Review in Intel 2009
Review in Intel 2009
Review in Intel 2009
DEFINITION OF TERMS
National Intelligence – the total product of intelligence developed by all
governmental agencies that cover the broad aspects of national policy and
security.
Military Intelligence – it is used in the preparation of military policies, plans and
programs. It includes the strategic and combat intelligence.
Strategic Intelligence – that knowledge pertaining to the capabilities and
probable courses of action of foreign nations.
Combat Intelligence – is required by the commander in order to determine the
best use of his available firepower and maneuver forces, to accomplish his
mission, and to maintain the security of his command.
Counter Intelligence – an integral part of all intelligence operations and as such
can’t be separated from combat and strategic intelligence. Its objective is to
safeguard information against espionage, material and installations against
sabotage, and personnel against subversive
Order of Battle Intelligence – concerns the manner in which military forces are
organized and disposed.
Technical Intelligence – concerns foreign technical developments, which have a
practical military application and the physical characteristics, performance,
capabilities, and limitations of material and installation, used by and for foreign.
Area of Operation – those aspects of the operational environment exclusive of
the military forces involved. It concerns weather economics, politics, sociology,
hydrographic (study of seas, lakes, etc.) and characteristics of the environment
of an area in which military operations are taking place or planned.
Capabilities – form a military standpoint, enemy capabilities are courses of
action which the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader
national standpoint, capabilities of a nation are the available, workable, courses
of action to accomplish national objectives.
Vulnerabilities – A nation’s vulnerabilities are the weaknesses, which make it
susceptible to any action, which reduces its war, potential, and or its will to fight.
HISTORICAL DEVELOPMENT
(Selected Items)
Moses
One of the first recorded formalized intelligence efforts, with format, can also be found in
the Holy Bible Numbers 3:17. The scriptures also named the twelve intelligence agents whom
the Lord directed Moses to sent into the land of Canaan and records that “ all those men were
heads of the children of Israel.”
Rehab
The Harlot of Jericho (Joshua 2:1-21)” who sheltered and concealed the agents of
Israel…
Delilah
(Judges 16:9). Delilah was an impromptu intelligence agent. Apart from her tonsorial
specialty, she also allowed sex to gain intelligence from a powerful enemy.
Sun –Tzu
Sun – Tzu’s book “The Art of War” was then a favorite readings of Chinese Communist
Tacticians. He further wrote the saying in which most people in the intelligence service believe
became a parlance in the world of intelligence:
“ Know thy enemy and know yourself,
1
2
jbdavid files….university of batangas – criminology…lipa campus
Sertorius
The Roman commander in Spain who possessed a white fawn and allowed it to be come
widely known that he derived both secrets and guidance from the fawn. His intelligence agents
credited their information to the supernatural power of animals.
Akbar
The “Great Mogul” and sagacious master of Hindustan employed more than 4,000 agents
for the sole purpose of bringing him the truth that his throne might rest upon it.
Genghis Khan
A Mongol who used intelligence to conquer China and invade Cathay. He instructed his
Generals to send out spies and used prisoners as sources of information. The leader of the so-
called MONGOL CONQUERORS - made use of effective propaganda machine by spreading
rumors of Mongol Terror. They collected information on weaknesses and rivalries of Europe.
They usually disguised as merchants.
RENAISSANCE PERIOD
In England, SIR FRANCIS WALSINGHAM, Under Queen Elizabeth, organized the first
National Intelligence Service. He employed spies on the staff of the Admiral in Command of the
Spanish Army and able to obtain information regarding Spanish Army as to their Ships,
equipment, forces and stores. He protected Queen Elizabeth I from countless assassins.
In France, RICHLIEU – introduced the network of covert collectors who transmitted
prompt and accurate information to Paris regarding the activities of the rebels and dissidents of
the kingdom.
NAPOLEON BONAPARTE “One Spy in the right place is worth 20,000 men in the field”
Spy against spy was of high proportion during his time wherein counterespionage came into
popular usage.
