You are on page 1of 92

Police Intelligence

&
Secret Service

1
“If you know the enemy and know yourself, you need not fear the
result of a hundred battles.”
“If you know yourself and not the enemy, for every victory, you are
a fool who will meet defeat in every battle” - SUN TZU

“Against organized crime, internal affairs


in my defensive arm; Intelligence is my offensive arm.” – W. Parker
Definition of Terms

• National Intelligence – the total product of intelligence developed by al


l governmental agencies that cover the broad aspects of national
policy and security.
• Military Intelligence – it is used in the preparation of military policies, p
lans and programs. It includes the strategic and combat intelligence
.
• Strategic Intelligence – that knowledge pertaining to the capabilities a
nd probable courses of action of foreign nations.
• Combat Intelligence – is required by the commander in order to deter
mine the best use of his available firepower and maneuver forces, t
o accomplish his mission, and to maintain the security of his command.
• Counter Intelligence – an integral part of all intelligence operations an
d as such can’t be separated from combat and strategic intelligence. Its
objective is to safeguard information against espionage, material and in
stallations against sabotage, and personnel against subversive
• Technical Intelligence – concerns foreign technical developments, which have
a practical military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.

• Area of Operation – those aspects of the operational environment exclusive of


the military/police forces involved. It concerns weather economics, politics, socio
logy, hydrographic (study of seas, lakes, etc.) and characteristics of the environ
ment of an area in which military/police operations are taking place or planned.

• Capabilities – form a police/military standpoint, enemy capabilities are courses


of action which the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader
national standpoint, capabilities of a nation are the available, workable, courses
of action to accomplish national objectives.

• Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it s


usceptible to any action, which reduces its war, potential, and or its will to fight.
HISTORICAL FEATURES

MOSES
One of the first recorded formalized intelligence efforts, with format, can als
o be found in the Holy Bible Numbers 13:17

“And Moses sent them to spy out the land of Canaan and said unto them, g
et you up this way southward, and go up into the mountain; and see the lan
ds, what it is; and the people that dwell therein, whether they are strong
or weak, few or many; and what the land they dwelt in, whether in tent
s, or in strongholds; and what land is; whether it be fat or lean, wheth
er there be wood therein, or not. And be of good courage and bring of
the fruit of the land.” The scriptures also named the twelve intelligence ag
ents whom the Lord directed Moses to sent into the land of Canaan and rec
ords that “all those men were heads of the children of Israel.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN

SHAMMUA THE SON OF ZACCUR – Tribe of Reuben


SHAPAT THE SON OF HORI – Tribe of Simeon
CALEB THE SON OF JEPHUNNEH – Tribe of Judah
IGAL THE SON OF JOSEPH – Tribe of Issachar
HOSHEA THE SON OF NUN – Tribe of Ephraim
PALTI THE SON OF RAPHU – Tribe of Benjamin
GADDIEL THE SON OF SODI – Tribe of Zebulun
GADDI THE SON OF SUSI – Tribe of Joseph, that is from the Tribe of Manasseh
AMMIEL THE SON OF GEMALLI – Tribe of Dan
SETHUR THE SON OF MICHAEL – Tribe of Asher
NAHBI THE SON OF VOPSHI – Tribe of Napthali
GEUEL THE SON OF MACHI – Tribe of Gad
RAHAB
The Harlot of Jericho (Joshua 2:1-21)” who sheltere
d and concealed the agents of Israel, made a
covenant with the agents and duped their pursuers.
She was not only an impromptu confederate of
immense value for the Jewish leader of that far
distant day, but also established a plot-pattern
which is still of periodic relief to motion picture
producers.
DELILAH
The Philistine used her when she allowed Philistine
spies to hide in her house (Judges 16). Delilah
was an impromptu intelligence agent. Apart from
her tonsorial specialty, she also allowed sex to gain
intelligence from a powerful enemy. She achieved
the largest effective force of her employer’s
adversaries and contriving the stroke which put that
force out of action”.
IMPORTANT EVENTS AND PERSONALITIES
IN THE WORLD OF INTELLIGENCE

Sun –Tzu
A Chinese philosopher, creator of the “The Art
of War”
“Information must be obtained from men who
knew the enemy situation.”
“Know thy enemy and know yourself, you nee
d not fear the results of a hundred battles”
“If you know yourself and not the enemy, for e
very victory, you are a fool who will meet defe
at in every battle.”
Alexander the Great

When Alexander the Great was marching to


Asia, were rumors of disaffection growing
among his allies and mercenaries, he sought
the truth, and got it by simplest expedient by
devising the first “letter sorting” and opening to obtain
information.
Sertorius
He was the Roman Commander in Spain who possessed a
White Fawn and allowed it to become widely known - that
he derived secrets and guidance from the fawn. His
intelligence agents credited their information to the
supernatural power of animals.

Akbar
He was known to be the sagacious master of the
Hindustan. He employed more than 4,000 agents for the sole
purpose of bringing him the truth that his throne might rest
upon it.
Genghis Khan

He was known “The Great Mongol”, who used intelligence to


conquer China and invade Cathay. He instructed his Generals
to send out spies and used prisoners as sources of
information. The leader of the so-called MONGOL
CONQUERORS - made use of effective propaganda machine
by spreading rumors of Mongol Terror, they collected
information on weaknesses and rivalries of Europe.
The leaders usually disguised as merchants.
• RENAISSANCE PERIOD

With the rise of Nationalism and development of modern armies, intelligenc


e became apparent to large states. In England, Sir Francis Walsingham,
under Queen Elizabeth, organized the first National Intelligence Service. H
e employed spies on the staff of the Admiral in Command of the Spanish Ar
my and able to obtain information regarding Spanish Army as to their ships,
equipment, forces and stores. He protected Queen Elizabeth I from countle
ss assassins.

In France, Richlieu – introduced the network of covert collectors who trans


mitted prompt and accurate information to Paris regarding the activities of t
he rebels and dissidents of the kingdom.

Louis XIV – systematized political policy, continuous surveillance, postal c


ensorship and military intelligence organization were his contributions.
The French Intelligence System continued since 15th Century.

