The trapping of the dark intruder is a formidable
talk. The aims of counter-espionage is to locate the enemy, to
identify the enemy, and to neutralize the enemy.

09/06/17 John B. David, Ph.D. 54


Five Categories of CI
1. Military Security
2. Port Frontier and Travel Security
3. Civil Security
4. Censorship
5. Special Operations

09/06/17 John B. David, Ph.D. 55


CI INVESTIGATION
CI INVESTIGATION is an activity that
constitutes the value of the CI
workload, worldwide and includes
specific investigation of individual
and incidence which for the most
part are conducted in an overt but
discreet manner.
09/06/17 John B. David, Ph.D. 56
Three types of CI INVESTIGATION
1. Denial Measure - Secrecy discipline,
Document security, Camouflage and
concealment, Communication security,
Military censorship, Counter reconnaissance
2. Detection Measure PSI, Security tag or pass
card, Challenge or password, Reconnaissance
3. Deception Measures - Ruse use of escape
and evasion, Dummy position, Fabricated
info
09/06/17 John B. David, Ph.D. 57
Three Categories of CI Operation
1. Counter Human Intel (HUMINT)
2. Counter Imagery Intel (IMINT)
3. Counter Signal Intel (SIGINT)

09/06/17 John B. David, Ph.D. 58


Counter Human Intel (HUMINT)
Seeks to overcome enemy
attempts to use human sources
to collect information or to
conduct sabotage and subversion

09/06/17 John B. David, Ph.D. 59


Counter Signal Intel (SIGINT)
Determine enemy SIGINT and
related EW capabilities and
activities, assess friendly
operations to identify patterns,
profiles and develop, recommend
and analyze counter measures.

09/06/17 John B. David, Ph.D. 60


The Intelligence
Cycle/Phases

09/06/17 John B. David, Ph.D. 61


09/06/17 John B. David, Ph.D. 62
The Evaluation Guide
Accuracy of Info Reliability of Info
A Confirmed by other sources 1 Completely Reliable

B Probably True 2 Usually Reliable

C Possibly True 3 Fairly Reliable

D Doubtfully True 4 Not Usually Reliable

E Improbable 5 Unreliable

F Truth cannot be Judged 6 Reliability cannot be judged

09/06/17 John B. David, Ph.D. 63


Evaluation Guide As to Source of Info

T Direct Observation by COMDR/CHIEF of a unit


U Report by PENETRATION AGENT or RESIDENT
AGENT
V Report by PNP/AFP Troops involved in encounter
W Interrogation of CAPTURED ENEMY
AGENT/FOREIGNER
X Observation of GOVT/CIVILIAN EMPLOYEE or
OFFICIAL
Z Documentary
09/06/17 John B. David, Ph.D. 64
Phase III: Processing the Collected Information
3. Interpretation it is establishing the meaning and
significance of the information. It involves the following
activities:
Analysis shifting and isolating those elements that
have significance in light of the mission or national
objective.
Integration combining the elements isolated in
analysis and known information to form a logical picture
or theory.
Deduction the formulation of conclusions from the
theory developed, tested and considered valid
determination of effort and meaning of the information.

09/06/17 John B. David, Ph.D. 65


Phase IV: Dissemination and Use
Processed information are disseminated through Annexes,
Estimates, Briefing, Message, Reports, Overlays, Summaries.
The criteria that must be observed in dissemination are:
Timeless must reach the users on time to be of value. It
must be disseminated in accordance with the urgency and
must reach the user in sufficient time to be use.
Propriety the message must be clear, concise and
complete, as well as in the proper form for the receiver to
readily understand its contents. It must be disseminated to
the correct user, presented in a form that lends itself to
immediate use and distributed by the most effective
means appropriate to both time and security
requirements.
09/06/17 John B. David, Ph.D. 66
Methods of Dissemination
Fragmentary orders from top to bottom
of the command
Memorandum, circulars, special orders
Operations order, oral or written
Conference staff members
Other report and intelligence documents
Personal Contact
09/06/17 John B. David, Ph.D. 67
Who are the users of intelligence?
National Leaders and Military/Police
Commanders formulation and
implementation of national policies.
Advisors and Staff preparations of plans and
estimates
Friendly nations or other branches of the
armed forces.
Processor basis for evaluation and
interpretation.
09/06/17 John B. David, Ph.D. 68
Topic II:

Police Intelligence
Operations

09/06/17 John B. David, Ph.D. 69


Police Intelligence
The end product resulting from the collection,
evaluation, analysis, integration and
interpretation of al available information
regarding the activities of criminal and other
law violators for the purpose of affecting
criminals and other law violators for the
purpose of affecting their arrest, obtaining
evidence, and forestalling plan to commit
crime.

09/06/17 John B. David, Ph.D. 70


Purposes of Police Intelligence
Check the condition of the community relating to
crime, vice, juvenile delinquency and indications of
subversion and insurgency.
Determine through counter intelligence applicant
matters pertaining to personnel security, physical
security and document security of the police
organization.
Determines the follow-up leads and helps in the
solution of individual criminal cases.

09/06/17 John B. David, Ph.D. 71


Purposes of Police Intelligence
Assists in the arrest of wanted
criminals and those wanted under
RA 1700 otherwise known as the
Anti-Subversion Law.
Check on the quality and
effectiveness of the operation of the
police (PNP) forces.

09/06/17 John B. David, Ph.D. 72


Purposes of Police Intelligence
Check on the security conditions of PNP
Personnel, funds, equipment and
materials.
Help in crime control prevention.
Serve as a tool of management for
planning and organizational employment
purposes.

09/06/17 John B. David, Ph.D. 73


Different Task involve in Police
Intelligence Operation
Discovery and identification activity,
Surveillance, Liaison Program, Informant
Management, Clipping Services,
Debriefing, Relevant Miscellaneous
Activities, Casing, Utilization of Informant
for planning and organizational
employment purposes.

09/06/17 John B. David, Ph.D. 74


THE 14 OPERATIONAL CYCLES
Mission and Target Infiltration the insertion of action
agent inside the target organization Penetration
recruitment of action agent inside the target organization
Planning Spotting - Investigation - PBI/CBI -
Recruitment - the only qualification of an agent is to
have an access to the target Training Briefing
Dispatch - Communication - Technical telephone/radio,
Non-technical personal meeting, live drop/dead drop -
Debriefing - Payments depends upon the motivation -
Disposition involve activity on rerouting, retraining,
retesting, termination Reporting - Operational Testing

09/06/17 John B. David, Ph.D. 75


Information and its Sources
INFORMATION all evaluated materials of every
description including those derived fro
observation, reports, rumors, imagery, and other
sources from which intelligence in produced.
Information is a communicated knowledge by
others obtaining by personal study, investigation,
research, analysis, observation. The use of
modern gadgets in intelligence and other things
and material that possess or contain a desire
information or knowledge.

09/06/17 John B. David, Ph.D. 76


Two General classifications of sources
of information

1. Open Sources 99% of the info


collected are coming from open
sources.
2. Close Sources 1% of info from
close sources.

09/06/17 John B. David, Ph.D. 77


Overt Intelligence
Is the gathering of information or
documents procured openly without regard
as to whether the subject or target become
knowledgeable of the purpose.
Open Sources: Includes information taken
from: Enemy activity, POW, Civilians,
Captured documents, Map, Weather,
forecast, studies, report, Agencies

09/06/17 John B. David, Ph.D. 78


Covert Intelligence
Is the secret procurement of information,
which is obtained without the knowledge of
the person or persons safeguarding vital
intelligence interest.
Close Sources: information are usually taken
through: Surveillance, Casing, Elicitation,
Surreptitious Entry, Employment of technical
means (Bugging and Tapping device), Tactical
Interrogation, Observation and Description
(ODEX).
09/06/17 John B. David, Ph.D. 79
Persons as sources of information
Informant Net It is a controlled group of people who
worked through the direction of the agent handler. The
informants, principal or cutouts supply the agent
handler directly or indirectly with Intel information
Informants people selected as sources of
information, which could be voluntary, or in
consideration of a price.
Informant refers to a person who gives
information to the police voluntarily or involuntarily
with out any consideration
Informer those who give information to the police
for price or reward
09/06/17 John B. David, Ph.D. 80
Types of Informants
1. Criminal Informant an informant who give information to the
police pertaining to the underworld about organized criminals
with the understanding that his identity will be protected
2. Confidential Informant is similar to the former but he gives
information violate of the law to includes crimes and criminals
3. Voluntary Informant a type of informant who give
information freely and willfully as a witness to a certain act
4. Special Informant those who gives information concerning
specialized cases only and it is regarded a special treatment by
the operatives (ex. teachers, businessmen)
5. Anonymous Informant those who gives information through
telephone with the hope that the informant can not be
identified

09/06/17 John B. David, Ph.D. 81


Sub-type of Informant
1. Incidental Informant a person who casually imparts
information to an officer with no intention of providing
subsequent information
2. Recruited Informant A person who is selected cultivated and
developed into a continuous source of info
Spontaneous or Automatic Informant Informants who by
the nature of their work or position in society have a certain
legal, moral or ethical responsibilities to report info to the
police
Ordinary run of he Mill Informants Informants that are
under the compulsion to report info to the police
Special Employee informants who are of a specific
operational nature

09/06/17 John B. David, Ph.D. 82


Cover and Undercover
Cover - the means by which an individual group
of organization conceals the true nature of its
acts and or existence from the observer.
Cover story a biographical data through
fictional that will portray the personality of the
agent he assumed, a scenario to cover up the
operation
Cover Support an agent assigned in target
areas with the primary mission of supporting
the cover story.
09/06/17 John B. David, Ph.D. 83
Types of Cover
1. Natural Cover using actual or true
background
2. Artificial using biographical data
adopted for the purpose
3. Cover with in a Cover justification of
existence
4. Multiple Cover any cover you wish.

09/06/17 John B. David, Ph.D. 84


Organizational Cover
Is an account consisting of biographical
which when adopted by an individual will
assume the personality he wants to
adopt - To camouflage and protect
operational personnel and their activities
and protect installation on which
clandestine activities are based.

09/06/17 John B. David, Ph.D. 85


Undercover Assignment

Is an investigative technique in
which agent conceal his official
identity an obtain information
from that organization

09/06/17 John B. David, Ph.D. 86


Types of Undercover Assignment
Dwelling
Work
Social
Jurisdictional Assignment
Combination of Assignment
Rope job striking up friendship with the
subject

09/06/17 John B. David, Ph.D. 87


Undercover Agent
Special qualifications:
Knowledge of the language,
Area background regarding events,
Knowledge about the custom and
habits,
Physical appearance,
An artist

09/06/17 John B. David, Ph.D. 88


Methods of Covert Intelligence
1. Surveillance
2. Casing
3. Elicitation
4. Surreptitious Entry
5. Employment of technical means (Bugging
and Tapping device)
6. Tactical Interrogation
7. Observation and Description (ODEX)

09/06/17 John B. David, Ph.D. 89


SURVEILLANCE
A form of clandestine investigation
which consist of keeping persons,
place or other targets under physical
observation in order to obtain
evidence or information pertinent to
an investigation.

