Escolar Documentos
Profissional Documentos
Cultura Documentos
Ps IN
LAW ENFORCEMENT ADMINISTRATION
By:
ROMMEL K. MANWONG, Ph.D.
PRELIMINARY NOTES
LEA is the most comprehensive area in the criminology board examination carrying a
weight of 20 % from the total percentage in
the scoring system.
COVERAGE
PART ONE
QUESTIONS
1.What is meant by the Greek word politeia?
A. State of the Nation
B. Nationhood or Cityhood
C. Government of a City
D. Police Officers
2. Which society first use the word Police to
mean person who enforce the law?
A. Greeks B. French
C. Germans D. English
POLICING SYSTEMS
Basic Concepts
Police Politeia G, government of a city
Politia R, same meaning above
Polizei Gr, Safe keepers (territory)
Police F, persons to enforce law
**borrowed by the English and Americans to
refer to LAW ENFORCER.
** constable, patrol, F in origin
QUESTIONS
3.In the history of law enforcement, which one
is considered the earliest codified law?
A. Code of King Hammurabi
B. 12 Tabulae
C. The Sumerian Code
D. Code of Kalantiao
4. An ancient police system used by the Greeks.
A. Medjays B. Ephori
C. Tythingmen D. Vigiles
Historical Background
2300 B.C Sumerians Lipithstar & Eshumma set
standards on what constituted an offense against
society the Sumerian Code
2100 B.C Babylonians Code of King Hammurabi Principle LEX TALIONES oldest
harsh code.
1500 B.C Egyptians Court system presided by
judges appointed by the Pharoah; Marine patrol &
custom house officers protecting commerce started;
first use of dog patrol; Medjays civilian police under the command of a military.
Ancient Greece Ephori law enforcers
QUESTION
5. What was the earliest Roman law?
A. The Justinian Code
B. Code of Draco
C. 12 Tabulae
D. Anglo-Saxon Law
Ancient Rome 12 Tabulae (12 Tables) the first written laws, Emperor Augustus
created the
Praetorian Guard, Urban Cohorts (City Patrol),
and the Vigiles (fire fighters);
Emperor Justinian Justinian Code became known as
Corpus Juris Civilis (Body of Law)
Japanese Occupation
1941 - The Japanese Military Police (Kempetai)
took over MPD.
Liberation Period
1945 - The MPD was reconstituted and placed
under American control. Col. Marcus Ellis Jones became the Chief of Police of the MPD.
Most Recent
BOARD QUESTIONS
1. The law that provides the National Police Commission to conduct Police examination is
R.A 2260 B. R.A 6040
C. R.A 4864 D. R.A 6141
2. Automobile patrol was introduced in the Philippines on __
A. May 17, 1954 B. May 17, 1939
C. May 17, 1953 D. May 17, 1940
PART TWO
CONCEPTS ON POLICE ORGANIZATION,
MANAGEMENT & ADMINISTRATION
Functional Type Organization
Police Management
Pertains to the utilization of available resources in an organization. (5Ms)
Police administration
Refers to the processes used in the organiztion
(POSDCRB/POSDC)
> POSDCRB
Planning - setting performance objectives
Organizing - dividing the work to be done
Staffing - filling the org with the right people/position
Directing - making decisions
Coordinating interrelating various parts of work
Reporting keeping executives informed
Budgeting fiscal planning, accounting, and control
Approaches in Managing
Police Organizations
Classical Approach
Division of Work
Authority and Responsibility - right to command
Discipline
Unity of Command
Unity of Direction
Subordination of individual interest to general interest
Remuneration of Personnel
Centralization
Scalar Chain
Order
Equity
Stability of personnel tenure
Initiative
Espirit de Corps
Contemporary Approach
- looking at the organization as a system
(system theory)
- recognizing internal and external variables affecting organization (contingency theory)
ORGANIZATIONAL TERMINOLOGIES
Functional Units
Bureau the largest organic functional unit within a large
department. It comprises of numbers of divisions.
Division a primary subdivision of a bureau.
Section functional unit within a division that is necessary
for specialization.
Unit functional group within a section; or the smallest
functional group with in an organization.
