Nothing Special   »   [go: up one dir, main page]

Cdi 1-Full Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 54

CDI 1

FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE

COVERAGE OF LESSON 1
 INTRODUCTION TO CRIMINAL INVESTIGATION
 HISTORICAL BACKGROUND OF INVESTIGATION
 RELEVANT LAWS/ PROVISIONS APPLICABLE IN CRIMINAL INVESTIGATION
 CRIMINAL INVESTIGATION PROPER

--------------------------------------------------------------------------------------------------

I. INTRODUCTION TO CRIMINAL INVESTIGATION

Investigation - this refers to the process of carrying out a detailed examination or


inquiry usually in official manner, to discover something or somebody. The term came from the
Latin word investigare (vestigare in some books) which means “to track or to look into for
traces”. Fundamentally, it may have been derived from Vestigium, another Latin word which
means footprint (Encarta Reference Library, 2009).

Criminal Investigation came from the Latin term Investigat, which means “to inquire or
to discover” during the 5th century (Microsoft® Encarta® 2008 © 1993-2007 Microsoft
Corporation).

Criminal Investigation is a logical process of collection and analysis of facts about


persons, things and places relative to a crime. It includes:
(a) Identification of the guilty party
(b) The location of the whereabouts of the guilty party, and
(c) Providing admissible evidence to establish the guilt of the parties involved in the
crime.

Criminal Investigation is an ART- because it is governed by rigid rules or fixed legal


procedures but most often based on intuition (logic and tested knowledge, immediate
learning/consciousness) and sometimes by chance.

Criminal Investigation is a SCIENCE because it involves the application of knowledge


of forensic sciences in the process of identifying, locating, collecting, processing, and/or
evaluating physical evidences (Manwong, 2004).

Criminal Investigation is a PROCESS: it involves systematic process of identifying,


collecting, preserving, and evaluating data or raw facts to produce valuable information for
bringing a criminal offender to justice.

A. KINDS OF CRIMINAL INVESTIGATION


Generally, there are only two kinds of criminal investigation:
1. Investigation while the suspect is under arrest and detention; and
2. Investigation while the suspect is “at large”. It means that the suspect is not under arrest
or detention, as distinguished from fugitive from justice.

B. THE FOUR PHASES OF CRIMINAL INVESTIGATION


1. The identification of criminal.
2. The criminal is traced, located and arrested.
3. The facts or evidence to prove the guilt of the accused is gathered.
4. The pieces of evidence are presented in court.

C. GOALS OF CRIMINAL INVESTIGATION


Generally, the goals of criminal investigation are the following:
1. To determine whether a crime has been committed;
2. To legally obtain information or evidence;
3. To identify persons involved in the crime;

Page 1 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
4. To arrest suspects ;
5. To recover stolen properties;
6. To present the best possible case to the prosecutor.

D. COMPONENTS OF CRIMINAL INVESTIGATION


1. Pattern- refers to a series of similarities that may link particular cases or indicate that the
same person is committing a series of crimes.
2. Leads-these are clues or pieces of information that aid in the progress of an investigation.
3. Tips-specifically refer to leads provided by the citizens that aid in the progress of an
investigation.
4. Theories-beliefs regarding the based on the evidence, patterns, leads, tips and other
information developed and uncover in the case.

E. TRICHOTOMY OF CRIMINAL INVESTIGATION


1. Training- being a critical factor in developing good and competent investigator, is the key to
freedom from bandage of ignorance.
2. Tools- to establish facts and develop evidence, a criminal investigator must use these tools-
information, interview, interrogation, and instrumentation.
3. Technique Essence of tactical strategy in investigation.

F. ROLES OF AN INVESTIGATOR
1. Determine whether a crime has been committed
2. Identify the victim/s and the offender
3. Locate and apprehend the accused
4. Present evidence of guilt for the suspect/s
5. Assist in case follow-up

G. IMPORTANCE OF CRIMINAL INVESTIGATION


1. The problem on crimes and criminals should be carefully studied and provided with
solutions.
2. It helps the five pillars of the Criminal Justice system in recognizing and identifying criminal
and provides clues or information in promoting social justice.
3. An aid in enforcing the laws and the protection of lives and properties.

H. THE CRIMINAL INVESTIGATOR


The criminal investigator is the superstar in the process of investigation. He must be
capable of observation and a rational thinker. Many times, a police investigator is being tested
with his discretion (wise use of one’s own judgment). He should therefore possess various are
the following:

SOME QUALIFICATIONS OF AN INVESTIGATOR


1. Perseverance -Refers to the steadfastness, persistence and resolution to bring the desired
conclusion in spite of obstacles connected with criminal investigation.
2. Endurance -This is the ability to last physically and mentally hence; he must have the
extraordinary physical and mental energy, enduring sleepless nights and tiresome days.
3. Incorruptible Honesty and Integrity- In the practice of his art, there is the ever
temptations of money, women and drinks where these are present in every corner playing
tricks of temptations.
4. The intelligence and Wisdom of Solomon-This is very important in order that the
investigator could easily decipher falsehood from truth and separate the gain from the chaff.
5. Acting Ability-It is the ability to go down to the level of the minor, the prostitute or the
slum dwellers, or the level of the other professionals or the members of the elite.
6. Mastery of the Oral and Written Communication- in order that the investigator will
not suffer setback in getting the accurate facts especially in the preparation of reports and
or transmittal of information.
7. The Keen Power of Observation and Description-These are very important in crime
scene investigation and in interview and interrogation.
8. Courage-It is the moral fortitude to tell the truth no matter who will be hurt.

Page 2 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
9. Working Knowledge- of Criminal Law, Evidence, Criminal Procedure, and Penal Special
Laws.
10.The power to “read between the lines.”- This is the ability of the investigator to
interpret the words or phrases encountered in the process of investigation in their deeper
meaning in order to arrive with concrete meaning of a certain statement.
11.Working knowledge of martial arts and firearms proficiency- The investigator will
find himself in many occasions that he will be alone in confronting, arresting, bringing to
headquarters and interrogating the suspect.

J. DESIRABLE TRAITS OF THE INVESTIGATOR


1. Superior reasoning ability
The ability to analyze logically a multitude of facts and determine how they interrelate is
basic to the investigative process.

This is related to critical thinking. This method of reasoning challenges one to adopt
an attitude of fair mindedness, intellectual caution and an openness to questions common or
assumed beliefs. Critical thinkers will find supportable reasons to accept or reject an assumption
and are never hesitant to seek an explanation of the “why” of an event.

Elements from the foundation of the critical thinking process:


a. Differentiating between fact and opinion.
b. Determining cause-and-effect relationships
c. Determining the accuracy and completeness of information presented.
d. Recognizing logical fallacies and faulty reasoning.
e. Developing inferential skills through deductive or inductive reasoning

Definition of terms:
 Fact- is a statement or observation that can be verified by other verifiable points of
information, whereas an OPINION is merely one’s impression or personal belief. Factual data
will generally guide the course and direction of the case, whereas opinions serve only as
secondary, less valuable functions.
 Cause-and-effect-thinking often serves as a directional purpose during the investigative
process, as one or more facts generate further related factual insights.
 Faulty reasoning often centers on generalization, stereotyping, oversimplifying, or
incorrect assumptions
 Deductive reasoning-forms a general conclusion prior to having a complete explanation
based on facts. With the deductive conclusion in mind, the investigator considers the
emerging evidence, contrasting it with the conclusion to determine its validity.
 An inductive reasoning - is base on the results of further investigation and evidence
gathering.

2. Imagination and curiosity


 Imagination- means forming mental images of what is not present, or creating new ideas
by combining previous experiences – is indispensable in the many investigations that are
not complete.
 Curiosity is the desire to learn by being inquisitive (the eagerness of the investigator to
know more about the crime).

3. Intuition
This is the immediate apprehension or cognition – quick and ready insight without the
conscious use of reasoning. It has been pointed out that many police investigators have a “sixth
sense” resulting in hunches that those outside the profession rarely perceive. This is often the
result of experience and training.

4. Observational ability
The act of observing is a noting and recording of facts. Under most circumstances, the
investigator will use the sense of seeing and hearing, the former being the more significant.

Page 3 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
5. Organizational ability
Like the successful business executive, the police investigator is continually processing
various types of information. Written information, verbal information, current case assignments,
and follow-ups of past investigation all require an ability to organize. The investigating officer is
receiving and processing formal reports from a multitude of sources. This demands an orderly
method of information retention that will result in the availability of records and facts when
needed.

6. Legal knowledge
Today’s investigator must possess a solid grounding in criminal and to a lesser degree,
in civil law. The office must be able to distinguish between a criminal violation and a civil
violation in order to determine appropriate action.

7. Cultural understanding and a wide range of interest


An awareness and understanding of cultures different from the investigator’s own can
be of great advantage. Such insight can assist appreciably in information gathering,
interviewing, informant recruiting, and many other tasks commonly encountered during criminal
investigation. Because specific behaviors and traits are unique to various groups, development
of an awareness of cultural diversity can provide the investigator with new insights.

8. Persistence
It is the ability of continuing the case in the face of opposition, or refusing to give up
when faced with an adverse situation. To persist until all available facts of an investigation are
known and until satisfied that further effort will be unproductive is the working definition of
persistence for the investigator.

K. FORMS OF INVESTIGATION
Six Major Types:
1. Formal Investigation
 Refers to official inquiry conducted by a government agency in an effort to uncover facts
and determine the truth.
 It is usually considered as some form of inquiry concerning of criminal activity.
2. Inquest
 It is an effort to search the basic cause of an incident such as the commission of a crime.
3. Inquisition
 A historical description than a current usage to describe any penetrating investigation
concerning a religious issue.
4. Probe
 Similar to formal investigation, is an extensive, searching inquiry conducted by a
government agency.
5. Research
 It is the most employed type of investigation refers to the careful, patient investigations
done by scientist or scholars in their efforts to identify original sources of data or causes
of problem.
6. Investigative Reporting
 Relatively speaking, is a recent type of investigation pursued by the members of the press
on their own initiative. It is design to satisfy two purposes.
 To attract readers/viewers
 To get to the roots of the problem

L. CATEGORIES OF CRIMINAL INVESTIGATION ACCORDING TO JOHN DEMPSEY


1. Criminal Investigation vs Non-Criminal Investigation
 Criminal Investigation- It usually carried out by the police with the goal of prosecuting
the person responsible for the commission of a crime.
 Non-Criminal Investigation- It involves on non-criminal incidents or events.

2. Reactive Investigation vs Proactive Investigation


 Reactive Investigation- It is an investigation initiated based on a complaint filed by the
victim or any concerned citizen.

Page 4 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Three categories of reactive investigation
a. walk-through-The suspect could be easily determined and located. The detective
must only observe the legal guidelines to reach a solution.
b. where-are-they-The appropriate type of investigation to use in cases to which the
suspect is identified tentatively but has not been located. The case may have simple
solution or it involves complex mystery.
c. whodunit-It refers to cases in which no suspects are initially identified. The majority
of
crimes reported to the police under this category are rarely solved.

 Proactive Investigation Investigations conducted by the police based on their own


initiative. These are designed to catch a criminal in the act of committing a crime, rather
than waiting until a crime is reported by a concerned citizen.

Categories of Proactive Investigation


a. Decoy operations-Are of blending and decoy types. In blending type, officers dressed
in civilian clothes try to blend into an area to catch criminals in flagrante delicto.
b. Undercover operations-Usually in the form of buy-bust and entrapment.
 Buy-bust operation is commonly used in catching drug-traffickers whereby an
undercover officer usually pose as buyers of illegal drugs.
 Entrapment on the other hand involves duping someone who has intentions to
commit a crime to execute their plan but upon consummating the crime, they are
arrested right there and then.

3. OVERT INVESTIGATION vs COVERT INVESTIGATION


 Overt Investigation-It is conducted openly.
 Covert Investigation-It is conducted in secret.

--------------------------------------------------------------------------------------------------

II. HISTORICAL BACKGROUND OF INVESTIGATION

 2100 B. C. BABYLON: as civilization developed, social and cultural traditions were


codified into formal laws. The Code of Hammurabi was then implemented to detect
those who refused to obey the law. It imposes the Lex Taliones principle.

 5th CENTURY B.C., ROME: Rome created the first specialized investigative unit. It was
named as QUESTORS/TRACKERS/MURDERERS due to their cruel treatment to suspects in
investigating crimes.

 6th CENTURY B.C. ATHENS: Unpaid magistrates (judges), were appointed by the
citizens to make decisions for the cases presented to them.

 9th CENTURY. ENGLAND: King Alfred the Great established a system of “mutual pledge”
(social Control), which organized for the security of the country into several levels;

 AT ABOUT THE TIME OF CHRIST, ROME: The Roman Emperor Augustus picked out
special, highly qualified members of the military to form the Praetorian Guard, the
Praefectus Urbi and the Vigiles of Rome.

 1285 A.D., ENGLAND: THE STATUTE OF WINCHESTER was enacted establishing a


rudimentary criminal justice system in which most of the responsibility for law enforcement
remained with the people themselves.

 1720’s, ENGLAND: JONATHAN WILD – He was a buckle maker and a brothel operator;
a master criminal who became the London’s most effective criminal investigator.

 1750s, ENGLAND: HENRY FIELDING – An English man who wrote a novel entitled
“TOM JONES” and was appointed as magistrate (sheriff) for the areas of Westminster and

Page 5 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Middle Age, London. He was the creator of the Bow Street Runners.

 1753, ENGLAND: JOHN FIELDING – The younger brother of Henry Fielding who took
over the control of Bow Street Court in 1753. DESPITE OF HIS CLOSED VISION (BLIND),
HE GUIDED THE RUNNERS, THEY BECAME QUITE EFFECTIVE.

 1800, LONDON: PATRICK COLQUHOUN – A prominent London President who


proposed the unique idea of creating sizeable uniformed force to police the city of London
in order to remedy the public outcry concerning the increase of criminality during the early
1800s.

 EARLY 18TH CENTURY, ENGLAND: The first body of public-order officers to be named
police in England was the Marine Police, a force established in 1798 to protect merchandise
in the port of London.

 1811, FRANCE: EUGENE “FRANCOIS” VIDOCQ - established a squad of ex-convicts to


aid the Paris Police in investigating crimes. He worked under the theory of “Set a thief to
catch a thief.”
 He introduced the concept of “Trade Protection Society,” which became the forerunner
of our present-day credit card system.
 He is credited, as the founder of La Surete, France’s National Detective Organization.

 1829, LONDON: ROBERT PEEL – The founder and chief organizer of London
Metropolitan Police. He introduced the techniques in detecting crimes such as detectives
concealing themselves, and secretly photographing and recording conversations.

 1833, ENGLAND: London Metropolitan Police employed the first undercover officer.

 1835, TEXAS RANGERS was organized as the first law enforcement agency with
statewide investigative authority. This is the forerunner of the Federal Bureau of
Investigation (FBI).

 1839, BIRTH YEAR OF PHOTOGRAPHY: WILLIAM HENRY FOX TALBOT explained a


photographic process he had invented to the Royal Society of London.

 (1847-1915), DR. HANS GROSS – The earliest advocate of criminal investigation as a


science.

 1852, U.S.A: CHARLES DICKENS is a great novelist in which through his story entitled
bleak house, he introduced the term detective to the English language (Adams & Taylor,
1995).

 1852, U.S.A: ALLAN PINKERTON was the America’s foremost private detective. This
individual truly deserves the title of “America’s Founder of Criminal Investigation.” Among
methods pioneered were “shadowing,” the art of suspects surveillance, “roping,” working in
undercover capacity, they have the motto, “We never sleep.”

 1856, U.S.A: KATE WAYNE: The first woman detective in the history of criminal
investigation. She was hired by the Pinkerton Agency and contributed to the resolutions of
big cases of the United States of America.

 1866, U.S.A: THOMAS BYRNES - He is an unusually keen-minded individual who trained


his detectives in recognizing individual criminal techniques. He founded the criminal “modus
operandi,” or method/mode of operation.

 1866, LIBERTY, MISSOURI, USA: THE JESSIE JAMES GANG made the first hold-up
which marks the beginning of the gang’s 15 year hold-up and robbery spree (12 bank hold-
ups and 12 train stage coach robberies in 11 states). Clay County Savings Association was
their first victim and their take was $60,000.00.

Page 6 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
 1877, ENGLAND: HOWARD VINCENT – He headed the newly organized Criminal
Investigation Department in Scotland Yard.

 1882, FRANCE: ALPHONSE BERTILLON – A French Police Clerk who introduced and
established the first systematic identification system based on the Anthropological
Signalment (Anthropometry). He is considered as the founder of Criminal Investigation.

 1887, DR. ARTHUR CONAN DOYLE – He popularized the scientific Criminal Investigation
by creating the fictional detective Sherlock Holmes and his friend Watson.

 1892, ENGLAND: FRANCIS GALTON – An English man who published his study on
classifying fingerprints and recognized the uniqueness of the fingerprints to be used as
evidence against a suspect

 1909-1924 JOHN EDGAR HOOVER – He became the head of the Federal Bureau of
Investigation, which was established by the attorney general from 1909 to 1924.

 1913, PHILIPPINES - The genesis of Criminal Investigation in the Manila Police


Department, presently the Western Police District took place.

 1918, ENGLAND, a new concept was introduced in the field of Criminal Investigation. This
is known as “Team Policing.”

 1954, USA: DR. PAUL KIRK – The best known Criminalist who headed the Department
of Criminalistics at the University of California, USA.

 1966, USA: MIRANDA Vs ARIZONA – The US Supreme Court established procedural


guidelines for taking criminal confessions. The case is the origin of the present Miranda
rights of every accused under the custody of police.

III. RELEVANT LAWS/ PROVISIONS APPLICABLE IN CRIMINAL INVESTIGATION

 ACT No. 175 = The law that establishes the Insular Police Force which was entitled “An
Act Providing For The Organization And Government of an Insular Constabulary.” It is the
organic act creating the Philippine Constabulary (PC). Approved July 18, 1901.

 ACT No. 225 = This is the law which established the Philippine Constabulary. Approved
October 3, 1901.

 REVISED ADMINISTRATIVE CODE OF 1917, SECTION 825 = The Law stated that
the Philippine Constabulary is a national Police Institution for preserving the peace, keeping
the order and enforcing the law.

 RA No. 4864 = The law otherwise known as the Police Act of 1966, It created the Office
of the Police Commission (now National Police Commission). It was under the Office of the
President and was created as the supervisory agency to oversee the training and
professionalization of the local Police forces.

 Proclamation No. 1081 = was the date of declaration of Martial Law in the country by
the former president of the Philippines Ferdinand E. Marcos on September 21, 1972.
Consequently, military officers from the Philippine Constabulary (PC) were designated as
Officers-in-Charge of the respective police department of the different cities and
municipalities and took control of the supervision, administration and operation thereof.
Those were the days where a young first lieutenant of the PC requires a peace officer with
a higher rank including the chief of police to salute him.

 PD No. 421= This is the law that integrates the police force in greater scope in Manila
area to test its effectiveness particularly the first four cities: Manila, Quezon, Caloocan and

Page 7 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Pasay. It was Mayor Arsenio Lacson who proposed the idea that police should be
integrated.
 PD No. 482 = The law that integrates the police force in the provincial level particularly
the provinces of Pampanga, Nueva Ecija, Bulacan, and Misamis Oriental. This was approved
June 13, 1974.

 PD No. 765 = The law which stipulated that the office of the National Police Commission
was under the office of the Ministry of the National Defense (now Department of National
Defense). Approved August 8, 1975.

 RA No. 6975 = The law otherwise known as the Department of Interior and Local
Government (DILG) Act of 1990. This is the law that created the PNP and subsequently
dissolving the PC whose officers and rank and file were given the privilege either to join the
AFP or the PNP within the period as provided therein.

 RA No. 8551 = This law is known as The PNP Reform and Reorganization Act of 1998
which is at present is the operational law that governs over the PNP. This was approved
February 25, 1998.

 1987 PHIL CONSTITUTION, Art 3, Sec. 12(1) = “Any person under investigation for
the commission of an offense shall have the right to be informed of his right to remain
silent and to have a competent and independent counsel preferably of his choice. If the
person cannot afford the services of a counsel, he must be provided with one. These rights
cannot be waived EXCEPT in writing, signed and in the presence of a counsel.”

 1987 PHIL CONSTITUTION, Art 16, Sec 6 = “The state established and maintained
one police force, which shall be National in Scope and Civilian in Character, to be
administered and controlled by the National Police Commission. The authority of the local
executives over the police shall be provided by law.”

 RA No. 7438 = An act defining certain rights of person arrested, detained or under
custodial investigation as well as the duties of the arresting, detaining, and investigation
officers and providing penalties for violation thereof.

--------------------------------------------------------------------------------------------------
II. CRIMINAL INVESTIGATION PROPER

A. BASIC STEPS IN CRIME SCENE INVESTIGATION


1. RECOGNITION- involves the efforts of identifying data, including physical things that may
provide relevant information regarding the criminal case being investigated.
2. COLLECTION- refers to the act of gathering those identified data or facts, or physical things
that are significant to the case under investigation.
3. PRESERVATION- includes act of keeping the collected evidences in their true and original
for, preventing contamination or destruction of its substantive value.
4. EVALUATION- the process of determining the probative value of the evidence.
5. PRESENTATION- It is the function that is primarily manifested inside the courtroom.

B. STARTING POINTS OF CRIMINAL INVESTIGATION


1. STATE THE PROBLEM-It is done by asking the 5W's and 1H questions what, who,
where, when, why, and how about a crime committed. These questions are termed the
"cardinal points" of a criminal investigation.

2. FORM HYPOTHESES-These are educated guesses made pertaining to crimes under


investigation. It answers the 5Ws and 1H however which could be accepted or not upon
inquiry or proper investigation.

3. OBSERVE AND EXPERIMENT-This steps focuses on the actual process of


conducting the investigation such as surveillance, undercover operations, and the like to

Page 8 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
gather information concerning a certain person, thing, or organization related to
criminal activities or criminals.

4. INTERPRET DATA-After the observation and experimentation, the interpretation of


data comes in whereby the investigator will evaluate and assess the gathered
information (pieces of evidence) if it is relevant, important in the investigation.

5. DRAW CONCLUSIONS-Just like other fields or professions, concluding is the last


step in the process but in an investigation, upon drawing a conclusion, it does not close
the case, rather it opens the beginning of the prosecution of crimes or the offenders.

C. THE SIX (6) CARDINAL POINTS OF INVESTIGATION


1. WHO QUESTIONS: These are questions used to inquire on the identity of the victims or
offended party, name of suspect, accomplices, accessories and witnesses of the crime.
2. WHAT QUESTIONS: The purpose of these types of questions is to find out what happened
or what took place before, during and immediately after the commission of the offense.
3. WHERE QUESTIONS: These are questions that localize the place of the incident- the city
or town, the district or barangay, the street or road, the number of the house or building.
Where questions are necessary in specifically pinpointing the particular location of the crime
scene.
4. WHEN QUESTIONS: These are questions needed to determine and fix the time, day,
month and year when the crime was committed. When questions should be specified and as
accurate as possible.
5. WHY QUESTIONS: These are questions that endeavor to ascertain the motives, causes,
antecedents, previous, incidents, related facts, background occurrences that might help
explain the commission of the offense.
6. HOW QUESTIONS: These are designed to help the investigator determine how the crime
was committed, the means/tools are employed, the crime was discovered, and the culprit
enters the building/room.

--------------------------------------------------------------------------------------------------
D. THE GOLDEN RULE IN CRIMINAL INVESTIGATION

The golden rule states “Do not touch, alter, move, or transfer any object at the
crime scene unless it is properly marked, measured, sketched and/or
photographed.”

The purpose of this rule is to avoid the mutilation, alteration and contamination (MAC) of
the physical evidences found at the crime scene.

Doyle, A.C (2016). A study in scarlet. Retrieved on August 19, 2021, from
https://www.gutenberg.org/files/244/244-h/244-h.htm

Page 9 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE

COVERAGE OF LESSON 2
D. GOLDEN RULE IN CRIMINAL INVESTIGATION
 THE THREE (3) I’s OF INVESTIGATION
 ARREST, SEARCH AND SEIZURE
 THE CRIME SCENE: METHODS OF SEARCH AND SKETCH
 INFORMATION AND PHYSICAL EVIDENCE
 HOW PHYSICAL EVIDENCES ARE COLLECTED, MARKED, TAGGED AND PRESERVED?
 INTRODUCTION TO CRIMINALISTICS

--------------------------------------------------------------------------------------------------

III. THE THREE (3) I’s OF INVESTIGATION


In criminal investigation, we have the so-called three tools or sometimes called as the I’s of
criminal investigation to include: Information, Interview and Interrogation and Instrumentation.
1. INFORMATION = It is the knowledge or facts which the investigator had gathered or
acquired from persons or documents, which are pertinent or relevant concerning the
commission of the crime or criminal activities.

INFORMATION CLASSIFIED AS TO ITS SOURCES:


a) Regular Sources - Records, files from the government or non-government agencies, news
items. The bulk of application of this nature is news items. Included also is news or TV
broadcast, intercepted radio, telephone messages and stored computer area.
b) Cultivated Sources - Information furnished by informants or informers.
c) Grapevines sources - When the information is disclosed by the underworld characters
such as prisoners or ex-convicts.

2. INTERVIEW AND INTERROGATION - Interview and interrogation are similar with each
other, in the sense that, they are both ways of obtaining information from a certain suspect
or person that has knowledge on a crime.
a. Interview
Interview is the simple questioning of a person believed to possess information, which
are relevant to the investigation of a crime or on criminal activities.
b. Interrogation
Interrogation is the vigorous and confrontational questioning of a reluctant suspect
about his participation in a crime. This process is also applied to an uncooperative or
recalcitrant witness. The purpose of Interrogation is to obtain confession or admission from
the suspect and to learn relevant information from uncooperative witnesses.

3. INSTRUMENTATION (sometimes called Criminalistics) - It is the process of applying


instruments or tools of the police sciences in criminal investigation and detection. This is the
use of the Police Laboratory in the examination of physical evidences.

--------------------------------------------------------------------------------------------------

IV. ARREST, SEARCH and SEIZURE

A. DEFINITION OF ARREST and SEARCH


 ARREST came from the Latin word “arrestare” which means “cause to stop” and
“restare” which means “stay behind”. These terms were used as early as during the 14th
century.
 SEARCH was derived from the Anglo-Norman word “searcher,” Old French cerchier which
means “to explore,” Latin word “circare" which means “go around in circles.”

Page 10 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
B. RELATED TERMS:
 Warrant of Arrest is an order in writing issued in the name of the People of the
Philippines, signed by a judge directed to a peace officer, commanding him to arrest the
person designated and take him into custody of the law in order that he may be bound to
answer for the commission of an offense.
 Alias Warrant refers to the warrant of arrest issued by a judge to the peace officer after
returning the original warrant of arrest after the lapse of the 10-day validity period.
 Search Warrant is another order in writing issued in the name of the People of the
Philippines, signed by the judge and directed to a peace officer commanding him to search
for personal property and bring it before the court.
 John Doe Warrant (Richard Doe/ Jane Doe) is a warrant containing no specific name
of person to be arrested but only descriptions based from the testimonies of the victim/s or
the witnesses/es. It contains the physical description of the accused as well as other factors
to be considered for the identification of the accused (Sadili & Pena, 1998).
 Arrest is the actual taking of a person or persons into custody by an authority in order that
he/they may be bound to answer for the commission of an offense.
 Search is the act of examining documents, papers and effects.
 Complaint is a sworn written statement charging a person or a group of persons of an
offense that is subscribed by the offended party such as the victim/s of the offense
committed, or any other peace officer charged with the enforcement of the law violated.
 Information is an accusation in writing charging a person or a group of persons of an
offense that is subscribed by the prosecutor or fiscal. It is substantiated on oath and
includes the name of the party, the offense committed, facts of the offense and other
factors relevant (Curton,1989) .

C. PROPERTIES THAT ARE SUBJECT TO SEIZURE


 Subject of the offense;
 Stolen or embezzled properties;
 Proceeds or fruits of the offense; and
 Property used or intended to be used as means for the commission of an offense.

D. INSTANCES OF WARRANTLESS ARREST (Rule 113 Sec. 5, Rules of Court)


1. When, in his (peace officer) presence, the person to be arrested has committed, is actually
committing, or is attempting to commit an offense.
2. When an offense has just been committed and he (peace officer) has probable cause to
believe based on personal knowledge of facts or circumstances that the person to be
arrested has committed it.
3. When the person to be arrested is an escapee.
4. When the right is validly waived.

E. INSTANCES OF WARRANTLESS SEARCH


1. Consented Search
2. Search is incidental to a lawful arrest
3. Search in violation of tariff and custom laws
4. Plain view Doctrine
5. Search of Moving Vehicles
6. Inspection of buildings for fire and sanitary regulations
---------------------------------------------------------------------------------------------------------------------

V. THE CRIME SCENE: METHODS OF SEARCH AND SKETCH

A. DEFINITION OF CRIME SCENE AND CRIME


 Crime scene is said to be the “treasure island”, when it comes to criminal investigation. It
is because pieces of evidence are mostly found in the crime scene, which are very relevant
for the solution of the crime.
 Crime is also defined as any act or omission punishable by law forbidding or commanding
it.

Page 11 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Some of the suggested procedure for a team of responders are the following:
1. The Means of Reporting - Refers to the method of reporting the crime whether it
reached the station through phone call, personal appearance or others means.
2. The Time of Report - The exact time of the report to include minute must be recorded.
3. The Receiver of Report - The identity of the one who received the report in the station
must be properly noted.
4. The Time of Dispatch - The time when the Desk Officer dispatches the investigator/s is
also recorded, together with the names of the investigator, with the means of
transportation, either by mobile car, taxi or other means.
5. The Time of Arrival -The time of arrival of the investigating team at the crime scene
should be noted. The situation in the area should also be noted whether it is windy, rainy,
sunny or any other description of the climate in the immediate area.

B. INITIAL STEPS IN CRIME SCENE PROCESSING


The members of the investigating team, upon arrival at the crime scene should do the
following:
1. The master note taker shall take note the date, time of arrival and weather condition (rainy,
windy, sunny or any appropriate weather description).
2. Cordon the crime scene- This includes the use of the “Police Line” to prohibit the entry of
unauthorized persons inside the crime scene. Rope can also be used in protecting the scene
of the crime. Deputizing responsible persons by the investigators can be done also when
necessary to protect the scene.
3. The Team Leader will make a preliminary survey at the crime scene.
4. Command post shall be established nearby or adjacent the scene.
5. The Team Leader after the preliminary survey will conduct briefing among the responding
team members.
6. Photographer takes pictures of pieces of evidence.
7. The searchers may enter the crime scene to find for pieces of evidence and identifying them
with flaglet, chalk or other marking tool or device.
8. Photographer re-enters the scene to photograph identified pieces of evidence.
9. The measurer enters the crime scene to measure distances of the pieces of evidence.
10. The pieces of evidence shall now be collected, marked (with initials, date and time and case
if possible) and preserved with available containers.
11. Pieces of evidence shall be submitted to the command post for inventory.
12. Fingerprint dusting may now be done to suspected areas. Dusting could be made
simultaneously to save time and to develop good prints.
13. The team leader shall make the final survey of the crime scene.
14. Debriefing and proper accounting of the pieces of evidence shall be made.

C. OTHER STEPS TO BE DONE IN THE CRIME SCENE INVESTIGATION


1. Identify and retain the person who first notified the police for questioning.
2. Determine the suspect by direct inquiry or observation.
3. Detain all people present at the crime scene.
4. Safeguard the area by issuing appropriate orders.
5. Separate the witnesses in order to obtain independent statement.
6. Summon assistance from responsible persons if necessary.

D. ASSIGNMENT OF DUTIES OF THE RESPONDING OFFICERS


1. Team Leader – The one who directs the processing of the crime scene.
2. Assistant Team Leader – The one who implements or executes the order/s coming from
his/her superiors.
3. Photographer – Takes photograph of all pieces of evidence that are relevant to the crime
committed.
4. Sketcher – Make sketches of the immediate, background and inside the scene of the
crime.
5. Master note taker – The one who writes down in short hand all observations at the crime
scene such as: weather condition, time of dispatch and time of arrival at the crime scene
and other relevant data that’s should be taken down note.

Page 12 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
6. Evidence Custodian – The one in charge in the collection, preservation, tagging of the
articles of evidence found at the crime scene.
7. Measurer – Makes all relevant measurements of the scene such as: the distance of the
body of the victim to the firearm used; in motor vehicle collision, the distances of the two
vehicles to the points of references.
---------------------------------------------------------------------------------------------------------------------

VI. INFORMATION AND PHYSICAL EVIDENCE

A. DEFINITIONS OF CRIMINAL LAW


 Criminal law is defined as that branch of the municipal or substantive law which defines
crimes, treats of their nature, and provides for their punishment.
 Felonies are acts and omissions punishable under the Revised Penal Code (RPC). Felonies
are committed not only by means of deceit but also by means of fault.
 Deceit (dolo) when the act is performed with deliberate intent
 Fault (culpa) when the wrongful act results from imprudence, negligence, lack of
foresight, or lack of skill (Article 3, RPC).
 Offense-Act is punishable by special statute.
B. FORMS OF INFORMATION
1. Sensory form – This is the form of information wherein information was acquired through
the five senses: eyes, ears, nose, tongue and hands can perceive the manifestation of
criminal event.
2. Physical form – The form of information that can give information to the person because
of its physical appearance. The information may actually be in physical (real) form, physical
objects w/c proves upon evaluation to be a clue in investigation.

C. CLASSES OF EVIDENCE
1. Testimonial Evidence – most common form of evidence obtained by interview and
interrogation of which witnesses smell, hear, taste and touch are being describe through
oral and written testimony.
2. Documentary Evidence – are writings, including official records, or contents “could speak
for themselves” when read by the investigation and the court. They may be collected
through voluntary relinquishment or by a Subpoena Duces Tecum (court order) which
compels the party to bring the records to the court.
3. Physical/ Real/ Object Evidence – are physical objects used as evidence w/c are
obtained through searches at the scene of the crime. Articles and material found in
connection with investigation, which aid in establishing the identity of the perpetrator.

D. KINDS OF PHYSICAL EVIDENCE


1. Corpus delicti – objects/substances which are essential parts of the body of the crime.
This is a Latin term, which means the body of crime so that in order to prove something
such as the existence as the crime of murder, the body of the victim and circumstances
surrounding the crime must be proven.
2. Associative evidence – evidence which links the suspect to the crime scene or offense
such as fingerprints & shoe prints.
3. Tracing evidence – article w/c assist the investigation in locating the suspect such as ID
and other personal documents (birth certificate, diary) that may identify the person
concerned.
4. Circumstantial evidence – Identification is being established indirectly by proving other
facts or circumstances from which, either alone or in connection with other facts. The
identity of the perpetrator can be inferred.

 EVIDENCE is the means, sanctioned by these rules, of ascertaining in a judicial


proceeding the truth respecting a matter of fact (Sec 1, Rule 128, Rules of Court).

KINDS OF EVIDENCE:
Considering the kinds of evidence written in the Rules of Criminal Evidence, the
following are included:
1.

Page 13 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1. Direct evidence 12. Corroborative evidence
2. Circumstantial evidence 13. 1Cumulative evidence
3. Primary evidence 14. Prima facie evidence
4. Secondary evidence 15. Conclusive evidence
5. Positive evidence 16. Relevant evidence
6. Negative evidence 17. Material evidence
7. Competent evidence
8. Object (real) evidence
9. Documentary evidence
10. Testimonial evidence
11. Substantial evidence

Page 14 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
BURDEN OF PROOF
Presented below is a summary on who shall have the burden of proof on the different given
situations:
SITUATION WHO SHALL HAVE THE BURDEN OF PROOF?

1. Alibi Defense The burden of proof lies on the suspect.


He who introduces and presents the document as evidence has the
2. Authenticity of burden of proof to prove its authenticity.
document
The regularity of its execution is presume in law. The confessant has
3. Confession the burden of proof to prove otherwise.
In all criminal prosecution, the burden of proof is on the prosecution
4. Corpus delicti to prove the corpus delicti.
The accused has the burden to prove that he is insane at the time
5. Insanity when he committed the crime.
As a rule, the accused has the burden of prove that he is covered by
the exemption of criminal culpability. An exception to the rule is a part
6. Exempting of the description of the offense in which case, the prosecution has
circumstance the burden to prove otherwise.
The burden of proof is on the part of the accused who professes self-
7. Please of self- defense as a justifying circumstance.
defense
8. Place of The burden of proof on the prosecution
commission of
crime
The accused has the burden to prove sufficient provocation on the
9. Provocation part of the offended party when the crime was committed.

E. THE ELEMENTS OF CRIME


Intent/Motive, Opportunity and Instrumentality are the elements of crime. Without these
elements, there’s no crime to talk about. Below are brief descriptions on the three elements of
crime.

Intent

Instrumentality CRIME Opportunity

F. THE GENERAL TYPES OF SUSPECT IDENTIFICATION


1. Positive Identification – this use information that identifies an individual beyond question
and is legally acceptable as pertaining to and originating from a particular individual.
Examples are the following:
a) Information developed after comparing questioned with inked fingerprints;
b) Result of DNA analysis of blood and semen
2. Tracing Identification – this involves the use of all other information that
maybe indicative of the personal identity of an individual. Examples include
the following:
a) Description of witnesses as to the appearance of culprits;
b) Information about the presence of a suspect’s personal belongings at the crime
scene.

G. REASONS FOR GOING BACK TO THE CRIME SCENE


In some instances, crimes are committed during nighttime and the investigator arrives at
the scene at daytime due to late of discovery or delayed report about the commission of a
crime. The investigator goes back to the scene at the exact time when the crime occurred, in
order to see for himself the order of things at that precise moment. His note of concern shall be

Page 15
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
the lighting conditions, the distance of normal visibility, the volume of pedestrian and vehicle
traffic and other things and conditions relevant to his investigation.

The other reason is that during the progress of the investigation, new matters may crop up
which maybe inadvertently considered irrelevant during the crime scene investigation. Thus,
there is a need to go back.

H. OTHER SOURCES OF INFORMATION


1. Government Records – Police files, NBI files, Bureau of Immigration files, COMELEC files,
files from the local jails and the National Bureau of Prisons and other government agencies.
2. Private Records – From private offices and business and non-government organizations.
3. Intercepted Messages – From telephones, cellular phones, radio telecommunications and
other means of communications.
4. Records of the Firearms and Explosive Unit concerning licensed holders of firearms
and authorized possessor of explosives.
5. Fire Busting – Tracing the chain of possession a firearm, from the manufacturer,
distributor, seller and to the last processor. This could be done through the files of the FBI
and other US police agencies.
6. Stored Data on Computers and Cellphones – Only experts must be employed to
retrieve these stored data.

I. RULES ON COMPUTER EVIDENCE


The following are strongly suggested when evidence involved computers that may contain
very important stored data:
1. When the computer is OFF at the time of arrival, do not turn it on.
2. When it is ON, do not turn it OFF nor touch its mouse or keyboard.
3. The unplugging of the computer whether it is ON or OFF should be done by pulling out the
cable directly from the back of the Central Processing Unit.
4. Each unplugged cable should be marked in the same marking corresponding to the socket
from where the cable was unplugged.
5. The computer should be carefully handled and packed for transport to the police station.
6. Only computer forensic expert should search for any information or evidence contained in
the hardware.
7. The expert should duplicate the computer and the evidence custodian for future court
presentation should keep the original. Search and analysis must be undertaken using the
image disk.
--------------------------------------------------------------------------------------------------

VII. HOW PHYSICAL EVIDENCES ARE COLLECTED, MARKED, TAGGED AND


PRESERVED?

COLLECTING, MARKING, TAGGING AND PRESERVING EVIDENCE


In the process of investigation, the responding team members should be knowledgeable on
the proper actions to be done on specific kinds of evidences found in the scene of the crime. To
give you some information on the proper methods, the following must be observed:

1. COLLECTING EVIDENCE – All items that were found in the crime scene should be
collected. The collecting officer should not decide whether a certain item is relevant or
irrelevant. Small pieces of evidences also must have to be given importance, thus collecting
them is necessary.

In collecting firearm as evidence found in the crime scene, cautious action should be
employed. The firearm should be lifted using string or handkerchief in its trigger guard to avoid
destruction of possible latent prints in the firearm.

Liquid evidences such as blood, mucous, urine and other body fluid can be collected
using dropper and stored in a sealed container to maintain the same physical nature as found in
the crime scene. However, clotted blood and other hardened evidences can be collected by

Page 16
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
scraping with the use of any available instrument. Samples are very important for laboratory
testing.

2. MARKING EVIDENCE – As evidence is collected, it is individually marked with the initials


of the investigator. The marking tool depends upon the nature of the evidence. If it is a hard
object such as metals, the initial are scratched or engraved by the use of sharp-pointed steel,
which is called stylus.
Methods of Marking Specific Evidence
1. Revolvers must be marked separately on the BARREL, FRAME, and CYLINDER. Tape
should also be put around the bore and the frame of the gun with signature of the
investigator.
2. Pistols must be marked on the BARREL, UPPER RECEIVER, FRAME AND MAGAZINE.
Tape must also be put around the gun with signature to avoid changing the parts of the
gun that may affect the result of laboratory examination.
3. Rifles should be marked on the BARREL, FRAME, MAGAZINE, BOLT OR SLIDE. All
magazines and accessories shall also be marked.
4. Revolver Cylinder – Aside from the mark on the Cylinder, the CHAMBER facing the
firing pin must be marked as soon as it is opened for examination. A drawing must
depict the chamber facing the firing pin, the respective position of the fired empty
shells, misfired or dud cartridges. A detailed examination on the respective position of
this evidence could make or unmake a claim of self-defense.
5. Fired Empty Shells, Misfired Cartridges – Strictly regulations say they must be
marked inside/outside the mouth of empty shells. It is nearly impossible to mark
them inside the mouth, especially .22 caliber shells. But they could be marked on the
side of the body of the shells, not on the base.

6. Bullets/ Slugs/ Balls – A bullet or slug can be marked on the ogive or nose as well
as in the base. The initials of the investigators and/ or date should be marked on those
parts so that the rifling (land and grooves) found in the bullet or slug will not be
disturbed because they are very important for laboratory examination.

3. TAGGING EVIDENCE - Evidence which by their nature could not be marked on each
surface such as blood, hairs, fibers, are placed in the plastic container where that container is
then marked, we call such practice as tagging the physical evidence with the use of card
where the initials of the investigator, date and time of collection, specific case and other
information can be written.

4. PRESERVING EVIDENCE – Perishable material should be preserved by the way or the


preservation in order that they will reach the court in the same physical condition as when
they where collected from the crime scene. This is the work of laboratory technician.

Chain of custody is the number of persons who handled and possessed the pieces of
evidence the moment that they were collected, marked and tagged, up to the time of the final
disposition of the case.
---------------------------------------------------------------------------------------------------------------------

VIII. INTRODUCTION TO CRIMINALISTICS

INSTRUMENTATION - is the application of instruments and the laws of physical sciences in


the investigation and detection of crimes and criminals. This is otherwise known As
Criminalistics. The persons applying the forensic sciences in crime detection are sometimes
called Forensic Detectives.

1. POLYGRAPHY OR LIE DETECTION TEST = Up to now, there is no judicial ruling as to


the admissibility of the result of polygraph examination. But as a part of police investigation,
it is admissible at that point. Hence, the use4 of this science as part of criminal investigation
is admissible as police procedure. William Marston is considered the father of modern
polygraphy.

Page 17
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. POLICE PHOTOGRAPHY = The photograph of the crime scene and the pieces of evidence
thereat are real evidences because they are addressed to the senses of the court. Motion
pictures taken during bank heist are important in the prosecution of criminals. William
Henry Fox Talbot, Joseph Nicephore Niepce and Jacques Mande Daguerre are
considered the pioneers of photography. They were the individuals who spread the
photographic process that was patented by them.

3. FORENSIC CHEMISTRY = It involves the use of the science of chemistry in the


examination of fibers, hairs, powder burns, blood, stain, paints, poisonous substances and
other matters in their relevance to the investigation. The Forensic Toxicologist
determines the qualitative and quantitative poison that may have caused the death and he
alone is the authority concerning poisons.

4. FORENSIC MEDICINE = The Forensic Pathologist examines the cadaver of a person


thru an autopsy inorder to determine the cause of death as one of the elements of corpus
delicti. This science could also approximate the time of death and other pertinent and
relevant matters in the investigation. Based on history, the father of forensic medicine is
Paulus Zacchias.

5. FORENSIC BALLISTICS or FIREARMS IDENTIFICATION = This is the science of


firearms identification. In crimes involving the use of firearms, the bullets ad shells found at
the scene of the crime are compared microscopically with that of the suspected firearms. A
firearm has its own individual characteristics different from others with the same class
characteristics. When there are identical findings, the conclusion is that the ballistics
evidence found at the crime scene was fired from the same firearm. The comparison
microscope and other instruments are used in firearm identification. The father of forensic
ballistics is Col. Calvin H. Goddard.

6. DACTYLOSCOPY or PERSONAL IDENTIFICATION = This is otherwise known as the


science of fingerprint identification is one of the means to identify the suspect or unknown
cadavers. It is based on the fact the no two persons have the same or identical fingerprints.
Fingerprints have their own individuality and immutability. Edward Richard Henry is
considered the father of fingerprinting in the world since his work has a great influence
to several law enforcement agencies not only in the Philippines but to other
countries. The fingerprint system that the Philippines is using is the combination of Henry-
Galton and the FBI System with modification and extension.

7. QUESTIONED DOCUMENTS EXAMINATION = Suspected forged or falsified documents


are subjected to animation by the Questioned Document Expert to establish if there is
alteration, superimposition, or erasures, either mutually or chemically. A Forensic Chemist
assists the expert if there is the use of chemicals in the forgery or falsification. Albert S.
Osborn published his book entitled “Questioned Documents” that made him the most
influential person on that field and making him the father of Questioned Documents.

8. FORENSIC ODONTOLOGY = The remove of dentures are of paramount importance in the


identification of unknown bodies especially when other means of identification is lost due to
burning or extremely advanced state of decomposition. The Forensic Dentist are the ones
who conduct examination of dentures for the purpose of identification.

9. FORENSIC PSYCHOLOGY = This is a very recent science in the field of criminal


investigation and detection. In the website of the FBI, the crime scene is examined by the
Forensic Pathologist and from there, he could describe the unknown criminal, his
deformities, height and even his way of living. In some cases, solutions were done with this
new science.

10.FORENSIC COMPUTER TECHNOLOGY = This is the age of advanced information


technology. Every human transaction today is with the use of these technologies.
A new expert in the field of investigation and detection is the Forensic Computer
Technologist who is now added to the list of experts in their own field of studies.

Page 18
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
MODERN DISCOVERIES OF INSTRUMENTATION:
1. DNA (DEOXYRIBONUCLEIC ACID) = DNA Fingerprinting is considered to be the
ultimate identification test in the conduct of criminal investigation. It provides 100
percent positive identification of a suspect whose blood, semen and/or other DNA-
bearing body tissues of fluids were found at the crime scene or with the victim.The
discovery in genetics is that no two persons have the same DNA profile, except the
identical twins.
The father of DNA is Sir Alec Jeffreys who discovered this branch of genetics in
England. The DNA of an individual is formed by a combination of the DNA’s of the father
and mother. The DNA profile is like a bar code that is found in every commercial
product, printed on their package, wrapper, box, or container.

2. HAIR EXAMINATION = The roots of the hair when examined under this new
technology will determine the presence of drugs taken by the person two years prior to
the said examination.

3. AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM = A questioned fingerprint


is feed into the AFIS machine which will automatically search the files of fingerprints and
renders report in matters of seconds.

4. GLOBAL POSITIONING SYSTEM (GPS) = This is for the effective identification on


the location of criminals and objects thru modern and special gadgets. It points out
the exact location of the subject or the person who committed the crime.

Page 19
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE

COVERAGE OF LESSON 3
 INTRODUCTION TO INTELLIGENCE
 INTELLIGENCE CYCLE

--------------------------------------------------------------------------------------------------

I. INTRODUCTION TO INTELLIGENCE

In this world, the importance of intelligence has become increasingly emphasized. It is


important that we gain an understanding of the nature and scope of intelligence and its
implications in this time. Intelligence and the need for intelligence is far from new. However,
these days of rapid communications, more powerful weapons, ideological hot, warm and cold
war emphasize the need for rapidly acquired and processed accurate and detailed intelligence,
timely, of life and freedom, which is valued so clearly.

A. HISTORY OF INTELLIGENCE
1. Holy Bible- is here you can find the just recorded intelligence operations in history.
a. Moses - One of the first recorded formalized intelligence efforts, with format, can be
found in the Scripture; also named the 12 intelligence agents when the Lord directed Moses to
send into the Land of Canaan and records that “all those men were heads of the children of
Israel”.
b. Rahab - “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and concealed
the agents of Israel, made a covenant with the agent sand duped their pursuers. She was not
only an impromptu confederate of immense value to the Jewish leaders of that far-distant day,
but also established a plot- pattern which is still of periodic relief to motion- picture producers.
c. Delilah - a Palestine agent who used her charm to gain information from the
powerful enemy.

2. Sun Tzu- a Chinese-“Father of Intelligence” philosopher, in his book “PING FA”


(Art/Principles of War) - the earliest known textbook on the art of general warfare- once
said;
“If you know your enemy and know yourself, you need not fear the result of a
hundred battles. If you know yourself but not your enemy, for every victory, you will
suffer defeat. If you know neither yourself nor your enemy, you are a fool who will
meet defeat in every battle.”

Mao- Tse-Tung- applied this during the long march and by the Japanese prior to Pearl
Harbor. Sun Tzu believed that to wage war economically while defending the state against
other, it was necessary to employ a permanent espionage service spying on neighbors and
enemies. Sun Tzu introduced a rigid hierarchy of spies to include:
a. local spies
b. internal spies
c. converted spies
d. condemned spies

The captured agents should be treated with benevolence, tempted with bribes, led away
and comfortably housed. Sun Tzu realized that if such mean could be turn, they would be in
position to report on their previous master strengths and weaknesses. The condemned spies
were less fortunate; Unknown to them they were fed completely false information by Sun Tzu’s
agents, sent into enemy territory and if necessary, compromised. When they were captured and
tortured, the information that they were able to divulge was wholly incorrect, leading the
enemy to miscalculate his response. When the enemy learned of his mistake the spy was put
to death, but by then it was often too late.

3. Alexander “The Great” - Under the tutelage of Aristotle, Alexander the Great King of
Macedonia, became the first ruler to utilize intelligence as a weapon of government. He divided

Page 20
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
a simple but highly effective system of covert ciphers. He introduced a primitive form of
“Cabinet Noir” (Internal Monitoring) when he instigated postal censorship into the army and
investigated letters and malcontents. By then, he was considered as the Father of
Censorship.

4. Belle Boyd-The daughter of Shenandoah Valley. She spied for the Confederacy. She
became a confederated courier running messages and medicines through the Union lines. She
traveled far into the enemy lines and beyond occasionally bringing back intelligence of the
greatest timeliness and importance. Belle’s greatest failings were her extrovert nature and her
love of publicity. She talked incessantly about her exploits to reporters and allowed herself to
be a celebrity of the south. Eventually late in the war, Union authorities lost patience with her
and had her deported to Canada. Her biographer described her as the most famous woman
concerned w/ official secret activities in the Civil War.

5. Sir Francis Walsingham of England- He was credited with creating the first viable secret
service in England. He protected Queen Elizabeth I from countless assassins.

6. Lord Baden – Powell- Known as the founder of the Boy scout Movement and was
also an active spy. Baden- Powell exploited his powers of tracking and observation, coupled
with his considerable skills as a Thespian (theatrical), to the benefit of the British Secret
Service. Subsequently, when ordered to investigate a rumor that a large dry dock was being
constructed in Hambur, he posed as a drunk, saturating his clothes in brandy to enhance the
effect. He was swiftly arrested by the German military, but believing him to be too drunkard
incapable of finding out any secrets, they released him.

7. Mata Hari (1876-1917) -she is one of the best known spies in history, yet she was one of
the worst.
When World War I broke out, she was in Berlin, where she had befriended the Chief of police,
who subsequently enlisted her into the ranks of the German Secret Service. She carried on her
life as before dancing naked on the stage and dispensing her services liberally to those who
could afford her.

8. Sertorius- When he was the Roman Commander in Spain, according to Polyaenus, the
possessor of a white fawn that he trained to follow him everywhere. This little fawn was taught
to approach at a given signal, and Sertorius himself the signal, when about to pronounce his
decision in judicial cases. The fawn appeared to convey information to the Roman general; and
Sertorius allowed it become widely known that he derived both secrets and guidance from the
fawn. His intelligence agents meanwhile, were everywhere active and all that they learned was
credited to the supernatural powers of the animal.

9. Frederick “the Great”-considered as the, “Father of Organized Military Espionage”.

10. Hannibal- Hannibal’s invasion of Italy, the most brilliant and futile raid in history, gained
him victories
and nearly bleed Rome to death, but the mere slaughter of Romans and a great city’s despair
would not
have sustained him for fifteen years if he had not also made powerful allies and developed an
excellent intelligence system. He often dressed as a beggar and went into the streets of Rome.

11. Schulmeister, “Napoleon’s Eyes”- He was the Napoleon’s military secret service.

12. Wilhelm Stieber- He made two major contributions to the sequence of military
intelligence, namely military censorship and organized military propaganda.

13. Alfred Red- One of the most brilliant intelligence agents, though he was a homosexual. He
rose to become chief of the Austro- Hungarian Secret Service, or in other terms, director of
their military intelligence system. For more than half of his time as director of intelligence, Red
was acting as an intelligence agent of Russia.

Page 21
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
B. SOME INTELLIGENCE UNITS IN THE WORLD:
1. CIA- Central Intelligence Agency- Military intelligence agency of United States of
America and engaged in many undercover activities throughout the world.
2. KGB- Komitet Gusodarstevenoy Bezopasnosti- Russia
3. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim M-eyudim)-“ Central Institute for
Intelligence and Security”- Israel.
4. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known by its
wartime designation, “MI6”, equivalent to US’s CIA, in charge with gathering information
overseas and with other strategic services ranging from foreign espionage to covert political
intervention.
5. SDECE- (Secret de Documentation Exterieure et Contre- Espionage)- France.
6. SAD- (Social Affairs Department)- China.
7. FBI- Federal Bureau of Investigation- its primary role is counter intelligence limited to
internal security within the United States of America.
8. “MI-5” - Great Britain’s civilian intelligence agency for internal counter intelligence,
equivalent of US’ FBI and equivalent to Internal Security Section of Russia’s KGB.
9. NICA- National Intelligence Coordinating Agency- Philippines.
Col. Rudolph Abel - (Russian) - was probably the highest ranking and most successful
spy whoever infiltrated the United States.
Mathew Cevetic - a famous undercover agent of FBI infiltrated the communist party.

C. ASPECTS OF INTELLIGENCE
What is Intelligence?
Intelligence the end product resulting from the collection, evaluation, analysis,
integration, and interpretation of all available information which may have immediate or
potential significance to the development and execution of plan, policies and programs of the
user.
Webster defined intelligence as:
1. Capacity for understanding and for other forms of adaptive intellect of behavior; the mind in
operation.
2. Knowledge of an event, circumstances etc., received or imparted; the gathering or
distribution of information; the staff of persons engaged in obtaining such information.

What is Police Intelligence?


Police Intelligence is the end product resulting from the collection, evaluation,
analysis, integration and interpretation of all available information regarding the activities of
criminals and other law violators for the purpose of effecting their arrest, obtaining evidence &
forestalling plan to commit crimes.

What is Information?
Information is any evaluated materials of every description including those derived from
observation, reports, rumors, imagery, and other sources from which intelligence is produced.

Two General Classifications of Sources of Information:


1. Open Sources (Overt Source) – 99% of the information collected are coming from open
sources.
a. Enemy Activities d. Map
b. Prisoners of War e. Weather Forecast, Studies, Reports
c. Captured Documents f. Agencies
2. Close Sources (Covert/Close Source) – 1% of information from close sources.
a. Surveillance e. Employment of Technical Means
b. Casing (Bugging and Tapping Devices)
c. Elicitation f. Tactical Interrogation
d. Surreptitious Entry g. Observation and Description

D. FUNCTIONAL CLASSIFICATIONS OF POLICE INTELLIGENCE


a. Criminal Intelligence – refers to the knowledge essential to the prevention of crimes and
the investigation, arrest, and prosecution of criminal offenders.

Page 22
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
b. Internal Security Intelligence – the knowledge essential to the maintenance of peace
and order.
c. Public Safety Intelligence – knowledge essential to ensure the protection of lives and
properties.

E. FOUR I’S OF INTELLIGENCE


1. Interest 3. Integrity
2. Ingenuity 4. Intelligence

F. PRINCIPLES OF INTELLIGENCE
1. Intelligence and operation are interdependent – It is separate and distinct activities
but complement each other.
2. Intelligence requires continuous security measures – It denies unauthorized
personnel information about operation and intelligence product.
3. Intelligence must be useful – It must serve the commander’s need and requirements.
4. Intelligence must be timely – must reach the user in time to serve as basis for
appropriate action.
5. Intelligence must be flexible
6. Intelligence requires imagination and foresight

G. BROAD CATEGORIES OF INTELLIGENCE


1. National Intelligence – It refers to the integrated product of intelligence developed by all
government departments concerning the broad aspect of national policy and national security.
 National Policy – It refers to the specific courses of action to achieve the national
objectives.
 National Security – This relates to the protection and preservation of military, economic
and a productive strength of a country including the security of the government and
domestics and foreign affairs against espionage, sabotage and subversion.

2. Department of Intelligence – This the intelligence required by department or agencies of


the
government to execute its mission and discharge its responsibilities.
3. Military Intelligence – This used in the preparation and execution of tactical plans.

H. FIELDS OF POLICE INTELLIGENCE


1. Strategic Intelligence – It involves knowledge pertaining to the capabilities and
vulnerabilities of a foreign nation, which is required by the National Planners for the
formulation of an adequate National Defense in peace and forms the basis for projected military
operations in time of war.

Components of Strategic Intelligence are:


a. Political Intelligence –deals w/ Domestic & Foreign affairs and relation of government
operations;
1. Basic Principles of the Government 4. Subversion
2. Government Structures 5. Intelligence and Security
3. Public Order and Safety Organization
b. Economic Intelligence – deals with the extent and utilization of Natural and Human
resources to the industrial potential of the Nations.
c. Transportation and Telecommunication Intelligence - concerned with the operations
and facilities not only the Military but also the Civilians.
d. Sociological Intelligence –deals w/ the demographic & psychological aspects of groups
of people.
1. Population and Manpower
2. Characteristics of the People
3. Public Opinion – attitudes of the majority of the people towards matters of public policy.
4. Education – based on literacy rate
e. Biographical Intelligence – deals w/ individual personalities who have actual possession
of power.
f. Armed Forces Intelligence – deals with the armed forces of the Nation.

Page 23
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1. Position of the Armed Forces – constitutional and legal basis of its creation and actual
role.
2. Organization and structure and territorial disposition
3. Military Manpower Recruitment
4. Order of Battle
g. Geographical Intelligence – deals with the natural as well as man-made features of the
physical environment of man considered from the point in view of military operations.
1. Location – military and economic importance
2. Size – measurement of which a nation can exchange space or time during war.
3. Shape
4. Weather and Climate
h. Scientific Intelligence – deals with the progress of the research and development as it
affects the economic and military potential of a nation.

2. Line Intelligence (Tactical and Combat) – is the intelligence required by the


commander to provide for planning and conduct of tactical operation. This refers to knowledge
of the People, Weather, Enemy, and Terrain (PWET) used in planning and conducting
tactical and administrative operation in a counter insurgency.

What are the Intelligence Information to be Determined?


A. People
- living condition of the people
- sources of income
- education of the people
- government livelihood of the people
- extent of enemy influence to the people
B. Weather
- visibility
- cloudy
- temperature
- precipitation (rain)
- wind
C. Enemy
- location of the enemy
- strength of the enemy
- disposition
- tactical capability
- enemy vulnerability
D. Terrain
- relief and drainage system
- vegetation
- surface material
- man -features

 Five Military Aspects of Terrain are:


1. Cover & Concealment
2. Obstacle
3. Critical Key Terrain Features
4. Observation & field of fire
5. Avenue of Approach

3. Counterintelligence – it is the phase of intelligence covering the activity devoted in


destroying the effectiveness of hostile foreign activities and the protection of information
against espionage, subversion and sabotage.

Three Activities of Counterintelligence are:


a. Protection of information against espionage
b. Protection of personnel against subversion
c. Protection of installations and materials

Page 24
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
d. against sabotage

Page 25
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Two General Types of Counterintelligence are;
1. Passive Measures – are those measures, which seek to conceal information from the
enemy.
2. Active Measures – are those measures, which seek actively to block the enemies’
effort to gain
information or engage in espionage, subversion, and sabotage.

Five Importance of Effective Counterintelligence are:


1. Denies information to the enemy
2. Reduces the risk of a command
3. Aids in achieving surprises
4. Increases the security of the command
5. Decreases the enemy ability to create information about the forces.

Five Categories of Counterintelligence Operation are:


1. Military Security – it encompasses the measures taken by a command to protect itself
against espionage, enemy operation, sabotage, subversion or surprise. Example:
- secrecy discipline
- special safeguarding of classified information
- security of troop movement
- special handling of weather and escapees
- counter subversion within the armed forces
- tactical measures in combat area

2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for counterintelligence control at point of entry and departure,
international borders and boundaries. Example:
- scty. control of merchants, seamen & crew of commercial aircraft
- scty. screening and control of frontier
- scty. control of sea ports
- scty. control of frontier/border crossing point

3. Civil Security – it encompasses active and passive counterintelligence measures affecting


the non-military nationals permanently or temporarily residing in an area under military
jurisdiction. Example:
- systematic registration of civilians and aliens
- control of circulation
- curfew
- surveillance of suspected political organization
- scty. screening of labor
- issuance of passes and permits
- control of internal commerce

4. Censorship – it is the control and examination of the following:


- civil
- national
- armed forces
- field press
- POW (prisoners of war)
5. Special Operations – counter subversion, sabotage and espionage.

Eight Basic Principles of Counterintelligence Operations are:


1. Conformity to mission 4. Confirmation 7. Continuity
2. Avoidance of publicity 5. Offense 8. Coordination
3. Objectivity 6. Flexibility
What is Counter Intelligence Investigation?

Page 26
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Counter Intelligence Investigation is an activity, which constitutes the value of the
counterintelligence workload, worldwide and includes specific investigation of individual and
incidence, which for the most part are conducted in an overt but discreet manner.

Three Categories of Counter Intelligence Measures are:


1. Denial Measures
a. secrecy discipline
b. document security
c. camouflage and concealment
d. communication security
e. military censorship
f. counter reconnaissance effort

2. Detection Measures
a. PSI (Personnel Background Investigation) c. challenge or password
b. security tag or pass card d. reconnaissance

3. Deception Measures
a. ruse –use of escape & evasion
b. dummy position
c. fabricated information

--------------------------------------------------------------------------------------------------

II. THE INTELLIGENCE CYCLE

Planning and Supervision of the Collection Effort:


1. The intelligence officer must have a thorough knowledge of the available sources of
information, the collecting agencies and type of information the latter can provide.
2. He must understand the operations of the command in order to provide the particular
intelligence required for success.
3. He must have a thorough knowledge of the tactics, organizations and characteristics of the
enemy.
4. He must be especially competent in the fields of surveillance, reconnaissance, counter-
reconnaissance, and acquisition of operations.
5. He should also have a basic understanding of the weather elements and their influence upon
personnel, material and terrain.

Phases of Intelligence Cycle


A. Directing the Collection Efforts
1. Determination of Requirements
- Enemy capabilities, including time, place, strength, or other details
- Enemy vulnerabilities, including nature, extent, performance and other details
- Enemy order of battle and factors
- Terrain, including natural and artificial obstacles
- Weather
- Information desired by higher, lower or adjacent headquarters

2. Determination of the Essential Elements of Information


- Is an item of intelligence or information of characteristics of the area of operations and
the enemy, which the commander feels he needs before he can reasonably arrive at a
decision.

3. Establishment of Priorities
- Priorities reflect the criticality of the need for the particular information. No formula
exists which can automatically determine priorities. Such determination is a matter of
judgment.

Collection of Information

Page 27
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1. Determine collecting agency 4. Use tools or technique in collection
2. Send orders or request 5. Ensure timely collection
3. Supervise collection efforts

Factors in Choosing Collection Agents are:


1. Capability – agents placement or access to other target
2. Multiplicity – more agents

B. Processing the Collected Information


1. Recording – is the reduction of information into writing or some other form of graphical
representation and the arranging of this information into groups related items.
2. Evaluation – is the determination of the pertinence of the information to the operation,
reliability of the source of or agency and the accuracy of the information.

Evaluation is used to determine the following:


a. Pertinence – does it holds some value to current operation; is it needed immediately.
b. Reliability – judging the source of information or agency.
c. Credibility – truth of information.

Judging Credibility:
 It is possible for the reported fact or event to have taken place.
 Is the report consistent within itself?
 Is the report confirmed or corroborated by information from different sources or
agencies?
 If the report does not agree with information from other sources, which one is
more likely to be true?

Interpretation of Information is to determine:


 Meaning
 Significance

3. Analysis – it is the determination of the significance of the information relative to the


information and intelligence already known and drawing deductions about probable
meaning of the evaluated information.

Two Distinct Phases are:


a. Assessment- evaluation of the information at hand on its reliability and credibility.
b. Integration – it is the combination of the elements stated in assessment with other
known information or intelligence to form a logical feature or hypothesis of enemy
activities or information of the operational area characteristics of the mission of the
command.

Dissemination and Use:


Processed information is disseminated through:
-Annexes -Estimates
-Briefing -Message
-Reports -Overlays/cover
-Situations -Summaries

 EVALUATION GUIDE
Reliability of Information Accuracy of Information
A – Completely Reliable 1 – Confirmed By Other Sources
B – Usually Reliable 2 – Probably True
C - Fairly Reliable 3 – Possibly True
D – Not Usually Reliable 4 – Doubtfully True
E – Unreliable 5 – Improbable
F – Reliability Cannot Be Judged 6 – Truth Cannot Be Judged

Sources of Information

Page 28
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
S – Signal Intercept W – Interrogation of Captured Enemy
T – Direct Observation by Commander/Chief Agent/Foreigner
of a Unit X – Observation of Government/Civilian
U – Report by Penetration Agent or Resident Employee or Officials
Agent Y – Observation by a Member of the
V – Report by PNP/AFP Troops Involved in Populace
Encounter Z – Documentary

 FOURTEEN OPERATIONAL CYCLE


1. Mission and Target - is carried out through:
 Infiltration – the insertion of action agent inside the target organization.
 Penetration – recruitment of action agent inside the target agent.

2. Planning
3. Spotting
4. Investigation
 Background Investigation (BI)
 Partial Background Investigation (PBI)
 Complete Background Investigation (CBI)
 Personnel Background Investigation (PSI)

5. Recruitment - The most preferred qualification of an agent is his/her access to the target.
6. Training
7. Briefing
8. Dispatching
9. Communication
 Technical – telephone/radio
 Non-technical – personal meeting

10. Debriefing
- Let your agent talk all he encountered during the operation.
- Don’t interrupt your agent while he is talking.
- Never postpone or pause and set for another time for the briefing

11. Payment - (Depends upon the motivation)


- Buy his life not his job.
- Regularity and dependability that counts not the amount.
- Pay no bonuses.
- Supplement the agent income from regular sources enough to ease his financial
worries but not enough to cause him to live in style.

12. Disposition
-Reroute
-Retraining
-Retesting
-Termination

Page 29
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
13. Reporting
14. Operational Testing

CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE

COVERAGE OF LESSON 3
 POLICE INTELLIGENCE OPERATION

--------------------------------------------------------------------------------------------------

III. POLICE INTELLIGENCE OPERATION

Intelligence Operation – is the result of intelligence planning. Planning is always


ahead of operation although an operation can be made without a plan, it is usually due to
sudden and inevitable situations but definitely, this is poor intelligence management.

Different Task involved in Police Intelligence Operation


1. Discovery and Identification Activity
2. Surveillance
3. Liaison Program
4. Informant Management
5. Clipping Services
6. Debriefing
7. Relevant Miscellaneous Activity
8. Casing
9. Utilization of Informant

A. COVER AND UNDERCOVER


 Cover – is the means by which an individual group or organizations conceal the true
nature of its acts and or existence from the observer.
 Cover Story – is a biographical data through fictitious which will portray the personality
of the agent which is to assume or this is any scenario to cover-up the operation.
 Cover Support – is an agent assigned in target areas with the primary mission of
supporting the cover story.

Essentials of Cover:
1. Secrecy of operation against enemy intelligence.
2. Secrecy of operation against friendly agencies that do not have the need to know.
3. Successful accomplishment of the mission.

Four Types of Cover:


1. Natural Cover – using actual or true background.
2. Artificial Cover – using biographical data adopted for the purpose.
3. Cover within a Cover – justifies your existence.
4. Multiple Cover – any cover you wish.

Hazards to Cover:
1. Static or Dormant Opposition (Ordinary Citizens)
2. Unhostile Active Opposition (Political Security Agencies)
3. Hostile Active Opposition (Enemy International Operatives)

Precautions or Guidelines in Case of Compromise:


1. Move out immediately.
2. Start new facility for operation and develop it.
3. Built entirely new cover.

Page 30
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
4. Use circuitous routes and provide careful counter surveillance measure.
5. Be specifically careful of former contacts with non-intelligence personnel.
6. Be patient, slowly and careful.

 Organization Cover – is an account consisting of biographical which when adopted by


an individual will assume the personality he wants to adopt.
Objectives of Organizational Cover are:
1. To camouflage and protect operational personnel and their activities.
2. Protect installation in which clandestine activities are based.
Guidelines when Organizational Cover is Compromise:
1. Make a physical move or relocation.
2. Start a new facility for the old operation and let it grow.
3. Use new personnel.
4. Let old personnel remain in place.
5. Built entirely new cover.
6. When files are relocated use circuitous route to avoid surveillance and other
counterintelligence.
7. Be specifically careful in making contacts with non-intelligence personnel.
8. Be patient.

 Undercover Assignment – is an investigative technique in which agent conceal his


official identity and obtain information from the target organization.

How to Plan an Undercover Assignment? It involves:


1. Determine the level on which the investigation is intended
2. Develop appropriate cover and cover story
3. Selection of qualified personnel
4. Consideration of all operational details to include documentation, contact reporting, housing
and convergence
5. Briefing, coaching and rehearsal

Two Uses of Undercover are:


1. Use interdependently to get firsthand information about the subject of investigation.
Example:
a. security evaluation of every installation
b. gain confidence of suspected persons
c. agent penetration
d. verify information from human resources
e. undercover concealed identity

2. Supplement other investigative techniques


Example:
a. playing ground works for raids and searches by going entry
b. to assist in locating evidence
c. to install and maintain investigative equipment of undercover assignment

Types of Undercover Assignment are:


1. Dwelling 5. Combination Assignment
2. Work 6. Rope job–striking up friendship w/ the
3. Social subject
4. Jurisdictional Assignment

Social Qualifications of Undercover Agent are:


1. Knowledge of the language 3. Knowledge about the customs and habits
2. Area background regarding events 4. Physical appearance

Factors to be considered in Selecting Cover Story are:


1. Mutual point of interest 3. Previous and permanent address
2. Justification of presence 4. Efficient in his role

Page 31
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
5. Freedom for movement 8. Optional alternate plan
6. Means of communication 9. Safe departure
7. Social and financial status

B. INFORMANT vs. INFORMER


 Informant – refers to a person who gives information to the police voluntarily, without
any consideration.
 Informer – is an individual who gives information for a price or reward.

Types of Informant are:


1. Anonymous Informant- one who gives information through telephone or letters with the
hope that the informant cannot be identified.
2. Confidential Informant- is a person who provides investigator with confidential
information concerning a past or projected crime and does not wish to be known as the
source of the information. The investigator should take a special precaution to protect the
identity of such an informant because of his value as a source on the disclosure of crimes
and gives information violative of the law to include crimes and the criminal.
3. Criminal Informant- A criminal informant is a type of informant who gives information to
the police pertaining to the underworld, about organized crimes with the understanding that
his identity will be protected and for a certain consideration.
4. Voluntary Informant- one who gives information freely as a witness to a certain act.
5. Special Informant- one who gives information concerning specialized cases only and is
regarded special treatment by the operatives.
6. Accidental Informants- a person who casually imparts information to an officer with no
intention of providing subsequent information.
7. Rival- Elimination Informant- is usually anonymous. His purpose in informing is to
eliminate rival or competition.
8. False informant- Reveals information usually of no consequence or stuff concocted of thin
air. He may do so out of the desire to appear to be on the side to law and order and for the
purpose of throwing suspicion from himself or his gang or associates.
9. Frightened informant- maybe prodded by fear or self- interest. He maybe one of the
“little men” who runs to the police when he sees that his confederates are about to be
involved in a dangerous situation and gives information as a protective device and as a
means of sustaining his own feeling of self- importance. This type is the “Weakest link “in
the criminal chain.
10. Self- aggrandizing informant- Hangs about the fringes of the underworld and delights
in surprising the police with choice bit of information. From time to time, his information
may be of value.
11.Mercenary Informants- has something to sell. He may be a valuable source. Sometimes
there is a revenge motive present. He may have thought himself to have be double-crossed
or given a “dirty deal” and seeks revenge as well as profit in the telling.
12.Double Crosser informant- Use his seeming desire to give information as an excuse to
talk to the police in order to get more information from them that he gives. It is will to feed
this informant false information to catch him.

Sub-Types of Informants are:


1. Incidental Informant – a person who casually imparts information to an officer with no
intention of
providing subsequent information.
2. Recruited Informant – a person who is selected, cultivated and developed into a
continuous source of information regarding police targets.
Categories of Recruited Informants are:
1. Spontaneous of Automatic Informant – informants who by the nature of their work
or position
in the society have a certain legal, moral and ethical responsibilities to report information to
law
enforcement agencies.
2. Ordinary Run of the Mill Informant – informants that are not under the compulsion
to report information to the police.

Page 32
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
3. Special Employee – informants who are of a specific operational nature.

Motives of Informants are:


1. Reward 4. Patriotism
2. Revenge 5. Friendship
3. Fear

Four Phases or Steps of Informant Recruitment


1. Selection – it is particularly desirable to be able to identify and recruit an informant who
has access to many criminal in-groups or subversive organizations. Wide access is probably
the single most important feature in the consideration of recruiting potential informant.
2. Investigation – the investigation of the potential informants that has tentatively identified
as a “probable” must be as thorough as possible. It must establish possible existing motives
as to why this person might assist the police intelligence community. Failure to do so will
deny the officer who must perform the approach and persuasion phase with little more than
a guess. If necessary, conduct complete background investigation (CBI).
3. Approach – must be done in a setting from which might include pleasant surrounding,
perhaps a confidential apartment completely free of any probable compromise, preferable in
an adjacent city or a remote area foreign to the informants living pattern.
4. Testing – the testing program should begin of course with limited assignments, with the
gradual integration into the more important areas. The occasional testing of an informant
should continue through the entire affiliation.

Factors to Consider in Informant Recruitment


1. Access 5. Age
2. Health 6. Education
3. Built 7. Personality
4. Ability 8. Sex

General Treatment of Informants


1. Avoid the use of derogatory terms in referring to informants to any type.
2. Avoid disclosing the identity of the informant, which will in most cases ruin his potential.
3. Protect the interest of the informant; remember an investigator is usually just as good as his
source of information.
4. Consider all information from known and unknown informants as valuable until proven
otherwise.
5. Be noncommittal on the value of information received.
6. Express appreciation for all information received regardless of its value.
7. Keep appointment on time even though informant may not.
8. Do not get over anxious; be patient. Take your time.
9. Keep control of the investigation.
10. Keep what you know to yourself, do not become an informant’s informant.

Important Rule that a Handler or Civilian agent or informant must follow:


“Never, Never Love Your Agent”
An agent handler must be able to determine when to “terminate” the agent that is to cut
off the agent from a project when it has reached a particular stage. “That is why when you fall
in love with an agent, it becomes difficult to “terminate” him or her.” In extreme cases, like
when agents commit serious acts of betrayal, to terminate means physical elimination.

 Information Net – This is a controlled group of persons who work through the
direction of the agent handler. The informants, principal or cutouts supply the agent
handler directly or indirectly with intelligence information.

Factors in the Selection of Action Agent


1. Placement – location of prospective agent with respect to the target.

Page 33
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. Access – it is the capability or ability of a prospective agent to obtain the desired
information for the intelligence organization or to perform the intelligence collection
mission in the area.
 Primary Access – has direct access to the desired information.
 Secondary Access – it is the access to the desired information through a
principal source where the latter has the direct access.
 Outside Access – the agent is employed outside the target and merely monitors
 information from a third person who is monitoring information in the area.

Motivations of an Agent are:


1. Ideology – believe in the principle 3. Remuneration
of life. 4. Career Development
2. Patriotism 5. Fear

General Nature of an Agent Handler


1. Sharing a secret purpose
2. Agent handler controls the agent operationally and administratively
3. Rapport with each other
4. Respect with each other

Basic Agent Management Principle


1. Agent handler must be in charge of the operation
2. The act ensure the agent adherence
3. Good rapport must be established between the agent handler and the agent
4. The agent handler must constantly reinforce the agent’s motivation

 Control – This refers to the authority to direct the agent to carryout the task or
requirement on behalf of the clandestine organization in ac acceptable manner and
security.

Two Categories of Control


1. Positive Control – is characterized by professionalism and rapport.
Types of Positive Control
a. agent motivation
b. psychological control

2. Negative Control – blackmails and threat


Types of Negative Control
a. Disciplinary Action – includes verbal reprimand for poor performance or
insecure actions withholding certain material rewards, reduction of agent’s salary
or in extreme situation the threat of terminating professional relationship.
b. Escrow Account- control of an agent by putting his salary in a bank to be
withdrawn only after a fulfillment of a condition.
c. Blackmail

Key Elements of Agent Management


1. Direction and Control
a. leadership c. personal
b. action example
2. Natural Weaknesses
a. inability to keep secret c. strain of dual experience
b. need for recognition d. experience
3. Agent Training
4. Agent Testing
5. Agent Termination

Problems in the termination of agent:


1. Amount of knowledge the agent has in the operation and personnel
2. His inclination to use knowledge to the disadvantage of the intelligence service

Page 34
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
3. Moral obligation to the agent – the cause of loss incurred by him as a result of his
connection with the intelligence service.

C. OBSERVATION and DESCRIPTION


 Observation – a complete and accurate observation by an individual of his
surroundings and encompasses the use of all the major senses to register and
recognized its operational or intelligence significance.
 Description – the actual and factual reporting of one’s observation or the reported
sensory experience recounted by another.

Psychologist estimates that approximately:


a. 85% of your knowledge is gathered through sight
b. 13% through your hearing
c. 2% through the other three senses

Psychological Process for Accurate Observation


1. Attention – consist of the psychological process involved in becoming aware of an
existence of fact.
Types of Attention
a. Involuntary – you have no control and requires no effort
b. Voluntary – this is more reliable but not dependable
c. Habitual – little effort with a maximum of control

2. Perception – involve in the understanding these facts of awareness.


Factors involved in Perception
a. Mental Capability
b. Educational Background
c. Occupational Background
d. Impirical Background – acquired through experience

3. Report – involve in the identifying the name in one’s own mind and some facts,
which has been perceived, narrated and identified.
Factors governing Report
a. Vocabulary – the word which and individual uses to press himself
b. Time Log – accurate reporting depends entirely on timeliness, delays in
reporting results in unconscious omission of details
c. Recurrence of similar incidents

D. ELICITATION- a system or plan whereby information of intelligence value is obtained


through the process of direct intercommunication in which one or more of the parties to the
communication is unaware of the specific purpose of the conversation.

Three Phases
1. Determination of the Mission
2. Selection of the Subject
3. Accomplishment of the Mission

Page 35
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Two Techniques in the Conduct of Elicitation
1. Approach – process of setting people to start talking

Types of Approach:
a. Flattery Approach – people are susceptible to praise
Variants:
 Teacher-Pupil Approach- the subject is treated as an authority. We request him to
enlighten us and solicit his viewpoints and opinions.
 Kindred Sole Approach- the subject had been placed in a pedestal having some
specialized quality and you flatter him by showing enough concern for his welfare to
pay special attention to his enjoyment.
 Good Samaritan Approach- is sincere and valid offers to help and assistance are
made to the subject
 Partial-Disagreement Approach- seek to produce talking by the word “I not am sure
if I fully agree”.
b. Provocative Approach – discover a wide range of conversational gambits
Variants:
 Teaser Bait Approach- elicitor accumulates the sources of knowledge about a
particular
subject
 Manhattan from Missouri Approach- the elicitor adopts an unbelievable attitude
above anything. He questions all statements and oppositions.
 Joe Blow Approach- is “I know the answer to everything” approach. The elicitor
adopts the attitude of being approachable of any field.
 National Pride Approach- nature propensity of all person to defend their country and
its policies.

2. Probe – to keep the people talking incessantly


Types of Probe:
a. Completion Probe – this is effective when used in connection with the teacher pupil
approach.
b. Clarity Probe – used to elicit additional information in an area, which the response is
clear.
c. High Pressure Probe – it serve to pin down a subject in a specific area or it maybe
used to point out contradictions in what the subject had said.
d. Hypothetical Probe – present a hypothetical situation and to get the subject to react
to the hypothetical situation.

Four Purposes of Elicitation


1. To acquire information that is unachievable through other channels.
2. To obtain information, which, although unclassified is not publicly known.
3. To provide operational information and background data on potential source of information.
4. To assist various individuals.

Planning and Preparation


1. What information is necessary and essential.
2. Who has access to the information.
3. What are his vulnerabilities.
4. How susceptible is he to elicitation.
5. Outline elicitation points prior to meeting and prepare specific questions and know your
subject well.

E. CASING
 Casing – is a reconnaissance or surveillance of a building, place or area to determine its
suitability for intelligence use or its vulnerability in operations.

It aids in the planning of an operation by providing needed information. It assists the


agent handler to instill confidence in his agent during briefing phase by being able to speak

Page 36
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
knowingly about the area of operation. Casing is also considered a security measure because it
offers some degree of protection for those operating in an area unfamiliar to them.

Types/ Forms of Casing


1. Surveillance - means to gather specific or detailed information over a particular area and it
takes a long period of time. Surveillance is continuous while reconnaissance is intermittent /
alternating (mission or operation).
2. Reconnaissance - means to gather general information in a wider area and it requires
short time frame. Reconnaissance has specific objectives while Surveillance has general
objectives.

General Principles are:


1. Know the best route to take to get you there.
2. Know how to conduct yourself without attracting attention.
3. Know what security hazards are in the area and how can they be avoided or minimized.
4. Know the best route to extricate from the area.

Methods in Casing are:


1. Personal Reconnaissance – the most effective method and will produced the most
information since you know just what you’re looking for.
2. Map Reconnaissance – it may not be sufficient but it can produce a certain amount of
usable information.
3. Research – much information can be acquired through research.
4. Prior Information – your unit and other unit will have file report that they may provide you
with information.
5. Hearsay – information usually gain by the person operating in the area and performing
casing job.

Information Desired in Casing are:


1. Area Condition and Habit – a description of the locality as to whether the place is
residential, commercial, highly urbanized or rural. The living condition, income of population,
operational data (time where the area seemed to be useful – closing time). It includes
description of the area during the different weather conditions. What transportation is
available in the area to include the amount of fare. Habits refer to the routine activities of the
people in the area, dialect and different beliefs also considered.
2. Active Opposition – means all organs of every activity system whose task is to prevent
intelligence activity in a given area. This also includes not only the enemy but also the effort
of the neutral or allied countries to discover and observe our intelligence activities and learn
its objectives. Remember that a country which either neutral or ally today may anytime in
the future become the ally of the opposition.
3. Disposal Plan – disposal of the information in case of possible compromise. Disposal of
information and materials.
4. Escape and Evasion Plan – the existing plan in case of emergencies, from immediate focal
point, the general area and completely from the area.

Five Fundamental Principles of Casing


1. To gain contact as soon as possible and maintain continuously.
2. Maneuver freely in conformity with operations (dry run)
3. To fight only when necessary.
4. To report all items of information.
5. To develop the situation.

Steps/Guide in the Conduct of Casing


1. Preparation of general location map
2. Sketch of the adjoining establishment and prominent features
3. Specific sketch or floor plan of main target
4. Detailed features of inner portion of the target and its description
5. Photograph of the casing target ( from general to specific points)

Page 37
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE

COVERAGE OF LESSON 5
 SURVEILLANCE
 CLANDESTINE OPERATION

--------------------------------------------------------------------------------------------------

I. SURVEILLANCE

 Surveillance–form of clandestine investigation which consist of keeping person, place


or other targets under physical observation to obtain evidence or information pertinent
to the investigation.

Objectives of Surveillance
1. To confirm or deny allegations
2. To identify persons involved in certain activities
3. Provide background information for undercover assignment
4. Develop leads to vital information
5. To obtain upon which to conduct additional investigation
6. To check on sources of information
7. Locate addresses, or places frequently by subject as well as his associates
8. To obtain detailed information about the nature, scope of subject’s activities
9. To secure basis for securing search warrant
10. To provide protection

Definition of terms:
 Pre-Surveillance conference – a conference held among the team members, the police
intelligence unit before surveillance is conducted
 Subject/Rabbit- it is the subject either person or place.
 Surveillant – a person conducting surveillance which includes observations only.
 Stakeout or Plant – is the observation of places or areas from a fixed point.
 Tailing or Shadowing - it is the observation of a person’s movement.
 Undercover Man – it refers to a person trained to observe and penetrate a certain
organization suspected of illegal activities and later reports the observations and information
so that proper operational action can be made.
 Safehouse – is a place, building, enclosed mobile, or an apartment, where police
undercover man meet his action agent for debriefing or reporting purposes.
 Drop – is a convenient secure and unsuspecting place where a police undercover man,
informer or informant by a pre-arrangement leaves a note leaves a note, a small package,
an envelope or item for the action agent, supervisor or another agent.
 Convoy – an accomplice or associate of the subject.
 Decoy – any person or object, almost similar to the subject used to avoid or elude the
surveillant.
 Contact – any person whom the subject picks or deals while he is under surveillance.
 Made or Burnout – when subject under surveillance becomes aware that he is under
observation and identifies the observer.
 Lost – when the surveillant does not know the whereabouts of his subject or the subject
had eluded the surveillant.
 Finger man - any individual who can positively point the subject.
 Put to bed - when the subject under surveillance returns to quarter & apparently retire
for the night.

Types of Surveillance are:


A. According to Intensity and Sensitivity
1. Discreet – subject person to be watch is unaware that he is under observation.
2. Close – subject is aware that he is under observation.

Page 38
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
3. Loose – applied frequently or infrequently, period of observation varied on each
occasion.

B. According to Methods
1. Stationary – this is observation of place, usually a bookie stall, a gambling joint, or a
residence where illegal activities are going on. ( fixed location )
2. Moving – surveillant follows the subject from place to place to maintain continuous
watch of his activities.
3. Technical – a surveillant uses telecommunication hardware, gadgets, systems and
equipment.

Preparation of Surveillance
A. Area and Target Study – all available information about the areas should be collected
and analyzed.

B. Surveillance Plan – the plan should establish the required type of personnel, the general
and specific instruction for surveillant. Ensure that the overall objective of the surveillance is
understood. All participating personnel will have common understanding of the operational
limitations, signals and special instruction, which have been improved.

C. Selection of Personnel
1. Inconspicuous physical character
2. Ability to remain unnoticed
3. Resourcefulness
4. Patience and physical stamina
5. Keen sensory perception and retentive memory
6. Driving ability
7. Personal courage
8. Area knowledge
9. Security consciousness

D. Administrative and Logistics


1. Communication and control
2. The conduct of surveillance

Equipment in Surveillance:
1. Camera with telephoto lens 3. Mini-video camera and others
2. Voice recorder

Surveillance Precautions are:


1. Do not make abrupt or unnatural movement
2. Do not make use of disguise that will attract attention
3. Never stare at the subject
4. Do not attempt to appear too innocent when accessed by the subject
5. Never speak to another surveillant unless absolutely necessary to accomplish the mission
6. Maintain distance
7. Plan ahead
8. Be aware on the changes of action
9. Note taking should be done in safe areas
10. Make use of street furniture ( telephone booth, sidewalks, waiting shades, vendors )

Factors to Consider in Fix Surveillance:


1. Determine base of operation
2. Maintain a thorough, cautious reconnaissance of the area
3. Obtain necessary equipment
4. Assignment of specific duties to each member of the team
5. Prepare alternative course of action
6. Provide for relief team
7. Arrange for communication signals

Page 39
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel on the
base of operation

Don’ts in Surveillance include:


1. Window shopping 4. Getting out immediately on public
2. Use of convoys conveyance
3. Stopping immediately on blind corners 5. Retracing
6. Enter mobile housing
Required Appearance of a Surveillant:
1. Be of average size, built and general appearance.
2. Have no noticeable peculiarities in appearance or mannerisms.
3. Wears inconspicuous/unnoticeable/ordinary jewelry or clothing.
4. Have nothing about him to attract attention or fix him in the mind of a person.
5. Have perseverance and be able to wait for hours at a time without showing any sign of
impatience or irritation, since this attracts attention.
6. Always gives the appearances of attending strictly to his own business and of not being
interested in what anyone else maybe doing.
7. Be resourceful, versatile, and quick witted, so that he can readily conceive reasons or
excuses for being in any given place.
8. Be a good talker, able to talk his way out of embarrassing situations without arousing
suspicion.
9. Have one or two good standard “line” such as canvassing for the city directory or a trade
publication or selling brushes or other articles.
10. Carries a cap and glasses to effect such changes including wig, mustache if necessary.

A. Kinds of Surveillance
 Stake Out or Surveillance of Places
Two types of place surveillance
1. Using a room in a nearby house or business establishment and remaining undercover.
2. Remaining outdoors and posing as a person who would normally conduct his business in
such an area, ex. a laborer, carpenter, street vendor, etc.

 Tailing or shadowing
Don’ts in Shadowing:
1. Don’t make abrupt or unnatural movements.
2. Do not make use of disguise that will attract attention.
3. Don’t meet the eye of the subject. Doing so tends to fix the shadower in the mind of the
subject. If the subject turns and it seems as if a face to face encounter will result, the
shadower must look anywhere except the subject’s face.
4. Don’t adopt a slinking, sleuthing, creeping, peeking manner. Don’t slink in and out of
doorways, sleuth behind the subject, creep from around parked cars, peek for around corners,
it is unnecessary, ineffectual and above all attract attention.
5. Don’t wear story- book disguises. False whiskers, artificial noses, simulated deformities
and the like rarely. If ever, are convincing when worn by an amateur and seldom convincing for
any length of time even when worn by a professional actor or when applied by a professional
make- up artist. These disguises maybe good in theaters but not in the street.
6. Don’t carry briefcases, notebooks, papers or other noticeable objects.
7. Don’t greet or never speak to fellow officers or allow them to greet you. It must be an
established policy that other officer in or out of uniform do not greet each other on the streets
if there is any possibility that one may be on a job.
8. Don’t make notations or entries ostensibly. Strangely enough sometimes, the more
experience shadower fails to observe this precaution. This is so to avoid suspicion of his
mission.
9. Beware of bulging concealed weapons.
10. Don’t attempt to appear too innocent if accosted by the subject.
11. Maintain distance
12. Note taking should be done in safe areas.

Page 40
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
B. Methods of Shadowing
 Foot Surveillance
1. One- man shadow 3. Three- man Shadow or ABC method
2. Two- Man Shadow

Techniques in Shadowing using Foot Surveillance:


1. Turning Corner- If the subject turns a corner, the surveillant should not hurry. If the
subject is lost, the nature of the neighborhood will determine the subsequent procedure. In
most cases, it is preferable to lose the suspect than to alert him to the tail.
2. Entering a Building- If the building is a store, the surveillant should wait until the subject
comes out. In buildings having a number of exits, it is necessary to follow him inside. If the
subject enters an elevator, the surveillant should board the same elevator. The surveillant may
tell the elevator boy that his destination is the same floor as the subject, or he may proceed to
the top floor, if there are more than one surveillant, one should alight at the subject’s floor and
should proceed in a different direction then the latter can return to the first floor and wait for
the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and on the
same side. If he misses the bus, he should hire a taxi and board the bus at a point ahead.
4. Taking a taxi- When the subject takes a cab, the surveillant records the time, place and
name of the taxi’s company and license. He should endeavor to follow in another taxi. If this
results in failure, he should trace the taxi by means of recorded information and ascertain the
destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant should
endeavor to get in line behind him with one person intervening. If he hears the destination
requested by the subject he may buy a similar ticket. In the event that he is unable to hear the
destination, he should merely request for a timetable.
6. In a restaurant - The surveillant should allow a few minutes to elapse before following the
subject into a restaurant. He should then take an obscure sect and arrange to finish his meal at
the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he registered,
the surveillant can take the adjoining room.
8. In a telephone booth- The surveillant should either go into the next booth or stand near
enough to hear. He should note the telephone book use and the page at which it was left
open.
9. In the Theater- The surveillant should sit behind the subject and take not of the various
exits which are available.

Risks constantly incurred by a shadower:


1. The risk of being recognized as a shadower of the subject.
2. The risk of being “lost” or eluded by the subject.
3. Test for Tailing- The common trick of the suspect when he becomes conscious that he is
being “tailed” is to board a public conveyance, such as bus, street car, or subway train, and
then jumping off the vehicle. The subject then looks about quickly to determine if any other
person jumped off. If the shadower alights too, the suspect will study him closely to
facilitate future recognition. On finding himself in this predicament, the surveillant’s best
tactic is to remain on the vehicle until the next stop, alight, and board the next car or train.
4. The Convoy- Sometimes the suspect is being guarded against shadowers. The convoy is
usually at the rear of the subject. It may be therefore necessary for the surveillant to keep a
look out behind him to guard against this. If the subject has a follower or convoy, the
shadower must get behind the convoy and follow him instead of the subject.

 Automobile Surveillance
This requires careful preparation, wherein the shadowers must use a vehicle if the
subject uses a vehicle. The vehicle used by the shadowers must be non-descript, preferably
rented vehicles since they can be changed often. The license plates must be anonymous if the
car used in shadowing is official or government vehicles. The “tail” car may be changed several
times a day to lessen chances of being detected. It is preferred that there be three men in
shadow car. Number one man is the driver, number two watches for a convoy, number three
takes notes. The notation includes place, every act and every contact of the subject’s vehicle

Page 41
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
and its passengers. Complete descriptions are made of all persons contacted if their identities
are unknown. If number two catches a convoy, then the tail job is switched to the convoy car.
The driver will avoid attracting attention by deriving at normal speed in reasonable manner. He
will avoid unnecessary turning, twisting, stating, stopping and other maneuvers. If the subject
leaves his vehicle, number two and three leave the shadow car then take up the surveillance on
foot. Number one remains with the car.

In automobile surveillance, the vehicle used should conform to the same characteristics
as the investigation or surveillance. The make and model of the car should not be spectacular
or readily unidentifiable, and it should not carry any distinctive license plates.

Disguising the Car:


The following must be observed in disguising the car:
a. License Plate – a popular type of black color car should be used and care must be taken
that the license plates are not identified. This can be remedied by the following:
1. Use of security plates.
2. Use of “colorum cars”/”Drive-it- yourself rented cars”
3. Borrowing cars from friends.

b. Appearance- Various devices may be used to change the appearance of a car. Placing and
removing stickers, wind shield adornments, shifting head lights from dim to bright , re-
arranging the seats of occupants, changing the occupants cloths, changing or removing hats,
changing the number of occupants, etc.

Precautions to be observed in tailing using Automobile:


1. Don’t park in the same spot too long.
2. Don’t sit behind the steering wheel for an extended period.
3. It is preferable to sit in the passenger’s seat.
4. Don’t seat both surveillants in the front seat for an extended time.
5. Don’t approach the parking position in a manner that may arouse suspicion.
6. Don’t park in a prohibited zone if it can be avoided since such a location attracts attention
and frequently lead to police conferences.
7. Don’t be mysterious about leaving or returning to your car.
8. Don’t use credit cards in the vicinity of the surveillance. If the car has some identification
marks or equipment, care should be exercised in the selection of a servicing station.
9. Don’t operate in short wave radio with excessive volume.
10. Don’t hold a general conference or “board meeting” with the relieving team.
11. Don’t fail to give the relieving team the pertinent data that have developed.
12. Don’t use telephone repeatedly from the same store or filing station.
13. Don’t be too unconcerned in appearance. In some instances, it is better to appear to be
impatiently waiting.
14. Don’t stand around a lobby reading newspaper.
15. Don’t look away if the subject approaches. Be normal and look at him briefly.

 Undercover Investigation (CI)/Assignment (CA) or “Roping”


It is a form of investigation in which the investigator assumes a different and unofficial
identity in order to obtain information. It requires the assumption by a police agent of an
identity in keeping with the situation to be explored. The agent must drop his identity and
adopt another. It is an investigative technique in which agent conceal his official identity and
obtain information from that organization.

Importance of Undercover investigation


In law enforcement agencies, members of organized crime, local gambling operators
and prostitutes make it their business to get to know the faces of as many member of the
police department as possible. For this reason, rookie officers are always in demand for
undercover assignments in the vice
and narcotics units.

Page 42
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
In business and industry, the vast majority of undercover agents are found in here, not
law enforcement. They are employed directly by corporations or employed by private agencies
for internal investigation. Their importance in business and industry is the prevention and
control of employee theft.

Type of Undercover according to time frame:


1. Long- range - operations can provide reliable, accurate and continuing access to
information which would not be otherwise attainable.
2. Short-range - the duration of short undercover activity may vary considerably,
form one-
time interview to a series of separate but related actions over an extended period of
time.

Selection of Undercover Worker


The ideal undercover agent is a combination of an actor and a good investigator. The
selection shall be made in consideration of the following elements.
1. Background - A good undercover man must be able to fit to the environment of his
assignment. He must be able to suit his speech and line of thinking to that of his associates.
His educational and technical background must rise to the required level. Is conversation
and knowledge of hobbies, sports and general information should be in the particular
stratum in which he will find himself.
2. Temperament - A calm, affable, enduring personality is required. He should have the
necessary self-confidence to carry him through the more trying moments and the
resourcefulness to adjust to change of plans or situations.
3. Intellect - The undercover agent must, above all, be intelligent. He should have a clear
view of the objective of the mission and the over-all strategy that must be employed in its
accomplishment. A retentive memory and a keen imagination will serve him in good stead.
Finally, he should be an excellent observer and a person of sound judgment.