09/06/17 John B. David, Ph.D. 90


Important Terms in Surveillance
Pre-Surveillance Conference a conference held
among the team members, the police intelligence
unit before surveillance is conducted.
Surveillance Plan established type of personnel,
the general and specific instructions for surveillance,
the operational limitations, signals and special
instruction.
Area Target Study All available information about
the areas should be collected and analyzed.
Surveillant a person who conducts surveillance
through observations.
09/06/17 John B. David, Ph.D. 91
Important Terms in Surveillance
Stakeout or Plant is the observation of
places or areas from a fixed point.
Tailing or Shadowing it is the observation of
a persons movement.
Undercover Man a person trained to
observe and penetrate certain organization
suspected of illegal activities and later reports
the observation and informations that proper
operational action can be made.

09/06/17 John B. David, Ph.D. 92


Important Terms in Surveillance
Liaison Program this is the assignment of trained
intelligence personnel to other agencies in order to
obtain information of police intelligence value.
(Agencies like the press, credit agencies, labor
unions, tel. Companies)
Safe-house is a place, building., enclosed mobile,
or an apartment, where police undercover men meet
for debriefing or reporting purposes.
Drop any person is a convenient, secure and
unsuspecting place where police undercover men
meet his action agent for debriefing or reporting
purposes.
09/06/17 John B. David, Ph.D. 93
Important Terms in Surveillance
Convoy an accomplice or associate of the subject
used to avoid or elude Surveillant.
Contact ant persons whom the subject picks or
deals with while he is under observation and
identifies the observer.
Made when subject under surveillance becomes
aware that he is under observation and identifies the
observer.
Lost when the surveillant does not know the
whereabouts of his subject or the subject had eluded
the surveillance.
09/06/17 John B. David, Ph.D. 94
Type of Surveillance
According to Intensity and Sensitivity
1. Discreet subject person to be watch is
unaware that he is under observation
2. Close subject is aware that he is under
observation varied on each occasions
3. Loose applied frequently or
infrequently, period of observation
varied on each occasion.

09/06/17 John B. David, Ph.D. 95


Type of Surveillance
According to Methods
1. Stationary this is observation of place usually a
bookie stall, a gambling, joint, a residence where
illegal activities are going on (fixed position)
2. Moving surveillance follow the subject from the
place to place to maintain continuous watch of his
activities
3. Technical this is a surveillance by the use of
communications and electronic hardwares,
gadgets, system and equipment

09/06/17 John B. David, Ph.D. 96


Special Equipment (Technical Support)

1. Camera with telephoto lens


2. Moving Picture camera
3. Binoculars
4. Tape recording apparatus
5. Wire tapping device
6. Other instrument miniaturized one-
way radio, etc.

09/06/17 John B. David, Ph.D. 97


Methods available to Employ

1. Surveillance of Place or CASING


2. Tailing or shadowing (1-2-3 man
shadow)
3. Undercover Investigation

09/06/17 John B. David, Ph.D. 98


Basic Preparations
Study of the Subject (Name, Address, Description,
Family and Relatives, Associates, Character and
Temperament, Vice, Hobbies, Education, etc)
Knowledge of the area and Terrain (Maps, National
and religious backgrounds, Transportation, Public
Utilities)
Subversive Organization (History and Background,
Biography of the Official, Identity and Background of
members and former members, Method of
identification employed by the members, Files and
records, nature, location and accessibility, Meeting)

09/06/17 John B. David, Ph.D. 99


CASING
It is reconnaissance or
surveillance of a building, place
or area to determine its
suitability for Intelligence use or
its vulnerability in operations.

09/06/17 John B. David, Ph.D. 100


Method of Casing
Personal Reconnaissance the most effective method
and will produced the most info since you know just
what youre looking for.
Map Reconnaissance it may not sufficient but it can
produce a certain amount of usable info
Research - much info can be acquired through
research
Prior Information your unit and of the unit will have
file report that they may provide you with info
Hearsay info usually gain by the person operating in
the area and performing casing job

09/06/17 John B. David, Ph.D. 101


Information desired in Casing
Area condition and habit a description of the
locality as whether the place is a residential,
commercial, highly urbanized, rural, etc.
Active Opposition enemy
Disposal Plan disposal of the information in
case of possible compromise.
Escape and Evasion the exist planning in case
of emergencies, from immediate focal point,
the general area and completely from the area.