Territorial Units
1. Criminal Investigation
2. Narcotics Command absorbed into the PDEA
3. Traffic Management
4. Intelligence
5. Special Action Force
6. Security
7. Civil Security Force
8. Maritime
9. Police Community Relations
10. Aviation Security
Ranking System
COMMISSIONED OFFICERS
NCOs
Senior Police Officer IV (SPO IV) Master Sergeant
Senior Police Officer III (SPO III) Tech. Sergeant
Senior Police Officer II (SPO II) Staff Sergeant
Senior Police Officer I (SPO I) Sergeant
Police Officer III (PO III) Corporal
Police Officer II (PO II) Private 1st Class
Police Officer I (PO I) Private
Cadets of the Philippine National Police Academy (PNPA) are classified above the Senior
Police Officer IV and below the
Inspector rank in the PNP.
Traditional Community
PERSONNEL MANAGEMENT
(HUMAN RESOURCES MANAGEMENT)
POLICE PERSONNEL
IN RE: R.A 8551
Field Training
APPRAISAL In Service Training
Note: Purposes
PROMOTION
Standards of Evaluation
Note: System of promotion
Note: Purpose
Powers/Authorities
Salaries, Benefits, Privileges
Note: Incentives/Awards
Pays/Allowances
Retirement Benefit
INSPECTION
Note: Types
Powers/Authorities to
Inspect
Types:
Administrative Offenses
Light Offenses Imposable Penalties
Less Grave Offenses
Grave Offenses Reprimand, Forfeiture of
Suspension,
Privilege,
Forms: Demotion from
Rank, Dismissal
Malfeasance (Misconduct) abuse power from Service
Misfeasance (Irregularities) improper perfo
Non-feasance (Neglect of Duty) refusal ** or any
RETIREMENT
Note: Nature of Retirement
Retirement is either OPTIONAL or MANDATORY
Retirement Benefit
50% of the base pay and longevity pay of the retired grade in case of twenty (20) years of active
service, increasing by 2.5% for
every year of active service rendered beyond twenty (20) years
to a maximum of 90% for 36 years of service and over.
PART FOUR
POLICE PATROL
(Management and Operations)
Note:
- The Peel Principle
- Koban System, COPS, Community-Oriented
Note:
Proactive measure (assurance of omnipresence)
Police Visibility
Police Discretion
Use of ones own wise judgment on certain events or circumstances not covered by SOPs.
Sample Scenario
On patrol alone
Rainy & Foggy situation, urban area
No FA, no HHR, no means of com to HQ
No flashlight, wearing Rain Coat,
3 Males in front of a pawnshop w in AOR
Suspicious looking
CRIME TRENDS
2012 - As of April 2012, crime rate went down by 16.77%
(According to the Philippine National Police)
Crime statistics provided by the PNP Directorate for Investigation and Detective
Management (DIDM) indicates a 16.77% decline in the countrys Total Crime Volume
recorded from January to March of Year 2012, compared with the First Quarter 2011 crime
record.
CRIME
An act or omission in violation of a law/statute
Felony As defined in the RPC
Offense Violation of SL
Delinquency Misdemeanor
KEY PLAYERS
VIOLATOR offending party (suspect/respondent/accused/criminal)
motive
Crime situation
instrumentation
instrumentation
INSTRUMENTALITY
The means or implements use in the commission of the crime.
(firearm, a bolo, a fan knife, ice pick, poison, a crow bar, a battery-operated hand drill
for carnapping, etc.)
OPPORTUNITY (SITUATION)
The act or omission by a person (victim) which enables
another (criminals) to operate the crime.
(leaving ones home crime prone alley, wearing expensive jewelry
in the slum area, readily admitting a stranger into ones residence)
MOTIVE
The moving power which impels one to action for a definite result.
The reasons or cause why person or group of persons perpetrate
a crime.
The Criminal Formula
C=T+S
R
Where:C = Act (Criminal Act)
T = Criminal Tendency (Desire/Intent)
S = Total Situation (Opportunity)
R = Resistance to Temptation
PROSECUTION
investigate determine
COMMUNITY
law abiding help prevent crimes CRIME probable cause
CORRECTION
reform change
criminal behavior COURT
trial determine
guilt or innocence
Crime Prevention.
is a proactive measure against crime
the objective of which is aimed towards ways and means to reduce the DESIRE of the
potential criminal to commit crime.
