You are on page 1of 18

CDI 1- FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE

CRIME DETECTION AND INVESTIGATION

BASIC CONCEPTS:

CRIMINAL INVESTIGATION

-İs an art which deals with the identity and location of the offender and provides evidence of guilt
through criminal proceedings.

-It is the systematic method of inquiry that is more a science than an art. The logic of scientific method
must however, be supplemented

by the investigator's inítiative and resourcefulness. The sequences of the investigation should be
regarded by scientific, operating

framework that requires improvising on the part of the investigator.

INVESTIGATION DEFINED

- It is the process of Inquiring, eliciting, soliciting and getting vital information, facts, circumstances in
order to establish the truth.

The collection of facts to accomplish a three-fold aim:

- To identify the guilty party;

-To locate the guilty party; and

-To provide evidence of his guilt.

Criminal Investigator-A publíc safety officer who is tasked to conduct the tnvestigation of all criminal
cases as provided for and embodiedunder the revised penal code, criminal taws änd special laws which
are criminal in nature.

THREE-FOLD AIM OF CRIMINAL INVESTIGATION

1. ldentify Perpetrators

2. locate his/her whereabouts

3. Provide evidence needed for his conviction


PRIMARY JOB OF AN INVESTIGATOR

-The primary job of the investigator is to discover whether or not an offense has been committed under
the law.

QUALITIES OF A GOOD INVESTIGATOR

✓ Perseverance Intelligence ✓ Honest

✓ Understanding of the people and environment Keen power of observation

THREE TOOLS OF INVESTIGATION INFORMATION

- It is the knowledge / data which an investigator acquired from other persons and records .

B. INTERVIEW AND INTERROGATION INTERVIEW - Is a conversation with a purpose , motivated by a


desire to obtain certain information from the person being interviewed as to what was done , seen ,
felt , heard , tasted , smell or known .

I.R.O.N.I.C. FORMAT

The interview of a witness can be described by its acronym ' IRONIC ' which stands for Identity , Rapport
, Opening Statement , Narration Inquiry , and conclusion .

a . Identity - prior to the commencement of an interview , the investigator should identify himself to the
subject by name , rank and agency . Except , when there is no need to know the officer's identity .

b . Rapport - it is good to get the positive feeling of the subject towards the investigators , such friendly
atmosphere is a vital for both the subject and the investigator t have a better interaction .

c . Opening Statement- the investigator must have to indicate why the subject is being contracted .

d . Narration - the witness should be allowed to tell all he knows with little interruptions from the
investigator .

e . Inquiry - after all information have been given by the subject , that is the time for the investigator to
as question to clarify him about the case under investigation .

f . Conclusions - after the interview , it is but proper to close the interview with outmost courtesy and
thanking the subject for his cooperation .

INTERROGATION -is a questioning of a person suspected of having committed an offense or a person


who is reluctant to make full disclosure of information in his possession which is pertinent to the
investigation . ( Most Skillful type of questioning ) What are the purposes of Interrogation ?
1 . To obtain confession to the crime

2 .To induce the suspect to make admission

3. To learn the facts of the crime

4. To learn the identity of the accomplice

5.To develop information which will lead to the recovery of the fruits of the crime

6. To discover the details of other crimes participated by the suspect.

INSTRUMENTATION

-It is the application of instruments and methods of physical science to detection of crimes . In cases
where there are no significant physical evidence to be found , then the use of instrumentation is
relatively important . Special Crime Investigation .

PHASES / STAGES OF CRIMINAL INVESTIGATION

1.Identification of criminals

2.Tracing and locating the criminal

3. Gathering of evidence to prove the guilt of the criminal.

Methods of Identification by witness

- Verbal description ( Portrait Parle )

- Photographic files ( Rogues Gallery )

- General Photograph

-Artist sketch ( Composite Criminal Illustration )

-Mug shot

The value of identification by eyewitness depends on : ( Board Exam Question )

✓ The ability to observe and remember distinct appearance of suspect ;

Prevailing condition of visibility ;

✓ The lapse of time .


