You are on page 1of 8

TOPIC 1: Recall, apply and understand the principles of: Criminal Investigation;

tools of investigation; rights of persons and law on investigation, detention, and


torture; knowledge, skills, competencies, characteristics, the attitude of
Crime/Criminal Investigator, kinds and techniques of Investigation; Intent and
motive

Here are the specified topics:

1. Criminal Investigation:
- Definition and purpose of criminal investigation
- Investigative process and methodology
- Roles and responsibilities of a criminal investigator
- Types of criminal investigations (e.g., homicide, robbery, fraud)
- Crime scene investigation techniques

2. Tools of Investigation:
- Forensic tools and techniques (e.g., fingerprint analysis, DNA profiling)
- Surveillance methods and equipment
- Electronic evidence collection and analysis
- Interrogation and interviewing techniques
- Use of informants and undercover operations

3. Rights of Persons and Law on Investigation:


- Constitutional rights of individuals during investigations
- Search and seizure laws
- Arrest and detention procedures
- Miranda rights and the right to remain silent
- Due process and fair trial rights

4. Detention and Torture:


- Laws and regulations governing detention and custody
- Prohibition of torture and cruel, inhuman, or degrading treatment
- Rights of detained persons
- Conditions of detention facilities
- International human rights standards on detention and torture

5. Knowledge, Skills, Competencies, Characteristics, and Attitude of a


Crime/Criminal Investigator:
- Knowledge of criminal law and procedure
- Analytical and critical thinking skills
- Communication and interviewing skills
- Attention to detail and observation skills
- Professional ethics and integrity

6. Kinds and Techniques of Investigation:


- Surveillance and undercover investigations
- Forensic investigation methods
- Criminal profiling and behavioral analysis
- Financial investigation and asset tracing
- Cybercrime investigation techniques

7. Intent and Motive:


- Understanding the concepts of intent and motive in criminal investigations
- Differentiating between motive and intent
- Identifying and analyzing motives in criminal cases
- Role of motive in establishing guilt or innocence
- Psychological and sociological factors influencing intent and motive

These topics encompass various aspects of criminal investigation, covering both


theoretical principles and practical applications in the field.

References:

Here are some possible references for the topics related to criminal investigation:

1. Criminal Investigation:
- "Criminal Investigation: The Art and the Science" by Michael D. Lyman
- "Criminal Investigation: A Method for Reconstructing the Past" by James W.
Osterburg and Richard H. Ward
- "Practical Criminal Investigation" by Manuel Pena and Joseph N. Davis
- "Criminal Investigation: An Analytical Perspective" by Christine Hess Orthmann
and Kären M. Hess

2. Tools of Investigation:
- "Crime Scene Investigation and Reconstruction" by Robert R. Ogle, Jr.
- "Practical Crime Scene Processing and Investigation" by Ross M. Gardner
- "Criminalistics: An Introduction to Forensic Science" by Richard Saferstein
- "Criminal Investigation: Basic Perspectives" by Charles A. Lushbaugh and Paul
B. Weston

3. Rights of Persons and Law on Investigation:


- "Criminal Procedure: Constitutional Constraints upon Investigation and Proof"
by James J. Tomkovicz
- "Criminal Investigation: Law and Practice" by Michael J. Palmiotto
- "Criminal Procedure: Investigation and Right to Counsel" by Ronald Jay Allen,
William J. Stuntz, and Joseph L. Hoffmann

4. Detention and Torture:


- "Criminal Interrogation and Confessions" by Fred E. Inbau, John E. Reid,
Joseph P. Buckley, and Brian C. Jayne
- "Torture, Terror, and Trade-Offs: Philosophy for the White House" by Jeremy
Waldron
- "Detention and Denial: The Case for Candor after Guantanamo" by Benjamin
Wittes

5. Knowledge, Skills, Competencies, Characteristics, and Attitude of a


Crime/Criminal Investigator:
- "Criminal Investigation: The Art and the Science" by Michael D. Lyman
- "Criminal Investigation: An Introduction to Principles and Practice" by Peter
Stelfox
- "Effective Interviewing and Interrogation Techniques" by Nathan J. Gordon and
William L. Fleisher

6. Kinds and Techniques of Investigation:


- "Practical Homicide Investigation: Tactics, Procedures, and Forensic
Techniques" by Vernon J. Geberth
- "Criminal Profiling: An Introduction to Behavioral Evidence Analysis" by Brent
E. Turvey
- "Financial Investigation and Forensic Accounting" by George A. Manning

7. Intent and Motive:


- "Criminal Investigation: An Analytical Perspective" by Christine Hess Orthmann
and Kären M. Hess
- "Criminal Profiling: Developing an Effective Science and Practice" by Richard
N. Kocsis
- "Criminal Psychology: Nature, Nurture, Culture: A Textbook and Practical
Reference Guide for Students and Working Professionals in the Fields of Law
Enforcement, Criminal Justice, Mental Health, and Forensic Psychology" by Richard
N. Kocsis

These references should provide you with valuable information on the specified
topics of criminal investigation.

TOPIC 2: Apply the different modes, methods, types, and techniques of gathering,
collection, preservation, and processing of information such as but not limited to:
Intelligence; Surveillance; Informants; Informers; Regular and Cultivated sources
of information; Undercover; Background Investigation; Cyber Intelligence and Cyber
Investigation; Codes and Ciphers; Classification of Information and Sources;
Security and Access of Document/Information including its classification; and
others

Under the specified topic, here are the subtopics:

1. Intelligence:
- Definition and purpose of intelligence gathering
- Types of intelligence (e.g., tactical, strategic, counterintelligence)
- Intelligence cycle (planning, collection, analysis, dissemination)
- Intelligence sources and methods
- Intelligence-driven decision-making

2. Surveillance:
- Types of surveillance (e.g., physical, electronic, technical)
- Surveillance techniques and equipment
- Legal considerations and limitations of surveillance
- Covert surveillance and undercover operations
- Surveillance reports and documentation

3. Informants and Informers:


- Role of informants and informers in criminal investigations
- Recruiting and handling confidential informants
- Informant management and protection
- Confidentiality agreements and legal considerations
- Validating and corroborating information provided by informants

4. Regular and Cultivated Sources of Information:


- Differentiating between regular and cultivated sources
- Establishing and maintaining relationships with sources
- Reliability and credibility assessment of sources
- Source validation and verification
- Ethical considerations in source cultivation

5. Undercover:
- Undercover operations in law enforcement
- Role and responsibilities of undercover agents
- Techniques for establishing and maintaining cover identities
- Managing risks and maintaining safety in undercover operations
- Legal considerations and guidelines for undercover work

6. Background Investigation:
- Purpose and scope of background investigations
- Conducting interviews and record checks
- Gathering information on an individual's personal, educational, and
professional history
- Analyzing and evaluating background investigation results
- Confidentiality and privacy issues in background investigations
7. Cyber Intelligence and Cyber Investigation:
- Cyber intelligence gathering techniques
- Digital footprint analysis and online investigations
- Cyber threat intelligence sources
- Investigating cybercrimes and digital evidence collection
- Cybersecurity measures and protecting sensitive information

8. Codes and Ciphers:


- Understanding codes and ciphers in intelligence and investigations
- Types of codes and ciphers (e.g., substitution, transposition, encryption
algorithms)
- Codebreaking techniques and tools
- Cryptanalysis and decryption methods
- Historical examples of codebreaking and intelligence gathering

9. Classification of Information and Sources:


- Information classification systems (e.g., confidential, secret, top secret)
- Handling and safeguarding classified information
- Need-to-know principle and access controls
- Source classification and protection
- Proper marking and labeling of classified documents

10. Security and Access of Document/Information, including its classification:


- Information security policies and procedures
- Physical and digital document security measures
- Access controls and user authentication
- Handling and transmission of classified information
- Document classification guidelines and markings

These topics cover a range of modes, methods, types, and techniques related to
gathering, collection, preservation, and processing of information in various
investigative contexts, including intelligence, surveillance, informants, cyber
intelligence, and more.

References:

Here are some possible references for the topics related to gathering, collection,
preservation, and processing of information:

1. Intelligence:
- "Intelligence: From Secrets to Policy" by Mark M. Lowenthal
- "The Art of Intelligence: Lessons from a Life in the CIA's Clandestine
Service" by Henry A. Crumpton
- "Intelligence Analysis: A Target-Centric Approach" by Robert M. Clark

2. Surveillance:
- "Practical Surveillance for Operational Teams" by Henry Prunckun
- "Covert Surveillance: The Manual of Surveillance Training" by Peter Jenkins
- "The Complete Guide to Electronic Surveillance Devices" by Kevin D. Murray

3. Informants and Informers:


- "Informants, Cooperating Witnesses, and Undercover Investigations: A Practical
Guide to Law, Policy, and Procedure" by Dennis G. Fitzgerald
- "Confidential Informants: A Closer Look at Police Policy" by Jon Shane
- "The Informant: The FBI, the Ku Klux Klan, and the Murder of Viola Liuzzo" by
Gary May

4. Regular and Cultivated Sources of Information:


- "Intelligence Collection: How to Plan and Execute Intelligence Collection in
Complex Environments" by Robert Clark and Michael Dougan
- "The Art of Intelligence: Simulations, Exercises, and Games" by William M.
Williams and Sam C. Sarkesian
- "Spy the Lie: Former CIA Officers Teach You How to Detect Deception" by Philip
Houston, Michael Floyd, and Susan Carnicero

5. Undercover:
- "Undercover: The True Story of Britain's Secret Police" by Paul Lewis and Rob
Evans
- "Undercover Police Surveillance in Comparative Perspective" edited by Simon N.
Verdun-Jones
- "Undercover: The Secret Lives of a Federal Agent" by Donald Goddard and Lynn
Goddard

6. Background Investigation:
- "The Complete Idiot's Guide to Background Checks" by Susan P. Joyce
- "Background Investigations: A Guide for Human Resources Professionals,
Investigators, and Attorneys" by W. Barry Nixon and Kim Kerr
- "Background Check: How to Do Your Own Professional Background Check" by David
B. Sherwood

7. Cyber Intelligence and Cyber Investigation:


- "Cyber Intelligence: From Diagnosis to Strategy" by Edir Garcia
- "The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to
Information Technology Crimes (Theft, Sabotage, Fraud)" by Dawn M. Cappelli, Andrew
P. Moore, and Randall F. Trzeciak
- "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers,
Intruders, and Deceivers" by Kevin D. Mitnick and William L. Simon

8. Codes and Ciphers:


- "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography" by Simon Singh
- "Cracking Codes and Cryptograms For Dummies" by Denise Sutherland and Mark
Koltko-Rivera
- "Cryptanalysis: A Study of Ciphers and Their Solution" by Helen F. Gaines

9. Classification of Information and Sources:


- "Information Security Management Handbook" by Harold F. Tipton and Micki
Krause
- "Managing Information Security" by John R. Vacca
- "Classification and Clustering in Business Intelligence" by Christian Borgelt

10. Security and Access of Document/Information, including its classification:


- "Information Security: Principles and Practices" by

Mark S. Merkow and James Breithaupt


- "Managing Information Security Risks: The OCTAVE (SM) Approach" by
Christopher Alberts and Audrey Dorofee
- "Classified: Secrecy and the State in Modern Britain" by Christopher Moran

These references should provide you with valuable information on the specified
topics of gathering, collection, preservation, and processing of information.

TOPIC 3: Use the principles, procedures, legal requirements, methods, and


techniques of the following but not limited to: Arrest with and without warrant;
Raid, Search with and without warrant; search of arrested persons; check and choke
points; crime scene processing; a collection of evidence and chain of custody;
crime scene photography and crime sketch; deposition, confession, and admission;
and others.

Under the specified topic, here are the subtopics:

1. Arrest with and without warrant:


- Legal requirements for making an arrest with a warrant
- Legal authority and limitations for making an arrest without a warrant
- Procedures for executing an arrest warrant
- Rights of the arrested person during and after arrest
- Documentation and reporting of arrests

2. Raid and Search with and without warrant:


- Legal basis and procedures for conducting raids and searches with a warrant
- Legal authority and limitations for conducting searches without a warrant
(e.g., exigent circumstances, consent)
- Planning and executing search operations
- Search techniques and strategies
- Documenting and reporting search activities

3. Search of Arrested Persons:


- Legal authority and procedures for searching arrested persons
- Permissible scope and limitations of searches
- Search methods for ensuring officer safety and preventing destruction of
evidence
- Handling and documenting items seized during a search
- Rights of the arrested person during a search

4. Check and Choke Points:


- Purpose and methods of establishing check and choke points
- Legal considerations and limitations in implementing check and choke points
- Techniques for screening individuals and vehicles at check and choke points
- Documentation and reporting procedures for check and choke point operations
- Maintaining public safety and minimizing disruptions during check and choke
point operations

5. Crime Scene Processing:


- Principles and procedures for processing a crime scene
- Securing and isolating the crime scene
- Systematic search methods for locating and documenting evidence
- Techniques for preserving and collecting physical and trace evidence
- Documentation and recording of crime scene processing activities

6. Collection of Evidence and Chain of Custody:


- Legal requirements and procedures for collecting and handling evidence
- Proper packaging, labeling, and documentation of evidence
- Chain of custody procedures to maintain the integrity of evidence
- Storage and preservation of evidence
- Transfer and transportation of evidence

7. Crime Scene Photography and Crime Sketch:


- Techniques and principles of crime scene photography
- Proper documentation of a crime scene through photographs
- Equipment and lighting considerations for crime scene photography
- Creating accurate and detailed crime scene sketches and diagrams
- Annotations and measurements in crime scene sketches

8. Deposition, Confession, and Admission:


- Legal requirements and procedures for taking depositions
- Techniques for obtaining accurate and admissible confessions and admissions
- Miranda warnings and custodial interrogations
- Documentation and recording of statements, confessions, and admissions
- Ethical considerations in obtaining and using statements in investigations

These topics cover the principles, procedures, legal requirements, methods, and
techniques related to arrest, search, crime scene processing, evidence collection,
and interrogation.

References:

Here are some possible references based on the Philippine setting for the specified
topics:

1. Arrest with and without warrant:


- "Criminal Procedure: A Contemporary Approach" by Riano
- "Remedial Law Compendium" by Guevara
- "The Revised Rules of Criminal Procedure" by The Supreme Court of the
Philippines

2. Raid and Search with and without warrant:


- "Criminal Procedure: A Contemporary Approach" by Riano
- "The Revised Rules of Criminal Procedure" by The Supreme Court of the
Philippines
- "Criminal Procedure: Investigation, Prosecution, and Due Process" by Mitra

3. Search of Arrested Persons:


- "Criminal Procedure: A Contemporary Approach" by Riano
- "The Revised Rules of Criminal Procedure" by The Supreme Court of the
Philippines
- "Criminal Law Book Two" by The Revised Penal Code of the Philippines

4. Check and Choke Points:


- "The Law on Checkpoints and Roadblocks" by The Supreme Court of the
Philippines
- "Criminal Procedure: A Contemporary Approach" by Riano
- "The Revised Rules of Criminal Procedure" by The Supreme Court of the
Philippines

5. Crime Scene Processing:


- "Practical Guide to Criminalistics: The Crime Scene Investigation Process" by
Ong
- "Forensic Science: An Introduction to Scientific and Investigative Techniques"
by Saunar
- "Criminal Investigation Manual" by The Philippine National Police (PNP)

6. Collection of Evidence and Chain of Custody:


- "Manual on the Custody and Disposition of Evidence" by The Philippine National
Police (PNP)
- "Criminal Investigation Manual" by The Philippine National Police (PNP)
- "Criminal Procedure: A Contemporary Approach" by Riano

7. Crime Scene Photography and Crime Sketch:


- "Practical Guide to Crime Scene Photography" by Ong
- "Criminal Investigation Manual" by The Philippine National Police (PNP)
- "Forensic Photography: A Practitioner's Guide" by Clarke

8. Deposition, Confession, and Admission:


- "Criminal Procedure: A Contemporary Approach" by Riano
- "The Revised Rules of Criminal Procedure" by The Supreme Court of the
Philippines
- "Criminal Law Book Two" by The Revised Penal Code of the Philippines

Please note that these references are based on the Philippine setting and provide
relevant information on the specified topics in the context of Philippine laws and
procedures.

You might also like