Crime Repression
is a REACTIVE measure against crime
the objective of which is preventing the actual commission of crimes. Repression is leveled
on the prevention of the very act itself, which constitutes crimes.
To Prevent Crimes
Remove/Reduce/Prevent Criminal tendency
Remove/Reduce /Prevent the opportunity on the part of the would be criminal
Increase/Improve Resistance to Temptation
Applications
By not committing crimes!...by not violating the lawsby simply being a LAW ABIDING
citizen!
(PREVENTING CRIMINAL TENDENCY)
PART FIVE
POLICE
OPERATIONAL
PLANNING
KEY CONCEPTS
PLANNING is a management function concerned with:
visualizing future situations
making estimates concerning them
identifying issues
analyzing and evaluating the alternative ways for reaching desired goals
estimating the necessary funds and resources to do the
work
initiating action to cope with the changing
conditions and contingent events.
the responsibility of the C/PNP and other chiefs of the different units or headquarters
within their area of jurisdiction to achieve the
objectives or mission of the police organization.
What are the basic considerations
in Police Planning?
Primary Doctrines
OPERATIONAL DOCTRINE Are the principles and rules governing the planning,
organization and direction and employment of the PNP forces in the accomplishment of
basic security operational mission in the maintenance of peace and order, crime
prevention and suppression, internal security and public safety operation.
FUNCTIONAL DOCTRINE This provides guidance for specialized activities of the PNP
in the broad field of interest such as personnel, intelligence, operations, logistics, planning,
etc.
Secondary Doctrines
ETHICAL DOCTRINE That defines the fundamental principles governing the rules of
conduct, attitude, behavior and ethical norm of the PNP.
Four Primal Conditions of the
Police Organization
AUTHORITY The right to exercise, decide and
command by virtue of rank and position.
DOCTRINE It provides for the organizations
objectives. It provides the various actions. It is
where procedures/plans are based.
COOPERATION/COORDINATION
DISCIPLINE It is imposed by command or self-restraint to insure supportive behavior.
Classifications of Police Plans
According to coverage
Local Plan
Regional Plan
National Plan
According to Time
It relates to plans which are strategic or long range in application, it determine the
organizations
original goals and strategy.
Examples
Police Action Plan on the Strategy DREAMS
P-O-L-I-C-E 2000
Examples
Master Plan Sandigan-Milenyo (Anti-Crime Master Plan)
Master Plan Sandugo/ Alpha (ISO)
Master Plan Banat (Anti-Illegal Drugs Master Plan)
Master Plan Sang-ingat (Security Operations Master Plan)
Master Plan Saklolo (Disaster Management Master Plan)
Sangyaman (Protection and Preservation of Environment, Cultural Properties, and Natural
Resources Master Plan)
Functional Plans - include the framework for the operation of the major functional units in the
organization, such as patrol and investigations.
Time-specific Plans are concerned with a specific purpose and conclude when an objective is
accomplished or a problem is solved.
Oplan Jumbo Aviation Security Group Strategic Plan against terrorist attacks
Oplan Salikop CIDG Strategic Plan against Organized Crime Groups (OCG)
OPLAN BANTAY DALAMPASIGAN that sets forth the operational guidelines on the
heightened security measures and sea borne security patrols.
Police Blotter
A police blotter is a logbook that contains the daily registry of all crime
incident reports, official summaries of arrest, and other significant events
reported in a police station.
Definition of Terms
National Intelligence the total product of intelligence developed by all governmental
agencies that cover the broad aspects of national
policy and security.
Military Intelligence it is used in the preparation of military policies, plans and
programs. It includes the strategic and combat intelligence.
Strategic Intelligence that knowledge pertaining to the capabilities and probable
courses of action of foreign nations.
Combat Intelligence is required by the commander in order to determine the best use
of his available firepower and maneuver forces, to accomplish his mission, and to maintain
the security of his command.
Counter Intelligence an integral part of all intelligence operations and as such cant be
separated from combat and strategic intelligence. Its objective is to safeguard information
against espionage, material and installations against sabotage, and personnel against
subversive
Technical Intelligence concerns foreign technical developments, which have a practical
military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.
Area of Operation those aspects of the operational environment exclusive of
the military/police forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment of an area
in which military/police operations are taking place or planned.
And Moses sent them to spy out the land of Canaan and said unto them, get you up this
way southward, and go up into the mountain; and see the lands, what it is; and the people
that dwell therein, whether they are strong or weak, few or many; and what the land they
dwelt in, whether in tents, or in strongholds; and what land is; whether it be fat or lean,
whether there be wood therein, or not. And be of good courage and bring of the fruit of the
land. The scriptures also named the twelve intelligence agents whom the Lord directed
Moses to sent into the land of Canaan and records that all those men were heads of the
children of Israel.
THE 12 MEN SENT BY MOSES TO SPY CANAAN
When Alexander the Great was marching to Asia, were rumors of disaffection growing
among his allies and mercenaries, he sought the truth, and got it by simplest expedient by
devising the first letter sorting and opening to obtain information.
Sertorius
He was the Roman Commander in Spain who possessed a White Fawn and allowed it to
become widely known - that he derived secrets and guidance from the fawn. His
intelligence agents credited their information to the supernatural power of animals.
Akbar
He was known to be the sagacious master of the Hindustan. He employed more than
4,000 agents for the sole purpose of bringing him the truth that his throne might rest upon
it.
Genghis Khan
He was known The Great Mongol, who used intelligence to conquer China and invade
Cathay. He instructed his Generals to send out spies and used prisoners as sources of
information. The leader of the so-called MONGOL CONQUERORS - made use of effective
propaganda machine by spreading rumors of Mongol Terror, they collected information on
weaknesses and rivalries of Europe. The leaders usually disguised as merchants.
RENAISSANCE PERIOD
With the rise of Nationalism and development of modern armies, intelligence became
apparent to large states. In England, Sir Francis Walsingham, under Queen Elizabeth,
organized the first National Intelligence Service. He employed spies on the staff of the
Admiral in Command of the Spanish Army and able to obtain information regarding
Spanish Army as to their ships, equipment, forces and stores. He protected Queen
Elizabeth I from countless assassins.
In France, Richlieu introduced the network of covert collectors who transmitted prompt
and accurate information to Paris regarding the activities of the rebels and dissidents of
the kingdom.
Louis XIV systematized political policy, continuous surveillance, postal censorship and
military intelligence organization were his contributions.
The French Intelligence System continued since 15th Century.
Napoleon Bonaparte once said, One Spy in the right place is worth 20,000 men in the
field. He organized two Bureaus of Interest: Bureau of Intelligence which consolidate
all incoming information regarding the enemy for presentation to the emperor and to obtain
information as desired, and Topographic Bureau which maintains a large map which
covers the latest information regarding both enemy and friendly forces. He maintained
Military Intelligence and Secret Political Police Service all over Europe. His main arm was
Spy against spy concept.
Frederick the Great
Karl Schulmeister
He was Napoleons eye, Napoleons military secret, born on August 5, 1770. He began his
career in offensive espionage under a cover role. He was able to infiltrate the Austrian
General Staff.
Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further device
military censorship and organized military propaganda. He introduced military censorship
and organized military propaganda. He works as a census taker and developed informal
gathering of data.
Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he became
Chief of the Austro Hungarian Secret Service. He became a double agent of Russia.
Brahma Kautilya
In Ancient India, he overthrew the Nanda Dynasty and established the first MAYURYAN
king in the Indian throne. He recommended to his king that for the ruler to succeed, the
ruler should strike at his enemys weak points by means of spies. He proposed the
following means to conquer enemys stronghold: Intrigues and spies - Winning over
enemys people - Siege and assault - Before beginning military operation, a conqueror
should know the comparative strength and weaknesses of himself and his enemy. No war
should be undertaken without careful examination of all factors reported by the kings
spies.
Maj. General Donovan
He was the organizer of the OSS, builder of a central intelligence system - OSS whose
exploits become legendary in World War II.
V2 Rackets - OSS agents working in conjunction with the British Intelligence, through
penetration and technical intelligence discovered Punemundo which was the V2 guide
missile research project of Nazi Germany. It resulted to its destruction and heavy bombing.
Battle of Midway
In June 1442, the turning point of the Naval in the Pacific, the victory gained by the
Americans was due to the disrupted messages from the Imperial Japanese Navy.
Admiral Isoroku Yamamoto
April 1943, He was the crypto analyst of the U.S. Navy Communications Intelligence
intercepted a top-secret signal relaying the travel of the Admiral. En route, he was
intercepted and crashed in the Jungles of Baungainville.
State Informer
Edward I, King of England in 1725 organized a systematic police system so called Witch
and Ward. By Royal proclamation, the profession State Informer was created in 1734
enjoining all informers to expose criminal activities and be compensated.
Joseph Fouche
Father of Police Intelligence Operations. A Frenchman born in 1759, rose to become
the most feared and respected intelligence director in French history. He created a
network of agent. His assistance founded the modern system of spying on spies, which
later was known as counter espionage.
Joseph Petrosino
He was member of the New York Police Department in early 1900, he was the head of the
Italian Squad. Through extensive intelligence network, he was credited to smash and
neutralization of the Black Society.
Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of Justice and
became what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On
September 6, 1939 by a presidential directive, it came to its responsibility the task of a
domestic intelligence.
Central Intelligence Agency - The agency was created under the US National Security
Act of 1947. It was the Central Intelligence group established during the time of President
Truman in January 1946. The CIA was under the National Security Council.
Committee for State Security - Russia - The Intelligence agency known as the KGB -
Komitet Gosudarstvennoy Bezopasnosti (KGB)
Mossad Israel
1900 Europe powers developed modern staff systems and place intelligence on the
same level with personnel, operations and logistics. Intelligence then functioned in time of
peace and war. Intelligence during this period, concentrated on information about the
armed forces of the enemy and their capabilities. AIRCRAFT was introduced as a method
of conducting aerial reconnaissance. WIRELESS TELEGRAPH was used wherein
CODES AND CIPHERS were applied. ARMY INTELLIGENCE rapidly expanded during
this period.
GERMAN INTELLIGENCE started the war with the worlds best organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer Group wherein they
subordinated intelligence to operation and did not regard intelligence assignment worthy of
a soldier.
JAPANESE INTELLIGENCE failed because it was not provided with sufficient number of
trained personnel to assemble and evaluate the mass of materials which were collected
although Japanese Intelligence was involved in short war and defensive in nature.
BRITISH INTELLIGENCE the delay in the use of German V-BOMB against them was
their main achievement during this time.
In 1942 a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Penemuenda. Its intelligence
failed in the defeat of GENERAL MONTGOMERYS forces at ANNHEIM.
US INTELLIGENCE In 1941, The US Strategic Service was established to research and
analyze military, political and economic information as it affected the security of the
country. US JOINT CHIEFS OF STAFFS was organized to act in support of the army
and the navy in the collection and analysis of strategic information and to be responsible
for the planning and operation of special services. US greatest contribution to intelligence
was the development of the AMPHIBIOUS WARFARE where coordination of many types
of intelligence activities was required to provide adequate knowledge of the successful
operation of a complex military force transported over water with the objective of
establishing itself on an enemy held shore against opposition. US successes in WW II
were based on personnel drawn from CIVILIAN POPULACE, BUSINESS AND
PROFESSIONAL MEN AND WOMEN.
SOVIET INTELLIGENCE AMTORG was organized for the purpose of purchasing all
kinds of materials for the Soviet Union.
Agents of Betrayal
Intelligence is sometimes described as a world of deceit and betrayal. Some of the high
personalities which evidence this description are:
Webster defines intelligence as the capacity for understanding and for other forms of
adaptive intellect of behavior; the mind in operation; the power of meeting any situation,
especially a novel situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to guide action
towards goal; knowledge of an event, circumstances, etc., received or imparted; the
gathering or distribution of information; the staff of persons engaged in obtaining such
information.
According to Police Parlance - The end product resulting from the collection,
evaluation, analysis, integration and interpretation of al available information
regarding the activities of criminal and other law violators for the purpose of
affecting criminals and other law violators for the purpose of affecting their arrest,
obtaining evidence, and forestalling plan to commit crime.