CIRCUMSTANTIAL EVIDENCE - facts or circumstances from which , either alone or in connection with
other facts , the identity of the person can be inferred.

What must be inferred to prove identity by circumstantial evidence ?

Motive - is what induces the criminal to act ( Moving power )

Intent- is the result or accomplishment of the act ( Purpose )

Opportunity - is the physical possibility that the suspect could have committed the crime .

PHYSICAL EVIDENCE TO IDENTIFY CRIMINALS ( C.A.T )

CORPUS DELICTI - is the body of the crime or fact of specific loss or injury sustained . It constitutes the
essential parts or elements in the commission of the crime .

ASSOCIATIVE EVIDENCE - these are the pieces of evidence that will link the suspect to the crime scene .
The suspect may leave some clues at the scene such as weapons , tools , garments or prints .

TRACING EVIDENCE - articles which assist the investigator in locating the criminal . Stolen goods in the
possession of the suspect in an example of tracing evidence .

MODUS OPERANDI - is the method of operation by a specific criminal or criminal syndicate . It is a


distinct pattern of how a crime is committed and is established by a series of crimes under one
classification . The modus operandi of one criminal is distinct and different from the other . It is a
criminal trademark , logo or brand name .

-Deals with the study of major crimes based on the application of special investigative techniques . It is
also the study concentrates more on physical evidence ; its collection , handling , identification and
preservation in coordination with the various criminalists in the crime laboratory . Special crime
investigation involves close relationship between the investigator in the field and the investigator in the
laboratory- the Criminalist .

Crime scene Investigation

-It is the conduct of processes , more particularly the recognition , search , collection , handling ,
preservation and documentation of physical evidence to include the identification and interview of
witnesses and the arrest of suspect / s at the crime scene .
Crime Scene

-A crime scene be defined as a location at which an offense was committed and where potential for
evidence of that crime may exist . It can be understood to include all areas in which the criminal , any
possible victim / s , and any eyewitness / es moved during the time the crime was committed .

GOLDEN RULE AT CRIME SCENE INVESTIGATION ( MAC Rule ) " Never touch , move , or alter any object
at the crime scene unless it has been photographed , measured , and sketched from any conceivable
angle .

UPON RECEIPT OF THE CRIME INCIDENT The Desk Officer shall :

-Record the date and time the report / complaint was made , the identity of the person who made the
report , place of the incident and a synopsis of the incident . ● -Inform his superior officer or the duty
officer regarding the report .

The First Responder shall :

- Cordon off the crime scene with whatever available materials like ropes , straws , human barricade ,
police line , etc .

- Evacuate injured persons to the nearest hospital ; -Prepare to take the " dying declaration " of severely
injured person , if any

- Prevent entry / exit of persons within the cordoned area ; and

- Prepare to brief the investigator of the situation upon their arrival .

Scene of Crime Operation ( SOCO )

-Is a forensic procedure performed by trained personnel of the PNP Crime Laboratory through scientific
methods of investigation for the purpose of preserving the crime scene , gathering information ,
documentation , collection and handling of all physical evidence .

It is the conduct of processes, more particularly the recognition, search, preservation, documentation,
collection, packaging and

handling of physical evidence.


Basic composition of the Scene of Crime Operation( SOCO)

a. Team Leader

b. Crime Photographer

c. Crime Scene Sketcher

d. Recorder

e. Evidence Collector

f Evidence Custodian

g. Medico-legal Officer

h. Fingerprint Examiner/Technician

Note: This composition is ideal in major cases but in some cases, this can be accomplished by trained
SOCO personnel or Investigators.

SOCO Assistance

-In cases where the crime scene needs special processing due to its significance or because of its
sensationał nature, the Scene of the

Crime Operation (SOCO) specialists of the Crime Laboratory shall be requested.

METHODS OF SEARCH

-Strip or Line Search Method-the searchers will proceed at the same pace along the path parallel to one
side of the rectangle .

-Double Strip or Grid Method - is a combination of the strip search and is useful for large crime scene .

Spiral or Circular Method - the searchers will follow each other in the path of a spiral , beginning in the
outside and spiraling towards the center or vice versa in a clockwise or counter clock - wise direction .

Quadrant of Zone Method - the area to be searched is divided into four quadrants and each searcher is
assigned to one quadrant .

Wheel , Radial or Spoke Method- is applicable for area which is considered to be approximately circular
or oval . The area is then divided into six quadrants in a pie - like fashion . Photographing the Crime
Scene .
TYPES OF MEASUREMENTS

- Rectangular coordinates method - a sketching method that involves measuring the distance of an
object from two fixed lines at right

-Triangulation method - a sketching method that requires measuring the distance of an object along a
straight line from two widely angles to each other . separated fixed reference points .

-Baseline method -a sketching method that makes measurements along from a single reference line ,
called a baseline , which can be established by using a length of string , chalk line , or some other
convenient means .

-Compass point method - a sketching method that requires a protractor or some method of measuring
angles between two lines . One point is selected as the origin and a line extending from the origin
becomes an axis from which the angles can be measured .

-Cross projection method - a sketching method in which the ceiling appears to open up like a lid of a
hinged box , with the four walls opening outward . Measurements are then indicated from a point on
the floor to the wall.

Collection of Physical Evidence

-The competence to recognize and properly collect physical evidence is critical to both solving and
prosecuting crimes .

- The team leader is always informed of significant evidence located . The evidence collectors shall put
his initial , location and date of collection on the item and turn it over to the evidence custodian for
documentation and safekeeping .

CHAIN OF CUSTODY

-It is the number of persons who handled and possessed the pieces of evidence the moment they were
collected , marked and tagged , up to the time of the final disposition of the case .
Conduct of Final Survey

-The team leader makes a final review on the crime scene to determine whether or not the processing
has been completed .

Release of the Crime Scene

-The release of the crime scene is done if the investigator is satisfied that all pieces of evidence have
been recovered . Thus , the investigator must evaluate the items recovered from the results of the
interrogations of the suspect / s and the interview of the witnesses . He must bear in mind that upon the
formal release of the crime scene to the proper authority , the warrant is already required for his re -
entry to the crime scene .

Intelligence

-Is the product resulting from the collection , evaluation , and analysis , and interpretation , integration
of all available information ?

Obert intelligence - gathering of info or documents openly .

Covert Intelligence - secret procurement of information or documents .

Police Intelligence - Information regarding the activities of criminals and other law violators for the
purpose of affecting their arrest , obtaining evidence , and forestalling plan to commit crimes .

Criminal Intelligence ( CRIMINT ) -Production of intelligence essential to the prevention of crime , and
the investigation , arrest and prosecution of criminal offenders .

Internal Security Intelligence ( INSINT )- Knowledge essential to the maintenance of peace and order .

Public Safety Intelligence ( PUSINT ) - Knowledge essential to ensuring the protection of lives and
properties .

Military Intelligence- Refers to the knowledge by the military institution essential in the preparation and
execution of military plans , policles and programs .

National Intelligence . - Integrated product of intelligence developed by all government departments


concerning the broad aspect of national policy and national Security .

. Departmental Intelligence -the intelligence required by department or agencies of the government to


execute its mission and discharge its responsibilities .

Strategic Intelligence

-Intelligence , which is not of practical and immediate operational value but rather long range in nature .
Line Intelligence

-Processed information coming from the overt and covert sources that affect police operations and
harmony with the community an other government agencies . It is a knowledge which contributes
directly to accomplishment of specific objectives of immediate concern such as raids , anests , etc.

Definition of Terms :

Espionage - practice of spying

Sabotage - a willful and malicious destruction .

Saboteur - a person or group of persons designed to carry out sabotage work .

Subversion - an organized and systematic conspiracy to overthrow a duly constituted authority or


government .

Cover - it is the change , forging and screening of person's real personality , things , events and places .

Deception - in general , to mislead another

Infiltration or Penetration - penetration of agent to an intelligence target .

Agent - a person or group of person employed by the organization whose objectives is to obtain
information or intel.

Procurement - in intelligence , an aggressive effort to acquire certain specific information which may not
readily available.

Duress Code - a type of code system so that security personnel when forced by an armed men to enter
into installation can give alarm by use of certain words in casual observation .
Intelligence Agency

-an agency responsible in intelligence related matters .

Federal Bureau of Investigation ( FBI )

- Investigative arm of the U.S Department of Justice and its 1st . Director is John Edgar Hoover

National Intelligence Coordinating Agency ( NICA ) -Created by Executive Order 246 by President Cory
Aquino

- It is the primary intelligence gathering and analysis arm of the Philippine government , in charge of
carrying out overt , cover and clandestine intelligence programs . Its motto is " Intelligence is Security

- Under the Office of the President

Intelligence Cycle

- It is the process through which intelligence is obtained , produced , and made available to users .

-A cyclical steps followed from intelligence planning to the dissemination of processed information .

-It is a repetitive process used to produce intelligence from information .

1. Directing - in this phase the intelligence staff officer or unit commander will determine the required
or important information relevant to the mission .

2. Collecting Information - in this phase the collecting agency determines what specific information is to
be collected , by who and from whom . After the collection of information , it is then submitted for
processing .

3. Processing - in this phase collected information will be transformed into intelligence . It involves :

- Recording the reproduction of information through writing or in some other form of graphical
representation and the arranging of information into groups of related items .

Evaluating - to determine the pertinence and reliability of the information to the mission or operation
as well as the reliability of the source or the agent and the accuracy of the information .

Collation- organizing of raw materials to compare with others .


4. Analysis - the determination of the significance of the information collected and to obtain the
probable meaning of the evaluated information .

Integration - It is the combination of the elements stated in assessment with other known information

5. Dissemination and use

- the final phase of the cycle wherein the processed information or intelligence will be disseminated by
means of reports , annexes , briefings , estimates , messages and other forms to the selected agency ,
unit or command to effect or implement the mission .

Counter Intelligence

-Phase of intelligence covering the activity devoted in destroying the effectiveness of hostile foreign
activities and the protection of information against espionage , subversion and sabotage .

- aspects of intelligence to all security measures , both offensive ( active ) and defensive ( passive )
designed to ensure the safeguarding of information , personnel , material and installation against
espionage , sabotage and subversion by foreign nations and dissident groups or individuals that
constitute threat to national security .

Types of Agent used in collecting of Information

Agent of Influence

- Agent who uses authority to gain information

Agent in Place

- Agent who has been recruited within a highly sensitive target

Penetration Agent

- Agent who have reached to the enemy , gather information and able to get back without being caught .

Expendable Agent

- Agent who leaks false information to the enemy .


Double Agent

- An enemy agent , who has been taken into custody , turned around and sent back where he came from
as an agent of his captors .

Information Classified as Sources

Information

-All evaluated materials of every description including those derived from observation, reports, rumors,
imagery, and other Sources from which intelligence is produced.

Regular Source

-is acquired from open source, records, files

Cultivated Source

-are information furnished by informants and informer thru police initiative

Grapevine Source

-Are information coming from the underworld character such as prisoner or ex-convict?

Sponsor

- directs the organization conducting the clandestine activity.

Target

- Person, place or things against which the clandectine activity is to be conducted.

Agent

- It refers to a person who conducts the clandestine Operations


Espionage Agent

- Agent who dandestinely procure or collect information.

Propagandist

- Agents who molds the attitudes, opinions, and actions of an individual group or nation.

Surveillant

- Agent who observes persons and places af operations of interest.

Kinds of Covert Operation

Surveillance

-Is the covert, discreet observation of people and places for the purpose of obtaining information
concerning the identities or activities of subjects.

Terms to remember in Surveillance

Surveillant

- is the plainclothes investigator assigned to make the observation

Subject

- is who or what is observed. lt can be a person, place, property, and vehicle, group of people,
organization or object.

Safe house

- Refers to a place where agents meet each other for purposes of de-briefing and reporting.

Live Drop

- Refers to a place where agents or informants leave their messages to the other Agents.
Decoy

- A person or object used by the subject in attempt to elude Surveillant.

Log

- cronological records of activities that took place in the establishment under surveillance.

Convoy

- An associate of the subject who follows him to detect surveillance.

TYPE OF SURVEILLANCE ACCORDING TO METHOD

1. Stationary

2. Moving

3. Technical

Tactics of Surveillance :

Loose tail

- employed where a general impression of the subject's habits and associates is required .

Rough Shadowing

- employed without special precautions , the subject maybe aware of the surveillance ; employed also
when the subject is a material witness and must be protected from harm or other undesirable
influences.

Close tail

- extreme precautions are taken against losing the subject is employed where constant surveillance is
necessary .
Methods of Shadowing or Tailing

1.. One man shadow

2. Two man shadow

3. Three man shadow

Elicitation

- The process of extracting information from a person believes to be in possession of vital information
without his knowledge or suspicion .

Employment of Technical Means :

Bugging

- The use of an equipment or tool to listen and record discreetly conversations of other people .

Wire Tapping

- A method of collecting information thru interception of telephone conversation .

Tactical Interrogation

- It is a process or method of obtaining information from a captured enemy who is reluctant to divulge
information .

Observation and Description

It is a method of collecting information by just merely using the different senses .

" Cover and Undercover Operations "

Undercover Operations

- also referred to as " Roping "

-Undercover is disguising one's own identity or using an assumed identity for the purposes of gaining the
trust of an individual or organization to learn secret information or to gain the trust of targeted
individuals in order to gain information or evidence .
Cover

-It refers to the changing , forging or falsifying agent's real personality including but not limited to
things , location , job , and others that will be used in undercover assignment

Types of Cover

Artificial

- altering the background that will correspond to the operation

Multiple

- Includes different cover

Natural

- Actual or True Background .

Hazards of Undercover Operations

-Reintegration back into normal duty

- Maintenance of identity

Uses and Types of Undercover Assignment

Residential Assignment

-It is related to the neighborhood of the subject , where the agent will live as a new resident without
making any suspicion . His mission is to make friends within its neighborhood and gather information
regarding the subject and possibly getting closer to the subject .

Social Assignment

-The agent will gain access to the subject by going to the different hang out places of the subject and
gather information like knowing how to drink socially without getting drunk .
Work Assignment

- The agent will be employed where the subject work to acquire information . The agent must know his
work and focus his mind set and habit to his work assignment .

Subversive Organization

-This is the most dangerous of all the undercover assignment ; the agent will join the organization of the
subject itself he must know the ideologies of the group and the actions while inside should conform to
the organization to avoid any suspicion .

"Informers and Informants"

Informants

- Any person who hand over information to the agents which is relevant to the subject. The informant
may openly give the information clandestinely and choose to remain anonymous.

Types of Informants

-Anonymous Informant

-Mercenary Informant

- Confidential Informant

-Double-Crosser Informant

-False Informant

-Frightened Informants

-Self-Aggrandizing - moves around the center of crimals delight in surprising the police about bits of
information.

-Mercenary Informant

-Double-Crosser Informant

-Women

-Legitimate Informant

-Rival Elimination Informant


"Cryptography"

Cryptography

-It is defined as an art and science of codes and ciphers. This is done through the use of "Speech
Inverter" whereby esserntial speech frequencies are divide into several ranges by filters then inverted to
produce it scrambled speech when intercepted.

Crypto Analyst

- Refers to those persons who break intercepted codes..

Cryptographer

- It refers to a person who is highly skilled in converting message from clear to unintelligible forms by
use of codes and cipher.

Coding

- It is the changing cf message from plain clear text to unintelligible form also known as "Encrypting".

Decoding

- Transforming of coded message into plain text also known as "Decrypting".

You might also like