You are on page 1of 20

FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE

INTRODUCTION TO CRIMINAL INVESTIGATION AND DETECTION – HANS GROSS – A


noted Criminologist once said that Criminal Investigation is a 95% perspiration b. 3% inspiration
and c. 2% luck.

A. Definition of Terms:
Criminal investigation - is an art, not science. But we must treat it partially in order that we will
be guided by the general principle and concepts; and the provision of laws pertinent to our
Criminal Justice System.

ART - is simply defined as the POWER of performing certain action especially acquired by
experience, study and observation.

Criminal Investigator – is an artist in his chosen field and who had his skills to produce the finest
work of art by busting blank wall cases. Criminal investigators are the cream of the police
organization. They are removed from the stratum of the ordinary police man and they belong to
the realm of police intellectuals. Hence, their selection must be based not only on qualifications
but competence and nothing less.

CONCEPTS AND PRINCIPLES OF CRIMINAL INVESTIGATION

CRIMINAL INVESTAGATION defined – it is an art, which the identity and location of the criminal
offender and gathering and providing evidence of his guilt in criminal proceedings.

CRIMINAL INVESTIGATOR defined – He is the skilled person who is charged with the duty of
conducting criminal investigation when a crime is committed.

QUALITIES OF INVESTIGATOR:

1. Perseverance
2. Endurance
3. Incorruptible honesty and integrity
4. The Intelligence and Wisdom of Solomon
5. The knowledge of psychology and other natural sciences
6. Acting Ability
7. Mastery of the Oral and Written Communication
8. The keen power of observation and deception
9. Working knowledge of Criminal Law, Evidence, Criminal Procedures and Penal special
laws.
10. Sense of justice and Fairy Play.
11. The power to “read between the lines”
12. Working knowledge of martial arts and Fire arms proficiency.

B. THE THREE TOOLS OR I’S OF INVESTIGATION:


1. INFORMATION defined – It is the knowledge of facts which the investigator had gathered from
persons or documents, which are pertinent relevant concerning the commission of criminal
activities.

INFORMATION CLASSIFIED AS TO SOURCES:


a. Regular Sources
b. Cultivated Sources
c. Grapevines Sources

2. INTERVIEW AND INTERROGATION


a. Interview defined – it is the simple questioning of a person who cooperates with the
investigator.
b. Interrogation defined – It is process of obtaining and admission or confession from those
suspects to have committed a crime. It is confrontational in nature.
c. Field Inquiry defined – It is the general questioning of all persons at the crime scene
conducted by the investigator.
3. INSTRUMENTATION defined - It is the police of applying instruments or tools of the police
sciences in criminal investigation and detection.

C. CARDINAL QUESTIONS IN INVESTIGATION:


1. THE FIVE W’s and H OF CRIMINAL INVESTIGATION – These are the questions: WHO,
WHAT, WHEN, WHERE, WHAT and HOW.
2. RECURRING QUESTIONS - are the MENTAL and PHYSICAL RECONSTRUCTIONS on
how the crime was committed, these questions will preoccupy the mind of the investigator.

D. RESPONDING TO THE CRIME SCENE:


When a report of a crime is received, the identity of the person who reported is noted, to
include his address, personal circumstances and possibly contact number.

a. The means of the report


b. The time of the report
c. The receiver of the report
d. The time of dispatch

E. CRIME SCENCE INVESTIGATION:


1. THE GOLDEN RULE AT THE CRIME SCENE - Never touch any object at the crime scene
unless photographed, measured and indicated in the sketch.

2. ASSIGNMENT OF DUTIES - The team is headed by the Chief or Senior Investigator.


The Members include the following:
a. Assistant Team Leader
b. Photographer
c. Sketcher
d. Master note taker
e. Evidence Man
f. Measurer

3.THE CRIME SCENE SEARCH - The investigator places himself at a spot where there are no
physical evidence that will be tampered and make an estimate as to what form af search will be
employed.

4.THE METHODS OF SEARCH:


a. the strip method
b. the double strip method
c. the spiral or circular method
d. the zone method
e. the wheel, radial or spoke method

5.THE PURPOSE OF SEARCH - the purpose of the crime scene search is to find physical
evidence. The afore-stated methods are only general guides for the investigator.

6.PHOTOGRAPH OF THE CRIME SCENE:


a. general view
b. medium view
c. close up view
d. color photography

7.GUIDES IN PHOTOGRAPHING CRIME SCENES:


a. Series of photographs of the crime scene
b. The depicted object in the photograph should not be immaterial or irrelevant.

8.THE KINDS OF PHOTOGRAPHS TO BE TAKEN AT THE SCENE


a. The photograph of the deceased showing the relationship of the dead body with
surroundings, especially the physical evidence
b. Photographs of evidence showing forcible entry destroyed padlocks, broken doors and
windows and other relevant signs of disturbances.

9.THE USE OF SPECIAL PHOTOGRAPHY


a. Such as infrared, ultra violet, orthosterios macro- photography, movie camera,
etc…
b. Photography of environs
c. Close-up photograph of the dead body after removal from the scene.

10.SKETCHING THE CRIME SCENE

a. SKETCH - it is the graphic representation of the scene of the crime. With complete
measurements of the relative distances of relevant object and conditions obtaining therein.
b. THE GENERAL KINDS OF SKETCH
1. Rough Sketch – It is made by the investigator at the crime scene which is full of important
details. But without the scale of proportionThis is used as the basis for the finished sketch.
2. Finished Sketch- This is a Sketch with a scale of proportion and drawn by the draftsman. The
rough sketch and the finished sketch are fore court presentation.

11. THE SPECIFIC KINDS OF SKETCHES


a. sketch of locality
b. Compass direction
c. Sketch in details/cross projection or the exploded view

12. THE ELEMENTS OF THE SKETCH


a. measurements
b. compass direction
c. essential items
d. scale of proportion
e. legend
f. title

13. COLLECTION, MARKING, TAGGING and PRESERVATION OF THE EVIDENCE

a. COLLECTION – As evidence is collected, it is individually marked with initials of the


Investigator.
b. MARKING – Every collected evidence is marked.
c. TAGGING - Every piece of evidence the is collected and marked must be tagged
d. PRESERVATION OF THE EVIDENCE – Perishable Materials should be preserve by the way
or the methods of preservation in order that they will reach the court in the same physical condition
as when they were collected from the crime scene. This is the work of the laboratory technician

14. CHAIN OF CUSTODY defined - it is the number of persons who handled and possessed the
piece of evidence the moment that they were collected, marked and tagged, up to the time the
final disposition of the case.

15. METHODS OF MARKING SPECIFIC KINDS OF EVIDENCE

a. GUNS:
i. Revolver – frame, butt, cylinder, barrel and stock.
ii. Rifles – barrel, frame, bolt or slide
iii. All magazines and accessories shall also be marked.

b. REVOLBER CYLINDER: The chamber facing the firing pin must be marked as soon as it is
open for examination.

