Professional Documents
Culture Documents
Undercover agents play a vital role in the crime investigation and helping law enforcement authorities
locate, seize, and forfeit those properties. Undercover agents use guidelines to describe techniques for
the use of informers and undercover operations, as well as investigation methods for the capture of
criminal and criminal offences. Undercover agents should have to be knowledgeable regarding
undercover areas, including dialect, tradition, religion and culture. These special standards provide a
vast amount of support in collecting reliable information to solve crime.
Intelligence Cycle is a method of developing raw data into finished intelligence for strategy to use in
decision-making and implementation. There are five phases that make up the Intelligence Cycle.
Planning
It is the start and end of the cycle—the start, because it requires the creation of unique
collection criteria and the end, because the completed intelligence, which supports policy decisions,
creates new requirements. Identifying criteria means identifying the problems that intelligence is
expected to contribute to. Planning often include determining collection of certain forms of intelligence.
The purpose is to say that all policy areas have intelligence requirements that they do. However as
intelligence resources are minimal, objectives need to be set.
Collection
Collecting the raw information necessary to produce the completed intelligence. There are a
variety of sources of information, including open sources such as newspapers, international reports,
publications and books. When the requirements and priorities have been formed, the intelligence will be
collected. Some requirements have specific types of collection; some may require a number of sorts of
collection. They classify each item as a means to support solve the crime.
Processing
Compilation involves the collection of information that must be processed and exploited before
it could be regarded as intelligence and given to analysts. Conversion includes decoding, analysis,
observation and translation.
Dissemination
Dissemination will be the final step, the method of dissemination or the process of transmitting
information from producers to consumers will be largely centralized, with consumption expected in the
5-step process. Policy makers will receive finalized intelligence and decision-making on the basis of data
collection, and these decisions may lead to further planning and repetition of the 5-step cycle.
Informant Net
This is a group of people working for the Government, who are hired to provide knowledge about what
their skills, such as IT, Health professionals or Engineer, does not cove by intelligence so that they need
to hire specialists to perform and collect information.
Informants (Asset)
Selected individuals that can provide information or any data that can help the agent to provide a lead,
this can be voluntary or priced if the asset produces accurate information that can help the intelligence,
sometimes those people who accept this line of work are civilian.
Informant - a person who gives information to the police without asking for any amount or
exchanging for providing information, there is an instances that this kind of person is one of the
victims or even the victims' relatives.
Informer - Informer pertains to the person who give data/information for money some of
informer are closely related to the suspect, but because of needs they provide the information
about the suspect.
Types of Informants
Criminal informant is a type of informant who has data about a criminal organization
or a person in underworld that helps law enforcement, and can be a source of many
information, but in one condition his identity will be confidential.
Voluntary informant - the kind of informant that provides any details about the
incident or any crime scenario they have witnessed, this witness give information without any
exchange or benefit, they voluntarily provide information that can help to solve crimes.
Anonymous informant- Is the most unreliable informant, they typically use a text
message or a call, but some purpose of this is to hide their identity and not get involved in
something that might put them at risk. Their information can help, but the officer needs to
confirm whether or not they are telling the truth.
4. Explain how the methods of surveillance is conducted.
There are a number of methods to perform surveillance, including the use of physical
monitoring, electronics, interviewing, and use of technology.
Electronic Monitoring is the form of techniques most widely used by private investigators. It includes the
use of instruments such as TV, wiretapping, and radios to record operation. Physical observation when
the investigators are physically following or monitoring a subject. This may possibly entail disguises,
stake-outs, and various investigators.
There are instances that in a crime case we lack evidences, and so will resort for witnesses, we
may not know if those people are really telling the truth or just acting innocent just to defend the
suspect. In this kind of situation, there are ways we can use to find the truth, reveal and bring out justice
it called background investigations.
In order to perform background investigations, there are information needed such as: Domestic
Background, Personal Habit, Bussines History, Social/Business Associates, Medical History, Educational
Background, and lastly the family History. This type of information required to continue on the next step
which as known as tactical interrogation. Tactical Interrogation is the need for obtaining information if
the highest degree of credibility taken on the minimum of time, can be thorough interrogation which
also varies and dependent entirely on the situation.
Under these, there are different types of interrogation conducted; First, SCREENING is usually
accomplishe as soon as after capture, apprehension or arrest of an interrogee. The objective of this is to
know or determine his area of knowledge and ability. FORMAL INTERROGATION, detailed interrogation.
To exploit the information on depth from the screening process. Next, DEBRIEFING, a form of eliciting
information. Fourth is Interrogation of lay personnel (Specific type), especial effort are made to
establish a common frame reference between interrogator or interogee. Lastly, Technical Interrogation
is the level on which the source has specific and such detailed information that requires a trained expert
in the subject matter to be explored.
Above everything, in every case there are lot different ways used by our law enforcers in order to
reveal the truth. These techniques and information aee just proof that there is no secrer that will never
be revealed l. Everything will fall in it's place on the right time and the right moment.