Definitions of Terms:: Police Intelligence
Definitions of Terms:: Police Intelligence
Definitions of Terms:: Police Intelligence
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
POLICE INTELLIGENCE
Definitions of Terms:
Project, proposals - a recommended general plan of action envisioned to undermine a target
threat group or organization with the ultimate objective of neutralizing its ranking personalities and
machinery in a specified time frame.
Intelligence Project - all project proposals approved by higher headquarters, officers and
competent authorities.
COPLAN - a case operation plan
Case Operation Plan - a time-phased plan of action under an intelligence project directed
against a specific personality under a threat group or organization through infiltration and
penetration by an Action Agent/s (AA.) and other means with the ultimate objective of neutralizing
the target personalities
Action Agents (AA) - are recruited, documented and dispatched intelligence agents with
access and/or placement in a target personality's group or organization. They receive and implement
orders from an Agent Handler (AH)
Principal Agent (PA) - an intelligence man who had developed his information net within a
target organization or a particular area of operation.
Support Agent (SA) - is a person who extends administrative or operational assistance to the
Agent Handler or Action Agent.
Target - is a person, organization, installation or activity considered inimical to national
interest and security and is the objective of an intelligence project or COPLAN.
Case Operation Officer - any intelligence officer who initiates and implements a COPLAN
Surveillances a planned observation of persons, places or objects and activity.
Subject - the person, place or object being watched or under surveillance.
Convoy - an accomplice or associate of the subject who follows him to detect surveillance.
Decoy - a person or object used by the subject in an attempt to elude surveillant. Contact -
any individual whom the subject speaks or deals with in any way while he is under
surveillance
Fade - when subject under surveillance becomes aware that he is under observation and
identifies the observer.
Lost - the subject is lost when the surveillant does not know his whereabouts. The surveillant
is lost when the subject has eluded him.
Fingerman - an individual who can positively point out the subject
Put the finger on-to identify subject by pointing him out either in person or in photograph
Put to bed - when the subject under surveillance has returned to his quarters and apparently
retired for the night, the surveillants are said to have put to bed.
Shades and Fails - to follow an individual wherever he goes, on foot or vehicle. Tail -
conscious or tail-wise - an individual who is alert for surveillance.
Tail Job - surveillance assignment
INTRODUCTION:
In essence, intelligence is knowledge. As such, it under-goes an often intricate cognitive
process of synthesizing data of various forms and sources in order to perceive with a high decree of
certainty the truth or reality of things, individuals and events for the purpose of serving the best
interest of its sponsor.
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Principles of Intelligence:
1. Intelligence is a command responsibility - the use of Intel is a force multiplier, which
enhances the efficiency and effectiveness of police operations. Its non-utilization most often may
result in failure of police operation. It is therefore expedient that police officers most especially
Chiefs and Heads of Offices recognize their intrinsic value.
2. Intelligence and Operations are interdependent - intelligence provides valuable inputs for
effectiveness of police operation; operation likewise is needed for continuity of intelligence
activities.
3. Intelligence must be useful and timely - Intel data must be disseminated on time. It is a
waste of time if data is not disseminated to end-user on time or is found to have no
application and significance to police operation.
4. Intelligence Operations require flexibility, imagination, foresight and resourcefulness -
although the accomplishment of the assigned task is of paramount importance, police personnel arc
reminded to refrain from utilizing criminal elements in Intel operation.
5. Intelligence operations are continuous activities following a definite cycle - since it is a
cycle, it has no end. It begins where it ends.
6. Intelligence requires the employment of continuous security measures to protect
information, its source and organization itself.
7. Intelligence requires careful and thorough planning - It includes the anticipation of
intelligence needs, the identification of capable agencies and personnel to be tasked to provide the
valuable inputs to answer the Intel needs and the supervision of these collection agencies and
personnel.
4. DESSIMINATION – passing Intel data to end-users. In this process, consider the factors
of timeless, propriety and security.
EVALUATION OF EVALUATION OF SOURCE OF
SOURCE ACCURACY OF INFORMATION
ITEM
A - Complete 1-Confirmed by other T-Direct observation by
Reliable source other Unit Commander
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Method of casing:
Page 272 na to
SECURITY OPERATION
Preliminary:
Security is the state or quality of being secured, freedom from fear or danger; assurance;
certainty. To secure is to make safe or be protected.
The security of any business establishment today is a complex process. Security work involves
active and passive measures so that effective defenses can be established against crimes.
Active measures are the physical barriers, security lighting, use of vaults, locks and others.
Passive measures are those that will deter man from committing such act for fear of being caught,
charged in court or get dismissed. Security education programs, investigation, fire prevention seminars,
personal security checks are examples of passive measures.
Types of Security:
1. Physical Security - is the broadest branch of security which is concerned with the physical
measures adopted to prevent unauthorized access to equipment, facilities, materials and documents,
and to safeguard them against espionage, sabotage, damage and theft. Physical security covers other
types of security to protect equipment, document facilities and materials against theft, damage,
sabotage or espionage. It also encompasses protection of personnel from any criminal act.
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
4. Bank security - a specialized type of physical security protecting the assets, personnel and
operation of a bank, with special emphasis on the precaution and measures to safeguard the cash and
asset while in storage, in transit and during transactions.
5. Document Security - is physical security involving the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
6. Personal Security - protection of personnel especially ranking officials from any harm, kidnap
and other acts affecting them. VIP security is a type of personal security.
7. Crises Security - a part. of VTP security involved in hostage and kidnapping of VIPs.
8. Industrial Security - is a physical security as applied to business groups engaged in industries
like manufacturing, assembling, research and development, processing, ware
housing and even agriculture. It is a form of physical security involving industrial plants and business
enterprises where the personnel, processes. Properties and operations are safeguarded.
9. Operational Security - a part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing
Activities from espionage, infiltration, loss, compromise or photocopying.
Security Hazards
Security hazards is an act or condition which results in a situation like a breach of the
protection system and the subsequent loss or compromise of defense information, company secret or
damage to personnel, property or facilities.
3. Natural Hazard - is the act or situation caused by natural phenomenon like floods, typhoons,
earthquakes, etc.
Note: That the real problem actually in industrial place is the human or man-made hazards like
pilferage, theft, arson, etc.
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Note: A sudden dive of peso against the dollar which may cause inflation is an example of relative
criticality of operation
Types of Pilferers:
1. Casual pilferer - one who steals due to his inability to resist the unexpected opportunity and
has little fear of detection. Examples of these are kleptomaniac, children, and imbecile, etc.
4. Systematic Pilferer - steals with preconceived plans and takes away any or ail types of items
or supplies for economic gains. Examples of these are the professional shoplifters.
d) Clear zones - an obstructed area maintained on both sides of the perimeter barrier. A clear zone of
20 feet or more is desirable between the barrier and extension structures and natural covers
which may provide concealment or assistance to a person seeking unauthorized entry. Where it
is impossible to have clear 7ones, because of property lines or natural features, an increment in the
height of the fencing increased guard coverage, more security Sighting, or the use of intrusion devices
in that portion of the perimeter barriers should be done.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Security Lighting
1. Security lighting provides sufficient illumination to areas during hours of darkness. Among
its other purposes are:
a) It improves visibility so that intruders can be
seen, identified or apprehended.
b) It gives psychological fear which serves as a deterrent to thieves, pilferers, trespassers and
saboteurs.
c) It makes easier the routine work of guards in identifying employees, vehicles, etc. during
nighttime.
d) If placed in certain areas, may even reduce the number of stationary guards and instead may
require only roving patrols at night.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
1) Glare - projection type - the intensity is focused to the intruder while the observer or
guard remains in the comparative darkness. The lighting is toward the approach of an entrance to an
installation. Lights with reflectors increase glare.
2) Controlled Lighting - the width of the lighter atop can be controlled and adjusted to
suit the security needs. The lighting is focused, sag on a pile of items, rather than on the backgrounds.
These two types are used on the entry gate of employees
and vehicles.
b. Stand - by Lighting similar to continuous lighting but is turned on manually or by special
device or other automatic means when there is suspicion of entry.
c. Movable lighting - consists of stationary or portable, manually operated search Sights which
may be lighted continuously during hours of darkness or only as needed and
usually supplementary to cither at" the first two types.
d. Emergency Lighting - a stand-by lighting which can be utilized in the event of electrical
failure, either due to local equipment or commercial power failure.
Protective Alarms
a) Alarm -aural or visual signal given by the annunciator to security when intruder enters in a
protected area. An annunciator is a visual or audible signaling device which initiates conditions of
associated circuits.
Basically, alarm systems are designed to alert security personnel to consummated or attempted
intrusions into an area, building or compound. Each type of alarm is activated in the event that an
intruder tampers with the circuitry, a beam or radiated waves; intrusion alarm can be an electrical,
mechanical or electronic. Alarms are also used for fire, smoke or other emergencies and presence of
other hazards.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Auxiliary System - on installation owned system which is a direct extension of the local
enforcement agency and/or fire department by special arrangements.
Local Alarm System - consists of rigging up a visual or audible alarm near the object to be
protected. In case of alarm, presence will be made by the local guards and other personnel within sight
or hearing.
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
c. The disk tumbler locks - also known as the wafer tumbler type, has flat tumbler with open
center fitted type into slots in a plug, which is in turn fitted into a lock case.
Pin tumbler lock - the pin tumbler mechanism depends for its security un a number of round
pins or tumblers operating on a cylinder.
Lock - a portable and detachable lock having a pivoted or sliding hasp, which passes through a
staple ring, or the like and is made secured.
Combination Locks - is a lock that requires manipulation of parts according to a
predetermined combination code of numbers or letters.
Master key - a special key capable of opening a series of locks. This key is capable of opening
less number of locks than grand master.
