Professional Documents
Culture Documents
A. Definition of Terms:
Criminal investigation - is an art, not science. But we must treat it partially in order that we will
be guided by the general principle and concepts; and the provision of laws pertinent to our
Criminal Justice System.
ART - is simply defined as the POWER of performing certain action especially acquired by
experience, study and observation.
Criminal Investigator – is an artist in his chosen field and who had his skills to produce the finest
work of art by busting blank wall cases. Criminal investigators are the cream of the police
organization. They are removed from the stratum of the ordinary police man and they belong to
the realm of police intellectuals. Hence, their selection must be based not only on qualifications
but competence and nothing less.
CRIMINAL INVESTAGATION defined – it is an art, which the identity and location of the criminal
offender and gathering and providing evidence of his guilt in criminal proceedings.
CRIMINAL INVESTIGATOR defined – He is the skilled person who is charged with the duty of
conducting criminal investigation when a crime is committed.
QUALITIES OF INVESTIGATOR:
1. Perseverance
2. Endurance
3. Incorruptible honesty and integrity
4. The Intelligence and Wisdom of Solomon
5. The knowledge of psychology and other natural sciences
6. Acting Ability
7. Mastery of the Oral and Written Communication
8. The keen power of observation and deception
9. Working knowledge of Criminal Law, Evidence, Criminal Procedures and Penal special
laws.
10. Sense of justice and Fairy Play.
11. The power to “read between the lines”
12. Working knowledge of martial arts and Fire arms proficiency.
3.THE CRIME SCENE SEARCH - The investigator places himself at a spot where there are no
physical evidence that will be tampered and make an estimate as to what form af search will be
employed.
5.THE PURPOSE OF SEARCH - the purpose of the crime scene search is to find physical
evidence. The afore-stated methods are only general guides for the investigator.
a. SKETCH - it is the graphic representation of the scene of the crime. With complete
measurements of the relative distances of relevant object and conditions obtaining therein.
b. THE GENERAL KINDS OF SKETCH
1. Rough Sketch – It is made by the investigator at the crime scene which is full of important
details. But without the scale of proportionThis is used as the basis for the finished sketch.
2. Finished Sketch- This is a Sketch with a scale of proportion and drawn by the draftsman. The
rough sketch and the finished sketch are fore court presentation.
14. CHAIN OF CUSTODY defined - it is the number of persons who handled and possessed the
piece of evidence the moment that they were collected, marked and tagged, up to the time the
final disposition of the case.
a. GUNS:
i. Revolver – frame, butt, cylinder, barrel and stock.
ii. Rifles – barrel, frame, bolt or slide
iii. All magazines and accessories shall also be marked.
b. REVOLBER CYLINDER: The chamber facing the firing pin must be marked as soon as it is
open for examination.
Note: the direction of the rotation of the cylinder must also be sketched and noted. E.g. Colt
clockwise while S&W counter clockwise direction.
c. FIRED EMPTY SHELLS: Fired empty cartridges inside the mouth, In case of. 22 call on the
side o0f 6the body of the shell.
d. BULLETS OF SLUG: Ogive or nose avoiding the land and groove. They could also be
marked on the base.
2. THE GOLDEN RULE IN INTERVIEW - Never conduct or let anyone conduct an interview if the
interviewer has not gone to the crime scene.
8.RULES IN QUESTIONING
a. One question at a time
b. Avoid implied answer
c. Simplicity of questions
d. saving faces
e. yes and no answer
10.STATEMENT ANALYSIS:
The investigator my exercise the utmost care before concluding the culpability of suspect.
Every compliant and testimonies of witnesses are subject to crucible of truth, lest the investigator
will be ignorant and unmindful weapon of deception, frame up of incriminatory machination
against innocent.
11.COMPLAINT AND TESTIMONIES BE REDUCED IN WRITING (Q&A)
B. INFORMATS
1. INFORMANT defined - is any person who furnishes the police information relevant to a criminal
case about the activities of criminal or syndicates. The informant may openly give information or
offer himself to a witness.
2. CONFIDENTIAL INFORMANT defined - people who provide the police with confidential
information concerning a past crime or projected and planned crime.
C. INFORMERS
1. INFORMER defined – the person who provides information to the police on a regular basis.
They are either paid regularly or in a case to case basis, or none at all.