Military offensive and defensive tactics, war plans, strategic concepts and tactical
principles, organizations, installations, industrial lease, armed forces, command
structure, command personnel, material, tactics, morale,
General topographical and hydrographic characteristics, historical backgrounds
Diplomatic foreign policies, alliances, diplomatic establishment, foreign service
personnel, technique of conducting foreign relations
Political ideology, traditions, institutions, personalities, area of friction
Communications and Transportation telephones, telegraphs, wireless, railways,
shipping, automobiles and trucks, highways, aviation, ownership, policies, organization,
personnel
Social nationality structure, classes and caste, historical factors, census, personal
aspects, characteristics and mentality of people forces, social legislation, radio,
television, press, motion picture
Usefulness - Intelligence is useless if it remains in the minds, or in the files of its collectors
or its producers. The story must be told and it must be told well. The story must be
convincing and to be convincing it must not only be plausible or factual but its significance
must be shown.
Security - Security is achieved by the measures which intelligence takes to protect and
preserve the integrity of its activities. If intelligence has no security, it might be as well
being run like a newspaper to which it is similar.
General Activities
Strategic Intelligence it is an intelligence activity which is primarily long range in
nature with little practical immediate operation value.
Line Intelligence it is an intelligence activity that has the immediate nature and value
necessary for more effective police planning and operation.
Forms of Intelligence
Armed Force Intelligence deals with the armed forces of the nation. It includes the
position of the armed forces, the constitutional and legal basis of its creation and actual
role, the organizational structure and territorial disposition, and the military manpower
recruitment and Order of Battle
People - living condition of the people, sources of income, education of the people,
government livelihood projects, extent of enemy influence to the people
Weather visibility, cloudy, temperature, precipitation (rain), wind
Enemy - location of the enemy, strength of the enemy, disposition, tactical capability,
enemy vulnerability
Terrain - relief and drainage system, vegetation, surface material, man made features.
There are military aspects of terrain which includes cover and concealment, obstacle,
critical key terrain features, observation and fields of fire, and avenues of approach.
Counter Intelligence (CI) - this kind of intelligence covers the activity devoted in
destroying the effectiveness of hostile foreign activities and to the protection of info against
espionage, subversion and sabotage. Hence, the three activities of CI are: protection of
information against espionage; protection of personnel against subversion; and protection
of installations and material against sabotage.
Measures in CI must be both passive and active. Passive measures are those measures
which seek to conceal info from the enemy while active measures are those which seek
actively to block the enemys efforts to gain info or engage in espionage, subversion or
sabotage.
Counter Intelligence is also known as Negative Intelligence - a generic term meaning three
different things;
Security Intelligence means that the total sum of efforts to counsel the national
policies, diplomatic decisions, military data, and any other information of a secret nature
affecting the security of the nation form unauthorized persons. It is an effort to deny
information to unauthorized persons by restricting to those who are explicitly authorized to
possess it.
Port Frontier and Travel Security has to do with the application of both military and
civil security measures for CI control at point of entry and departure, international
borders or boundaries. Examples are:Security screening and control of frontier Security
control of merchants, seaman and crew of commercial aircraft, Security control of
frontier crossing point
Security control of seaports
Civil Security it encompasses active and passive CI measures affecting the non-military
nationals permanently or temporarily residing in an area under military jurisdiction.
Examples are: Systematic registration of civilians and aliens
Control of circulation, Curfew, Surveillance of suspected political organizations, Security
screening of labor, Issuance of passes and permits, Control of internal commerce
Censorship it is the control and examination of the civil, national, armed forces, field
press, and POWs.
Special Operations counter subversion, sabotage and espionage
Categories of CI Operation
Counter Human Intel (HUMINT) seeks to overcome enemy attempts to use human
sources to collect information or to conduct sabotage and subversion which includes CI
special operations, liaison, counter security, and CI screening.
Counter Imagery Intel (IMINT) - includes action taken to determine enemy SIGINT and
related enemy weaknesses, capabilities and activities. These actions include
surveillance radar, photo thermal and infrared systems. Successful counter IMINT
operations rely heavily on pattern and movement analysis and evaluation of the enemy.
Counter Signal Intel (SIGINT) determine enemy SIGINT and related enemy
weaknesses, capabilities and activities, assess friendly operations to identify patterns,
profiles and develop, recommend and analyze counter measures.
PHASE 2
Collection of information
This phase of the cycle is concerned with identification of the collecting agency, the
formulation of procedures on the manner of collecting the information in conjunction with
the plans as achieved in phase one.
PHASE 3
Processing the Collected Information
This phase of the cycle is concerned with the examination and collation of all collected
information.
Collection organization of raw data and information into usable form; grouping similar items
of information so that they will be readily accessible.
Recording is the reduction of info into writing or some other form of graphical representation
and the arranging or this info into writing or some form of graphical representation and the
arranging of this into groups of related items. Police log book and Journal, Intel-work
Sheet - Intel Files, Situation Maps - Rouges Gallery, Modus Operandi Files Evaluation
examination of raw information to determine intelligence value, pertinence of the
information, reliability of the source and agency, and its credibility or truth of information.
Evaluation is the determination of the pertinence of the info to the operation, reliability of the
source of or agency and the accuracy of the info.
As to Source of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured Enemy
X- Observation of govt/civilian employee
Y Observation from populace
Z- Documentary
PHASE 4
Dissemination & Use of Information
This phase of the cycle refers to the activities of transferring the processed information to
the proper users, most particularly the authority that requires the activity. Processed
information can be disseminated through annexes, estimates, briefing, message, reports,
overlays, and or summaries.
Methods of Dissemination
Fragmentary orders from top to bottom of the command
Memorandum, circulars, special orders
Operations order, oral or written
Conference staff members
Other report and intelligence documents
Personal Contact
Who are the users of intelligence?
National leaders and military commanders formulation and implementation of national
policies.
Advisors and Staff preparations of plans and estimates
Friendly nations or other branches of the armed forces.
Processor basis for evaluation and interpretation.
Head / chairman of an organization
Any person with authority for purposes of planning.
INFORMATION
AND ITS SOURCES
NO INFORMATION = NO INTELLIGENCE
Anonymous Informant those who gives information through telephone with the
hope that the informant can not be identified
Sub-type of Informant
Incidental Informant a person who casually imparts information
to an officer with no intention of providing subsequent information
Recruited Informant A person who is selected cultivated
and developed into a continuous source of info
Cover - the means by which an individual group of organization conceals the true nature
of its
acts and or existence from the observer.
Cover story a biographical data through
fictional that will portray the personality of the
agent he assumed, a scenario to cover up the
operation
Cover Support an agent assigned in target
areas with the primary mission of supporting the cover story.
Undercover Assignment is an investigative technique in which agent conceal his
official identity an obtain information from that organization
Agent in Place an agent who has been recruited by an intelligence service within a
highly sensitive target, who is just beginning a career or have been long or (outside)
insider.
Double Agent an enemy agent who has been captured, turned around and sent back
where he came from as an agent of his captors
Expandable Agent an agent whom false information is leaked to the enemy.
Penetration Agent an agent who has such reached the enemy gets information and
would manage to get back alive.
Agent of Influence an agent who uses influence to gain information
Agent of Provocation one who provoke the enemy to give information
METHODS OF COVERT INTELLIGENCE
Concept of Surveillance
Surveillance is a form of clandestine investigation
which consists of keeping persons, place or other
targets under physical observation in order to obtain
evidence or information pertinent to an investigation.
Surveillance of persons is called Tailing or Shadowing, Surveillance of place is
called Casing or Reconnaissance, and Surveillance of other things, events, &
activities is called Roping.
SURVEILLANCE ACTIVITIES
CASING OR RECONNAISSANCE
Casing is the term use in the police organization
while reconnaissance is used in military terms.
Casing or reconnaissance is the surveillance of a building place or area to determine its
suitability for Intel use or its vulnerability in operations. It aids in the planning of an
operation by providing needed information. It assists the agent handler to install
confidence in his agent during briefing phase by being able to speak knowingly about the
area of operation.
Casing is also considered a security measure because it offers some degree of protection
for those operating in an area unfamiliar to them.
Method of Casing
Personal Reconnaissance the most effective method and will produced the
most info since you know just what youre looking for.