Master Keying System - a system used in big installation whereby keys can open a group or
group of locks. This is possible by the use of interchangeable cylinder cores in the locks.
Level of Control in the Master Keying Plan
C. Three Levels - grand master key All locks operated by change key, master key and
grand keys. Grand Master key operates all locks generally used in-a large building or a facility with
several buildings. Examples: office building, hospitals.
D. Four levels - Great grand master key All locks operated by change key, grand master keys
and great master keys. Used greatly in large com-plex system and similar to three Levels.
Maison keying - the issue of key to open the main entrance and the office.
Coded lock - a type of lock that can be closed and opened remotely by electronic means.
Fire Protection
1. Automatic Sprinkling System
Automatic sprinkling - is a type of built-in sprinkling which works by the increase of room
temperature and which automatically operates the system to put out the fire.
b. Dry pipe system - the pipes are filled with air under pressure, which hold the water
at a valve located in a room. When sprinkler head goes into operation, air is released, trapping the dry
pipe valve and allowing water to How through the system
2. Pump - a mechanical device for supplying water which can be manual or motor-driven.
These pumps are ideal when natural supplies of water are readily available like a river, lake or stream.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
3. Standpipes - are steel or plastic pipes located inside a building from the lowest to the top
floor with water under pressure for use in case of fire. Located near the standpipes is a fire hose
screwed into the standpipe outlet and a valve is opened to release the water. The water from the
standpipe can come from a storage tank at the roof or from a series of water pumps.
4. Fire hydrant - a mechanical service strategically located in an installation or street where a
fire hose is connected so that water with pressure will be available to extinguish a fire.
5. Portable Hand Extinguisher - is a fire fighting equipment which can be portable or in a cart
that is used to put out fire depending on the contents to extinguish certain types as classes A to D. This
is the most. Important and useful piece of fire fighting equipment in a plant, building or facility.
Clauses of Fire
a. Class A Fires - result to burning of wood, paper, textiles and other carbonaceous materials.
Extinguishment of this type is by quenching and cooling. Extinguishers which have water, sand, acid,
foam and the special solution of alkaline methyl dust, as found in the load-stream extinguisher; should
be used for this type of fire.
b. Class B Fires - those caused by flammable liquids like kerosene, gasoline, benzene, oil
products, alcohol and other hydrogen derivations. This type is put out and con trolled by foam, loaded-
stream, carbon dioxide, dry chemical and vaporizing liquid. If water is used, it might even spread the
flame, or explosions may ensue.
c. Class C Fires - Those that start in live electrical wires, equipment, motors, electrical
appliances and telephone switchboards. The extinguisher that should be used for such fires are carbon
dioxide, dry chemical and vaporizing liquid, as the soda-type can even electrocute the extinguisher
holder. In this case of fire, source of electricity should be shut off.
d. Class D Fires - the result of combustion of certain metals in finely divided forms. These
metal can be magnesium, potassium, powdered aluminum, zinc. sodium, titanium lithium, and
zirconium. This type of fire can be put out by G.I. type methyl LX, Lithium X, methyl L KYL, d;-y
sand and dry talc.
3. Dry Chemical Multi-purpose. (Class A, B, C Fires) Operates same as the dry chemical
type above. Coat Class A combustible thoroughly. Do not mix with dry chemical designed only for
Class B end C fires.
4. Foam (Class A, D Fires)Operates like soda acid, operates by turning extinguisher upside down.
Don't ever invert until ready to use. Aim stream at wall; or container side in back of fire, allowing foam
to flow easily OP. fire.
Class I - Vital records - include those that are irreplaceable; records of which reproduction does
not have the same value as the original; records needed to recover cash to replace buildings,
equipments, raw material, finished products and records needed to avoid delay in restoration of
production, sales and services.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Class II - Useful Records - include records which loss might cause inconvenience but could be
readily replaced and which would not in the meantime present an insurmountable obstacle to the
prompt restoration of the business.
Class III - Important Records - include records the reproduction of which will involved
considerable expense and labor, or considerable delay. Operating and statistical records belong to this
class as well as those maintaining check on efficiencies, operation, cost, etc. Also included are
contracts, customer’s credit flies, sales records, designs in process development, records of
experiments in progress, etc.
Class IV - Non-Essential Records - are daily files, routine in nature so that even if lost or
destroyed, will not affect operation or administration.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence
Security survey is performed by qualified security experts who can be from the organization or
outsiders contracted to do the job. Recommendations will fall into
three categories
a) Human guard
b) Equipment
c) Procedure
Note; Security education program to be effective must have the support and sanction of top
management. The main thrust being to acquaint all personnel of the reasons for the security measures.
This program should be given to all personnel from the work group that has no access to classified
Sendeavors, to the supervisors and executives handling sensitive plans and policies of the industrial
firm. This program is given a "follow through" which will be continuing and tailored to the specific
group level, depending on their access to restricted work and activity.