Napoleon Bonaparte once said, “One Spy in the right place is


worth 20,000 men in the field”. He organized two Bureaus of Int
erest: Bureau of Intelligence – which consolidate all incoming i
nformation regarding the enemy for presentation to the emperor
and to obtain information as desired, and Topographic Bureau
– which maintains a large map which covers the latest informati
on regarding both enemy and friendly forces. He maintained Mili
tary Intelligence and Secret Political Police Service all over Euro
pe. His main arm was “Spy against spy” concept.
Frederick the Great

He was known as the “Father of Organized Military Espionage”

He has divided his agents into four classes:


• Common spies – those recruited among poor folk, glad to earn a s
mall sum or to accommodate as military officer.
• Double spies – are unreliable renegades, chiefly involved in sprea
ding false information to the enemy.
• Spies of Consequences – couriers and noblemen, staff officers, an
d kindred conspirators, requiring a substantial bribe or bait,
• Persons who were forced to undertake espionage against their ow
n will.
Hannibal
He was considered one of the brilliant military strategists in the history of
military intelligence. He had developed an effective intelligence system
for 15 years in Rome. He usually roam around the city often disguise
himself as a beggar to gather first hand information.
Julius Caesar
During his time, the staff of each Roman Legion includes ten
“speculators” who served as an information-collecting agency.
The “speculators” were the first intelligence personnel to appear definitely
in a military organization. Military success of the Romans was aided by
communication system. Made use of carrier pigeons, which made possible
the amazing speed with which intelligence of Imperial Rome was
transmitted. They also employed ciphers to ensure secrecy of communicati
ons.
• George Washington
Conspirator under oath abounds in the history of every nation. George Washin
gton was grand master in intelligence. He mobilized the Free Masons of the c
olonies at the outbreak of the American war of Independence.

• Karl Schulmeister
He was Napoleon’s eye, Napoleon’s military secret, born on August 5, 1770.
He began his career in offensive espionage under a cover role. He was able t
o infiltrate the Austrian General Staff.

• Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further d
evice military censorship and organized military propaganda. He introduced mi
litary censorship and organized military propaganda. He works as a census ta
ker and developed informal gathering of data.

• Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he
became Chief of the Austro – Hungarian Secret Service. He became a dou
ble agent of Russia.
Brahma Kautilya

In Ancient India, he overthrew the Nanda Dynasty and establish


ed the first MAYURYAN king in the Indian throne. He recomme
nded to his king that for the ruler to succeed, the ruler should stri
ke at his enemy’s weak points by means of spies. He proposed t
he following means to conquer enemy’s stronghold: Intrigues an
d spies - Winning over enemy’s people - Siege and assault - Bef
ore beginning military operation, a conqueror should know the c
omparative strength and weaknesses of himself and his enemy.
No war should be undertaken without careful examination of all f
actors reported by the kings’ spies.
• Maj. General Donovan
He was the organizer of the OSS, builder of a central intelligence syste
m - OSS whose exploits become legendary in World War II.
• V2 – Rackets - OSS agents working in conjunction with the British Intel
ligence, through penetration and technical intelligence discovered Pune
mundo which was the V2 guide missile research project of Nazi Germa
ny. It resulted to its destruction and heavy bombing.
• Battle of Midway
In June 1442, the turning point of the Naval in the Pacific, the victory ga
ined by the Americans was due to the disrupted messages from the Im
perial Japanese Navy.
• Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of the U.S. Navy Communication
s Intelligence intercepted a top-secret signal relaying the travel of the A
dmiral. En route, he was intercepted and crashed in the Jungles of Bau
ngainville.
• State Informer
Edward I, King of England in 1725 organized a systematic police syste
m so called Witch and Ward. By Royal proclamation, the profession “St
ate Informer “was created in 1734 enjoining all informers to expose cri
minal activities and be compensated.
• Joseph Fouche
“Father of Police Intelligence Operations”. A Frenchman born in 17
59, rose to become the most feared and respected intelligence director
in French history. He created a network of agent. His assistance found
ed the modern system of spying on spies, which later was known as co
unter espionage. Father of Military Espionage in France.
• Joseph Petrosino
He was member of the New York Police Department in early 1900, he
was the head of the Italian Squad. Through extensive intelligence netw
ork, he was credited to smash and neutralization of the Black Society.
• Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of Justice and
became what is known as the F.B.I. under its first director John Edgar Hoover in 1924.
On September 6, 1939 by a presidential directive, it came to its responsibility the task o
f a domestic intelligence.

• Central Intelligence Agency - The agency was created under the US National Securi
ty Act of 1947. It was the Central Intelligence group established during the time of Presi
dent Truman in January 1946. The CIA was under the National Security Council.

• Committee for State Security - Russia - The Intelligence agency known as the KGB -
Komitet Gosudarstvennoy Bezopasnosti (KGB)

• British Secret Service – Great Britain

• Mossad – Israel, the number 1 Intelligence Agency in the world.

• Britain: Scotland Yard, London Metropolitan Police Force


It was established by Sir Robert Peel in 1829 which signaled the beginning of a colorful
legendary police force and considered one of the most efficient in the world today.
Intelligence and the World Wars

WORLD WAR 1

• 1900 – Europe powers developed modern staff systems and place intelligence on the same
level with personnel, operations and logistics. Intelligence then functioned in time of peace
and war. Intelligence during this period, concentrated on information about the armed forces
of the enemy and their capabilities. AIRCRAFT was introduced as a method of conducting a
erial reconnaissance. WIRELESS TELEGRAPH was used wherein CODES AND CIPHERS
were applied. ARMY INTELLIGENCE rapidly expanded during this period.

• GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness throughout


Europe but declined at the outset of the war.

• BRITISH INTELLIGENCE – succeeded greatly by means of censorship and its CODE ROO
M combined with skillful use of COVERT agents.

• US expanded their NAVAL INTELLIGENCE wherein DOMESTIC COUNTERINTELLIGENC


E became a principal activity. At this time US created three branches of its Intelligence Syst
em: POSITIVE BRANCH – function of collecting evaluating and disseminating intelligence.
Prepare situation estimate and translate documents; NEGATIVE BRANCH – it is the counte
rintelligence functions which involve in investigating disloyalty and sedition, investigate ene
my activities, investigate graft and fraud in organization; GEOGRAPHIC BRANCH – Produc
es maps, photographs, and terrain studies. SECTIONS - Administration, Collection by attac
hes and troops, Codes and ciphers
WORLD WAR II

• GERMAN INTELLIGENCE – started the war with the world’s best organized inte
lligence service through advance preparation of intelligence accompanied by tro
op movements. GERMAN INTELLIGENCE WEAKENED by the attitude of the O
fficer Group wherein they subordinated intelligence to operation and did not rega
rd intelligence assignment worthy of a soldier.