Hannibal
Disguise as a beggar to gather first hand information.
JULIUS CEASAR
During his time, the staff of each legion includes ten “speculators” who served as an
information-collecting agency. The “speculators” were the first intelligence personnel to appear
definitely in a military organization. Military success of the Romans was aided by communication
system. Made use of carrier pigeons, which made possible the amazing speed with which
intelligence of Imperial Rome was transmitted. They also employed ciphers to ensure secrecy
of communications.
Karl Schulmeister
2
3
jbdavid files….university of batangas – criminology…lipa campus
Karl Schulmeister, Napoleon’s eye, Napoleon’s military secret, was born on August 5,
1770. He began his career in offensive espionage. Under a cover role, he was able to infiltrate
the Austrian General Staff.
Wilhelm Stieber
Introduced military censorship and organized military propaganda. He works as a census
taker and developed an informal form in the gathering of data.
Alfred Redl
Chief of the Austro – Hungarian Secret Service - but in fact a double agent of Russia. In
1913, his treason was discovered and he was forced to commit suicide. His treason lead to the
death of 500,000 agents and soldiers combine in his 13 year espionage episode.
BRAHMA KAUTILYA
In Ancient India, he overthrew the NANDA dynasty and established the first MAYURYAN
king in the Indian throne. He recommended to his king that for the ruler to succeed, the ruler
should strike at his enemy’s weak points by means of spies.
Donovan
Major-General, organizer of the OSS, builder of a central intelligence system. The OSS
whose exploits become legendary in World War II.
Battle of Midway
In June 1442, the turning point of the Naval in the Pacific. The victory gained by the
Americans was due to the disrupted messages from the Imperial Japanese Navy.
V2 – Rackets
OSS agents working in conjunction with the British Intelligence, through penetration and
technical intelligence discovered Punemundo which was the V2 guide missile research project
of Nazi Germany. It resulted to its destruction and heavy bombing.
State Informer
Edward I, King of England in 1725 organized a systematic police system so called Witch
and Ward. By Royal proclamation, the profession “State Informer “was created in 1734 enjoining
all informers to expose criminal activities and be compensated.
Fouche of France
The most feared and respected intelligence director in French history. He created a
network of agent and founded the modern system of spying on spies, which later was known as
counter espionage.
Joseph Petrosino
Member, New York Police Department in early 1900, he was the head of the Italian
Squad. Through extensive intelligence network, he is credited to smash the Black Society.
3
4
jbdavid files….university of batangas – criminology…lipa campus
WORLD WAR II
GERMAN INTELLIGENCE – started the war with the world’s best-organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer Group wherein they
subordinated intelligence to operation and did not regard intelligence assignment worthy of a
soldier.
JAPANESE INTELLIGENCE – failed because it was not provided with sufficient number
of trained personnel to assemble and evaluate the mass of materials which were collected
although Japanese Intelligence was involved in short war and defensive in nature.
BRITISH INTELLIGENCE – Its achievement was the delay in the use of German V-
BOMB against them.
In 1942 – a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Penemuenda. Its intelligence failed in
the defeat of GENERAL MONTGOMERY’S forces at ANNHEIM.
US INTELLIGENCE – In 1941, The US Strategic Service was established to research
and analyze military, political and economic information as it affected the security of the Country.
US JOINT CHIEFS OF STAFFS – was organized to act in support of the army and the
navy in the collection and analysis of Strategic information and to be responsible for the
planning and operation of Special services.
US greatest contribution to Intelligence was the development of the AMPHIBIOUS
WARFARE where coordination of many types of intelligence activities was required to provide
adequate knowledge upon which to base the successful operation of a complex military force
4
5
jbdavid files….university of batangas – criminology…lipa campus
transported over water with the objective of establishing itself on an enemy – held shore against
opposition.
US success in WWH was there personnel were drawn from CIVILIAN POPULACE,
BUSINESS AND PROFESSIONAL MEN AND WOMEN.
CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police (the
BIS) to conduct espionage and counterespionage against Japanese Spies and Chinese
communist.
SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all
kinds of materials for the Soviet Union.
SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence
concerned with disaffection among Soviet Troops and anti-communism in any form. FIVE
MAJOR DIVISIONS: Administration, Operation, Investigation, Prosecution, and Personnel.
GERMAN INTELLIGENCE
RED GESTAPO – security service organized by East Germany to combat the Covert
activities of the West Germany Group when it was still divided by the Berlin Walls.
5
6
jbdavid files….university of batangas – criminology…lipa campus
DR. EMIL JULIUS KLAUS FUCHS – was accused of releasing American Atomic Secrets
to the Soviet in 1945 and British in 1947. He detailed knowledge of the construction of Atomic
bombs.
ERNST HILDING ANDERSON – In 1951, a Royal Swedish Navy provided military
secrets to a foreign power and was found guilty and sentences to life imprisonment.
Principles of Intelligence
The principles of objectivity - In intelligence only the well guided
succeed. It is a basic intelligence concept that there be unity between knowledge
and action. It follows therefore that intelligence should interact and condition the
decision. Intelligence must be adapted to the needs of the decision; it is both
giver and taker. Action or decision is planned by knowledge and guided by it at
every step.
The principles of Interdependence - Intelligence is artificially subdivided
into component elements to insure complete coverage, eliminate duplication and
to reduce the overall task to manageable sizes. Nevertheless, each subdivision
remain as essential part of unity; contributes proportionately to the end result;
possesses a precise interrelationship; and interacts with each other so as to
achieve a balanced and harmonious whole.
The Principles of Continuity - Intelligence must be continuous. It is
necessary that coverage be continuous so that the shape of what happens today
could be studied in the light of what was happened before, which in turn would
enable us to predict the shape of things to come.
The Principles of Communication - Intelligence adequate to their needs
must be communicated to all the decision makers in manner that they will
6
7
jbdavid files….university of batangas – criminology…lipa campus
understand and form that will permit its most effective use. Above all, it must be
understood for without understanding there is no communication.
The Principle of Usefulness - Intelligence is useless if it remains in the
minds, or in the files of its collectors or its producers. The story must be told and
it must be told well. The story must be convincing and to be convincing it must
not only be plausible or factual but its significance must be shown.
The Principles of Selection - In intelligence should be essential and
pertinent to the purpose at hand. Intelligence involves the plowing through a
maze of information, the considering and innumerable number of means or of
picking the most promising of a multitude of leads. The requirement of decision-
making covers very nearly the entire span of human knowledge. Unless there is
selection of only the most essential and the pertinent, intelligence will go off in
all directions in one monumental waste of effort.
The Principles of Timeliness - Intelligence must be communicated to the
decision-maker at the appropriate time to permit its most effective use. This is
one of the most important and most obvious, for Intelligence that is too soon or
too late is equally useless. Timeliness is one principle that complements all the
others.
The Principles of Security - Security is achieved by the measures which
intelligence takes to protect and preserve the integrity of its activities. If
intelligence has no security, it might be as well being run like a newspaper to
which it is similar.
7
8
jbdavid files….university of batangas – criminology…lipa campus
Forms of Intelligence
1. Sociological Intelligence – deals with the demographic and psychological aspects of
groups of people.
a. Population and manpower
b. Characteristics of the people
c. Public opinion – attitude of the majority of the people towards
matter of public policy.
d. Education – based of literacy rate
2. Biographical Intelligence – deals with individual’s personalities who have actual
possession of power.
3. Armed Force Intelligence – deals with the armed forces of the Nation.
a. Position of the Armed Forces Constitutional and legal basis of its creation and
actual role.
b. Organizational structure and territorial disposition
c. Military manpower recruitment.
d. Order of Battle
4. Geographical Intelligence – Deal with the progress of research and development as it
affects the economic and military potential of a nation.
