Methods in Gathering Information

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

METHODS IN GATHERING INFORMATION

It simply refers to the different approaches as to how information shall be gathered or collected.

The police department collects information in response to the intelligence requirements of its
head of office through “police routine activities”. These activities include but are not limited to patrol,
use of informant’s criminal investigation, community relations, checkpoints, searches and seizures,
surveillance operations, and coordination with other agencies. Whatever activities are maintained by
the police in the collection of information.

COVERT METHOD
It is a clandestine or secret means of obtaining information regarding criminals, organized crimes,
subversive elements, and activities of foreign nations. The most common techniques of covert
operations include “infiltration” and “surveillance”. These techniques range from physical observation
to the electronic monitoring of conversations.

Infiltration- is a secret and gradual penetration into the enemy organization, domain, and territory in
order to acquire information. It is by means of penetrating enemy’s organization. The process of secretly
becoming part of a group in order to get information or to influence the way that a group thinks or
behaves. (LETTER U SOURCE)

Surveillance- is an act of monitoring the behavior and activities of the people or group of individuals
and others with great interest to the police or the collection agency. A secret observation of persons
places, and vehicles for the purpose of obtaining information concerning the identities and activities of
the subject.

Surveillance is used by the government for the prevention of crime, the protection of a process, person,
group or object, or for the investigation of hostile activities.

Types of surveillance
1. Fixed surveillance also known as stakeout- it is conducted when a person, object, or activity
being watched is not expected to move from one area. The surveillant may however, move from
one vantage (position) point to another in the immediate area.
2. Moving surveillance also known as tailing or shadowing- a moving surveillance is conducted
when a person, object or activity being watched move from one place to another. The
surveillant may however, move from one vantage point to another in the immediate area.
a. Open tail/surveillance
Also termed as “rough surveillance”. The subject is most likely aware of the surveillance.
b. Close tail/surveillance
The subject is kept under constant surveillance also termed as “tight surveillance” the aim is
not to lose the subject even at the risk of being “made”.
c. Lose tail/surveillance
Refers to the tailing commonly employed if the surveillant wants to remain undetected.
3. Aerial surveillance
This type of surveillance is done using helicopters or other aerial devices. This is commonly
employed in the areas that is not accessible by foot or vehicle surveillance.
4. Technical surveillance
This surveillance involves or uses communication and electronic eavesdropping devices such as
wiretaps, tracking devices, beepers and electronic hardware’s gadgets system and equipment in
information gathering.
4A. AUDIO ELECTRONIC SURVEILLANCE
This refers to the employment of bugging or wiretapping devices.
4A.1 BUGGING
Is eavesdropping any communication or conversation with the aid of any bug devices. Bug is a
form of electronic device placed in a establishment to record, receive or transmit conversation.
4A. 2 WIRETAPPING
Is the interception of communication lines such as telephone or cellphone lines in order to listen
or record conversation.
It is an act of listening secretly to any conversation who are within the same premise as the
person who intends to listen to the conversation.

Equipment used to achieve the covert method of intelligence

 Body wire
 Tracking device
 Surveillance (PICTURES)
 Low light photography
 Covert packages
 Audio electronic device

OVERT METHOD
The act of obtaining the information through the use of open methods or through the
employment of open source data is known as overt method. It involves the collection of
information from open sources such as the government records, census and statistics,
commercial and business listings and other printed materials available to the public such as the
newspapers publications.

You might also like