• JAPANESE INTELLIGENCE – failed because it was not provided with sufficient


number of trained personnel to assemble and evaluate the mass of materials wh
ich were collected although Japanese Intelligence was involved in short war and
defensive in nature.

• BRITISH INTELLIGENCE – the delay in the use of German V-BOMB against the
m was their main achievement during this time.

• In 1942 – a female special agent was able to transmit vital information concernin
g the activities and installations of the main research station at Penemuenda. Its
intelligence failed in the defeat of GENERAL MONTGOMERY’S forces at ANNH
EIM.
• US INTELLIGENCE – In 1941, The US Strategic Service was established to research and a
nalyze military, political and economic information as it affected the security of the country.
US JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the navy
in the collection and analysis of strategic information and to be responsible for the planning
and operation of special services. US greatest contribution to intelligence was the developm
ent of the AMPHIBIOUS WARFARE where coordination of many types of intelligence activiti
es was required to provide adequate knowledge of the successful operation of a complex mi
litary force transported over water with the objective of establishing itself on an enemy – hel
d shore against opposition. US successes in WW II were based on personnel drawn from CI
VILIAN POPULACE, BUSINESS AND PROFESSIONAL MEN AND WOMEN.

• CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police to condu
ct espionage and counterespionage against Japanese Spies and Chinese communist.

• SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds
of materials for the Soviet Union.

• SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence conc
erned with disaffection among Soviet troops and anti-communism in any form. Its five major
divisions are: Administration, Operation, Investigation, Prosecution, and Personnel.
POST WAR PERIOD: The superpowers

• Soviet Intelligence System


SOVIET COUNTERINTELLIGENCE known as “IRON CURTAIN” signified that no one may
cross the borders of the USSR without being detected. This means that all communications
are rigidly controlled. Its contribution to modern intelligence was the dissemination of false i
nformation designed to mislead and confuse opponents and prospective victims. The MGB
– MILITARY INTELLIGENCE AND THE MINISTRY OF STATE SECURITY formerly NKGB
was concerned on political espionage and propaganda abroad and for the control of espiona
ge activities of foreign communist countries. The KGB resumed the former function of the ol
d MGB. It is now the official secret police agency of the Soviet Union, in charge of the state
security KGB means (Commission of State Security) K- Omissija G- Osudarstyennoj B – Ez
opasnosti or Komitet Gosudarstvennoy Bezopasnosti

• British Intelligence System


It is composed of several intelligence agencies such as the BRITISH MILITARY INTELLIGE
NCE DIVISION (MID) which is divided into 20 different departments. The M15 – devoted to
counterespionage and security. It is the special branch of the SCOTLAND YARD charged wi
th guarding the Royal Family and important British officials and Visiting Foreign Dignitaries.
• French Intelligence System
The SDECE DE DOCUMENTATION EXTERIEURE ET DEER CONTRE ESPIO
NAGE (SDECE-FOREIGN Intelligence and counterintelligence Service) was und
er the office of the Prime Minister. GENERAL CHARLES DE GAULLE set up the
Bureau Central de Renseignements et d’ Action (BCRA Central Office for Intellig
ence and Action in London in 1940. It is an expansion of the Service De Reassig
nments (SR-Intelligence Service which is a part of the Old Renzieme Bureau (S
econd Bureau) of the French General Staff. SDECE concerned on Strategic and
Counterintelligence while SURETE NATIONALE became part of French Intellige
nce Service.

• German Intelligence System


The RED GESTAPO which serves as security service organized by East Germa
ny to combat the covert activities of West Germany Group when Germany was s
till divided by the Berlin Walls.

• United States Intelligence System


The CIA and the FBI – the CIA is one among the biggest in the world in terms of
intelligence networking. CIA and the FBI and the other state/ federal units of intel
ligence services were US main intelligence agencies.
Agents of Betrayal
Intelligence is sometimes described as a “world of deceit and betrayal”
. Some of the high personalities which evidence this description are:

 JUDITH COPLON, a political analyst of a Department of Justice, was


accused of taking unlawful possession of government documents and
spying for a foreign power.
 DR. EMIL JULIUS KLAUS FUCHS was accused of releasing America
n Atomic Secrets to the Soviet in 1945 and to the British in 1947. He
detailed knowledge of the construction of atomic bombs.
 ERNST HILDING ANDERSON was a Royal Swedish Navy who provi
ded military secrets to a foreign power and was found guilty and sente
nces to life imprisonment in 1951.
ESSENTIAL INTERESTS IN INTELLIGENCE

Intelligence Defined

• Webster defines intelligence as the capacity for understanding and for other form
s of adaptive intellect of behavior; the mind in operation; the power of meeting an
y situation, especially a novel situation, successfully by proper behavior adjustme
nts; the ability to apprehend the interrelationships of presented facts in such a wa
y as to guide action towards goal; knowledge of an event, circumstances, etc., re
ceived or imparted; the gathering or distribution of information; the staff of person
s engaged in obtaining such information.

• Base on Psychology- Intelligence is the capacity of a person to adjust to new situ


ations through the use of what has been previously learned.

• According to Government - Commission Task Force - It means the collection, pro


cessing, collation, interpretation, evaluation and dissemination of information, wit
h references to national security. In certain context, it may also mean the networ
k or the system for the collection, collation, interpretation, evaluation, processing,
and dissemination of information. “The term as used here doesn’t include any pol
ice powers or authorities, any investigative function other than those involve in th
e collection of information nor any function involved in the enforcement of laws, o
rders, or regulation.
According to Military Terminologies - Intelligence is the end pr
oduct resulting from the collection, evaluation, analysis, integ
ration and interpretation of all available information which my
have immediate or potential significance to the development a
nd execution of plans, policies and programs of the users.

• According to Police Parlance - The end product resulting from


the collection, evaluation, analysis, integration and interpretati
on of al available information regarding the activities of crimin
al and other law violators for the purpose of affecting criminal
s and other law violators for the purpose of affecting their arre
st, obtaining evidence, and forestalling plan to commit crime.
The Principal Areas of Interest

• Military – offensive and defensive tactics, war plans, strategic conc


epts and tactical principles, organizations, installations, industrial le
ase, armed forces, command structure, command personnel, materi
al, tactics, morale,
• General – topographical and hydrographic characteristics, historical
backgrounds
• Diplomatic – foreign policies, alliances, diplomatic establishment, f
oreign service personnel, technique of conducting foreign relations
• Political – ideology, traditions, institutions, personalities, area of fric
tion
• Communications and Transportation – telephones, telegraphs, w
ireless, railways, shipping, automobiles and trucks, highways, aviati
on, ownership, policies, organization, personnel
• Social – nationality structure, classes and caste, historical factors, ce
nsus, personal aspects, characteristics and mentality of people forces
, social legislation, radio, television, press, motion picture

• Intelligence – organizations, methods and personnel of competing in


telligence system

• Economic - On economics, the areas are on:

Financial – Monetary policies, Currency structure, Transactions, In


stitutions, Personalities
Commercial – trade policies, markets, trading methods, price policies, pe
rsonalities
Industrial – structure of Capacity, manufacturing plants and processes, ra
w material, energy rotations, labor relations, personalities
Mining – Mineral Resources, Production method, Output
Agriculture – policies, crop structure, cultivation method, mechanization,
financing, specific characteristics of rural population
Principles of Intelligence

• Objectivity - in intelligence, only the well guided succeed. It is a basic in


telligence concept that there must be unity between knowledge and acti
on. It follows therefore that intelligence should interact and condition th
e decision. Intelligence must be adapted to the needs of the decision; it
is both giver and taker. Action or decision is planned by knowledge and
guided by it at every step.

• Interdependence - Intelligence is artificially subdivided into component


elements to insure complete coverage, eliminate duplication and to red
uce the overall task or manageable sizes. Nevertheless, each subdivisi
on remains as essential part of unity; contributes proportionately to the
end result; possesses a precise interrelationship; and interacts with eac
h other so as to achieve a balanced and harmonious whole.

• Continuity - Intelligence must be continuous. It is necessary that covera


ge be continuous so that the shape of what happens today could be stu
died in the light of what happened before, which in turn would enable u
s to predict the shape of things to come.
• Communication - Intelligence adequate to their needs must be commun
icated to all the decision makers in manner that they will understand an
d form that will permit its most effective use.

• Usefulness - Intelligence is useless if it remains in the minds, or in the fi


les of its collectors or its producers. The story must be told and it must
be told well. The story must be convincing and to be convincing it must
not only be plausible or factual but its significance must be shown.

• Selection - Intelligence should be essential and pertinent to the purpose


at hand. Intelligence involves the plowing through a maze of informatio
n, considering innumerable number of means or of picking the most pro
mising of a multitude of leads. The requirement of decision-making cov
ers very nearly the entire span of human knowledge. Unless there is sel
ection of only the most essential and the pertinent, intelligence will go o
ff in all directions in one monumental waste of effort.
• Timeliness - Intelligence must be communicated to th
e decision maker at the appropriate time to permit its
most effective use. This is one of the most important
and most obvious, for Intelligence that is too soon or t
oo late are equally useless. Timeliness is one principl
e that complements all the others.

• Security - Security is achieved by the measures whic


h intelligence takes to protect and preserve the integri
ty of its activities. If intelligence has no security, it mig
ht be as well being run like a newspaper to which it is
similar.
General Activities

• Strategic Intelligence – it is an intelligence activity which is primarily long range in nature with little
practical immediate operation value.

• Line Intelligence – it is an intelligence activity that has the immediate nature and value necessary f
or more effective police planning and operation.

• National Intelligence - it is the integrated product of intelligence developed by all the governmental
branches, departments concerning the broad aspect of national security and policy. It is concerned
to more than one department or agency and it is not produced by single entity. It is used to coordin
ate all the activities of the government in developing and executing integrated and national policies
and plans.

• Counter-Intelligence – phase of intelligence covering the activity devoted in destroying the effectiv
eness of hostile foreign activities and to the protection of info against espionage, subversion and sa
botage.

• Undercover Work – is an investigative process in which disguises and pretext cover and deception
are used to gain the confidence of criminal suspects for the purpose of determining the nature and
extent of any criminal activities that maybe contemplating or perpetuating.
Functional Classification
of Police Intelligence

• Criminal Intelligence – refers to the knowledge essent


ial to the prevention of crimes and the investigation, arr
est, and prosecution of criminal offenders.
• Internal Security Intelligence – refers to the knowledg
e essential to the maintenance of peace and order.
• Public Safety Intelligence – refers to the knowledge e
ssential to ensure the protection of lives and properties.
Forms of Intelligence

• Sociological Intelligence – deals with the demographic and psychological as


pects of groups of people. It includes the population and manpower and the ch
aracteristics of the people, public opinion – attitude of the majority of the peopl
e towards matter of public policy and education.

• Biographical Intelligence – deals with individual’s personalities who have act


ual possession of power.

• Armed Force Intelligence – deals with the armed forces of the nation. It inclu
des the position of the armed forces, the constitutional and legal basis of its cr
eation and actual role, the organizational structure and territorial disposition, a
nd the military manpower recruitment and Order of Battle

• Geographical Intelligence – deals with the progress of research and develop


ment as it affects the economic and military potential of a nation.
THREE KINDS OF INTELLIGENCE

 Strategic Intelligence – as defined earlier, it is an intelligence data t


hat are not of an immediate value. It is usually descriptive in nature, a
ccumulation of physical description of personalities, modus operandi.
It does not have immediate operational value but rather long range th
at may become relevant to future police operations.

 Line Intelligence – It is the kind of intelligence required by the comm


ander to provide for planning and conduct tactical and administrative
operation in counter insurgency. This pertains to knowledge of Peopl
e, Weather, Enemy and Terrain (PWET) used in planning and conduc
ting tactical and administrative operation in a counter insurgency.
Intelligence information to be determined in Line Intelligence are:

• People - living condition of the people, sources of income, educati


on of the people, government livelihood projects, extent of enemy i
nfluence to the people
• Weather – visibility, cloudy, temperature, precipitation (rain), wind
• Enemy - location of the enemy, strength of the enemy, disposition,
tactical capability, enemy vulnerability
• Terrain - relief and drainage system, vegetation, surface material,
man made features. There are military aspects of terrain which incl
udes cover and concealment, obstacle, critical key terrain features,
observation and fields of fire, and avenues of approach.
• Counter Intelligence (CI) - this kind of intelligence covers the a
ctivity devoted in destroying the effectiveness of hostile foreign a
ctivities and to the protection of info against espionage, subversi
on and sabotage. Hence, the three activities of CI are: protection
of information against espionage; protection of personnel agains
t subversion; and protection of installations and material against
sabotage.

Measures in CI must be both passive and active. Passive meas


ures are those measures which seek to conceal info from the en
emy while active measures are those which seek actively to bloc
k the enemy’s efforts to gain info or engage in espionage, subve
rsion or sabotage.
Counter Intelligence is also known as Negative Intelligence - a generic term
meaning three different things;

• Security Intelligence – means that the total sum of efforts to counsel the nation
al policies, diplomatic decisions, military data, and any other information of a sec
ret nature affecting the security of the nation form unauthorized persons. It is an
effort to deny information to unauthorized persons by restricting to those who are
explicitly authorized to possess it.

• Counter-Intelligence - counter intelligence is the organized effort to protect spe


cific data that might be of value to the opponent’s own intelligence organization.
Some of its functions are: Censorship – of the following: correspondence, broad
cast, telecast, telephone conversations, telegrams and cables, etc., prevention o
f the dissemination of any information that might aid an opponent; maintenance
of files of suspect; surveillance of suspects; mail reading, wire tapping and recor
ding; infiltration of the enemy intelligence organized to procure information about
its method, personal, specific operations and interest.

• Counter-Espionage - In counter-espionage, negative intelligence becomes a dy


namic and active effort. Its purpose is to investigate actual or theoretical violation
of espionage laws, to enforce those laws and to apprehend any violators.
Five Categories of CI Operation

• Military Security – it encompasses the measures taken by a


• command to protect itself against espionage, enemy operation,
sabotage, subversion or surprise. Examples are:
Secrecy discipline - Special safeguarding of classified informati
on - Security of troop movement - Special handling of weather
& escapes - Counter subversion with in the armed forces - Tact
ical measures in combat area

• Port Frontier and Travel Security – has to do with the applica


tion of both military and civil security measures for CI control at
point of entry and departure, international borders or boundarie
s. Examples are:Security screening and control of frontier Secu
rity control of merchants, seaman and crew of commercial aircr
aft, Security control of frontier crossing point
Security control of seaports
• Civil Security – it encompasses active and passive CI measure
s affecting the non-military nationals permanently or temporarily
residing in an area under military jurisdiction. Examples are: Sys
tematic registration of civilians and aliens
Control of circulation, Curfew, Surveillance of suspected political
organizations, Security screening of labor, Issuance of passes a
nd permits, Control of internal commerce

• Censorship – it is the control and examination of the civil, natio


nal, armed forces, field press, and POWs.

• Special Operations – counter subversion, sabotage and espion


age
Categories of CI Operation

• Counter Human Intel (HUMINT) – seeks to overcome enemy a


ttempts to use human sources to collect information or to cond
uct sabotage and subversion which includes CI special operati
ons, liaison, counter security, and CI screening.

• Counter Imagery Intel (IMINT) - includes action taken to deter


mine enemy SIGINT and related enemy weaknesses, capabilit
ies and activities. These actions include surveillance radar, ph
oto thermal and infrared systems. Successful counter – IMINT
operations rely heavily on pattern and movement analysis and
evaluation of the enemy.

• Counter Signal Intel (SIGINT) – determine enemy SIGINT and


related enemy weaknesses, capabilities and activities, assess
friendly operations to identify patterns, profiles and develop, re
commend and analyze counter measures.
THE INTE LLIGE NCE CYCLE

PHASE 1

PLANNING THE COLLECTION


EFFORT
PHASE 2

COLLECTION OF
INFORMATION

PHASE 4
MISSION
DISSEMINATION AND USE
OF INFORMATION

PHASE 3

PROCESSING THE
COLLECTED INFORMATION
PHAS E 1
Planning the Collection E ffort

This phase of the cycle involve the determination o


f the requirements of intelligence. It is concerned
with identifying the so called Essential Element of I
nformation (E E I) - an item of intelligence or inform
ation of the characteristics of the area of operations
and
the enemy, which the commander feels he needs
before he needs before he can reasonably arrive at a
decision.
• What are their capabilities and vulnerabilities?
• What are the physical characteristics of the probable area
of operation?
• What major policies, plans and decisions must be made in
the near future?
• What step must be taken to preserve the security of the
• nation?
• What is the information required by the higher, lower or
adjacent echelons within the government or armed forces?
PHASE 2
Collection of information

This phase of the cycle is concerned with identification of the collecting


agency, the formulation of procedures on the manner of collecting the
information in conjunction with the plans as achieved in phase one.

• Methods of Collection – information can be collected through overt


method (open system) or covert method (secret/clandestine).
• Collecting Agencies – depending on the type of operation, the
collecting agency could be Government Agencies, Intelligence units, or
Organizations
Trade Crafts – includes the use of photography, investigations / elicitation /
interrogation, surveillance, sound equipment, surreptitious entry – keys and
locks, use of an artist, communication
PHASE 3
Processing the Collected Information

• This phase of the cycle is concerned with the examination and collation of all
collected information.