2. THE PROVIAL BASIS – The saying goes: It needs a thief to catch another thief.
5. WOMEN INFORMERS- Most effective among informers because they could easily penetrate
the ranks of criminals with less suspicion.
6. DUAL ROLE OF THE INFOMERS - Identifying and tracing the whereabouts of the suspects
and gathering of information that will lead to the location and recovery of the evidence such as
the loot or the other pieces of evader relevant to criminal activities.
D. OTHER SOURCES
1. GOV ERNMENT RECORDS
2. PRIVATE RECORDS
3. INTERPCEPTED MESSAGES
4. RECORDS OF THE FIREARMS AND EXPLOSIVE UNIT
5. FIRE BUSTING
6. RECORDS OF FOREIGN AND LOCAL MANUFACTURER
7. STORED DATE ON COMPUTERS AND CELLPHONES RULES ON COMPUTER
Upon arrival when computer is off don’t turn it on. When on don’t turn it off. The plugging
should be done by pulling out the cable directly from the back of the CPU.
Each plugging cable must be marked; computer must be carefully handled and packed
only computer forensic expert should search for any information or evidence contained in the
hardware and the computer hardware should be duplicated by the expert and the original should
be kept by the evidence custodian.
8. RECORDED MESSAGE FROM THE FILE WITH I.T. COMPANIES – coordination with the IT
CO. on relevant information is desirable. The value of this information on the files of these
companies could not be underestimated.
4. KINDS OF CONFFESSION;
a. Extra Judicial confession
b. Judicial Confession
METHODS OF INSTRUMENTATIONS
1. POLICE SCIENCE INVOLVED
a. POLYGRAPH OR LIE DETECTOR TEST
b. QUESTIONED DOCUMENT EXAMINATION
c. POLICE PHOTOGRAPHY
d. DACTYLOSCOPY
e. FORENSIC MEDICINE
f. DONTOLOGY
g. FORENSIC CHEMISTRY- (TOXICOLOGY)
h. FORENSIC PSYCHOLOGY
i. FORENSIC BALLISTICS
j. FORENSIC COMPUTER TECHNOLOGY
3. FORENSIC DETECTIVE - The person applying the forensic science in crime detection.
1. SHADOWING or TAILING
C. VEHICLE SURVEILLANCE
D. UNDERCOVER OPERATION
INTRODUCTION
The history of Police and Military intelligence provides some interesting insights that spell
out the difference between SUCCESS AND FAILURE.
The artful employers of intelligence agents have been legion. We could never possibly
count them all, and probably the greatest of them are unknown to history.
Historians, in their “great man” treatment of history have somewhat neglected the
Commanders of secret, invisible army of intelligence agents which have had a profound
effect on the course of events.
BRIEF HISTORY OF INTELLIGENCE
BIBLICAL BEGINNINGS
Intelligence had existed for so long that the earliest records of intelligence gathering with
format can be found in the holy bible.
Bible characters like the prophet Moses, Rahab and Delilah etc… have somehow
contributed to the significant development of intelligence.
MOSES
❑ He sent 12 leaders of Israel to spy out the land of Canaan (Numbers 13:17-21).
❑ Check on the people, dwelling, the country and the soil.
❑ Data gathered by the 12 spies are known today as EEIs.
RAHAB
❑ 2ND recorded case: Joshua 2: 1- 21.
❑ Rahab, the harlot of Jericho who became an instant confederate agent to the
Israelites.
❑ Two agents of Israel were discovered and pursued by the enemy and hide at
Rahab’s place.
❑ Rahab misled the pursuing enemies by giving them false information.
DELILAH
❑ Judges 6: 1-31 tells the story of Samson & Delilah
❑ Samson, a member of the Israelite army was gifted with great strength that made
him a formidable enemy of the Philistines and thus a target of intel ops.
❑ Delilah used sex to obtain the greatest secret of Samson.
THE CONQUEST ERA
❑ The creation of an army became a necessary tool for a kingdom for its protection and the
conquest of other kingdoms that could become part of an empire.
❑ Great Leaders were born and became successful in their war exploits through a better
and more complex intelligence system.
ALEXANDER THE GREAT
➢ also known as Alexander III and Alexander the Macedonian, was an ancient Greek king
(basileus) of Macedon (336–323 BC).
➢ He devised the “first letter sorting”
MARCUS LUCINIUS CRASSUS
❑ A millionaire in Rome in the ancient time who employed slaves and freemen as fire brigade
turned intelligence unit.
❑ If not looking for fire, they gather evidence for Crassus used in Court.
AKBAR
The “Great Mogul” and sagacious master of Hindustan
Employed more than four thousand agents for the sole purpose of bringing him the truth
that his throne might rest upon him.
GENGHIS KHAN
❑ Founder of the Mongolian Empire.
❑ Win war because of careful planning based on intel/info supplied by spies.
❑ His conquest of central Asia was his remarkable achievement and became a threat to
China, India, Persia, the near east, Russia and Eastern Europe.
FREDERICK THE GREAT OF PRUSSIA
❑ Father of organized military espionage.
❑ First to classify spies in to four classes. (Common spies, double spies, spies of
consequences and forced spies)
❑ Threats and bribes, promises of promotion and gains were used
SUN TZU
❑ Wrote the book, The Art of War.
❑ Made emphasis on knowing self and the enemy.
❑ Use of spies will help a wise general to achieve great results.
THE PRE-MODERN TIMES
1. Walsingham of England
2. Joseph Fouche of France
3. Karl Schulmeister
4. George Washington
5. Wilhelm Stieber
6. Alfred Redl
❑ MI-5
➢ equivalent to U.S. FBI.
➢ Is responsible for counterintelligence activities.
MOSSAD
❑ Israel's principal agency for intelligence collection, counterterrorism, and covert action.
❑ Institute for Intelligence and Special Tasks, best known as Mossad, an abbreviation of its
Hebrew name, ha-Mossad le-Modiin ule-Tafkidim Meyuhadim. In a tiny country
surrounded by foes, the Mossad has been extremely active ever since its establishment
on April 1, 951.
❑ Its successes include the capture of former Nazi leaders, most notably Adolf Eichmann,
as well as numerous triumphs of intelligence-gathering that contributed to Israeli victory in
the 1967 Six-Day War.
KGB
❑ Committee for State Security/Komitet Gosudarstvennoy Bezopasnosti (KGB)
❑ doubled as secret police force; controlling the populace within the country and, outside the
USSR, conducting espionage, spreading “disinformation,” and attempting to destabilize
foreign governments.
WHAT IS NICA?
❑ Founded in 1949, it was formerly known as the National Intelligence and Security Authority
(NISA) and headed by Gen. Fabian Ver.
❑ Used to track down and eliminate anti-Marcos opponents
❑ primary intelligence collection and analysis arm of the Philippine government in charge in
carrying out overt, covert, and clandestine intelligence programs.
❑ Motto: Ang Karunungan ay Kaligtasan (translated "Knowledge is Security").
PRINCIPLES OF INTELLIGENCE
1. Principle of Objectivity
2. Principle of Interdependence
3. Principle of Continuity
4. Principle of Communication
5. Principle of Usefulness
6. Principle of Flexibility
7. Principle of Selection
8. Principle of Timeliness
9. Principle of Security
10. The Principle of Foresight
I asked for a flower
I got a garden
I asked for a tree…
I got a forest.
I asked for a river...
I got a sea.
I asked for a friend…
POLICE INTELLIGENCE OPERATIONS
POLICE INTELLIGENCE
❑ end product resulting from the collection, evaluation and interpretation of all available
information which concerns one or more aspects of police operations and which is
potentially significant to police planning and operations.
Areas of Interest in Police Intelligence:
1. Crime prone communities
2. Matters in connection with security, communication security, document security, VIP
security and physical security.
3. Pending cases under investigation
4. Identified personalities connected with syndicate and organized crimes.
5. Crime prevention and control.
6. Aspect of management for for organizational efficiency.
Purposes of Police Intelligence:
1. Arrest criminals and provide evidence.
2. Identify criminal and subversive elements as well as their associates.
3. Check the conditions of the community.
4. Check on the security condition of the organization and community.
5. Check on the effectiveness of the operation of the police organization.
6. A tool for police management.
FUNCTIONALCLASSIFICATIONS
OF POLICE INTELLIGENCE
1. Criminal Intelligence (CRIMINT) – production of intelligence essential to the prevention of
crimes, and the investigation, arrest and prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT) – knowledge essential to the maintenance of peace
and order.
3. Public Safety Intelligence (PUSINT) – knowledge essential to ensuring the protection of
lives and properties.
METHODS OF CASING
1.Personal Reconnaissance
2.Map Reconnaissance
3.Research
4.Prior Information
5.Hearsay
INFORMATION DESIRED IN CASING
1.Area Condition - description of the locality
2.Active Opposition – organizations whose task is to prevent intelligence activity in the area.
3.Disposal plan- disposal of info in case of possible compromise.
4.Escape and Evasion – the exist planning in case of emergencies, from immediate focal
point, the general area and completely from the area.
WHAT IS A LIAISON PROGRAM?
❑ the assignment of trained operatives to specific targets with coordination to any agency
such as credit agencies, utility companies, police agencies of all types, the press labor
unions and telephone companies.
❑ OBSERVATION & Observation
❑ a complete and accurate observation that involves the use of all the major senses
to register and recognize its operational or intelligence significance.
❑ Description
❑ the actual and factual reporting of one’s observation of the reported sensory
experience recounted by another.
PROCESS FOR ACCURATE OBSERVATION
1. Attention – becoming aware of an existence of fact.
2. Perception – understanding the fact of awareness.
3. Recording – identifying the name in own mind and some fact which have been perceived.
WHAT IS ELICITATION?
❑ It is a system or plan whereby information of intelligence value is obtained through the
process of direct intercommunication in which one or more parties is/are unaware of the
specific purpose of the conversation.
DEVICES USED IN ELICITATION
1. Approach- process of setting people to start talking
2. Probe – keeping people to talk incessantly.
Types of Approach
1. Flattery – people are susceptible to praise.
Variants:
a. Teacher-pupil- subject is treated as an authority.
b. Kindred-soul- showing enough concern to the subject.
c. Good-Samaritan- offers help and assistance to the subject.
d. Partial-disagreement
Types of Approach
2. Provocative Approach- use conventional gambits.
Variants:
a. Teaser-bait- elicitor accumulates knowledge of the subject.
b. Manhattan-Missouri – elicitor adopts unbelievable attitude above anything.
c. Joe-blow- approachable to any field.
d. National Pride – natural propensity to defend country.
Types of Probe
1. Competition Probe
2. Clarity probe- elicit additional info
3. His-pressure – serves to pin down a subject in a specific area or used to point out
contradiction to what the subject said.
4. Hypothetical – presents a hypothetical situation and get the subject reactions.
Planning the Elicitation
1. What information is necessary or essential.
2. Who has access to the information
3. What are the vulnerabilities
4. How susceptible is the subject to the elicitation
5. Outline elicitation points prior to meeting and prepare specific questions and know the
subject well.
Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have the need to know
3. Successful accomplishment of mission.
Types of Cover
1. Natural Cover – using true or actual personal background to fit the purpose.
2. Artificial Cover – using biographical data adopted for a fictitious purpose
3. Cover within a cover – use of secondary to justify existence
4. Multiple cover – any cover identity wished.
Guidelines when cover is compromised
1. Move out immediately and relocate.
2. Start new facility for operations and develop it.
3. Use new personnel.
4. Build entirely new cover.
5. Be careful when making contacts with non-intelligence personnel.
6. Use circuitous route and provide careful counter-surveillance.
WHAT IS UNDERCOVER ASSIGNMENT?
❑ an investigative technique in which an agent conceals his official identity in order to obtain
information from the target organization.
Planning an Undercover Assignment
1. Determine level on which investigation is intended.
2. Develop appropriate cover and cover story.
3. Selection of qualified personnel
4. Consideration of all operational details to include documentation, contract reporting,
housing and convergence.
5. Briefing, coaching and rehearsals.
Types of Undercover Assignment
1.Dwelling Assignment– establish residence in or near the target area.
2. Work Assignment – observation at the place of work.
3. Social Assignment – places of entertainment and amusement frequented by targets.
4. Multiple Assignments – two or more assignments covered simultaneously.
5. Rope Job – strike friendship with the subject.
The essence of undercover assignment
❑ The essence of intelligence is access,
❑ someone or some device has to get close enough to a thing, a place or person to be
observe or the desired facts,
❑ without arousing the attention of those who protect them.
❑ The information must then be delivered to the people who want it.
❑ It must move quickly or it may get stale. It must not get lost or integrated in route.”
TACTICAL INTERROGATION
❑ Interrogation – the vigorous and confrontational questioning of a suspect about his
participation in a crime.
Purposes:
1. To extract confession or admission.
2. To extract information an unwilling witness possesses.
Techniques of Interrogation
1. Emotional appeal – addresses a suspect with an emotional appeal to confess.
2. Sympathetic approach – dig deep into past troubles, plight and unfortunate events in the
life of the suspect.
3. Friendliness
4. Mutt & Jeff – 2 agents with opposite personality
5. Tricks and Bluffs
a. The pretense of solid evidence against the accused\
b. The weakest link – companion had confesses
c. Drama – used to fake pain and agony
d. Feigning contact with the family
e. The line up – witness is guided to point positively to suspect
f. Reverse Line up – suspect is placed among other persons in a line up and will be
identified by several witness/complainants
CLIPPING SERVICES
❑ Clipping articles from newspapers in accordance with an existing format is an important
method of gathering intelligence data.
❑ The communication network of modern newspapers makes an excellent source of highly
valuable material.
INFORMANT MANAGEMENT
❑ It is an exception to the rule when the ability of an investigator exceeds the quality and
quantity of sources of information he possesses.
❑ Rarely, if ever, has there been an investigator of any proficiency that did not possess many
and varied sources of information. Informant recruitment and development ranks very high
in mandatory achievements of an intelligence officer. Failure in this area will usually restrict
the individual officer to the ranks of mediocrity.
Classification of Clandestine Agents
1. Principal Agent
2. Action Agent
3. Support Agent
Who is a Principal Agent?
❑ A managerial agent and the leader of an agent network.
❑ Recruited agent who is authorized by the clandestine organization to recruit and handle
sub-agents under the direction and control of an agent handler.
Who is an Action Agent?
❑ The doer of the clandestine task
❑ May be further classified according to
the task he is assigned
Covert Action Agent - is a fully recruited agent who is in a senior position usually within a
government and able to exert influence on a foreign government at the direction of a sponsor. He
is an agent usually of political influence.
Types of Action Agent
1. Counter Intelligence/Intelligence Collection Agent - Obtains information about one or
more opposition targets
2. Access Agent - gather operationally useful information such as biographies, motivational,
personality, occupational on possible target individuals from within the opposition
3. Legal Traveler - an agent who is able to travel to and from a hostile area to perform
information and collection mission.
4. Penetration Agent - is a counter intelligence agent who provides intelligence information
to the agent handler on internal operations, directions and activities of the opposition
intelligence and security services Propagandist - undertakes action to mold the attitudes,
opinions and action of an individual, group or nation.
5. Saboteur - undertakes positive action against friendly power resulting in the loss of use,
temporary or permanent, of an article, material and facility
6. Guerilla -is a member of a paramilitary group organized to harass the enemy in a war
situation.
7. Strong Arm -provide special protection during the dangerous phases of clandestine
operations
8. Provocation - induces an opposition to act to his own detriment by discrediting himself.
Who is a Support Agent?
❑ is an agent who engages in activities that support the clandestine operations. These types
of agents perform all types of auxiliary services at the direction of the project officer.
KINDS OF SUPPORT AGENT:
1. Surveillant - observes personnel and places of operational interest
2. Investigator - procures information on persons of things of operational interest.
3. Procurers of Funds - obtain special currency that are needed in operational use.
4. Procurers of Supplies - procures ordinary and critical supplies
4. Safehouse Keeper - manages and maintains a safehouse for operational use.
5. Manager of storage area - arranges the storages, distribution or transportation of
operational supplies.
6. Communication Agent -facilitates communication equipment
Sources of Information
❑ Are persons, things or actions from which information about criminals and/or subversives,
weather and terrain is derived.
TYPES OF SOURCES OF INFO
1. Records
2. Persons
Purposes of Informants
Gain access to areas and targets inaccessible to intelligence.
Provide anonymity to investigations and operations.
Increase the scope of area of operation and target coverage