1 / 22

Group-IV

Group-IV. REPORT. Counter Intelligence. Counter Intelligence Defined

idola
Télécharger la présentation

Group-IV

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group-IV REPORT

  2. Counter Intelligence

  3. Counter Intelligence Defined This refers to the activities devoted to effective actions to destroy and neutralized the effectiveness of adverse enemy intelligence activities and to use defensive action to protect information, installation, and other vital forces resources against sabotage, espionage, subversion and terrorism. Two Major Types of Counter Intelligence 1.Passive measure (Defensive)- counter intelligence that seeks to conceal information from the enemy .

  4. 2. Active measure (Offensive)- counter intelligence that seek to actively block the enemy’s attempt to gain information or actively block the enemy effort to engage in espionage, sabotage, and subversion. Basic Principle of Counter Intelligence Operation 1.Conformity to mission 2.Avoidance of publicity 3. Objectively 4. Conformity 5. Offence 6. Flexibility 7. Continuity 8. Coordination

  5. Importance of Counter Intelligence 1. Denies information to the enemy 2. Reduces the risk of the commander 3. Aids in achieving surprises 4. Increases the security of the command 5. Decrease the ability of the enemy to have information about our forces. Limitations of Counter Intelligence Operation 1. Constitution 2. Penal laws 3. Special laws 4. Directives/legal provisions 5. PNP regulations standard operating procedures

  6. Figure 5 shows how the investigation team conducts a personnel security investigation process. REQUESTERS: Army Army PNP PNP Navy Navy Air Force Air Force Agencies Personnel Investigation Center Agencies OTHER AGENCIES FIELD Security Forms Figure 5. The Personnel Security Investigation Process

  7. Personnel Security and Personnel Security Investigation • The important factor in a security program is man himself. No security program can be efficient if the person who has knowledge of the protected information reveals the information to an authorized person. Personnel security aims to protect from hostile activities of the opposition, security orientation and indoctrination, and security education that will ensure the prevention of unsuitable individuals from gaining access to classified matter or being appointed, employed, or retained. It includes all measures to common to units/ offices involving the selection of personnel intended for sensitive positions, security clearance, a badge and pas system, and security education.

  8. Three basic objectives of personnel: • To provide the standards and procedures necessary to ensure the appointment, employment, or retention of suitable and loyal individuals in the government. • To develop the necessary and proper security discipline among the applicants and employees of the government in order to protect and preserve the security interest of the Philippine government. • To inculcate desirable security attitudes and habits among the applicants and employees of the government in order to promote the service.

  9. B. Basic policy • The general policy is that no person shall be entitled solely by his grade or position to knowledge or possession of classified matters, and that such matter shall be entrusted only to those individuals whose official duties require access to classified matter. Such person must meet the following standards: unquestionable loyalty, integrity and trust worthless, and has excellent character and has good judgment in the handling of classified matters.

  10. C. Personnel security investigation • A person security investigation is an inquiry into the loyalty, character, morals, and discretion of an individual because of the sensitive aspects of the position he holds or is about to assume. The aims of personnel security investigation are to make that the subject is of unquestionable loyalty, integrity, discretion and of excellent character, and that the subject has good associated habits and is a person with good judgment. • Authority conducts personnel security investigations on individuals in the Military/PNP and other agency personnel as authorized, these investigations are used by the authorities to determine if it is clearly consistent with the interests of national security.

  11. Factors Considered in Personnel Security Investigation A personnel security is an inquiry into the following qualities of an individuals. Integrity Loyalty Discretion Character Morals Reputation Figure 6. Qualities of an individuals

  12. All of these areas present a view of the individual’s entire character to the appropriate authorities so that officers have accurate information on which to make an appropriate security determination. • Loyalty - faithfulness and true allegiance to the Philippines government and duly constituted authority. • Integrity– uprightness tin character, soundness of moral principle, honesty and freedom from moral delinquencies • Discretion – the ability or tendency to act or decide with prudence: the habit of good judgment and extensive intelligence.

  13. 4.Morals – principle or standards of conducts of an individual, his ethical judgment in human relations and respect to superiors. 5.Character– the sum of traits that serves as an index to the essential or distinctive nature of a person, it is what a person is. 6.Reputation– the opinion or extermination in which one is generally held. It is what a person is reported to be.

  14. Motives that Cause People to be Disloyal • Revenge– is one of the strongest motivations which can cause a person to be disloyal. A real of fancied wrong can create hatred which will make one get back on another. • Material gain – some people are by nature materialistic that they will stop at nothing to achieve this end. • Personal prestige – this applies to those whose main desire is power – power over others – powers over the world. Power corrupts and individual. • Friendship– through close attachment to another person, many people do things inimical to their country. 5. Ideological beliefs– if a person holds beliefs inimical to his country, he is obviously vulnerable to approach by subversive group agents.

  15. Situation that could be exploited by subversives or the weaknesses which make people susceptible to pressure: • Close relatives in foreign lands – threat of treatment of loved ones under the control of the threatening power. In recent times, the communists have use d this technique extensively in attempts to secure cooperation and support. • Heavy investment in foreign lands – there are many people who consider material wealth more important than integrity and one’s moral principle. These people, when threatened with loss of their investment in foreign land, can be persuaded to betray their country. • Jealousy – one of the most powerful of motivation, jealousy can be used by alert agents to make officials loyal to the government betray their country’s interests.

  16. 4. Gullibility– the desire for more than what you have can be exploited by subversives. 5.Weakness of Character - a person with weak character can easily be dominated and is fair prey for subversive agents. 6.Serious indebtedness – the person who is heavily indebted is always looking for a fast and easy way to recover his losses and get out of debt. Such a person is very vulnerable and definite security risks when approaches with a lure of a large sum of money. 7.Addiction to drugs – drug addict will commit any crime to obtain their dope. 8.Serious guilty episodes in the past – threats to expose shameful acts committed have always been a powerful level for blackmailing a person into committing illegal acts

  17. Types of Personnel Security Investigation • Local Agency Check (LCA) – Investigation of the records and the files of agencies in the area about the individual subject. This includes check with the local police, municipal trial court, provincial fiscal, and counter intelligence unit. • National Agency Check (NAC) – consists of LAC supplemented by investigation of the record. • Partial Background Investigation – an inquiry into the specific phases of an individual’s life history including a minimum NAC, contact with character references and former employer, and such other investigations as may be deemed necessary by the investigation agency. • Complete Background Investigation – a complete inquiry or investigation into the specific phase of an individual’s life history.

  18. Agency checks • Birth records • Education • Employment • Citizenship • Police records • Credit records • Foreign travel • Organization • Neighborhood check • Character references

  19. Reference: Personal bacground: (Narrative) Biographical data: Personal data: Name: Address: Age: Sex: Date of birth: Martial status: Citizenship: Physical description: Height Weight: Built: Color of hair:

  20. Family background: Father’s name: Address: Occupation: Mother’s name: Address: Occupation: College: Name of school: Year of graduated: Degree/ course: Others:

  21. Educational background: Elementary: Name of school: Year graduated: High school: Name of school: Year graduated: Security Survey and Inspection security Survey and Inspection Security survey service to assist commanders in determining the security measures required in protecting key installation from possible sabotage, espionage, subversion, and unauthorized disclosure of or access defense information materials contained therein. “Security inspection" service is performed to determine the degree of compliance with established security policies and procedure.

  22. Thanks for listening!!!Have a good day and God bless… =)

More Related