Types of Surveillance
The types of surveillance that the agent or surveillant use may vary depending on his purpose. As such, it is the
job of the police investigator in charge as to what should be the best type of surveillance that should be done in
order to acquire details necessary for the case under investigation or for future endeavors. The types of surveillance
are discussed as follows:
1. Stationary surveillance - this surveillance is otherwise known as fixed, plant or stakeout surveillance and
is commonly done in one standard location. This is best useful when:
a. A stolen property is expected to be dropped; or
b. A crime is expected to happen.
2. Moving surveillance - this surveillance is employed when the subject moves from one place to another.
The person is commonly tailing or shadowing the subject. Tailing or shadowing simply means as the act of
following a person's movement either through foot or with the use of an automobile. The subject of this
surveillance is usually a person. Under this method of surveillance, this could be done in the following
manner:
a. Rough tail or open tail - otherwise known as rough shadowing, and is commonly employed if the
subject knows about the presence of the surveillant. Rough tail can be used in the following scenario:
When the subject is a material witness of a crime; or
A fugitive who knows that he is under constant surveillance.
Take note that rough tail also suffers some liabilities and charges like police harassment or
invasion of privacy.
b. Close tail or tight tail —this tailing is employed when it is extremely important not to lose the
subject and a constant surveillance is needed. Close tail is very useful when:
The subject will commit ä crime;
There is a need to know the subject's exact habit; and
Subject's activities are necessary to another critical operation.
This tailing is employed even if the subject recognizes the surveillant which means that the
subject must be within his distance and sight.
c. Loose tail — refers to the tailing commonly employed if the surveillant wants to remain
undetected. This tailing could be used best when:
Surveillant needs the general information about the subject; and
Surveillant needs to know the subject's activities or associates.
If the subject is lost during surveillance, relocate the subject and continue the surveillance.
3. Aerial surveillance—this type of surveillance is done using helicopters or other aerial devices. This is
commonly employed in areas that is not accessible to foot or surveillance vehicle.
4. Video surveillance - this refers to the use of video equipment and other devices used to record visual
activity of the subject.
5. Audio or electronic surveillance - this refers to the employment of bugging or wiretapping devices.
These two differ such that:
a. Bugging is the eavesdropping any communication or conversation with the aid of any bug
devices. Bug is a form of electronic device place in an establishment to record, receive or transmit
conversation.
b. Wiretapping is the interception of communication lines such as telephone or cellphone lines in
order to listen or record conversation.
1|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE
In addition, eavesdropping is the act of listening secretly to any conversation who are within
the same premise as with the person who intends to listen to the conversation. Example of this:
Listening to people who are talking at the table beside you; and
Sitting beside the person who is talking to someone over telephone lines.
Methods of Surveillance
The manner as to how surveillance is to be conducted which includes the various procedures and
techniques employed by an agent or surveillant is referred to as the methods in surveillance. This could be either be
one-man shadow, two-man shadow, or three-man shadow.
In one-man shadow, as the number speaks, there is only one surveillant following the subject. If two-man shadow,
two surveillant. In three-man shadow three surveillant.
Procedures in the Conduct of One-Man Shadow
1. Follow the subject, but not too close. A distance that is enough for you to see the subject, but
not too far to lose the subject.
2. If the subject turns, you either follow his path or cross to the other side, whichever you think
is practicable in the situation.
3. Make a good decision as to where the subject will be going. In that case, the surveillant is at
the advantage in taking the right position or placement while following the subject.
4. Do not wear any apparel or clothing that are obvious or can caught the attention of the
subject.
5. Take photographs if possible, especially those contacts by the subject.
6. For photographic guidance, see Figure 7.Figure 7. One-man Shadow
Procedures in the Conduct of Two Man Shadow
2|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE
1. The first surveillant (A) should follow the subject while the second surveillant (B) follows the first
surveillant.
2. Both surveillant should have a proportionate distance. Meaning, a distance that is enough for them to
see, but not too far to lose the subject. They must also have a proportionate distance which means that
they are not too far or too close to one another.
3. If the subject either crosses the street or turns, allow the second surveillant (B) to follow the subject
while the first surveillant (A) should either cross or go straight but not on the same side where the
subject go. This time, the first surveillant should find the right place and timing to regroup. He may
stop and later follow surveillant (B) or turn and catch them on the next corner depending on the
situation.