Steps in Processing Raw Information

Collection – organization of raw data and information into usable form;


grouping similar items of information so that they will be readily accessible.
Recording – is the reduction of info into writing or some other form of graphical
representation and the arranging or this info into writing or some form of graphical
representation and the arranging of this into groups of related items. Police log book
and J ournal, Intel-work S heet - Intel F iles, S ituation Maps - R ouges Gallery,
Modus Operandi F iles
E valuation – examination of raw information to determine intelligence value,
pertinence of the information, reliability of the source and agency, and its credibility
or truth of information.
E valuation is the determination of the pertinence of the info to the operation,
reliability of the source of or agency and the accuracy of the info.
RELIABILITY ACCURACY
A - Completely 1 - Confirmed by
reliable other
B - Usually reliable 2 - Probably true
C - Fairly reliable 3 - Possibly true
D - Not usually 4 - Doubtfully true
reliable 5 - Improbable
E - Unreliable 6 - Truth cannot be
F - Reliability cannot judged
be judged
As to S ource of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured E nemy
X- Observation of gov’t/civilian employee
Y – Observation from populace
Z- Documentary
PHASE 4
Dissemination & Use of Information

This phase of the cycle refers to the activities of


transferring the processed information to the proper
users, most particularly the authority that requires the
activity. Processed information can be disseminated
through annexes, estimates, briefing, message,
reports, overlays, and or summaries.
Methods of Dissemination
• Fragmentary orders from top to bottom of the
command
• Memorandum, circulars, special orders
• Operations order, oral or written
• Conference – staff members
• Other report and intelligence documents
• Personal Contact
Who are the users of intelligence?
• National leaders and military commanders – formulation
and implementation of national policies.
• Advisors and S taff – preparations of plans and estimates
• Friendly nations or other branches of the armed forces.
• Processor – basis for evaluation and interpretation.
• Head / chairman of an organization
• Any person with authority for purposes of planning.
INFORMATION
AND ITS SOURCE S

INFORMATION IS THE LIF E-B LOOD


OF INTE LLIGENC E

NO INFORMATION = NO INTE LLIGENC E

Intelligence is Knowledge = Knowledge is


POWE R !
INFORMATION

Information refers to all evaluated materials of every description


including those derived from observation, reports, rumors,
imagery, and other sources from which intelligence in produced.
Information is a communicated knowledge by others obtaining by
personal study, investigation, research, analysis, observation.

Two General classifications of sources of information:

• Open S ources – 99% of the information collected are coming


from open sources.
• Close S ources – 1% of information are collected from close
sources.
• Overt Intelligence – is the gathering of information or documents
procured openly without regard as to whether the subject or target
become knowledgeable of the purpose Open Sources: Includes information
taken from
• E nemy activity
• POW and Civilians
• Captured documents
• Map - Weather, forecast, studies, report - Agencies

• Covert Intelligence – is the secret procurement of information, which is obtained


without the knowledge of the person or persons safeguarding
vital intelligence interest.
Close Sources : Include information which maybe taken through:
• S urveillance
• Casing and E licitation
• S urreptitious entry
• E mployment of technical means (Bugging and Tapping device)
• Tactical Interrogation
• Observation and Description (ODE X)
PE RSONS AS SOURCE S OF INFORMATION

Informant Net – It is a controlled group of people who


worked through the direction of the agent handler. The
informants, principal or cutouts supply the agent handler
directly or indirectly with Intel information

Informants (Asset) – people selected as sources of


information, which could be voluntary, or in consideration
of a price.
• Informant – refers to a person who gives information to the
police voluntarily or involuntarily with out any consideration
• Informer – those who give information to the police for
price or reward
Types of Informants

• Criminal Informant – an informant who give information to the police per


taining to the underworld about organized criminals with the understand
ing that his identity will be protected

• Confidential Informant – is similar to the former but he gives information


violate of the law to includes crimes and criminals

• Voluntary Informant – a type of informant who give information freely


and willfully as a witness to a certain act

• Special Informant – those who gives information concerning specialized


cases only and it is regarded a special treatment by the operatives
(ex. teachers, businessmen)

• Anonymous Informant – those who gives information through telephone


with the hope that the informant can not be identified
Sub-type of Informant
• Incidental Informant – a person who casually imparts information
to an officer with no intention of providing subsequent information
• Recruited Informant – A person who is selected cultivated
and developed into a continuous source of info

Categories of Recruited Informants :


• Spontaneous or Automatic Informant – Informants who by
the nature of their work or position in society have a certain
legal, moral or ethical responsibilities to report info to the police
• Ordinary (out-of-their-will) Informants – those under the
compulsion to report info to the police
• Special E mployee – informants who are of a specific operational
nature
Other Classification of Informant
Other terms related to people who gives
information are Automatic Informant, Penetrating
Agent , Infiltrating Agent , Full time Informant , Rival –
Elimination Informant, False Informant, Frightened
Informant, Self- aggrandizing Informant, Mercenary
Informant , Double Crosser Informant , Woman
Informant , Legitimate Informant.
Motives of Informants
People give information to the police due to
various reasons. Their motives include reward,
revenge, fear and avoidance of punishment,
friendship, patriotism, vanity, civic-mindedness,
repentance, competition, and other motives.
INFROMANT RE CRUITME NT

• Selection – it is particularly desirable to be able to identity and recruit an infor


mant who has access to many criminal in-group or subversive organization.
Wide access is probably the single most important feature in the consideration of
recruiting the potential informant
• Investigation – the investigation of the potential informants that has tentatively
identified as a “probable” must be as thorough as possible. It must establish possible
existing motives as to this person might assist the police Intel community. F ailure to
do so will deny this office who must perform the approach and persuasion phase with
little more that a guess. If necessary, conduct complete background investigation
(CBI)
• Approach – must be done in a setting from which might include pleasant su
rroundings, perhaps a confidential apartment, completely free form any probabilit
y of compromise, preferably in an adjacent city or a remote area foreign to the info
rmants living pattern.
• Testing – the testing program should begin, of course, with the limited assignm
ent, with a gradual integration into the more important areas. The occasional testi
ng of an informant should continue through the entire affiliation
INTE LLIGENCE OPE RATIONS

Intelligence Operations is the result of intelligenc


e planning, planning is always ahead of operation
although an operation can be made without a plan,
it is usually due to sudden and inevitable situations
but definitely this is poor intelligence management
THE 14 OPERATIONAL CYCLE S

• Mission and Target


Infiltration – the insertion of action agent inside the target organization
Penetration – recruitment of action agent inside the target organization
• Planning
• S potting
• Partial Background Investigation (P BI) or Complete Background Investigation
• Recruitment - the only qualification of an agent is to have an access to the target
• Training
• Briefing
• Dispatch
• Communication - technical method like telephone/radio, non-technical method like personal meetin
g, live drop or dead drop
• Debriefing
• Payments – depends upon the motivation of informant
• Disposition – involve activity on rerouting, retraining, retesting, termination
• Reporting
• Operational Testing
COVE R AND UNDE RCOVE R