Note: the direction of the rotation of the cylinder must also be sketched and noted. E.g. Colt
clockwise while S&W counter clockwise direction.

c. FIRED EMPTY SHELLS: Fired empty cartridges inside the mouth, In case of. 22 call on the
side o0f 6the body of the shell.

d. BULLETS OF SLUG: Ogive or nose avoiding the land and groove. They could also be
marked on the base.

F. RECONSTRUCTING THE CRIME


1. RECONSTRUCTING THE CRIME defined – It is the assessment made by the investigator
after the crime scene investigation, of how the crime is committed.

2. KINDS OF RECONSTRACTING THE CRIME


a. PHYSICAL RECONSTRUCTION - It is based on the physical appearance of the crime scene
mainly focused on the pieces of physical evidence. And the accounts of witnesses and suspects
b. MENTAL RECONSTRUCTION - Based on the physical reconstruction; some conclusion could
be formulated taking into account all available pieces o9f evidence.

G. THE DEVELOPMENT OF THEORIES:


THEORY defined - It is the imaginative contemplation of reality, direct intellectual apprehension,
insight or body of generalization and principles developed in association with the practice in a
certain field of activity(The of the Investigator’s theory).
H. FIELD INQUIRY:
a. FIELD INQUIRY defined – it is the general questioning of all persons at near or around the
crime scene.
b. when to start the field inquiry.
c. how to treat witnesses and suspects retained ate the scene
d. the purpose of separating the witnesses or suspects from one another.

I.GOING BACK TO THE CRIME SCENE


a. Reason for going back at the crime scene
b. Value of the process

J. THE TRHEE PHASES OF CRIMINAL INVESTIGATION


a. The identification of the criminal
b. The facts or evidence to prove his guilt are gathered for introduction during trial.

K. THE FOUR METHODS OF IDENTIFYING THE CRIMINALS:


a. By confession or admission
b. By accounts or testimonies of witnesses
c. By circumstantial evidence
d. By associative evidence

L. THE TWO KINDS OF CRIMINALS FOR PURPOSES OF IDENTIFICATION BY WITNESS:


a. KNOWN FUGITIVES
b. UNKNOWN FUGITVES

FACTORS AFFECTING POSITIVE IENTIFCATION:


1. The ability of the witnesses to positively identify the unknown criminals depends upon his
level of alertness intelligence, vision, age and health.
2. The prevailing conditions of visibility and observation of the crime scene.
3. The lapse of time between the commission of the crime and the arrest of the offender.
4. The opportunity of the criminal to vary his personal appearance such as the removal of
moustache, side bums, goatee, the change to hair style, the addition of tattoo on the face,
earrings, nose rings, lip rings or facelift thru surgery.
M. METHODS OF IDENTIFICATION BY WITNESSES
1 verbal description
2. Rogue’s gallery
3. General photographs
4 cartographic sketches

N. THE POLICE LINE-UP


It is the process of identification by witnesses of the unknown fugitive who is mixed
innocent persons lined before the witness. (Procedures of Police Line-Up)

O. CENTERPOINTS OF PHYSICAL IDENTIFICATION


1. Face 7. Fingers
2. Hair 8. Manner of walking
3. Neck 9. Voice
4. Shoulder 10. Physical appearance
5. Waist 11. Complexion
6. Hands

P.THE PHYSICAL EVIDENCE TO IDENTIFY CRIMINAL

KINDS OF PHYSICAL EVIDENCE:


1. CORPUS DELICTI – These are the object or substance, which constitute the essential parts
or elements of the commission of the crime. It is sometimes called the body of the crime not the
body of the victim.The cause of death is one of the essential element of a crime.
2. ASSOCIATIVE EVIDENCE – Pieces of evidence which will link suspect to the scene, such as
fingerprints, foot or shoe impressions are but some of the examples.
3. TRACING EVIDENCE – Article which assist the investigator in location the criminal. Stolen
goods in the possession of the suspect is the example.

Q.PRESERVATION AND CARE OF EVIDENCE


(Purpose – shell have the same substantial condition when they will be presented before the court
during trial)
(Marking – for positive and defined identification during trial)
R.MODUS OPERANDI Defined – simply, it is the method of the operation by a specific criminal
or criminal syndicates. (Importance of Modus operandi)

THE ART OF OBTAINING INFORMATION


A.INTERVIEW
1. INTEERVIEW defined – it is the questioning of a person believed to posssess information
which is relevant to the investigation of a crime or on criminal activities

2. THE GOLDEN RULE IN INTERVIEW - Never conduct or let anyone conduct an interview if the
interviewer has not gone to the crime scene.

3. QUALITIES OF AAA GOOD INTERVIEWER:


a. Rapport forceful personality
b. Knowledge of human behavior
c. Conversational tone of voice
d. Common interest
e. Acting qualities
f. Humility

4. COGNITIVE INTERVIEW defined – it is a formed or technique in the conduct of interview upon


will witness and cooperative witness, where they are given the full opportunity to narrate their
accounts without interventions interruption and interference from the interviewer.

5. REASONS WHY WITNESSES REFUSE TO TALK AND TESTIFY


a. fear of reprisal
b. great inconvenience
c. hatred against the police
d. bias of the witness
e. avoidance of publicity
f. family restriction
g. bigotry
h. cultish indoctrination

6. COMMON TECHNIQUE APPLICABLE TO FOREGOING REASONS


Many of this witness want that they will not be utilized as formal witness but to remain
anonymous. (Note: The power of persuasion plays a key anonymous. (Note: The power plays
key role.)

7.THE STAGES OF HANDLING THE INTERVIEW


1. Preparation
2. Approach
3. Warming up
4. Cognitive interviews

8.RULES IN QUESTIONING
a. One question at a time
b. Avoid implied answer
c. Simplicity of questions
d. saving faces
e. yes and no answer

9.TYPE OF WITNESSES ACCORDING TO THEIR ATTITUDES


A. Known- nothing type
B. Disinterested type
C. The drunken type
D. Suspicious type
E. Talkative
F. Honest witnesses
G. Deceitful witness
H. Timid witnesses
I. Boasting, egoistic or egocentric witnesses
J. Type refusal to talk witnesses

10.STATEMENT ANALYSIS:
The investigator my exercise the utmost care before concluding the culpability of suspect.
Every compliant and testimonies of witnesses are subject to crucible of truth, lest the investigator
will be ignorant and unmindful weapon of deception, frame up of incriminatory machination
against innocent.
11.COMPLAINT AND TESTIMONIES BE REDUCED IN WRITING (Q&A)
B. INFORMATS
1. INFORMANT defined - is any person who furnishes the police information relevant to a criminal
case about the activities of criminal or syndicates. The informant may openly give information or
offer himself to a witness.

2. CONFIDENTIAL INFORMANT defined - people who provide the police with confidential
information concerning a past crime or projected and planned crime.