4. Make a good decision as to where the subject will be going. In that case, the surveillant is at the
advantage in taking the right position or placement while following the subject.
5. Regroup if chances are possible. Meaning, have the original placement but necessarily the same
surveillant when you started doing the shadowing of the subject. This means that the first
surveillant (A) may now become the second surveillant (B) or vice versa.
6. Do not wear any apparel or clothing that is obvious or can catch the attention of the subject.
7. Take photographs if possible, especially those contacts by the subject.
8. For photographic guidance, see Figure 8.
Figure 8. Two-man Shadow
Procedures in the Conduct of Three-Man Shadow
1. The first surveillant (A) should follow the subject while the second surveillant (B) follows the first
surveillant. The third surveillant (C) is in the same way where the subject is going but on the opposite
street parallel with surveillant (A).
2, Like in one man and two-man shadow, both surveillant should have a proportionate distance.
3. If the subject either crosses the street or turns, allow the second surveillant (B) to follow the subject
while the first surveillant (A) should either cross or go straight but not on the same side where the
subject gone. The third surveillant (C) should observe the subject and act the role of either surveillant
A or B depending on the situation. Whoever becomes the third surveillant should follow the same.
Later, they should find the tight place and timing to regroup.
3|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE
4. Make a good decision as to where the subject will be going. In that case, the surveillant is at the
advantage in taking the right position or placement while following the subject.
5. Regroup if chances are. possible but again, not necessarily the same place when you started doing the
shadowing of the subject. This means that the first surveillant (A) may now become the second
surveillant (B) or vice versa and surveillant (B) becomes now the surveillant (C) and surveillant (C)
becomes now the surveillant (A) or vice versa depending on the situation.
6. Do not wear any apparel or clothing that is obvious or can caught the attention of the subject.
7. Take photographs if possible, especially those contacts by the subject.
8. For photographic guidance, see Figure 9.
Take note that the procedure taken either in one man, two man, or three-man shadow are quite the same. They
just differ in terms of their role and placement. In this way, alarming the subject that he is under surveillance is
quite small considering that there are two or three persons conducting the surveillance.
Figure 9. Three-man Shadow
Casing
Casing refers to the process of inspecting places to determine its suitability for operational
use. In the military, it is known as Reconnaissance. Sometimes, it is called the surveillance of
places or building. Casing could be done either:
1. Internal - it is the inspection of the different parts of the building or any structure which
includes but not limited to the different rooms within the building.
2. External - this is the inspection and observation of the immediate areas surrounding the building or any
structure which includes location, direction, possible exits, and others.
AGENTS
An agent is defined as any person capable, skilled, and competent in collecting, extracting,
gathering, infiltrating, penetrating information of all kinds in various sources as well as knowledgeable
in the science of disguise in order to avoid detection from the enemy or any unwanted forces while
doing intelligence work. Intelligence work is defined as the clandestine operation or activity done by
any agents in order to gather relevant facts for future operation.
Agents also play an important role in extracting information in any undercover operation. They do
interview of suspected individuals, infiltrate the rank of criminal syndicate or even disguise as one of them with the
sole purpose of acquiring vital information relevant to the success-of the operation. Most Of the time, you* do not
recognize them or you do not see them. That is part of their job in order to hide their identity as well as to protect the
lives of their family and loved ones.
There are agents who use authority to gain information. He is called an agent of influence. For
those who are recruited within a highly sensitive target are called agent in place. There are also agents
4|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE
who leak false information to the enemy and they are called expandable agents. Those agents who have
reached the enemy camp, gathered information, and are able to get back without being caught are called
penetration agents. However, there are also those who acted as double agents. He is an enemy agent,
who, has been taken into custody, turned around, and sent back where he came from as an agent of his
captors.
General Classification of Agents
Agents are generally classified based on their assignment whether they are those who direct the
planning in gathering information, directly penetrate the ranks of criminal syndicate or supports the
whole operation. These agents are as follows.