8
9
jbdavid files….university of batangas – criminology…lipa campus
9
10
jbdavid files….university of batangas – criminology…lipa campus
3. Civil Security – it encompasses active and passive CI measures affecting the non-
military nationals permanently or temporarily residing in an area under military
jurisdiction.
Examples: Systematic registration of civilians and aliens
Control of circulation, Curfew,
Surveillance of suspected political organizations
Security screening of labor, Issuance of passes and permits
Control of internal commerce
1. Censorship – it is the control and examination of the Civil, National, Armed forces, Field
press, and POWs.
2. Special Operations – counter subversion, sabotage and espionage
WHAT IS CI OPERATION?
CI INVESTIGATION is an activity that constitutes the value of the CI workload, worldwide
and includes specific investigation of individual and incidence which for the most part are
conducted in an overt but discreet manner.
Three Categories of CI Measure
1. Denial Measure - Secrecy discipline, Document security, Camouflage and
concealment, Communication security, Military censorship, Counter reconnaissance
2. Detection Measure – PSI, Security tag or pass card, Challenge or password,
Reconnaissance
3. Deception Measures - Ruse – use of escape and evasion, Dummy position, Fabricated
info
Categories of CI Operation
1. Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to
use human sources to collect information or to conduct sabotage and
subversion
2. Counter Imagery Intel (IMINT) - Includes action taken to determine enemy
SIGINT and related EW capabilities and activities. These actions include
surveillance radar, photo thermal and infrared systems. Successful; counter
– IMINT operations rely heavily on pattern and movements analysis and
evaluation.
3. Counter Signal Intel (SIGINT) – determine enemy SIGINT and related EW
capabilities and activities, assess friendly operations to identify patterns,
profiles and develop, recommend and analyze counter measures.
10
11
jbdavid files….university of batangas – criminology…lipa campus
Intelligence Requirements
Collecting Agencies
Collection Plan
Users of Intel
methods of
dissemination:
Personal contact Sources of
Formal Intel Info
Documents Collecting
MISSION agencies
Intel Estimates
Periodic Reports methods of
Intel Studies collection
Collation Journal
Sit-map
Intel Files
Evaluation Interpretation
Persistence Analysis
Reliability of Source Integration
Credibility of Info Deduction
11
12
jbdavid files….university of batangas – criminology…lipa campus
Methods of Collection
1. Overt – open
2. Covert – secret
12
13
jbdavid files….university of batangas – criminology…lipa campus
As to Source of Info
T – DIRECT OBSERVATION BY COMDR/CHIEF OF A UNIT
U – REPORT BY PENETRATION AGENT OR RESIDENT AGENT
V – REPORT BY PNP/AFP TROOPS INVOLVED IN ENCOUNTER
W – INTERROGATIO OF CAPTURED ENEMY AGENT/FOREIGNER
X – OBSERVATIO OF GOV’T/CIVILIAN EMPLOYEE OR OFFICIAL
Z – DOCUMENTARY
13
14
jbdavid files….university of batangas – criminology…lipa campus
to the correct user, presented in a form that lends itself to immediate use
and distributed by the most effective means appropriate to both time and
security requirements.
Methods of Dissemination
1. Fragmentary orders from top to bottom of the command
2. Memorandum, circulars, special orders
3. Operations order, oral or written
4. Conference – staff members
5. Other report and intelligence documents
6. Personal Contact
INFORMATION
All evaluated materials of every description including those derived fro observation,
reports, rumors, imagery, and other sources from which intelligence in produced.
Information is a communicated knowledge by others obtaining by personal study,
investigation, research, analysis, observation. The use of modern gadgets in intelligence and
other things and material that possess or contain a desire information or knowledge.
Types of Informants
1. Criminal Informant – an informant who give information to the police pertaining to
the underworld about organized criminals with the understanding that his identity will be
protected
14
15
jbdavid files….university of batangas – criminology…lipa campus
Sub-type of Informant
1. Incidental Informant – a person who casually imparts information to an officer with
no intention of providing subsequent information
2. Recruited Informant – A person who is selected cultivated and developed into a
continuous source of info
Categories of Recruited Informants:
Spontaneous or Automatic Informant – Informants who by the nature of their work
or position in society have a certain legal, moral or ethical responsibilities to report
info to the police
Ordinary run of he Mill Informants – Informants that are under the compulsion to
report info to the police
Special Employee – informants who are of a specific operational nature
Other classification of Informant
Automatic, Penetration, Full time, Rival – Elimination, False Informant, Frightened Informant,
Self- aggrandizing Informant, Mercenary Informant, Double Crosser Informant, Woman
Informant, Legitimate Informant
Common Motives of Informants
Reward, Revenge, Fear and avoidance of punishment, Friendship, Patriotism, Vanity, Civic-
Mindedness, Repentance, Competition, Other motives
INFROMANT RECRUITMENT
1. Selection – (access)
2. Investigation – (potentials through CBI)
3. Approach – (pleasant surroundings, compromise free).
4. Testing – (begin with the limited assignment)
Factors considered in Informant Recruitment
Sex, Health, Age, Built, Education, Ability, Personality
INTELLIGENCE OPERATIONS
It is the result of intelligence planning, planning is always ahead of operation although an
operation can be made without a plan, it is usually due to sudden and inevitable situations but
definitely this is poor intelligence management.
15
16
jbdavid files….university of batangas – criminology…lipa campus
Cover story – a biographical data through fictional that will portray the personality of the
agent he assumed, a scenario to cover up the operation
Cover Support – an agent assigned in target areas with the primary mission of supporting
the cover story.
Types of Cover
1. Natural Cover – using actual or true background
2. Artificial – using biographical data adopted for the purpose
3. Cover with in a Cover – justification of existence
4. Multiple Cover – any cover you wish.
UNDECOVER AGENT
Special qualifications: Knowledge of the language, Area background regarding events,
Knowledge about the custom and habits, Physical appearance, an artist.
Agent Management
CONTROL – authority to direct the agent to carryout task or requirement on behalf of the
clandestine organization in an acceptable manner and security
1. Positive Control – is characterized by professionalism and rapport
2. Negative Control – characterized by blackmail and threat
Disciplinary Action - Escrow Account – Blackmail
SURVIELLANCE
A form of clandestine investigation which consist of keeping persons, place or other
targets under physical observation in order to obtain evidence or information pertinent to an
investigation.
Type of Surveillance
According to Intensity and Sensitivity
1. Discreet –subject person to be watch is unaware that he is under observation
2. Close – subject is aware that he is under observation varied on each occasions
3. Loose – applied frequently or infrequently, period of observation varied on each
occasion
According to Methods
1. Stationary – this is observation of place usually a bookie stall, a gambling, joint, a
residence where illegal activities are going on (fixed position)
2. Moving – surveillance follow the subject from the place to place to maintain
continuous watch of his activities
3. Technical – this is a surveillance by the use of communications and electronic
hardware’s, gadgets, system and equipment
Basic Preparations
Study of the Subject (Name, Address, Description, Family and Relatives, Associates, Character
and Temperament, Vice, Hobbies, Education, etc)
Knowledge of the area and Terrain (Maps, National and religious backgrounds, Transportation,
Public Utilities)
Subversive Organization (History and Background, Biography of the Official, Identity and
Background of members and former members, Method of identification employed by the
members, Files and records, nature, location and accessibility, Meeting)
Cover Story
17
18
jbdavid files….university of batangas – criminology…lipa campus
CASING
It is reconnaissance or surveillance of a building place or area to determine its suitability
for Intel use or its vulnerability in operations.
Method of Casing
a. Personal Reconnaissance – the most effective method and will
produced the most info since you know just what you’re looking for.
b. Map Recon – it may not sufficient but it can produce a certain amount of
usable info
c. Research - much info can be acquired through research
d. Prior Info – your unit and of the unit will have file report that they may
provide you with info
e. Hearsay –info usually gain by the person operating in the area and
performing casing job
ELICITATION
It is a system or plan whereby info of Intel value is obtained through the process direct
intercommunication in which one or more of he parties to the common is unaware of the specific
purpose of the conservation
Types of Approach
1. Flattery – people are susceptible to praise
a. Teacher – Pupil Approach –
18
19
jbdavid files….university of batangas – criminology…lipa campus
b. Kindred Soul Approach – the subject has been place in a pedestal having some
specialized quality and you flatter him/her by showing enough concern for his/her
welfare to pay special attention to his enjoyment
c. Good Samaritan Approach –
2. Provocative Approach – discover a wide range of conventional gambits. Ex. Joe Blow
Approach – is “I” know the answer to everything” approach. The elicitor adopts the attitude
of being approachable of any field
Types to Probe
1. Competition Probe – this is effective when used in connection with the teacher pupil
approach
2. Clarity Probe – used to elicit additional info in an area which the response is clear
3. His Pressure Probe – it serves to pin down a subject in a specific area or it maybe used
to point out contradictions in what the subject has said
4. Hypothetical Probe – presents a hypothetical situation and to get he subject to react to
the hypothetical situations
TACTICAL INTERROGATION
The need for obtaining information of highest degree of credibility on the minimum of
time.
Interrogation – the systematic asking of questions to elicit information in the minimum of
time.
Interrogator - person who does the questioning.
Interrogee – any person who is subjected to the interrogation process in any of its forms and
phases.
Suspect – any person believed to be associated with prohibited activity
Source – a person who for any reason submits information of intelligence interest usually on
a voluntary basis
Witness – any person who has direct knowledge of facts concerning an event or activity.
Provocateur – an individual from enemy forces who is deliberately introduce in our custody
with a specific mission of causing some unfavorable action or reaction on our part.
Screening – initial examination of an interrogee to determine the extent of his knowledge of
persons, places, things or events in which we are interested.
Formal Interrogation - the systematic attempt to exploit to an appropriate depth those are
of he interrogee’s knowledge which have been identified in the screening process
Debriefing – the interrogation of a friendly interrogee who has information at the direction of
or under the control of the friendly intelligence service.
Interview – Similar to a debriefing although it is less formal and the interrogee is not
necessarily under the control or employment of he respective intelligence service
Interrogation Report – an oral or written statement of information by the questioning f an
interrogee
Form of Interrogation
Direct – the subject is aware of the fact that he is being interrogated, but he may not learn
the true objectives of the interrogation. This is being used extensively at the tactical lever.
Indirect – the subject is not aware that he is being interrogated. This is used when time is
not so important
19
20
jbdavid files….university of batangas – criminology…lipa campus
Techniques of Interrogation
The “Open Techniques” – the interrogator is open and direct in his approach and makes no
attempts to conceal the purpose of the interrogator. It is best employed when the interrogee is
cooperative. It is frequently used at the tactical level where time is a major interrogator.
The “Common Interest” Technique – the interrogator must exert effort to impress the
interrogee of their common interest. The interrogator must look for he point out the real
advantages the interrogee will receive if he cooperates
Record File (we know all technique) – the interrogator prepare a file on the source listing all
known information (record should be padded to make it appear to be very extensive)
Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”, “Bud
Guy – God Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”.
ASPECTS OF SECURITY
Protective Security- can be defined as those measures taken by an
installation or unit to protect itself against sabotage, espionage or subversion
and at the same time provide freedom of action in order to provide the
installation of the unit with the necessary flexibility to accomplish its mission.
Physical Security- can be defined as those measures taken to prevent
physical access or entry to an installation or area by an unauthorized
personnel.
Personnel security- Personnel security measures are those measures
taken to insure that only authorized personnel have access to classified
documents or information.
Security of Classified Matter- Security of classified matters are those
measures taken to prevent the unauthorized disclosures of classified
matter.
PHYSICAL SECURITY
Physical Security may be also defined as the safeguarding by physical
means, such as guard, fire protection measures, of plans, policies, programs,
personnel, property, utilities, information, facilities and installation against
compromise, trespass, sabotage, pilferage, embezzlement, fraud, or other
dishonest criminal act.
20
21
jbdavid files….university of batangas – criminology…lipa campus
21
22
jbdavid files….university of batangas – criminology…lipa campus
SECRET MATTER
Information and material (matter), the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be of great advantage to a foreign nation. A SECRET grading is
justified if:
It materially influences a major aspect of military tactics;
It involves a novel principle applicable to existing important projects;
It is sufficiently revolutionary to result in a major advance in existing techniques or in the
performance of existing secret weapons;
It is liable to compromise some other projects so already graded.
CONFIDENTIAL MATTER
Information and material (matter) the unauthorized disclosure of which, while not
endangering the national security, would be prejudicial to the interest or prestige of the nation or
any governmental activity, or would cause administrative embarrassment or unwarranted injury
to an individual or would be of advantage to a foreign nation.
RESTRICTED MATTER
Information and material (matter), which requires special protection other than that
determined to be TOP SECRET, SECRET, or CONFIDENTIAL.
COMMUNICATION SECURITY
Communication Security is the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized persons in gaining information
through our communications. It includes Transmission, Cryptographic and Physical security..
TRANSMISSION SECURITY
Transmission Security is that component of communication security which results from all
measures designed to protect transmission from interception, traffic analysis and imitative
deception.
22
23
jbdavid files….university of batangas – criminology…lipa campus
CRYPTOGRAPHIC SECURITY
Cryptographic Security is that component of communication security which results from
the provisions of technically sound crypto-system and their proper use.
PERSONNEL SECURITY
The Security “chain”: Personnel Security is the “weakest link” in the security
“chain” .
Personnel Security Investigation- is an inquiry into the character, reputation, discretion
and loyalty of individual in order to determine a person’s suitability to be given security
clearance.
EXECUTIVE/VIP PROTECTION
Executive/VIP Security. – Those measures taken by Agents, Security Officers, Law
Enforcement officers or an Agency /officers to protect heads of state, foreign, national or local
dignitaries, civilian or military against any personal injury, assassination, sabotage, and
espionage. These may include the protection of any government or civilian officials and
individual utilized as government witnesses.
23
24
jbdavid files….university of batangas – criminology…lipa campus
NATIONAL SECURITY
National Interest
National Interest - the general and continuing end for which a nation acts. The term
“national interest” is used to refer to the general concept of national security and well-being.
Philippines National Interests - includes self-preservation, freedom and independence,
territorial integrity, political stability, and socio-economic welfare.
National Strategy
In furtherance of our national principles and polices, the leaders of our nation are then
able to formulate our strategy.
National Strategy is the art and science of developing and using the political, economic,
and psychological powers of a nation, together with its armed forces, during peace and war, to
secure national objectives. It is the long -range plan through which a nation applies its strength
toward the attainment of its objectives.
National Power
The numerical strength and character of population, cultural development, character of
government, geographical location, resources, economic development and military potential.
The degree to which a nation is strong or deficient in these elements is normally a measure of
its national power.
24
25
jbdavid files….university of batangas – criminology…lipa campus
Military strength is the ability of a nation to exert pressure by armed force in furtherance
of national policy. It consists of the strength of all the armed forces in combination with other
elements of national power, depending heavily on natural resources, economic strength, a broad
base of war industries and a vigorous population, military strength is influenced by the number
and quality of the nation’s military, economic, and political alliances.
25