Map Reconnaissance it may not sufficient but it can produce a certain amount
of usable information
Research - much info can be acquired through research
Prior Information your unit and of the unit will have file report that they may
provide you with info
Hearsay info usually gain by the person operating in the area and performing
casing job
OBSERVATION AND DECRIPTION (ODEX)
The need for obtaining information of the highest degree of credibility taken on the
minimum of time can be through interrogation which varies and dependent entirely on the
situation.
Types of Interrogation
Technical Interrogation the level of interrogation where the source has specific and
such detailed information that requires a trained expert in the subject matter to be
explored. It usually covers the specific subject and time is not as limited as during other
interrogation.
Phases of Interrogation
Techniques of Approach the purpose is to gain the cooperation of the source and
induce him to answer questions which will follows.
The Open Techniques the interrogator is open and direct in his approach and
makes no attempts to conceal the purpose of the interrogator. It is best employed when
the interrogee is cooperative. It is frequently used at the tactical level where time is a
major interrogator.
The Common Interest Technique the interrogator must exert effort to impress the
interrogee of their common interest. The interrogator must look for he point out the real
advantages the interrogee will receive if he cooperates
Record File (we know all technique) the interrogator prepare a file on the source
listing all known information (record should be padded to make it appear to be very
extensive). The information must contain the life history of he interrogee to include his
activities and known associates (Party- bio-data of the interrogee is important). The we
know all s used in conjunction with the record file. During the approach, the
interrogator may ask the interrogee about a subject, if he refuses to cooperate, the
interrogator may provide the answer in order to impress him that the interrogator knows
him very well (all is known).
Exasperation Techniques (Harassment) effectively employed against hostile type
interrogee. The interrogator must be alert because the interrogee may fabricate
information to gain relief from irritation (monotype). Subject Interrogee is placed in a longer
period of interrogation without rest or sleep. The interrogator permits the source to go to
sleep and subsequently awaken for another series of questioning (this is done repeatedly).
After many repetitions, the interrogee will be exasperated and will finally cooperate hoping
that he can be allowed to rest or sleep. Ask a question, listen to a reply and then ask the
same question repeatedly (use a tape recorder if possible). The purpose is to bore the
interrogee thoroughly until he begins to answer questions freely to end the harassment.
Opposite Personality Technique also known as Mutt and Jeff, Threat and Rescue,
Bud Guy God Guy, Sweet and Sour, Sugar and Vinegar, Devil and Angel. Use of
two (2) interrogators playing opposite roles.
Egotist Techniques (Pride and Ego) usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity. You may reverse the
technique by complimenting the interrogee in hopes of getting him to admit certain
information to gain credit. Described him as the best person, superior or comrade.
Silent Technique employed against nervous or the confident type of interrogee. Look
out the interrogee squarely in the eye with sarcastic smile (force him to break eye contact
first). He may ask questions but the interrogator must not answer. Patience is needed until
the interrogator is ready to break silence.
BASIC CONCEPTS
SECURITY state of being safe/secured/out of danger/free from hazard
PHYSICAL SECURITY
- protective security systems
PERSONNEL SECURITY
- human/workforce/employees/VIPs
Security Systems
Physical Security
a system of barriers
placed between the potential intruder and the
matter to be protected. It is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities,
material, and documents, and to safeguard
them against espionage,
sabotage, damage and theft.
PNPSOSIA PNP Supervisory Office for Security and Investigation Agencies responsible
for the issuance of implementing orders
regarding the rules & regulations affecting security agencies
operation.
At present
PNPSAG/SD PNP Security Agency Guards/ Supervision Division for national and
PNP FE/SAGS PNP Firearm and Explosives/ Security Agency Guard Services for local -
it directs the Chief of PNP to issue rules and regulations
concerning the implementing rules of
R.A. 5487 - 2003 Revised Rules and Regulations Implementing R.A. 5487 as amended.
INTRODUCTION
Policing is the most obvious and apparent
aspect of the criminal justice system
Police Systems around the world varied in
terms of approach and practices in achieving
police goals due to diversity of culture.
However similarities are placed on the purpose of their existence law enforcement,
peace and order, crime prevention.