3.THE TYPES OF INFORMANTS:


a. anonymous informant
b. rival- elimination informant
c. false informant
d. frightened informant
e. self- aggrandizing informant
h. woman informant
i. legitimate informant

C. INFORMERS
1. INFORMER defined – the person who provides information to the police on a regular basis.
They are either paid regularly or in a case to case basis, or none at all.

2. THE PROVIAL BASIS – The saying goes: It needs a thief to catch another thief.

3. SELECTION OF INFORMERS – This is addressed to the sound discretion of the investigator,


the informer may be to a fixed period of assignment or into a case to case basis.

4. CRITICAL AREAS IN DEVELOPMENT OF INFORMERS


a. Within the ranks of criminals and criminal syndicates
b. associates and friend of criminals
c. Places of hang outs criminals
d. Slum and residential places where criminals have their contacts
e. Detention Centers
f. Places where criminals dispose their loots

5. WOMEN INFORMERS- Most effective among informers because they could easily penetrate
the ranks of criminals with less suspicion.

6. DUAL ROLE OF THE INFOMERS - Identifying and tracing the whereabouts of the suspects
and gathering of information that will lead to the location and recovery of the evidence such as
the loot or the other pieces of evader relevant to criminal activities.

D. OTHER SOURCES
1. GOV ERNMENT RECORDS
2. PRIVATE RECORDS
3. INTERPCEPTED MESSAGES
4. RECORDS OF THE FIREARMS AND EXPLOSIVE UNIT
5. FIRE BUSTING
6. RECORDS OF FOREIGN AND LOCAL MANUFACTURER
7. STORED DATE ON COMPUTERS AND CELLPHONES RULES ON COMPUTER
Upon arrival when computer is off don’t turn it on. When on don’t turn it off. The plugging
should be done by pulling out the cable directly from the back of the CPU.

Each plugging cable must be marked; computer must be carefully handled and packed
only computer forensic expert should search for any information or evidence contained in the
hardware and the computer hardware should be duplicated by the expert and the original should
be kept by the evidence custodian.

8. RECORDED MESSAGE FROM THE FILE WITH I.T. COMPANIES – coordination with the IT
CO. on relevant information is desirable. The value of this information on the files of these
companies could not be underestimated.

THE ART OF INTERROGATION


1. INTERROGATION – it is the vigorous and the confrontational questioning of suspect about his
participation in a crime. It is confrontational in the sense the navigator places the guilt on the
accused. This process is also applied to an uncooperative or recalcitrant witness.
2. PURPOSE OF INTERROGATION
a. On the part of the suspect, it is to extract a confession or admission .
b. On the part of the uncooperative or unwilling witness, it is to extract the information he
possessed.

3. CONFESSION DISTINGUISHED FROM ADMMISSION


a. CONFESSION – it is the direct acknowledgement of guilt arising from the commission of crime.
b. ADMISSION – It is the acknowledgement of fact or circumstance without accepting guilt.

4. KINDS OF CONFFESSION;
a. Extra Judicial confession
b. Judicial Confession

5. CUSTODIAL INTERROGATION OR INVESTIGATION - This is the stage of investigation


where there is strict observance of the MIRANDA DOCTRINE.

6. MIRANDA DOCTRINE (MIRANDA VS ARIZONA)

THE RIGHTS OF THE ACCUSED DURING CUSTODIAL INTERROGATION


1. Right to remain silent
2. Right to counsel of his own choice and if he has none, the government must provide one
for him free of charge.
3. Right to be informed of the nature of the charges against him and whatever he says may
be used for or against him.

THIS RIGHT COULD BE VALIDY WAIVED


1. In writing
2. With the assistance of counsel
3. Signed and sworn by the accused

7.THE TECHNIQUES OF INERROGATION:


A. EMOTIONAL - Combining his skills of an actor and a psychologist.
B. SYMPATHETIC APPEAL - An offer to help, kindness, friendliness
C. FRIENDLINESS - An approach coupled with a posture of sincerity.
D. TRICK AND BLUFF
1. The pretense of Solid Evidence against the accused
2. The Weakest Link
3. Drama
4. Feigning contact with family member
5. Many more trick and bluffs
6. The Line-Up
7. Reverse Line-Up

E. STERN APPROACH – The investigator displays a stern personality towards the


suspect by using the following methods:
1. Pretense of physical evidence
2. Jolting
3. Opportunity to lie
4. Indifference
5. Feigning protection and consideration
F. THE MUTT AND JEFF OR SWEET AND SOUR METHOD
G. REMOVING THE ETHNIC OR CULTURAL BARRIER
H. SEARCHING FOR THE SOFT SPOT

8.ADDITIONAL MODERN TECHNIQUES OF INTERROGATION

a. RATIONALIZATION - it is use of reasons, which is acceptable to the subject that


led to commission of the crime.
b. PROJECTION - it is the process of putting the blame to other person, not and to
suspect
c. MINIMIZATION – It is the act minimizing the culpability of the suspect.

9.PHYSICAL SIGNS OF DECEPTIONS


a. sweating
b. color change
c. dry mouth
d. avoidance of direct eye contact
e. breathing
f. pulse

METHODS OF INSTRUMENTATIONS
1. POLICE SCIENCE INVOLVED
a. POLYGRAPH OR LIE DETECTOR TEST
b. QUESTIONED DOCUMENT EXAMINATION
c. POLICE PHOTOGRAPHY
d. DACTYLOSCOPY
e. FORENSIC MEDICINE
f. DONTOLOGY
g. FORENSIC CHEMISTRY- (TOXICOLOGY)
h. FORENSIC PSYCHOLOGY
i. FORENSIC BALLISTICS
j. FORENSIC COMPUTER TECHNOLOGY

2. INSTRUMENTATION - it is the application of instrument and the laws of physical sciences


in the investigation and detection of crimes and criminals. This is otherwise known as
CRIMINALISTICS.

3. FORENSIC DETECTIVE - The person applying the forensic science in crime detection.

4. MODERN DISCOVERIES OF INSTRUMENTATION


a. DNA (Deoxyribonucleic Acid) - The discovery in genetics is that no two persons
have the same DNA profile, expect the identical twins. The father of DNA is Sir
ALEC JEFFREY. The DNA of an individual is formed by the combination of DNA’s
of the father and the mother. Brothers and sisters of the same parents have
different DNA’s and there is never a chance that it would result to identical or
similar profile.
b. HAIR EXAMINATION - The roots of the hair when examined under the new
technology will determine the presence of drugs taken by the person two years
prior to the said examination.
c. GLOBAL POSITIONING SYSTEM (GPS) - This is for the effective identification
on the location of criminals and objects thru modern and special gadgets.

SURVEILLANCE AND UNDERCOVER OPERATIONS

A. PRINCIPLE AND CONCEPT OF SURVEILLANCE


1. SURVEILLANCE - It is the observation of persons, place and vehicles for the purpose
of obtaining information concerning the identities of criminals and their activities.

2. SURVEILLANT - The person who conducts the surveillance or performs the


observation.

3. Subject - is the person, place, vehicle being observed by the surveillant.

4. THE KINDS OF SURVEILLANCE:


a. COVERT- Subject is not aware that he is being observed.
b. Overt - Subject is aware that he is being tailed.

5. THE PURPOSE OF SURVEILLANCE


a. To get information on criminal
b. To discover the identities of persons frequenting the place to established their
criminal activities.

6. OTHER TYPES OF SURVEILLANCE


a. FIXED SURVEILLANCE - watching a house or building
b. MOVING SURVEILLANCE - on foot or by motor

7. PROCEDURES IN FIXED SURVEILLANCE

8. TOOLS USED IN FIXED SURVEILLANCE

9. PERSONNEL APPEARANCE OF THE SURVEILLANT


B. SURVEILLANT ON FOOT

1. SHADOWING or TAILING

2. PURPOSE OF FOOT SURVEILLANCE

3. THE DON’TS IN FOOT SURVEILLANCE

4. PREPERATION FOR THE SHADOWING

5. THE METHODS OF FOOT SURVEILLANCE


a. One man shadow
b. Two man shadow and
c. Three man shadow or ABC technique of shadowing

6. TACTICS AND TECHNIQUES OF SHADOWING


a. Turning corners
b. Entering a building
c. Riding a bus
d. Riding a taxi
e. Riding a train
f. In a hotel
g. In a telephone booth
h. In a theater
i. Inside a private house
j. Inside a small private or public office

7. THE CONSTANT RISK OF THE SHADOWER - if he is organized, he is recognized, he


is recognized, he is “burned out”. The other is losing the subject.

8. THE COMMON TRICKS OF SUBJECT


a. Test for tailing
b. Use of convoy

C. VEHICLE SURVEILLANCE

1. Technique in automobile surveillance.


2. Distinguishing the shadower’s cars.

D. UNDERCOVER OPERATION

1. UNDERCOVER OPERATION - It is a police operation wherein the investigator assumes


a fictitious identity in order to infiltrate the ranks of the criminals for the purpose of obtaining
information.

2. PURPOSE OF UNDERCOVER OPERATION


a. Gathering of evidence
b. Gathering of information
c. Installation of surveillance equipment
d. Loyalty check
e. Penetrating subversive organizations
f. Counter intelligence
g. Basis for a successful raid

3. QUALITIES OF A GOOD UNDERCOVER AGENT


a. A good actor and a psychologist.
b. Be able to adapt himself in the field of assignment.
c. Knowledge of general information and the varied ways of life, profession and
occupation.
d. Temperament – a calm, enduring and affable personality. Self-control and self-
confidence.
e. Photographic memory

4. SPECIFIC TYPES OF UNDERCOVER ASSIGNMENT


a. Work assignment
b. Social assignment
c. Subversive organization
d. Residential assignment
5. THE FICTITIOUS PERSONALITY – The preparation should include the fictitious
background of the undercover agent

6. THE DON’TS IN THE ASSIGNMENT


a. Don’t drink too much in the assignment
b. Don’t court women.
c. Do not fail to provide person in the place who could vouch for the agent.
d. Bragging
e. Woman agent
f. Expenditures must be moderate and commensurate with the fictitious identity.

7. MEANS OF CONTACT WITH HEADQUARTERS


a. Telephone
b. Coded messages
c. Secret meeting

TRACING AND ARRESTING CRIMINALS


1. METHODS OF TRACING AND LOCATING CRIMINAL
a. By informers
b. By informant
c. Grapevine sources
d. Tailings
e. Using children
f. Courting the girlfriend
g. Harassing the known associate and friends of the criminals
h. Interrogate arrested criminals known to the subject
i. In fresh cases, the use of bloodhound dog or K-9
j. In very recent cases, find out the ethnic group of the criminal
k. A thorough search at the hiding place
l. Disguises
m. Publication of rewards for the capture of the criminal
n. Corrupting with money of known associate of the criminal
o. Thru undercover operation
p. Issuance of general alarm
q. Tapping the communication of the facility, friends, and associate criminals.
r. The use of postal notice of package or registered letter.
s. The use of trick to flush out the criminal from a house where he is believed to be
hiding.
t. There are many more methods or techniques in tracing and locating criminals
which most often defend on resourcefulness and ingenuity of the investigator.

2. PLANNING THE ARREST OR RAID


a. Always plan for the worst scenario.
b. The raid or arrest must be well planned always accompanied by the element of
surprise.
c. More than one arresting officer must be employed.
d. Always presume that the criminal is armed and dangerous.
e. Never allow the criminal to change his clothes as the place of arrest.
f. Follow- up operation
g. In conducting raid on residence buildings the officer should always bring a ten –
pound sledgehammer for easy opening doors.
h. In raids, do not stay longer than necessary along the lines of fire.
i. In night time raids 2:00 am to 3:00 am is the ideal time
j. In all arrest and raids, the commanding loud voice of the arresting officer and
serious look.
k. Always rush towards the criminal ion a grapping distance but never place your gun
within his reach.
l. The entering parties should wear bulletproof vest if available.
m. In night raids, be equipped with powerful flashlight
n. Flexibility in the planning and execution should be encouraged
o. The use of marked vehicles from the uniformed units such as Mobile Patrol Bureau
shall be the second perimeter cordon ready for assistance to the raiding team.
p. The use of automatic fire is discouraged
q. In case of vehicle interception, the car should be immobilized by firing at the tire,
not on the occupants.
INTELLIGENCE

INTRODUCTION

 The history of Police and Military intelligence provides some interesting insights that spell
out the difference between SUCCESS AND FAILURE.
 The artful employers of intelligence agents have been legion. We could never possibly
count them all, and probably the greatest of them are unknown to history.
 Historians, in their “great man” treatment of history have somewhat neglected the
Commanders of secret, invisible army of intelligence agents which have had a profound
effect on the course of events.
 BRIEF HISTORY OF INTELLIGENCE

BIBLICAL BEGINNINGS
Intelligence had existed for so long that the earliest records of intelligence gathering with
format can be found in the holy bible.
Bible characters like the prophet Moses, Rahab and Delilah etc… have somehow
contributed to the significant development of intelligence.

MOSES
❑ He sent 12 leaders of Israel to spy out the land of Canaan (Numbers 13:17-21).
❑ Check on the people, dwelling, the country and the soil.
❑ Data gathered by the 12 spies are known today as EEIs.
RAHAB
❑ 2ND recorded case: Joshua 2: 1- 21.
❑ Rahab, the harlot of Jericho who became an instant confederate agent to the
Israelites.
❑ Two agents of Israel were discovered and pursued by the enemy and hide at
Rahab’s place.
❑ Rahab misled the pursuing enemies by giving them false information.

DELILAH
❑ Judges 6: 1-31 tells the story of Samson & Delilah
❑ Samson, a member of the Israelite army was gifted with great strength that made
him a formidable enemy of the Philistines and thus a target of intel ops.
❑ Delilah used sex to obtain the greatest secret of Samson.
THE CONQUEST ERA
❑ The creation of an army became a necessary tool for a kingdom for its protection and the
conquest of other kingdoms that could become part of an empire.
❑ Great Leaders were born and became successful in their war exploits through a better
and more complex intelligence system.

ALEXANDER THE GREAT
➢ also known as Alexander III and Alexander the Macedonian, was an ancient Greek king
(basileus) of Macedon (336–323 BC).
➢ He devised the “first letter sorting”
 MARCUS LUCINIUS CRASSUS
❑ A millionaire in Rome in the ancient time who employed slaves and freemen as fire brigade
turned intelligence unit.
❑ If not looking for fire, they gather evidence for Crassus used in Court.
 AKBAR
 The “Great Mogul” and sagacious master of Hindustan
 Employed more than four thousand agents for the sole purpose of bringing him the truth
that his throne might rest upon him.

GENGHIS KHAN
❑ Founder of the Mongolian Empire.
❑ Win war because of careful planning based on intel/info supplied by spies.
❑ His conquest of central Asia was his remarkable achievement and became a threat to
China, India, Persia, the near east, Russia and Eastern Europe.
 FREDERICK THE GREAT OF PRUSSIA
❑ Father of organized military espionage.
❑ First to classify spies in to four classes. (Common spies, double spies, spies of
consequences and forced spies)
❑ Threats and bribes, promises of promotion and gains were used
 SUN TZU
❑ Wrote the book, The Art of War.
❑ Made emphasis on knowing self and the enemy.
❑ Use of spies will help a wise general to achieve great results.
 THE PRE-MODERN TIMES
1. Walsingham of England
2. Joseph Fouche of France
3. Karl Schulmeister
4. George Washington
5. Wilhelm Stieber
6. Alfred Redl

 SIR FRANCIS WALSINGHAM


❑ Organized the first “ National Secret Service in England.
❑ He protected Queen Elizabeth Elizabeth from countless assassins.
 JOSEPH FOUCHE
❑ Most feared and respected intelligence Director and became Minister of Police in France.
❑ Created network of agents and modern system of spying on spies
 NAPOLEON BONAPARTE
 Believes that “One spy in the right place is worth 20,000 men in the field.” He also
organized two bureaus of interest.
1. Bureau of Intelligence – consolidated all incoming information regarding the enemy for
presentation to the emperor and to obtain information as desired.
2. Topographic Bureau – maintained a large map which covers the latest information
regarding both enemy and friendly forces.

KARL SCHULMEISTER
❑ Napoleon’s military secret service and Napoleon’s eyes.
❑ Under a cover role, infiltrated the Austrian General Staff and studied the characters
of the Generals (Marchal Mack – hope of Austria to defeat Napoleon).
 GEORGE WASHINGTON
❑ At the outbreak of American war for Independence, he mobilized the free masons of the
colonies, a secret society , to achieve result in winning the war.
❑ Little is known about the operations, but George Washington became as the first President
of USA.
 WILHELM STIEBER
❑ “King of sleuth-hounds”
❑ Worked as census taker and develop a informal format to expedite invasion or probed for
invaders. (statistics)
❑ Major contributions:
➢ military censorship
➢ Organized military propaganda
 ALFRED REDL
❑ A homosexual, one of the most brilliant agent whose 13-year work as a spy led to death
of over ½ million soldiers.
❑ Became chief of Austro-Hungarian Secret Service while working as intelligence agent for
Russia.
 WHAT IS INTELLIGENCE?
❑ product of a process which starts from collection of info, its evaluation, analysis, integration
and interpretation to arrive at a theory or conclusion.
❑ helps a commander with an actual situation.
 INTELLIGENCE DEFINED (Webster)
 It is the capacity for understanding and for other forms of adaptive intellect of behavior;
the mind in operation.
 Or it refers to knowledge of an event, circumstances, etc., received or imparted: the
gathering or distribution of information; or the staff of persons engaged in obtaining such
information.
 INTELLIGENCE DEFINED
 "the product resulting from the collecting and processing of information concerning actual
and potential situations and conditions relating to domestic and foreign activities”
 (International Dictionary of Intelligence. )
 INTELLIGENCE DEFINED (Psychology)
 Intelligence is the capacity of a person to adjust to new situations through the use of what
has been previously learned.
 HOW IS INTELLIGENCE VIEWED?
❑ As a process
➢ an activity which treats information as basis for departmental policy and decision-
making.
❑ Intelligence as an organization
➢ an institution composed of persons who pursue a special kind of knowledge for the
purpose of planning the collection of information, processing and dissemination of
intelligence relating to military/police operations.
 ESSENCE OF INTELLIGENCE
A Chinese philosopher, SUN TZU, once said,
❑ “If you know your enemy and know yourself, you need not fear the results of hundred
battles.
❑ If you know yourself but not the enemy, for every victory, you will suffer a defeat.
❑ If you know neither yourself nor the enemy, you are fool who will meet defeat in every
battle.”

IMPORTANCE OF INTELLIGENCE
1. Enable a nation to formulate its policies, strategic plans and conduct its diplomacy.
2. Forestall the activities of its internal and external enemies.
3. Detect and apprehend the activities or modus operandi of criminals and subversive
elements.
4. Providing ample security for the people and the state.
5. Intelligence plays an important role in the life and survival of a country by proving advance
and exact knowledge or information of the intentions and design of its enemies.

 BROAD CATEGORIES OF INTELLIGENCE


 MILITARY INTELLIGENCE
❑ the use of processed information in formulating military plans, programs and
policies, it encompasses three general categories:
❑ Strategic Intelligence – data which deals with the activities and probable courses
of action of foreign nations.
❑ Combat Intelligence – knowledge about weakness and strength of the enemies
which is needed by a commander in order to prepare for the conduct of tactical
operation.
❑ Counter -Intelligence – intelligence data which is used to deny information to the
enemy and provide security to the unit.
 NATIONAL INTELLIGENCE
❑ Integrated intelligence developed by all government departments
❑ Use to formulate national policy and the promotion and enhancement of national security.
 DEPARTMENTAL INTELLIGENCE
❑ requires by a department of the government in order to execute its mission and discharge
its responsibilities.
 POLICE INTELLIGENCE
❑ concerns the activities of criminal elements and its activities significant to police planning
and operation.
 THE INTELLIGENCE COMMUNITY
❑ Agencies which has intelligence interest and responsibilities.
❑ In the Philippines, more coordinated by the NICA (NISA) in their intelligence activities.
 MAJOR INTELLIGENCE AGENCY
1. Philippine National Police
a. Directorate for Intelligence (D2)
b. Staff Officer for intelligence (R2)
c. Police Districts Intelligence
d. Off-shore Anti-Crime Groups
2. Armed Forces of the Philippines (AFP)
a. J2- GHQ; ISAFP-Operation Arm; and MIG- operatives per Region
b. Philippine Army Intelligence - G2- GHQ; Intel & Scty. Group -operating Units; Mil.
Intel. Companies (MICOs) - Infantry Division
c. Naval Intelligence - N2 –GHQ; G2- Philippines Marines Intel; CG2- Philippine
Coast Guard; and F2- Philippine Fleet
d. Air force intelligence - A2-GHQ
3. National Bureau of Investigation (NBI)
 OTHER GOVERNMENT AGENCIES
1. Anti-smuggling Action Center
2. Central Bank of the Philippines
3. Bureau of Customs
4. Bureau of Immigration
5. Department of Justice
6. Department of foreign Affairs
7. Presidential Task Forces
 INTELLIGENCE SCHOOLS
1. J2/ISAFP - Special Intelligence Training School (SITS)
2. G2 - Military Intelligence Training School
3.N2 - Naval Intelligence Training Center
4.A2 – Air Intelligence Training Center
5.PNP - Intelligence Training Group
 NOTABLE INTELLIGENCE AGENCIES IN THE WORLD
1.UNITED STATES OF AMERICA – CIA, FBI, NSA, DIA
2.GREAT BRITAIN - MI-5 AND MI-6
3. ISRAEL – MOSSAD, SHINBET
4.RUSSIA – KGB (FSB)
 CIA
❑ CIA was created under the US National Security Act of 1947 (9/18/1947) under the
National Security Council with Rear Admiral Roscoe as first Director.
❑ principal for intelligence activities and covert operations abroad.
❑ Its first covert operation, it influenced the general elections in Italy so as to prevent a
Communist victory. Despite this success, President Harry S. Truman blamed Hillenkoetter
for failing to predict the coming of the Korean War, and replaced him with General Walter
Bedell Smith in October 1950.
❑ Under Smith's leadership, the CIA helped bring about the overthrow of Iran's Premier
Mohammed Mossadegh after the latter nationalized oil fields in his country.

GREAT BRITAIN
❑ MI-6 a.k.a. the Secret Intelligence Service (SIS)
➢ is analogous to CIA
➢ it ran the famous “Ultra” program during World War II in which coded
German Messages, encrypted by the Germans’ enigma machine, were
intercepted, broken and translated, thereby aiding the Allies on their
battlefield.

❑ MI-5
➢ equivalent to U.S. FBI.
➢ Is responsible for counterintelligence activities.
 MOSSAD
❑ Israel's principal agency for intelligence collection, counterterrorism, and covert action.
❑ Institute for Intelligence and Special Tasks, best known as Mossad, an abbreviation of its
Hebrew name, ha-Mossad le-Modiin ule-Tafkidim Meyuhadim. In a tiny country
surrounded by foes, the Mossad has been extremely active ever since its establishment
on April 1, 951.
❑ Its successes include the capture of former Nazi leaders, most notably Adolf Eichmann,
as well as numerous triumphs of intelligence-gathering that contributed to Israeli victory in
the 1967 Six-Day War.

KGB
❑ Committee for State Security/Komitet Gosudarstvennoy Bezopasnosti (KGB)
❑ doubled as secret police force; controlling the populace within the country and, outside the
USSR, conducting espionage, spreading “disinformation,” and attempting to destabilize
foreign governments.
 WHAT IS NICA?
❑ Founded in 1949, it was formerly known as the National Intelligence and Security Authority
(NISA) and headed by Gen. Fabian Ver.
❑ Used to track down and eliminate anti-Marcos opponents
❑ primary intelligence collection and analysis arm of the Philippine government in charge in
carrying out overt, covert, and clandestine intelligence programs.
❑ Motto: Ang Karunungan ay Kaligtasan (translated "Knowledge is Security").
 PRINCIPLES OF INTELLIGENCE
1. Principle of Objectivity
2. Principle of Interdependence
3. Principle of Continuity
4. Principle of Communication
5. Principle of Usefulness
6. Principle of Flexibility
7. Principle of Selection
8. Principle of Timeliness
9. Principle of Security
10. The Principle of Foresight
 I asked for a flower
 I got a garden
 I asked for a tree…
 I got a forest.
 I asked for a river...
 I got a sea.
 I asked for a friend…
 POLICE INTELLIGENCE OPERATIONS
 POLICE INTELLIGENCE
❑ end product resulting from the collection, evaluation and interpretation of all available
information which concerns one or more aspects of police operations and which is
potentially significant to police planning and operations.
 Areas of Interest in Police Intelligence:
1. Crime prone communities
2. Matters in connection with security, communication security, document security, VIP
security and physical security.
3. Pending cases under investigation
4. Identified personalities connected with syndicate and organized crimes.
5. Crime prevention and control.
6. Aspect of management for for organizational efficiency.
 Purposes of Police Intelligence:
1. Arrest criminals and provide evidence.
2. Identify criminal and subversive elements as well as their associates.
3. Check the conditions of the community.
4. Check on the security condition of the organization and community.
5. Check on the effectiveness of the operation of the police organization.
6. A tool for police management.

FUNCTIONALCLASSIFICATIONS
OF POLICE INTELLIGENCE
1. Criminal Intelligence (CRIMINT) – production of intelligence essential to the prevention of
crimes, and the investigation, arrest and prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT) – knowledge essential to the maintenance of peace
and order.
3. Public Safety Intelligence (PUSINT) – knowledge essential to ensuring the protection of
lives and properties.

TYPES OF POLICE INTEL OPS


1. Police Line or Tactical Intelligence – contributes directly to the accomplishment of
specific objectives of immediate concern such as raids, arrest, etc.
2. Police Counter-Intelligence – formulation, preparation and execution of plans,
policies and programs geared towards the neutralization of activities adverse to the
police organization.
3. Police Strategic Intelligence – deals with the wide and far reaching issues of law
and order, internal security, crime suppression and prevention, and public safety
necessary in the formulation, preparation and execution of long range plans,
policies and programs.
 NATURE OF POLICE INTEL OPS
❑ Overt Operations
➢ no precautionary measures to hide the investigation against the subject.
➢ From open sources like magazines, libraries, newspapers, radio broadcasts,
internet, books, investigations, research papers etc..
❑ Covert Operations
➢ without the knowledge of the subject.
➢ Kept secret from the public an even from other members of the intelligence
community

FOUR PHASES OF THE INTELLIGENCE CYCLE


1. Planning & Direction – involves determination of intelligence requirements, priorities,
selection of intelligence agency and means of supervision.
2. Collection of Information – involves the systematic exploitation of sources of information
by collection agency and the delivery of information to proper intelligence unit.
3. Processing – the phase where information becomes intelligence. It involves recording,
evaluation and interpretation of information.
4. Dissemination – the timely conveyance of information by any suitable means to those who
needs it.
 PHASE 1- PLANNING & DIRECTION
1. Determination of Intelligence Requirements.
2. Determination of the Essential Elements of information (EEI).
3. Establishment of Priorities (P.I.R’s)
 PHASE 2 - COLLECTION
1. Criteria of Collecting Agencies/Units
➢ Capability, Balance/suitability and Multiplicity
2. Two Basic Collection Strategies:
➢ Resource Integration - one agent
➢ Agent Mixed Redundancy - 3 or more agents assessing for the same assignment
➢ Who are Task to Collect Information?
➢ Intelligence officers/agents-regular members
➢ Civilian Agents-informers and informants

TRADE CRAFTS USED IN THE COLLECTION
 PHASE 3 - PROCESSING
1. Recording – reduction into writing or graphical representation and arrange into groups of
related items.
2. Evaluation -determination of the pertinence, reliability of the source and accuracy of the
information; or examination of raw information to determine intelligence value.
3. Interpretation – establishing the meaning and significance of the information. It involves
analysis, integration and deduction.
a. Analysis -done by shifting and isolating those elements that have significance
b. Integration - it is the combination of the elements stated in assessment
c. Deduction – conclusions from the theory developed, tested and considered valid;

PHASE 4 - DISSEMINATION & USE
1. Timeliness – reach the user on time to be useful.
2. Propriety – right user like national leaders or commanders
3. Security – proper security measures for classified matters.
Methods of Dissemination:
➢ Fragmentary orders from top to bottom of the command.
➢ Memorandum, circulars, special orders, etc.
➢ Operations order, oral or written.
➢ Conference – staff members.
➢ Other report and intelligence documents.
➢ Personal contact.
 WHAT IS SURVEILLANCE?
❑ A form of clandestine investigation which consist of keeping persons, place or other
targets under physical observation to obtain information pertinent to the investigation.
❑ Oldest and easily used by the police.

 TERMINOLOGY USED IN SURVEILLANCE


❑ Pre-surveillance Conference - conference held surveillance
❑ Stake out - fixed point observation.
❑ Tailing or Shadowing - observation of a person’s movement.
❑ Undercover Man - person trained to penetrate organization.
❑ Liaison Program - assignment to other agencies like the press, credit agencies, labor
unions, telephone companies, etc.)
❑ Safe House - It is a place, building, enclosed mobile, or an apartment, where police
undercover men meet his action agent for debriefing or reporting purposes.
❑ Drop - a convenient, secure, and unsuspecting place where a police asset and handler
leaves a note
❑ Convoy - accomplice or associate of the subject.
❑ Decoy. person almost similar to the subject used to avoid or elude surveillance.
❑ Contact - person or subject picks or deals with while he is under surveillance.
❑ Made – subject becomes aware that he is under observation
 TYPES OF SURVEILLANCE
1. According to Intensity and Sensitivity
a. Discreet – subject is unaware that he/she is under observation
b. Close – subject is aware that he/she is under observation. Used to protect the
subject or stop him to commit crime.
c. Loose – applied frequently or infrequently. Period of observation may vary on each
occasion
 TYPES OF SURVEILLANCE
2. According to Methods
a. Stationary – observation of place on a fixed point position.
b. Moving – subject is followed from place to place. (Foot, motorized, aerial and
water)
c. Technical – uses communication and electronic hardware, gadgets, systems and
equipment.
 METHODS IN FOOT SURVEILLANCE
1. ONE MAN-SHADOW
➢ Most difficult
2. LEAPFROG
➢ Variation of one man method wherein the route is known. Follow the subject for a
while, cease from tailing and follow again where the subject usually passes.
3. GROUP
➢ Two-man, Three-man, Four-man or more. Contact is constant.

APPEARANCE OF THE OPERATIVE
1. Average size, built and general appearance
2. Have no noticeable peculiarities
3. No conspicuous jewelry or clothing
4. Have nothing about him to attract attention
5. Have perseverance and able to wait for hours
6. Alert and full of energy
7. Resourceful, versatile and quick-witted
8. Good actor and talker
9. Good memory
 BASIC PREPARATION
1. Subject – name, address, description, known associates, habits vices, ability to elude
surveillance.
2. Geographical location – maps, national and religious backgrounds, transportation, public
utilities, etc.
3. Cover Story
4. Vehicle used – description make model, color and plate number.
 WHAT IS IDENTIFICATION?
❑ The identification and surveillance of individuals involved in organized crime and
subversive activities consumes a considerable part of the police operational intelligence
field activities.
❑ This also involves gathering information pertaining to the various organizations that pose
threat to the community to include their locations vehicles, telephone numbers and the
like.
 WHAT IS CASING?
❑ Reconnaissance or surveillance of a building, place or area to determine its suitability for
intelligence use or its vulnerability in operations.

PURPOSE OF CASING
1. Aids planning and operation
2. Instill confidence to operatives
3. Considered as a security measures
 GENERAL PRINCIPLES IN CASING
1. Know the best route to get there.
2. Know how to conduct yourself without attracting attention.
3. Know what security hazards are in the area and how they can be avoided or minimized.
4. Know the best route how to extricate the area.

 METHODS OF CASING
1.Personal Reconnaissance
2.Map Reconnaissance
3.Research
4.Prior Information
5.Hearsay
 INFORMATION DESIRED IN CASING
1.Area Condition - description of the locality
2.Active Opposition – organizations whose task is to prevent intelligence activity in the area.
3.Disposal plan- disposal of info in case of possible compromise.
4.Escape and Evasion – the exist planning in case of emergencies, from immediate focal
point, the general area and completely from the area.
 WHAT IS A LIAISON PROGRAM?
❑ the assignment of trained operatives to specific targets with coordination to any agency
such as credit agencies, utility companies, police agencies of all types, the press labor
unions and telephone companies.
❑ OBSERVATION & Observation
❑ a complete and accurate observation that involves the use of all the major senses
to register and recognize its operational or intelligence significance.
❑ Description
❑ the actual and factual reporting of one’s observation of the reported sensory
experience recounted by another.
 PROCESS FOR ACCURATE OBSERVATION
1. Attention – becoming aware of an existence of fact.
2. Perception – understanding the fact of awareness.
3. Recording – identifying the name in own mind and some fact which have been perceived.
 WHAT IS ELICITATION?
❑ It is a system or plan whereby information of intelligence value is obtained through the
process of direct intercommunication in which one or more parties is/are unaware of the
specific purpose of the conversation.

DEVICES USED IN ELICITATION
1. Approach- process of setting people to start talking
2. Probe – keeping people to talk incessantly.

Types of Approach
1. Flattery – people are susceptible to praise.
Variants:
a. Teacher-pupil- subject is treated as an authority.
b. Kindred-soul- showing enough concern to the subject.
c. Good-Samaritan- offers help and assistance to the subject.
d. Partial-disagreement

Types of Approach
2. Provocative Approach- use conventional gambits.
Variants:
a. Teaser-bait- elicitor accumulates knowledge of the subject.
b. Manhattan-Missouri – elicitor adopts unbelievable attitude above anything.
c. Joe-blow- approachable to any field.
d. National Pride – natural propensity to defend country.

Types of Probe
1. Competition Probe
2. Clarity probe- elicit additional info
3. His-pressure – serves to pin down a subject in a specific area or used to point out
contradiction to what the subject said.
4. Hypothetical – presents a hypothetical situation and get the subject reactions.

Planning the Elicitation
1. What information is necessary or essential.
2. Who has access to the information
3. What are the vulnerabilities
4. How susceptible is the subject to the elicitation
5. Outline elicitation points prior to meeting and prepare specific questions and know the
subject well.

 COVER & UNDERCOVER OPERATION


❑ Cover – means by which an individual, group or organization conceals the true nature of
its activities and existence from the observer.
❑ Cover story – a biographical account, true or fictitious, which portray the personality which
an agent assumed.
❑ Cover support – an agent assigned in target areas with the primary mission of supporting
the cover story.

 Importance of Cover
1. Secrecy of operation against enemy intelligence
2. Secrecy of operation against friendly agencies who do not have the need to know
3. Successful accomplishment of mission.

Types of Cover
1. Natural Cover – using true or actual personal background to fit the purpose.
2. Artificial Cover – using biographical data adopted for a fictitious purpose
3. Cover within a cover – use of secondary to justify existence
4. Multiple cover – any cover identity wished.

Guidelines when cover is compromised
1. Move out immediately and relocate.
2. Start new facility for operations and develop it.
3. Use new personnel.
4. Build entirely new cover.
5. Be careful when making contacts with non-intelligence personnel.
6. Use circuitous route and provide careful counter-surveillance.
 WHAT IS UNDERCOVER ASSIGNMENT?
❑ an investigative technique in which an agent conceals his official identity in order to obtain
information from the target organization.

Planning an Undercover Assignment
1. Determine level on which investigation is intended.
2. Develop appropriate cover and cover story.
3. Selection of qualified personnel
4. Consideration of all operational details to include documentation, contract reporting,
housing and convergence.
5. Briefing, coaching and rehearsals.

Types of Undercover Assignment
1.Dwelling Assignment– establish residence in or near the target area.
2. Work Assignment – observation at the place of work.
3. Social Assignment – places of entertainment and amusement frequented by targets.
4. Multiple Assignments – two or more assignments covered simultaneously.
5. Rope Job – strike friendship with the subject.

The essence of undercover assignment
❑ The essence of intelligence is access,
❑ someone or some device has to get close enough to a thing, a place or person to be
observe or the desired facts,
❑ without arousing the attention of those who protect them.
❑ The information must then be delivered to the people who want it.
❑ It must move quickly or it may get stale. It must not get lost or integrated in route.”
 TACTICAL INTERROGATION
❑ Interrogation – the vigorous and confrontational questioning of a suspect about his
participation in a crime.
Purposes:
1. To extract confession or admission.
2. To extract information an unwilling witness possesses.

Techniques of Interrogation
1. Emotional appeal – addresses a suspect with an emotional appeal to confess.
2. Sympathetic approach – dig deep into past troubles, plight and unfortunate events in the
life of the suspect.
3. Friendliness
4. Mutt & Jeff – 2 agents with opposite personality
5. Tricks and Bluffs
a. The pretense of solid evidence against the accused\
b. The weakest link – companion had confesses
c. Drama – used to fake pain and agony
d. Feigning contact with the family
e. The line up – witness is guided to point positively to suspect
f. Reverse Line up – suspect is placed among other persons in a line up and will be
identified by several witness/complainants
 CLIPPING SERVICES
❑ Clipping articles from newspapers in accordance with an existing format is an important
method of gathering intelligence data.
❑ The communication network of modern newspapers makes an excellent source of highly
valuable material.

 INFORMANT MANAGEMENT
❑ It is an exception to the rule when the ability of an investigator exceeds the quality and
quantity of sources of information he possesses.
❑ Rarely, if ever, has there been an investigator of any proficiency that did not possess many
and varied sources of information. Informant recruitment and development ranks very high
in mandatory achievements of an intelligence officer. Failure in this area will usually restrict
the individual officer to the ranks of mediocrity.
 Classification of Clandestine Agents
1. Principal Agent
2. Action Agent
3. Support Agent
 Who is a Principal Agent?
❑ A managerial agent and the leader of an agent network.
❑ Recruited agent who is authorized by the clandestine organization to recruit and handle
sub-agents under the direction and control of an agent handler.
 Who is an Action Agent?
❑ The doer of the clandestine task
❑ May be further classified according to
the task he is assigned
Covert Action Agent - is a fully recruited agent who is in a senior position usually within a
government and able to exert influence on a foreign government at the direction of a sponsor. He
is an agent usually of political influence.
 Types of Action Agent
1. Counter Intelligence/Intelligence Collection Agent - Obtains information about one or
more opposition targets
2. Access Agent - gather operationally useful information such as biographies, motivational,
personality, occupational on possible target individuals from within the opposition
3. Legal Traveler - an agent who is able to travel to and from a hostile area to perform
information and collection mission.
4. Penetration Agent - is a counter intelligence agent who provides intelligence information
to the agent handler on internal operations, directions and activities of the opposition
intelligence and security services Propagandist - undertakes action to mold the attitudes,
opinions and action of an individual, group or nation.
5. Saboteur - undertakes positive action against friendly power resulting in the loss of use,
temporary or permanent, of an article, material and facility
6. Guerilla -is a member of a paramilitary group organized to harass the enemy in a war
situation.
7. Strong Arm -provide special protection during the dangerous phases of clandestine
operations
8. Provocation - induces an opposition to act to his own detriment by discrediting himself.
 Who is a Support Agent?
❑ is an agent who engages in activities that support the clandestine operations. These types
of agents perform all types of auxiliary services at the direction of the project officer.
 KINDS OF SUPPORT AGENT:
1. Surveillant - observes personnel and places of operational interest
2. Investigator - procures information on persons of things of operational interest.
3. Procurers of Funds - obtain special currency that are needed in operational use.
4. Procurers of Supplies - procures ordinary and critical supplies
4. Safehouse Keeper - manages and maintains a safehouse for operational use.
5. Manager of storage area - arranges the storages, distribution or transportation of
operational supplies.
6. Communication Agent -facilitates communication equipment
 Sources of Information
❑ Are persons, things or actions from which information about criminals and/or subversives,
weather and terrain is derived.
TYPES OF SOURCES OF INFO
1. Records
2. Persons

 Persons as sources of information


❑ Informants – people selected as sources of information which could be voluntary or in
consideration of price or reward.
1. Informant – gives info voluntary without any consideration
2. Informer – give info for price or reward.
❑ Informant net – controlled group of people who together under the direction of agent
handler.

 Purposes of Informants
 Gain access to areas and targets inaccessible to intelligence.
 Provide anonymity to investigations and operations.
 Increase the scope of area of operation and target coverage

You might also like