• Cover - the means by which an individual group of


organization conceals the true nature of its
acts and or existence from the observer.
• Cover story – a biographical data through
fictional that will portray the personality of
the agent he assumed, a scenario to cover up
the operation
• Cover Support – an agent assigned in target
areas with the primary mission of supporting the
cover story.
• Undercover Assignment – is an investigative technique in which agent conceal his
• official identity an obtain information from that organization

Uses of Undercover Assignment


Use independently to get first hand info about the subject of investigation like:
a) S ecurity evaluation of every installation
b) Gain confidence of suspended persons
c) Agent penetration
d) Verify info from human resources
e) Uncover concealed identity

S upplement other investigative techniques like:


a) Playing ground works for raids and searches by going entry
b) To assist in locating evidence
c) To install, maintain investigative equipments of undercover assignment
THE UNDE COVE R AGE NT
S pecial qualifications include knowledge of the language, area
background regarding events, knowledge about the custom and
habits, physical appearance, and must be an artist.

Factors considered in Selecting Cover Story


• Mutual Point of Interest
• J ustification of presents
• Previous and permanent address
• E fficiency of role and freedom from the movement
• Means of communication
• S ocial and financial status
• Optional alternate plan
• S afe departure
Selecting Action Agents

• Placement – location of prospective agent with respect to


the target.
• Access – it is the capability of a prospective agent to obtain
the desired info for the Intel organization or to perform to
Intel collection mission in the area.
• Primary Access – it is the access to the desired info
• Secondary Access – it is the access to the desired info thr
ough a principal source where the latter has the direct acce
ss
• Outside Access – the agent is employed outside the target a
nd merely monitor info from a third person who is monitoring
info n the area
CONTROL – authority to direct the agent to carryout task or requirement on be
half of the clandestine organization in an acceptable manner and security

Two Categories of Control


• Positive Control – is characterized by professionalism and rapport like Agent
motivation and Psychological control
• Negative Control – characterized by threat and it include the following:
• Disciplinary Action – includes verbal reprimand for poor performance or insec
ure actions withholding certain material rewards, reduction of agents salary or
in extreme situation the threat of terminating professional relationship
• E scrow Account – control of an agent by putting hi salary in a bank to be with
drawn only after a fulfillment of a condition
• Blackmail
Procuring Different Type of Agents

Agent in Place – an agent who has been recruited by an intelligence


service within a highly sensitive target, who is just beginning a career
or have been long or (outside) insider.
Double Agent – an enemy agent who has been captured, turned
around and sent back where he came from as an agent of his captors
• E xpandable Agent – an agent whom false information is leaked to
the enemy.
• Penetration Agent – an agent who has such reached the enemy
gets information and would manage to get back alive.
Agent of Influence – an agent who uses influence to gain information
Agent of Provocation – one who provoke the enemy to give information
METHODS OF COVERT INTE LLIGENCE

Concept of Surveillance
S urveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an investigation.
S urveillance of persons is called Tailing or Shadowing,
S urveillance of place is called Casing or Reconnaissance,
and S urveillance of other things, events, & activities is called
Roping.
In S urveillance, the following are considered:
• Pre-Surveillance Conference – a conference
held among the team members, the police
intelligence unit before surveillance is conducted.
• Surveillance Plan – a plan established the as
required according to type of personnel, and the
general and specific instructions for surveillance.
• Area Target Study – refers to the area of
operation (AOR ) of surveillance activities.
• Surveillant – a person who conducts surveillance with includes only
observations.
• Stakeout or Plant – is the observation of places or areas from a fixed
point.
• Tailing or Shadowing – it is the observation of a person’s movement.
• Undercover Man – it refers to a person trained to observe and penetrat
e certain organization suspected of illegal activities and later reports the
observation and information’s that proper operational action can be mad
e
• Liason Program – the assignment of trained intelligence personnel to
other agencies in order to obtain information of police intelligence value
(Agencies like the press, credit agencies, labor unions, telephone compa
nies)
• Safehouse – is a place, building, enclosed mobile, or an apartment,
where police undercover men meet for debriefing or reporting purposes.
• Drop – any person is a convenient, secure and unsuspectin
g place where police undercover men meet his action agent
for debriefing or reporting purposes.
• Convoy – an accomplice or associate of the subject used to
avoid or elude surveillant.
• Decoy – a cover supporting the surveillant who can become
a convoy whenever surveillant is burned.
• Contact – any persons whom the subject picks or deals
with while he is under observation & identifies the observer.
• Made – when subject under surveillance becomes aware
that he is under observation and identifies the observer.
• Lost – when the surveillant does not know the whereabouts
of his subject or the subject had eluded the surveillance.
SURVE ILL ANCE ACTIVITIE S

• According to Intensity and Sensitivity


• Discreet –subject person to be watch is unaware that he is under obser
vation
• Close – subject is aware that he is under observation varied on each oc
casions
• Loose – applied frequently or infrequently, period of observation varied
on each occasion
• According to Methods
• Stationary – this is observation of place usually a bookie stall, a gambli
ng, joint, a residence where illegal activities are going on (fixed position)
• Moving – surveillance follow the subject from the place to place to maint
ain continuous watch of his activities
• Technical – this is a surveillance by the use of communications and ele
ctronic hardware’s, gadgets, system and equipment
Special E quipment (Technical Supports)
• Camera with telephoto lens
• Moving Picture camera
• Binoculars
• Tape recording apparatus
• Wire taping device
• Other instrument – miniaturized one-way radio

Methods available to employ in Surveillance


Ordinarily, the methods are surveillance of place, tailing or
shadowing (1-2-3 man shadow), undercover investigation,
special methods includes: wire tapping - concealed
microphones - tape recorder -television - electric gadgets
Counter Surveillance – the conduct of
operation is coupled with counter intelligence
measures such as window shopping, use of
convoys and decoys, stopping immediately on
blind corners, getting out immediately on
public conveyances, retracing, entering mobile
housing
CASING OR RE CONNAISSANCE
Casing is the term use in the police organization
while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building
place or area to determine its suitability for Intel use or its
vulnerability in operations. It aids in the planning of an
operation by providing needed information. It assists the agent
handler to install confidence in his agent during briefing
phase by being able to speak knowingly about the area of
operation.
Casing is also considered a security measure because it
offers some degree of protection for those operating in an area
unfamiliar to them.
Method of Casing
• Personal Reconnaissance – the most effective method and
will produced the most info since you know just what you’re
looking for.
• Map Reconnaissance – it may not sufficient but it can
produce a certain amount of usable information
• Research - much info can be acquired through research
• Prior Information – your unit and of the unit will have file
report that they may provide you with info
• Hearsay –info usually gain by the person operating in the
area and performing casing job
OBS E RVATION AND DECRIPTION (ODEX)

Observation – a complete and accurate observati


on by an individual of his surroundings an encom
passes the use of all the major sense to register a
nd recognized its operational or Intel significance

Description – the actual and factual reporting of o


ne’s observation of he reported sensory experien
ce recounted by another
E LICITATION
It is a system or plan whereby information of intelligence
value is obtained through the process direct intercommuni
cation in which one or more of he parties to the common is
unaware of the specific purpose of the conservation. The three
phases are determination of the mission, selection of the sub
ject, and accomplishment of the mission.

Two Devices in the conduct of Elicitation


Approach – process of setting people to start talking
Probe – to keep the people taking incessantly
E xample of Approach:
Teacher – Pupil Approach – the subject is tr
eated as an authority then solicit his view poi
nt and opinion on a subject matter.
Good Samaritan Approach – is the sincere a
nd valid offers of help and assistance are m
ade to the subject
PORTRAIT PARLE (P/P)
It is a means of using descriptive terms in
relation to the personal features of an individual
and it can be briefly described as a word
description or a spoken picture.
(Anthropometry - no two human beings has the s
ame body measurement)
BACKGROUND CHECKS AND INVES TIGATION
(BI- PS I or CBI)
Information needed:
• Domestic Background
• Personal Habit
• Business History
• S ocial or Business Associates
• Medical History
• E ducational Background
• Family History
TACTICAL INTE RROGATION

The need for obtaining information of the highest d


egree of credibility taken on the minimum of time c
an be through interrogation which varies and depe
ndent entirely on the situation.
Types of Interrogation

• Screening - usually accomplished as soon as after capture, a


pprehension or arrest of an interrogee. The objective is to obta
in background information about the interrogee and determine
his area of knowledge and ability.
• Formal Interrogation (Detailed) –the systematic attempt to e
xploit to an appropriate depth those areas of the interrogee’s k
nowledge, which have been identified in the screening process
• Debriefing – a form of eliciting information, which is generally
used when the area of intellectual capability of the interrogee i
s known. Maximum use of the narrative and not try to trap the
person being debriefed with leading question. The debriefer/int
errogator must be familiar with the subject in which the interrog
ation is being conducted.
• Interrogation of Lay Personnel (Specific Type) – the techniqu
es used are the same as in the interrogations, however, especia
l effort must be made to established a common frame of referen
ce between the interrogator and the interrogee. The amount of i
nformation obtained from this type will depend on the interrogato
r’s inequity in establishing common terminology on the source c
an understand which will enable the interrogator to get the desir
ed information.

• Technical Interrogation – the level of interrogation where the s


ource has specific and such detailed information that requires a
trained expert in the subject matter to be explored. It usually cov
ers the specific subject and time is not as limited as during other
interrogation.
Phases of Interrogation

• Planning and Preparation


• Approach (Meeting the Interrogee) Questioning
• Termination
• Recording Reporting
INTERROGATION TE CHNIQUES:

• Techniques of Approach – the purpose is to gain the cooperation of the sour


ce and induce him to answer questions which will follows.
• The “Open Techniques” – the interrogator is open and direct in his approach
and makes no attempts to conceal the purpose of the interrogator. It is best e
mployed when the interrogee is cooperative. It is frequently used at the tactica
l level where time is a major interrogator.
• The “Common Interest” Technique – the interrogator must exert effort to im
press the interrogee of their common interest. The interrogator must look for h
e point out the real advantages the interrogee will receive if he cooperates
• Record File (we know all technique) – the interrogator prepare a file on the
source listing all known information (record should be padded to make it appe
ar to be very extensive). The information must contain the life history of he inte
rrogee to include his activities and known associates (Party- bio-data of the int
errogee is important). The “we know all” s used in conjunction with the record f
ile. During the approach, the interrogator may ask the interrogee about a subje
ct, if he refuses to cooperate, the interrogator may provide the answer in order
to impress him that the interrogator knows him very well (all is known).
• Exas peration – Techniques (Harassment) – effectively employed against hostil
e type interrogee. The interrogator must be alert because the interrogee may fab
ricate information to gain relief from irritation (monotype). S ubject Interrogee is pl
aced in a longer period of interrogation without rest or sleep. The interrogator pe
rmits the source to go to sleep and subsequently awaken for another series of q
uestioning (this is done repeatedly). After many repetitions, the interrogee will be
exasperated and will finally cooperate hoping that he can be allowed to rest or sl
eep. Ask a question, listen to a reply and then ask the same question repeatedly
(use a tape recorder if possible). The purpose is to bore the interrogee thoroughl
y until he begins to answer questions freely to end the harassment.

• Opposite Personality Technique – also known as “Mutt and J eff”, “Threat and
Rescue”, “Bud Guy – God Guy’, “S weet and S our”, “S ugar and Vinegar”, “Devil
and Angel”. Use of two (2) interrogators playing opposite roles.

• Egotis t Techniques (Pride and Ego) – usually successful when employed agai
nst an interrogee who has displayed a weakness or a feeling of insecurity. You
may reverse the technique by complimenting the interrogee in hopes of getting h
im to admit certain information to gain credit. Described him as the best person,
superior or comrade.
• “Silent” Technique – employed against nervous or the conf
ident type of interrogee. Look out the interrogee squarely in t
he eye with sarcastic smile (force him to break eye contact fi
rst). He may ask questions but the interrogator must not ans
wer. Patience is needed until the interrogator is ready to bre
ak silence.

• “Question Barrage” Technique (Rapid Fire Questioning)


– intended to confuse the interrogee and put him into a defe
nsive position. The interrogee become frustrated and confus
ed, he will likely reveal more than he intended, thus creating
opening for further questioning.

You might also like