1. Principal Agents - These are the leader or management agent in the clandestine operation.
2. Action Agents - These are those who conducts the clandestine operation which is further classified into:
a. Espionage Agent - an agent responsible for the collection of information;
b. Propagandist - these are agents who molds the attitude, action or opinion of an individual or a
group of people;
c. Saboteur - an agent directed to undertake action in line with destroying temporarily or
permanently, any material, an article or property which is necessary in their normal operation;
d. Guerilla - these are agents who are part of paramilitary group organized to cause great damage to
the enemy during hot war situation;
e. Strong Arm — these are those agents who provide special protection in times of dangerous phase
of clandestine operation; and
f. Provocateur — these are agents who induces the enemy to act on their own detriment or put them
in disadvantage.
3. Support Agents — These are those agents who engage in activities in line with giving support to the
clandestine operations. This includes:
a. Surveillant Investigator - these are those who continue to observe any person or places that is
connected to the operation;
b. Procurer of Funds — these are those who obtain money needed to sustain the operation;
c. Safe house Keeper - is the person responsible in maintaining the safe house for training, briefing,
debriefing or any other purposes; and
d. Communication Agent - the person responsible for securing the clandestine operation.
As a whole, people may think that agents are cool and skillful in various aspects. However, those skills are
necessary in order for them to survive and go back alive to their respective agency and family. Some of them
were relocated and isolated in areas away from home for the sole purpose of accomplishing their tasks as
agents.
CRYPTOGRAPHY
The agent needs to communicate whatever valuable information they had possessed or acquired and
in like manner commander needs to provide instruction to the troops in the ground without allowing the
enemy to intercept this communication. However, sending any form of communication through plain
message might jeopardize the operation. With this regard, all information should be sent with
accompanying security measures and this could be done with the aid of cryptography.
Cryptography is defined as an art and science that deals with codes and cipher. In line with
intelligence, this is used in order to protect vital information from being intercepted by the enemy or if intercepted,
will disable them to read or understand the information contained in the communication.
Why cryptography is considered as an art?
Simply because it depends primarily with the undercover agent as to how he will convert plain text into
cryptogram or unintelligible.
Why cryptography is considered as a science?
It is science since it involves systematic process or procedure in converting the plain text into cryptogram
or unintelligible.
5|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE
Take note, plain text refers to the readable and understandable message that will be converted into
Cryptogram. Cryptogram or unintelligible simply means as unreadable. Cryptogram is the result of
cryptography.
Codes
Codes is a system of words, numbers or symbols that are used to represent a word. In using codes, one
must possess a code book. Code book is defined as a compilation of words, number, symbols, or a
combination of either word, number, or symbol with their corresponding meaning.
Examples Code book Meaning
Words TAT Attack
Number 156 Retreat
Symbol Defend
Words & Numbers Base
14AB
Using the code system, use above example such that:
Original Message (Plain Text) Coded Message
Attack the Base TAT the 14AB
Retreat and Defend 156 &
If the code system is used, the term of converting plaintext into unintelligible is known as encode while the
term of converting coded message into plain text is known as decode. Coded message refers to the product or output
of the code system. Also, coded message is the cryptogram in the code system. This is now the unreadable message
ready for transmittal to the appropriate person or organization.
Cipher
Cipher is the system which involves the substitution or transposition of individual letters to
make it unreadable. Cipher can be either transposition cipher or substitution cipher. A
transposition cipher involves the shuffling of individual letter or switching the original position of
individual letter. All letters in the original text are present, they are just merely disarranged.
Original Text Ciphered Text
Need Eden
From Form
Help Leph
Base Sabe
Using the transposition cipher system. Use the above example such that:
Original Message (Plain Text) Ciphered Message
Need help from base Eden leph form sabe
On the other hand, the substitution cipher system involves the process of substituting individual
letters or number with another letter or number. An example is provided below:
The first row provides for the original arrangement of the letters in the alphabet while the second
row provides the propose letter to be used as the substitute.
Using the transposition cipher system. Use the above example such that:
Original Message (Plain Text) Ciphered Message
6|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE
1 Need help from base Pggf jgnr htqo dcug
2 Attack the base Cvvcm vjg dcug
3 Retreat and defend Tgvtgcv cpf fghgpf
In contrary to the code system, if the cipher system is used then the term of converting plaintext into
unintelligible is known as encipher while the term of converting a ciphered message into plain text is known as
decipher. The ciphered message refers to the product or output of the cipher system. Also, ciphered message is
the cryptogram in the cipher system. This is now the unreadable message ready for transmittal to the appropriate
person or organization.
7|Page FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE