You are on page 1of 55

Big Picture in Focus:

ULOa. Illustrate the characteristics of a


productive investigative interview and explain
the rules in the conduct of interview.

PRESENTATION BY: ERECA J. LARROZA


Information
 any data gathered in the course of
investigation which will serve as a
foundation in solving the case.
 Field Inquiry simply means as the general
questioning of all people present in the
cirme scene.
 Interview a form of questioning among
person having knowledge regarding the
commission of the crime.
Interrogation
 a questioning style which involves the use of strong
appeal or aura in order to gather information among
persons who may have direct involvement of the
crime.
CONFESSION
 define as the direct acknowledgement of the suspect with
respect to his participation concerning the commission of
the crime.
Admission
 define as the acknowledgement only of come element
of the crime and is not tantamount to confession.

INTELLIGENCE

o a collated, analyzed and evaluated information


appropriately acquired for particular purpose.
Characteristics of productive
interviewer:
 Self-reliance
 Adaptability
 Perseverance
 Optimistic
 Patience
SELF-RELIANCE
 means that investigators must be confident in doing
the interview while at the same time conscious
listening to the interviewee.

ADAPTABILITY
 this means that investigators must be flexible in different
situations and be able to do interview at the interviewee's
convenience.
PERSEVERANCE
ο this means that investigators must endure all
obstacles that may come before the process of
interviewing the interviewee.
OPTIMISTIC
 this means that investigators must be positive in dealing
all possible interviewees that may be called him;

PATIENCE
 investigators must exert all possible effort in maintain
good attitude in handling the interview as well as the
ability to work under pressure.
Rule in Interview
 Case review - investigators must review relevant facts about
the case.

 Build Rapport - this means that investigator needs to


communicate properly.

 Simple question - investigator should not allow the


interviewee to be confuse.

 Avoid Implied answer - this means that investigators must not


allow a question answerable by “yes or no”.
 Avoid leading questions avoid leading questions as this will
allow the interviewee to focus only to matters.
 Don't ramble this simply that investigators should not ask
question at a time.
 Good closure this means that investigators must be courteous
and kind to the interviewee.
Interrogation
 a. Preliminary Preparation - investigators
must identify himself before the conduct of
the interrogation and must allow the subject to
know the purpose of the same.

 b. The term subject refers to the person who is


placed for interrogation.
Interrogation Techniques
  Strong approach -interrogator projects a hostile
personality toward the subject to create anxiety and fear
in order to confess.

 Friendly approach -interrogator manifest a sign of


friendliness and other help toward the subject.
Confession and Admission
 The main objective of interrogation is to obtain
confession form the subject.

 a. Confession is defined as the direct


acknowledgement of the suspect with respect to his
participation concerning the commission of the crime.

 b. Admission define as the acknowledgement only of


come element of the crime and is not tantamount to
confession.
In order for a confession to become valid, the
following requirements must confer :
 The person making the confession must be
appraised of his constitutional rights as
provided by the Miranda doctrine but that
the right to remain silent and anything he
will say can used against him, and be
provided with an independent and
competent counsel.
 If the person making confession waive his right, it
must be done upon a valid waiver with the assistance
of counsel. Waiver refers a document signed by the
person making the confession renouncing all his
rights as provide by the constitution; and

 There was no third degree use. Third degree simply


means as the use of physical force, intimidation,
threat, or any other similar means done to obtain
confession.
Miranda warning need not be applied in cases where
the confession was done to obtain confession was done
voluntarily such that :
 The person was running to the police station
and suddenly spoke out that he killed a person;
 The person who subjected to for fingerprinting
or be taken handwriting sample or doing lineup
for sobriety test;
 Field questioning or in the crime scene
 Roadside questioning or any traffic stops or;
 Any other minor violations.
Intelligence
 Information is define as accusation in writing,
charging a person with an offense, subscribe by
the fiscal and files in court. In connection to
intelligence, information is simply the “raw data “
 intelligence refers to collated, analyzed and
evaluated information appropriately acquired for
particular purpose.
Sources of Information
 the network of data which can be linked or
grouped in order to obtain a concrete and
reliable information based on the prevailing
need arises.
People as source of Information
 Regular source these are information gathered
through people who have come directly to the
attention of the police commonly the
complainant, witness or victim.
 Cultivated source these are information
generally taken through the use of informant or
informer.

 Grapevine source these source of information


are gathered from those who are in the
underworld criminals.
Types and Motives of Informant
 Anonymous - these are unidentified or unknown informants and
usually provides information to the police through telephone or
cellphone.

 Double Crosser - these are those informants who provides


information in order also to gain information form the police

 False Informant - these are those informants who provides


false information without bases.

 Frightened Informants - an informant who provides


information due to panic and anxiety.
 Legitimate - these are those informant who provides
information voluntarily to the police.

 Mercenary - these are those informant who provides


information exchange for a reward whether for money

 Self – Aggrandizing - an informant who provides exaggerated


information to the police in order to gain advantage or
attention.

 Women - these are the most dangerous and difficult type of


informant against male
Common motive of information
 Civic mindedness - informant provides information as a
sense of duty and obligation to assist the police.

 Fear - the person gives information due to oppression by


enemies or other impending danger.

 Gratitude or Gain - informant provides information to obtain


a privilege towards the welfare of his family.

 Jealousy - informant is push to provide information due to his


resentment to the accomplishments or possessions of another.
 Remuneration - a person informs the police for some
pecuniary or other material gain he is to receive.

 Repentance - the informant provides information as a sign


of regret for what he has previously done.

 Revenge - vengeance or retaliation is the sole purpose of


the person providing information to the police.

 Vanity - the person wants to gain favorable attention and


importance form the police.
Legal Limitations in Obtaining
Information.
 Republic Act 4200 ( Anti – Wire Tapping)
following acts are prohibited:
• Tapping any wire or cable
• Using any other device or arrangement;
• To secretly overhear, intercept, or record
• Private communication/conversation
• Without the knowledge or consent of the parties.
 Republic act 10173 ( Data Privacy )

• Unauthorized processing of personal information


• Accessing personal information due to
negligence
• Improper disposal of personal information
• Processing of personal information for
unauthorized
• Unauthorized access or intentional breach
• Malicious disclosure
• Unauthorized disclosure
Characteristics and Context of
Intelligence.
 Intelligence is used primarily to crack down
organized crime, defend from enemy attacks
and aid in the progress of either covert or overt
operation. Overt investigation simply means as
operation conducted openly . Covert
investigation in contrast it is an open operation
conducted in clandestine manner. Clandestine
simply means as secret.
Intelligence should possess the following
characteristics
 Intelligence and operation are interdependent
 Intelligence is continuous
 Intelligence must be useful
 Intelligence must be available on time
 Intelligence operation require imagination and
foresight
 Intelligence must be flexible
 Intelligence requires continuous security
measures.
Scope of Intelligence
National Intelligence
 Intelligence that covers a wide range of areas in its
application. It might be a network of information
concerning national police and national security
Police intelligence
 It could also be collected, analyzed, collated and
evaluated information concerning criminal
investigation, criminal syndicate, organize crime or
other police problems
Military Intelligence
 Those information regarding military activities
which is essential to the different military
operations.
Departmental Intelligence
 refers to information needed by all department
agencies in the execution of government plans
and programs.
In the area of police intelligence it includes
the following :
 Criminal Intelligence (CRIMINT) refers to
the knowledge essential to the prevention of
crimes and public safety and the investigation,
arrest and prosecution of criminal offenders.
 Internal Security Intelligence (INSINT) refers
to the knowledge essential in the maintenance of
peace and order.
 Public Safety Intelligence (PUSINT) refers to
the knowledge essential in ensuring the
protection of lives and properties.
Strategic Intelligence
 information which
primarily a long range
in nature with little
practical immediate.
Line Intelligence
o which is of an
immediate nature
and necessary for
more effective
police planning
and operation.
National Intelligence
 it is integrated product of
intelligence developed by
all governmental branches,
departments concerning the
broad aspect of national
security.
Counter Intelligence
 Intel covering the activity devoted in destroying the
effectiveness of hostile foreign activities and protection of
information against espionage, subversion and sabotage.
 it is a type of intelligence employed to protect the interest and
safeguard the property and important information against
possible entry or infiltration of enemy forces being lost,
destroyed or stolen.
Intelligence covering the activity devoted in destroying the
effectiveness of hostile foreign activities and the protection
of information

 Espionage - refers to
the stealing of vital
information either
physical or in electronic
form.
 Subversion - the
recruitment of person who
is working within an
organization or
employment of any person
to an organization who will
work secretly in an attempt
to undermine or overthrow
its current system.
 Sabotage - refers to the
stealing of properties or
destruction of any
material in order to
hamper or cause delay
in the preparation or
regular working duties.
Five Categories of Counter Intelligence
Operation
 Military Intelligence

 Port Frontier and Travel Security

 Civil Security

 Censorship

 Special Operation
Military Security
 it encompasses the
measures taken by a
command to protect
itself against
espionage, enemy
operation, sabotage,
subversion or surprise.
Port Frontier and Travel Security
 has to do with the
application of both
military and civil
security measures for CI
control at point of entry
and departure,
international borders or
boundaries.
Civil Security
 it encompasses active and
passive CI measures
affecting the nonmilitary
nationals permanently or
temporarily.
Censorship
 controlling the movement
of different person
particularly those who are
expected to destroy the
government institution and
projects.
Special Operations
 counter subversion,
sabotage and
espionage.
In the field of Counter intelligence (CI)
Operation
 a. Counter Human Intel (HUMINT) seeks to overcome
enemy attempts to use human source to collect information or
to conduct sabotage and subversion.

 b. Counter Imaginary Intel (IMINT) are actions such as


surveillance radar, photo thermal and infrared systems and rely
heavily on pattern and movement analysis and evaluation of
the enemy.

 c. Counter Signal Intel (SIGNT) determines enemy SIGINT


and related enemy weaknesses, capabilities and activities,
assess friendly operations to identify patterns, profiles and
develop, recommend and analyze countermeasures.
The type of counter intelligence
o Passive measures those measures, which seek
to conceal info from the enemy.

o Active Measures are those measures, which


seek actively, block the enemy’s efforts to gain
info or engage in espionage, subversion or
sabotage.
Intelligence Cycle
 define as the process of
obtaining information
which includes proper
procedure sequence of
steps starting from
planning, collection,
collation, and the
dissemination of
information to appropriate
person.
 Mission the purpose why intelligence should be
gather and use for particular undertaking

 Planning define as the process of determining the


extent and scope of the needed preparation which
includes the supervision of the collection of
information and other requirements base on the
standard priorities.
Collection of Information
1. Sources of Information pertains to individual or group,
association or entity which may possess possible information to
which an individual desires to gathered.
 
2. Operations of Command the manner how the collecting agency
gathered acts or works for a particular purpose in order to
determine the needed security.

3. Sources of Information pertains to individual or group,


association or entity which may possess possible information to
which an individual desires to gathered.

4. Operations of Command the manner how the collecting agency


gathered acts or works for a particular purpose in order to
determine the needed security.
5.Characteristics of the Enemy connections of the enemy forces to
whom the data be collected.

6.Methods in Gathering in Information simply refers to the


approaches as to how information shall be gathered and collected.

7. Essential Elements Of Information (EEI) information


pertaining to the target area which the commander feels he need
before he can arrive an accurate decision.

8. Target Area refers any individual, group, association or entity


who subject for operation or intelligence
Collection Phase
 Who will collect the information?
 What information will be collected?
 Where are the places whereby information
shall be collected?
 When is the right time to gather the
information?
 How the information shall be collected
 Why this information should be collected?
Selecting collecting agent
 The placement or access to the information

 The capability to gather information

 The number of people who will gather the


information

 The strength and security of the target area.


In collation stage, all collected information will
undergo the following :
1. Recording - refers to the systematic sorting of all documented
information and present them either in writing or some other form
of presentation so that they can be analyze and studied for future
action.

2. Analysis - collected information is break into different components


and isolate those that are relevant to the mission or those
intelligence value which includes looking into the source of
information, truthfulness of information and who provides the
information.

3. Evaluation - refers to the assessment of information done to


determine the reliability of the source and providing judgment in
line with accuracy.
6. Integration - is the combination of all those
isolated information from various sources to
produce a new information necessary for the
success of the mission.
7. Interpretation - is the process involved in
providing meaning and significance of the new
information
8. Synthesis - provide conclusion based on the
new information generated in relation to the
current situation.
Reliability and accuracy Table
Dissemination Phase
  Dissemination - refers to the actions taken to
transfer processed information to appropriate
persons.
THAT’S ALL THANK YOU!!

END OF WEEK
4-5 ULO A.

You might also like