You are on page 1of 4

CDI 1 MIDTERM EXAM

Louie-Al Vontroy Benito BSCRIM 2F

1. What is the role of undercover agent in crime investigation?

The undercover investigation is a confidential investigation. In a traditional strategy, an undercover


agent is hired as a daily worker, such as a truck driver, and collects information by trying to associate
with workers who are not aware of the undercover investigation.

Undercover agents play a vital role in the crime investigation and helping law enforcement authorities
locate, seize, and forfeit those properties. Undercover agents use guidelines to describe techniques for
the use of informers and undercover operations, as well as investigation methods for the capture of
criminal and criminal offences. Undercover agents should have to be knowledgeable regarding
undercover areas, including dialect, tradition, religion and culture. These special standards provide a
vast amount of support in collecting reliable information to solve crime.

2. Enumerate and explain how the intelligence cycle function?

Intelligence Cycle is a method of developing raw data into finished intelligence for strategy to use in
decision-making and implementation. There are five phases that make up the Intelligence Cycle.

Planning

It is the start and end of the cycle—the start, because it requires the creation of unique
collection criteria and the end, because the completed intelligence, which supports policy decisions,
creates new requirements. Identifying criteria means identifying the problems that intelligence is
expected to contribute to. Planning often include determining collection of certain forms of intelligence.
The purpose is to say that all policy areas have intelligence requirements that they do. However as
intelligence resources are minimal, objectives need to be set.

Collection

Collecting the raw information necessary to produce the completed intelligence. There are a
variety of sources of information, including open sources such as newspapers, international reports,
publications and books. When the requirements and priorities have been formed, the intelligence will be
collected. Some requirements have specific types of collection; some may require a number of sorts of
collection. They classify each item as a means to support solve the crime.

Processing

Compilation involves the collection of information that must be processed and exploited before
it could be regarded as intelligence and given to analysts. Conversion includes decoding, analysis,
observation and translation.

Dissemination

Dissemination will be the final step, the method of dissemination or the process of transmitting
information from producers to consumers will be largely centralized, with consumption expected in the
5-step process. Policy makers will receive finalized intelligence and decision-making on the basis of data
collection, and these decisions may lead to further planning and repetition of the 5-step cycle.

3. Who are the person’s sources of information? Explain

Informant Net

This is a group of people working for the Government, who are hired to provide knowledge about what
their skills, such as IT, Health professionals or Engineer, does not cove by intelligence so that they need
to hire specialists to perform and collect information.

Informants (Asset)

Selected individuals that can provide information or any data that can help the agent to provide a lead,
this can be voluntary or priced if the asset produces accurate information that can help the intelligence,
sometimes those people who accept this line of work are civilian.

Informant - a person who gives information to the police without asking for any amount or
exchanging for providing information, there is an instances that this kind of person is one of the
victims or even the victims' relatives.

Informer - Informer pertains to the person who give data/information for money some of
informer are closely related to the suspect, but because of needs they provide the information
about the suspect.

Types of Informants

Criminal informant is a type of informant who has data about a criminal organization
or a person in underworld that helps law enforcement, and can be a source of many
information, but in one condition his identity will be confidential.

Confidential informant - It is characterized as a person requiring confidentiality who


provides useful information, guided assistance both which improves criminal investigations
and furthers the Organization's purpose, typically in return for financial or some other benefit.

Voluntary informant - the kind of informant that provides any details about the
incident or any crime scenario they have witnessed, this witness give information without any
exchange or benefit, they voluntarily provide information that can help to solve crimes.

Special informant - These pertain to professionals who provide information on


specialized cases where they have preferential privileges on the part of the agent because
they will make a huge contribution to the case.

Anonymous informant- Is the most unreliable informant, they typically use a text
message or a call, but some purpose of this is to hide their identity and not get involved in
something that might put them at risk. Their information can help, but the officer needs to
confirm whether or not they are telling the truth.
4. Explain how the methods of surveillance is conducted.

There are a number of methods to perform surveillance, including the use of physical
monitoring, electronics, interviewing, and use of technology.

Electronic Monitoring is the form of techniques most widely used by private investigators. It includes the
use of instruments such as TV, wiretapping, and radios to record operation. Physical observation when
the investigators are physically following or monitoring a subject. This may possibly entail disguises,
stake-outs, and various investigators.

Conversations are undertaken by investigators to find as much information as possible (Approach) on


the subject. People interviewed may include relatives, neighbors, friends or acquaintances then to get
some information you need to let them talking this will help to gather more information (Probe).

5. How do we conduct Background Investigation? What are the things to be considered?

There are instances that in a crime case we lack evidences, and so will resort for witnesses, we
may not know if those people are really telling the truth or just acting innocent just to defend the
suspect. In this kind of situation, there are ways we can use to find the truth, reveal and bring out justice
it called background investigations.

In order to perform background investigations, there are information needed such as: Domestic
Background, Personal Habit, Bussines History, Social/Business Associates, Medical History, Educational
Background, and lastly the family History. This type of information required to continue on the next step
which as known as tactical interrogation. Tactical Interrogation is the need for obtaining information if
the highest degree of credibility taken on the minimum of time, can be thorough interrogation which
also varies and dependent entirely on the situation.

Under these, there are different types of interrogation conducted; First, SCREENING is usually
accomplishe as soon as after capture, apprehension or arrest of an interrogee. The objective of this is to
know or determine his area of knowledge and ability. FORMAL INTERROGATION, detailed interrogation.
To exploit the information on depth from the screening process. Next, DEBRIEFING, a form of eliciting
information. Fourth is Interrogation of lay personnel (Specific type), especial effort are made to
establish a common frame reference between interrogator or interogee. Lastly, Technical Interrogation
is the level on which the source has specific and such detailed information that requires a trained expert
in the subject matter to be explored.

In conducting Background Interrogation there are phases of interrogation to be followed which


are planning and preperation, approach (meeting the interogee) questioning, termination and Recording
Reporting. For the interogators to found out the truthsl, they use interrogation techniques such as
TECHNIQUES OF APPROACH, with the purpose of gaining cooperation from the source and induce him to
answer questions which will follows. The "OPEN-TECHNIQUES" the interrogator is open and direct in his
approach and makes no attempts to conceal the purpose of interrogator.
There are also other techniques such as the "Common Interest" Technique, interrogator impress
the interogee of their common interest. Next, is the "Record-File" we all know technique in which
interrogator prepares file on source listing of gathered information. This information must contain the
life history of interrogee. And during the approach the interrogator will ask question if the interogee
refuse to cooperate, the interogator may provide the answer so that interrogee will be impressed that
all is known about him and he had nothing to hide and just tell the truth. Lastly is the "EXASPERATION -
TECHNIQUE", interrogator must be alert because interrogee may fabricate some information.

Above everything, in every case there are lot different ways used by our law enforcers in order to
reveal the truth. These techniques and information aee just proof that there is no secrer that will never
be revealed l. Everything will fall in it's place on the right time and the right moment.

You might also like