09/06/17 John B. David, Ph.D. 102


OBSERVATION and DECRIPTION (ODEX)
Observation a complete and accurate
observation by an individual of his
surroundings an encompasses the use of all
the major sense to register and recognized its
operational or Intel significance
Description the actual and factual reporting
of ones observation of he reported sensory
experience recounted by another

09/06/17 John B. David, Ph.D. 103


Psychologist estimate that
approximately :
85% of our knowledge is gathered
through sight
13% through our hearing
2% through the other three senses

09/06/17 John B. David, Ph.D. 104


Psychological Processes for accurate
observation
Attention consist of he psychological process
involve in becoming aware of an existence of
fact
Perception involved in the understanding this
fact of awareness
Report involved in identifying the name in one
own mind and some fact which has been
perceive, narrated and identified

09/06/17 John B. David, Ph.D. 105


ELICITATION
It is a system or plan whereby
information of Intelligence value is
obtained through the process of
direct intercommunication in which
one or more of the parties to the
common is unaware of the specific
purpose.
09/06/17 John B. David, Ph.D. 106
Two Devices in the conduct of
Elicitation
1. Approach process of
setting people to start talking
2. Probe to keep the people
talking incessantly

09/06/17 John B. David, Ph.D. 107


Types of Approach
1. Flattery people are susceptible to praise
a) Teacher Pupil Approach
b) Kindred Soul Approach the subject has been place
in a pedestal having some specialized quality and you
flatter him/her by showing enough concern for
his/her welfare to pay special attention to his
enjoyment
c) Good Samaritan Approach
2. Provocative Approach discover a wide range of
conventional gambits. Ex. Joe Blow Approach is I
know the answer to everything approach. The elicitor
adopts the attitude of being approachable in any field.
09/06/17 John B. David, Ph.D. 108
Types to Probe
1. Competition Probe this is effective when used
in connection with the teacher pupil approach
2. Clarity Probe used to elicit additional info in an
area which the response is clear
3. His Pressure Probe it serves to pin down a
subject in a specific area or it maybe used to point
out contradictions in what the subject has said
4. Hypothetical Probe presents a hypothetical
situation and to get he subject to react to the
hypothetical situations

09/06/17 John B. David, Ph.D. 109


Tactical Interrogation
The need for obtaining
information of highest degree of
credibility on the minimum of
time.

09/06/17 John B. David, Ph.D. 110


Important Terms in TI
Interrogation the systematic asking of questions to
elicit information in the minimum of time.
Interrogator - person who does the questioning.
Interrogee any person who is subjected to the
interrogation process in any of its forms and phases.
Suspect any person believed to be associated with
prohibited activity
Source a person who for any reason submits
information of intelligence interest usually on a
voluntary basis

09/06/17 John B. David, Ph.D. 111


Important Terms in TI
Witness any person who has direct knowledge of facts
concerning an event or activity.
Screening initial examination of an interrogee to
determine the extent of his knowledge of persons, places,
things or events in which we are interested.
Provocateur an individual from enemy forces who is
deliberately introduce in our custody with a specific mission
of causing some unfavorable action or reaction on our part.
Formal Interrogation - the systematic attempt to exploit to
an appropriate depth those are of he interrogees
knowledge which have been identified in the screening
process.

09/06/17 John B. David, Ph.D. 112


Important Terms in TI
Debriefing the interrogation of a friendly
interrogee who has information at the direction of or
under the control of the friendly intelligence service.
Interview Similar to a debriefing although it is less
formal and the interrogee is not necessarily under
the control or employment of he respective
intelligence service
Interrogation Report an oral or written statement
of information by the questioning f an interrogee

09/06/17 John B. David, Ph.D. 113


Form of Interrogation
1. Direct the subject is aware of the fact that
he is being interrogated, but he may not
learn the true objectives of the interrogation.
This is being used extensively at the tactical
lever.
2. Indirect the subject is not aware that he is
being interrogated. This is used when time is
not so important

09/06/17 John B. David, Ph.D. 114


Techniques in TI
The Open Techniques the interrogator is open and
direct in his approach and makes no attempts to
conceal the purpose of the interrogator. It is best
employed when the interrogee is cooperative. It is
frequently used at the tactical level where time is a
major interrogator.
The Common Interest Technique the interrogator
must exert effort to impress the interrogee of their
common interest. The interrogator must look for he
point out the real advantages the interrogee will
receive if he cooperates.

09/06/17 John B. David, Ph.D. 115


Techniques in TI
Record File (we know all technique) the interrogator
prepare a file on the source listing all known information
(record should be padded to make it appear to be very
extensive)
Exasperation Techniques (Harassment) effectively
employed against hostile type interrogee. The interrogator
must be alert because the interrogee may fabricate
information to gain relief from irritation (monotype).
Opposite Personality Technique also known as Mutt and
Jeff, Threat and Rescue, Bud Guy God Guy, Sweet
and Sour, Sugar and Vinegar, Devil and Angel.

09/06/17 John B. David, Ph.D. 116


Techniques in TI
Egotist Techniques (Pride and Ego) Described him as
the best effective on the source who have been looked
down upon by his superiors or comrade.
Silent Technique employed against nervous or the
confident type of interrogee.
Question Barrage Technique (Rapid Fire
Questioning) intended to confuse the interrogee and
put him into a defensive position. The interrogee
become frustrated and confused, he will likely reveal
more than he intended, thus creating opening for
further questioning.

09/06/17 John B. David, Ph.D. 117


Topic III:

Undercover
Investigation
09/06/17 John B. David, Ph.D. 118
Preparation for undercover work
should be sufficiently thorough:
1. To preclude compromise;
2. To minimize danger to the undercover
operative; and
3. To ensure the ultimate success of the
investigation.

09/06/17 John B. David, Ph.D. 119


Undercover investigation
should not be attempted
until other investigative
techniques have failed or
are deemed impractical.

09/06/17 John B. David, Ph.D. 120


Factors to consider before undercover
investigation is initiated:
1. The exact result desired
2. Jurisdiction
3. The importance of the investigation
4. Available planning information
5. Availability of qualified personnel
6. The equipment and preparation necessary
7. Danger to the investigator involved.

09/06/17 John B. David, Ph.D. 121


Qualifications for Undercover
Operatives
Undercover work as a selective
assignment requires that the investigator
possess, in addition to certain general
qualifications, specific qualifications
required in the type of investigation
being conducted.

09/06/17 John B. David, Ph.D. 122


General Qualifications of Undercover
Operatives
1. Well-trained and experienced
2. A calm, collected and resourceful
individual with good judgment and wit
3. Complete self-confidence to feel
absolutely certain that he can
successfully play the part of the
character he will assume.

09/06/17 John B. David, Ph.D. 123


General Qualifications of Undercover
Operatives
4. Courage and ability to meet unforeseen
situations with quick, sound decisions.
5. Will power to avoid drugs and excessive
use of intoxicants.
6. Ability to avoid unwise entanglements
with women involved in the case or
associated with the subject.

09/06/17 John B. David, Ph.D. 124


Specific Qualifications of Undercover
Operatives
1. Ability to act out an assumed role
2. Good memory in an investigation in which
no notes can be taken or report submitted.
3. Skill adaptable to the occupation assumed.
4. Physical appearance and capabilities
consistent with his assumed qualifications.

09/06/17 John B. David, Ph.D. 125


Specific Qualifications of Undercover
Operatives
5. Well-grounded in the lingo and techniques of
the subject criminal operations
6. In special situations, the undercover
investigator should possess certain linguistic
abilities, hobbies, sports, musical talent and
personal background for the particular and
undercover assignment.

09/06/17 John B. David, Ph.D. 126


SOP for
Undercover
Operative

09/06/17 John B. David, Ph.D. 127


1. Authority for undercover operations
must be from the top officer of the
organization, for this requires
coordination with other agencies.
2. The fewest number of persons must
know the undercover operation.
Otherwise, the investigation or the
operative himself might be jeopardized.

09/06/17 John B. David, Ph.D. 128


3. The background or cover story
regarding the assumed identity of the
undercover operative must be such
that he can easily win the confidence
of the suspect or organization sought
to be infiltrated, and should seldom be
wholly fictitious.
4. Badge and credentials must never be
carried.

09/06/17 John B. David, Ph.D. 129


5. A weapon should only be carried if it is
consistent with the background story.
6. Provide safe communication systems
between the undercover agent and
headquarters relaying information or
instructions.
7. Arrangements for drops and safe houses
must be made and, if necessary, the
undercover operative himself may be placed
under surveillance.

09/06/17 John B. David, Ph.D. 130


8. The undercover operative must never pose as
a criminal unless no other approach appears
adequate.
9. The role of the undercover operative is to
gather information or evidence against the
suspect(s) or the organization, never to
instigate the commission of a crime.
10.Plans for the operation must provide actions
or alternatives in case the undercover is
arrested.

09/06/17 John B. David, Ph.D. 131


Reminders for Undercover Operatives
1. Act as natural as possible.
2. Do not overplay the part.
3. Do not indulge in any activity, which is
not in conformity with the assumed
identity.
4. Do not use intoxicants except to play the
part.

09/06/17 John B. David, Ph.D. 132


Reminders for Undercover Operatives
5. Do not make notes unless they are
to be mailed or passed immediately:
(Use codes and never place return
address in letters and envelopes).
6. Limit association with women
except if necessary to play the part

09/06/17 John B. David, Ph.D. 133


General concept of Surveillance
In the investigation of a certain case, a point is
reached when the investigator sometimes finds it
difficult to secure leads through questioning of
the complainant and witnesses. In such a
situation, the investigator has to go to the filed to
locate the criminal or, if he is known, to study his
habits, movements and possible accomplices in
the commission of the crime.

09/06/17 John B. David, Ph.D. 134


Definition and Objectives
Surveillance is the discreet observation of places, persons
and vehicles for the purpose of obtaining information
concerning the identities or activities of subjects.
Objectives of Surveillance:
To detect criminal activities
To discover the identity of persons who frequent the
establishment and determine their relationship.
To discern the habits of a person who lives in or
frequents the place.
To obtain evidence of a crime or to prevent the
commission of a crime.

09/06/17 John B. David, Ph.D. 135


Shadowing or Tailing
It is the act of following a person. Its
objectives are:
To detect evidenced of criminal activities.
To establish the association of a suspect
To find a wanted person
To protect a witness

09/06/17 John B. David, Ph.D. 136


Types of Shadowing or Tailing
1. Loose Tail is employed when a general
impression of the subjects habits and associates
is required.
2. Rough Shadowing without special precautions
may be used where the criminal must be
shadowed and he is aware of this fact; or where
the subject is a material witness and must be
protected from harm or other undesirable
influences.
3. Close Tail surveillance is one is which extreme
precautions are taken against losing the subject.
09/06/17 John B. David, Ph.D. 137
Roping or Undercover Work
It is a form of investigation in which the
investigator assumes a different and
unofficial identity (a cover story) in order
to obtain information.
The general objective of an undercover
investigation is to obtain more
information.

09/06/17 John B. David, Ph.D. 138


Arrest of Undercover Agent
If the Police arrested an Undercover investigator,
he must act in accordance with orders. If he has
not received orders regarding the disclosure of
his identity in case of arrest by other law
enforcement officers, he must act according to
his judgment. In such a case, if retaining his
assumed character does not serve a useful
purpose, the investigator should refuse to make a
statement except to a member of his own
organization.

09/06/17 John B. David, Ph.D. 139


Topic IV:

Fundamentals of
Cryptography

09/06/17 John B. David, Ph.D. 140


Cryptography
Is the art and science of codes and
ciphers. This is done through the use of
Telephone Scrambler or technically
speaking, a Speech Inverter whereby
essential speech frequencies are divided
to produce a scrambled speech when
intercepted.

09/06/17 John B. David, Ph.D. 141


Definition of Important Terms
Coding is the changing of message
from plain clear text to unintelligible
form. Otherwise known as
Encrypting.
Decoding is the transforming of
message into plain text. Otherwise
known as Decrypting.
09/06/17 John B. David, Ph.D. 142
Secret Codes commonly used by
Intelligence Officers and Operatives
1. One-Time Pads (OTP) is used for
secret communications by all
Intelligence Agencies in the world.
2. Invisible Writing
3. Code Word
4. Morse Code is a code based on
dashes and dots.
09/06/17 John B. David, Ph.D. 143
Topic V:

Introduction to National
Security

09/06/17 John B. David, Ph.D. 144


National Security
Is defined as the protection of the nations
people and territories from physical assault.
In this sense, national security was properly
equated with national defense, and the
threats to a nations security.
Basis of National Security is NATIONAL
INTEREST.

09/06/17 John B. David, Ph.D. 145


National Interest
the general and continuing end for which a
nation acts. The term national interest is
used to refer to the general concept of
national security and well-being.
(The Philippine National Interests) includes
self-preservation, freedom and independence,
territorial integrity, political stability, and
socio-economic welfare.

09/06/17 John B. David, Ph.D. 146


National Security Policies
It refers to those political, economic, psycho-
social and military instruments which
government adopt in order to cope with the
various threats and obstacles to their
NATIONAL SECURITY and/or to develop,
explore or use opportunities presented to
enhance the attainment of national goals and
uphold the interest of the nation.

09/06/17 John B. David, Ph.D. 147


National Principles and Polices
1. That our country shall be a Republican State
2. That the defense of the state shall be the concern of all
citizens.
3. That we, as a people, renounce war to further our national
interests.
4. That our government shall promote social justice.
5. That as a matter of concept, civilian authority is supreme at
all times over the military. This concept is actualized when
the President assumes at the same time the position of the
Commander-in-Chief of the AFP.

09/06/17 John B. David, Ph.D. 148


END

GOOD LUCK TO ALL!

09/06/17 John B. David, Ph.D. 149


Mock Board Exam

09/06/17 John B. David, Ph.D. 150


1. It is a pre-arranged hidden location for
depositing and picking up of messages and
money in a clandestine manner without the
parties involved being present at the same
time.
A. Live Letter Box
B. Dead Letter Box
C. Depository Box
D. Secret Box

09/06/17 John B. David, Ph.D. 151


2. Refers to Male Agent employed to seduce women to engage
in espionage.
A. Aging Cover
B. Swallow
C. Raven
D. Spotting
3. Places where organized crime groups usually or normally
store or conceal their armaments, vehicles or other
equipment prior to or immediately after each criminal
activity.
A. Staffhouses
B. Safehouses
C. Stashhouses
D. Drophouses
09/06/17 John B. David, Ph.D. 152
4. Refers to falsified documents and material prepared by an
undercover agent to make his cover story more credible.
A. Backstops
B. Black List
C. Aging Cover
D. Compartmentation
5. An A- 1 intelligence report means
A. The information comes from reliable sources and is possibly
true
B. The information comes from reliable sources is probably
true
C. The information comes from reliable sources but it is
doubtfully true
D. The information completely reliable and is confirmed by
other sources
09/06/17 John B. David, Ph.D. 153
Answer Key

1. B
2. C
3. C
4. A
5. D

09/06/17 John B. David, Ph.D. 154

You might also like