Special Qualification
1. knowledge of the language
2. area background regarding events
3. knowledge about the customs and habits
4. physical appearance

Preparation of Undercover Assignments


a. Study of the subject
1. Name 6. Character and temperament
2. Address 7. Drug
3. Description 8. Hobbies
4. Family and relatives 9. Education
5. Associates 10. Occupation and specialty
b. Knowledge of the Area
1. Maps
2. National and Religious Background
3. Transportation
4. Public utilities

Need-to-know from Subversive Organizations are:


1. History and background of organization. Biography of the official
2. Identity and background of members and former members.
3. Method of identification employed by members.
4. Files and records- nature , location, accessibility
5. Meeting- schedule and meeting place.

 Cover - It is a means by which an individual group or organization conceal the true nature
of its acts and or existence from the observer.

Page 43
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
 Code Name – It is the alias or symbolic designations used by intelligence officer/
informants and even criminals for security.

 Cover Story – It refers to any scenario made to cover up the operation. It may include:
1. A biographical data through fictional, which will portray the personality of the agent, he
assumed any scenario to cover up the operation.
2. A fictitious background and history for the new character of the investigation should be
prepared, including the names, address and descriptions of the assumed places of
education, employment, associates, neighborhoods, trades and travels.
3. The investigator’s background story should seldom, or ever, be wholly fictitious.
4. It is usually advisable for the investigator to maintain his reputation that he is from a
city wherein he has lived and which he is acquainted of. He can avoid the hometown of the
subjects by not selecting it as the origin of the investigation.

 Cover support- an agent assigned in target areas with the primary mission of supporting
the cover story.

 Physical Details - Personal possessions should be obtained for the undercover


investigator, which is appropriate to the character assumed in quality, price, age, fit, degree
of cleanliness; laundry marks, and manufacturer’s design. Personal possessions may
include: clothes, a pocket book, a watch, a ring, a suitcase, stubs of tickets form
amusement places, and letters, certificates, and amount of money. The undercover
investigator must not possess any article which wills suggest his true identity. Badges and
credential must never be found on his person and firearm may only be carried when
compatible with the investigator’s background story.

Hazard to Cover:
1. Passive opposition- refers to people who are not directly involved in security and CI
activities.
2. Friendly or not hostile opposition- refers to friendly organizations that may hinder the
operations.
3. Unfriendly or hostile active opposition- refers to the enemy intelligence operations that
may
compromise the undercover.

Precautions or Guidelines in Case of Compromise


1. Move out immediately.
2. Start new facilities for operation and develop it.
3. Build entirely new cover.
4. Use circuitous routes and provide counter surveillance measures.
5. Be specifically careful of former contacts with non intelligence personnel.
6. Be patient, build slowly and carefully.

Golden Rules of an undercover agent:


1. Don’t drink while working as under cover. Liquor is a great tongue loosener. But, it is
well to get the subject.
2. Don’t court women. Usually the less contact the agent has with women, the greater is
the chance of success. The investigator cannot afford to incur the enmity or jealousy of a
subject who might think that the investigator is “making time” with his girl friend.
3. Don’t take woman on an undercover assignment. The subject may become
interested in the woman. If this happens, the subject attention is diverted from those
things in which the investigator’s interests lie. The woman maybe placed in an embarrassing
or impossible situation form which extrication may disclose the identity of the undercover
investigator.
4. Don’t claim to be a “big shot”. It is too easy to identify a big shot. It will cause more
inquiries to be made in the place. It is better to assume a character of average status or
less.
5. Don’t fail to provide persons in the place who can vouch for the investigator

Page 44
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
6. Don’t spend too much money. Expenditure maybe in keeping with the part, if not,
suspicion is aroused. Many agents have given themselves away by spending more money
than the amount justified.

Conduct of undercover work agent and assignment:


1. Demeanor - The undercover man must in every respect live the part which he plays. His
appearance, language, attitude, opinions, interests and recreations must support the
assumed role. He should speak little, but let his actions carry conviction. Bragging or
showing up too much knowledge may invite unwanted attention.
2. Approach – This is the making of contracts with the subject or subjects, who normally
makes the first talk with the investigator. In this instance, the undercover man should create
a situation which makes the subject or subjects interested in approaching him thinking he is
what the purpose to be. Many a subject has become interested in a undercover man who
lived in the same rooming house.
3. Entrapment - It is against public policy for an officer of the law to incite or participate in
the commission of the crime. The investigator may agree w/ the plan but should never take
part or make any suggestions or plan, or render any real assistance with regards to the
perpetration of the crime.
4. Women Associates - Of criminals are frequently emotional and jealous. It is best therefore
to treat them with exceptional consideration. It may be necessary to avoid their association.
One of the criminals or woman may become inquisitive.

Means of communications:
Communication may be done through technical and non- technical.
1. Technical Communications:
a. Telephone- Communication between headquarters and the undercover investigator must
be accomplished by secret method. In calling headquarters by telephone it is best to use a
dial tone in a public booth not connected with the local switch board operator. To lessen
the possibility of wire tapping, the investigator should use a different telephone for each
call.
b. Secret Writings
c. Radio
d. Cell Phone (SMS)

2. Non-technical
Forms of non- technical communications:
1. Personal meetings:
a. Car pick-up
b. Hotel meeting
c. Safe house meeting
d. Restaurant meeting
2. Brief encounter – personal meeting between agent handler and the agent not more than
60 seconds in order to pass an urgent message.
3. Written report- The written report may be addressed to a fictitious girl –friend at a pre-
arranged general delivery address which is under the control of officials from headquarters.
It is best not to put the undercover investigator’s return address in the envelope as the
post office department might return it to the investigator’s dwelling for insufficient postage
or other reasons, in which case, it might fall into improper hands. Since criminals, usually
have few correspondence, the investigators should not become conspicuous by the posting
of numerous letters. To preclude the possibility of the report falling into improper hands
before mailing, they may be written in the post office.
4. Brush pass- passing of an object between two persons going in opposite directions.
5. MBU meeting- is the use visual signals, verbal signals and danger signals.
6. Cut- outs- a person or devices interpose between two persons or groups in order to
provide communication.

---------------------------------------------------------------------------------------------------------------------

Page 45
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
II. CLANDESTINE OPERATION

It is a secret action undertaken by an intelligence /counter intelligence organization in


behalf of the government or other friendly forces.

A. ELEMENTS OF CLANDESTINE OPERATION


1. Sponsor- refers to the organization or government that authorizes, approves, directs,
controls and supports clandestine operational activities. It maybe represented by the
following:
a. Project officer
b. Case officer
c. Agent handler
2. Target or Rabbit- is a person, place, things or activity against which the clandestine
organization or operational activity is directed.
3. Agent- is a person who is aware that he/she is engaged in counter operational activity and
willingly accepts control and direction.

B. CLASSIFICATION OF CLANDESTINE AGENTS:


1. Principal Agent or Agent Handler -a managerial agent, in most cases the leader of the
agent network.
2. Action Agent -doer of the clandestine task & further classified according to the task that
he is assigned.
3. Espionage (Counter Intel/Intel agent)- is the primary and most important human
collector agent.
4. Propagandist- an agent that undertakes action to mold the attitudes, opinions and actions
of an individual, group, organization or nation.
5. Saboteur- is an agent who undertakes positive action against unfriendly power/ forces
resulting in the loss temporarily or permanently of an article, material or facilities which are
being used.
6. Guerilla- is a member of a paramilitary group organized to harass the enemy.
7. Strong man/arm- is an agent readily available to provide special protection during
dangerous phases of the clandestine operation.
8. Provocateur- an agent who induces an opponent to act on his own detriment by
discrediting himself or revealing his true purpose or identity.
9. Cover action agent- is a fully recruited agent who is in a senior position usually within the
government and is enable to exert influence from foreign government upon the direction of
the sponsor.
10.Support Agent- an agent who engages in activities which support the clandestine
operation. This agent performs all types of auxiliary services at the direction of the case or
project officer.

C. CATEGORIES OF SUPPORT AGENTS


1. Surveillant- is a support agent who observes persons and paces of operational interests.
2. Investigator- an agent who provides information about persons or things of operational
interests.
3. Procurer of Funds- an agent who obtains special currency when needed for operational
use.
4. Procurer of supplies- an agent who supplies or procures ordinary as well as critical
operational materials.
5. Safe house keeper- an agent that manages and maintains the safe house for operational
use, such as for briefings, meetings, debriefings and safe haven and training.
6. Manager of Storage area- an agent who arranges the storage, distribution or
transportation of operational supplies.
7. Communication agent (Commo. Agent) - an agent who facilitates communications.

Page 46
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE

COVERAGE OF LESSON 6
 INTRODUCTION TO SECURITY
A. VIP SECURITY
B. DOCUMENT SECURITY
C. SECURITY OF CLASSIFIED MATTER
D. INTRODUCTION TO NATIONAL SECURITY
--------------------------------------------------------------------------------------------------

III. INTRODUCTION TO SECURITY

 Security – is the protection of all classified information, material and equipment from
disclosure to unauthorized person
 VIP (Very Important Person) Security – protection accorded to VIP to protect his
image from harm, death, annoyance and embarrassment.
 Assassination – murder of state leaders or persons occupying high position.

A. VIP SECURITY

Personalities Considered as VIPs and Objectives of Adversary


1.
2. Head of States or national leaders 6. Great Scientist
3. Persons of high political position 7. Official guests/visitors of the State
4. Persons occupying sensitive position 8. Various publics figure temporarily
5. Military commanders attracting public attention.

Motives for Adversaries


1. Personal – for ones own satisfaction or gain
2. Political – for group aggrandizement

Classification of Personalities to Determine the Degree of Security Provided


1. Importance of VIP
2. Degree threatening the VIP
3. Degree of vulnerability of VIP

Classes of Adversaries
1. Lunatics - neurotic persons
2. Public seekers

Methods of Action Used by the Adversaries


1. Physical Assault
2. Threats - to frighten the VIP
3. Blackmail
4. Insult and Humiliation
5. Kidnapping
a. hold the hostage to obtain concession from the government
b. obtain information from kidnapped person ( victim)
c. prevent the kidnapped person (victim) to conduct certain activity
d. ransom

Weapons Used by Adversaries:


-Classified according to its range and capabilities)
1. Instruments which are no real weapons
2. Cold weapons - bladed weapons
3. Weapons with short range (20 m)-pistol/revolver
4. Explosives
5. Poisons and radioactive materials

Page 47
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
6. Weapons with long range - rifle

Different Ways of Activating Explosives:


-When using explosives)
1. Through the assailant himself 3. Trough conscious helpers
2. Through an unconscious courier 4. Through technologies (gadgets)

 VIP SYSTEM OF PROTECTION


Methods and Means for Protection of VIP's
 Physical Protection - includes protection from bodily harm, accidents insults or humiliation
through overt and secret protection or combined
 Secrecy
 Deception
 Control of people getting in contact with VIP
 Neutralization of suspect
 Saturation of the area by friendly forces

a. Protection of Installation Used Permanently by the VIP


1. Security considered type of attack in the installation
2. Security against access in the building
3. Security against direct attack and snipping
5. Prevention of sabotage and trapping in an installation
6. Gifts must be cleared in a control point
7. Camouflage of objects

b. Physical Implements
1. Fence
2. Protective Illumination
3. Alarm System

c. Animal
d. Human (Guards - uniformed & non-uniformed)
e. Planning of Protection - considers the following:
1. Approach route
2. Entrance - limit number of entrance and exits
3. Internal passage
4. Patrols

Protection of VIP in Public Hall


1. Entrance of enemy agents, together with the rest of the public
2. Mining of the public before hand
3. Organizing a panic

Means of Protection
1. Preliminary inspection of the hall 3. Control of the exit
2. Physical guarding of the hall 4. Deception

Protection of VIP during an Open Space


1. Preliminary control of the ground before coming of the VIP in the place of
engagement
2. Guarding of the grounds and its approaches
3. Control of its exits and the passages from the platform to the exits
4. Secrecy of the approaches of the platform
5. The place of the meeting should be chosen so as to be easily protected
6. The public should not be allowed to approach the platform more than 15 meters

Protection while in Movement


A. Protection of VIP while riding in a car
1. Protection starts with the choice of adequate car

Page 48
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. The attending cars should pass all the qualities of VIP's car
3. Generally speaking, the car should run at the maximum speed
4. A priority alternative road should be decided
B. Protection of Route
1. guards
2. patrols

C. Protection of vehicles
D. Protection of VIP
E. Information and development of unit and the guards during a ride on different roads.

Cardinal Rules on VIP Security


1. Remove the VIP from the area in case of an attempt
2. Get the weapon of the would be assassin
3. Neutralize the enemy

Public Hall, Auditorium, Theaters and Church Services


Contact the Manager to:
1. Procure information on the time of the function, type of program, tickets, publicity
restriction, and availability of telephone facilities and restrooms.
2. Select seat or box for official party and sit in the audience for protective personnel.
3. Determine whether firearms or other weapons are to be used in the performance.
4. Obtain a diagram of the building with the layout of dignitary's seat or box, and the seating
arrangements for members of the protective detail and those assigned to security posts.
5. Select entrance and exit routes for the official party and provide for cars outside the
building.
6. Secure a list of employees and members of the cast. All must be vouched for by the
responsible officials.
7. Obtain a list of purchasers of seats close to VIP.
8. Conduct a joint security survey. This includes;
a. A complete inspection of the building, basement, main floor, boxes, balconies or upper
floor, rest rooms dressing rooms, stage, orchestra pit, roof, alleys, wings, and adjacent
buildings.
b. An examination of fire prevention facilities, extinguishers, fire stations, fire escapes,
stage equipment and curtain.
c. An inspection of the lighting system and the electrical switchboard.
9. Incorporate required security measures into the overall plans. This includes document
security and national security.

B. DOCUMENT SECURITY

Definition of Terms]Objectives of Document Security


Document Security (PNPR G 200-013) prescribes the policies and establishes the
standard basic procedures governing the classification and security of official matters in the
interest of national security.

Responsibilities for Protection


1. Security is a command responsibility. It is the duty of all commanders to assure themselves
of the integrity and loyalty of all personnel belonging to their units. Effective security is
dependent on the character and loyalty of the personnel having access to classified matters.
2. The security of classified matters should be the primary concern of everyone in the
government service. It should be emphasized that it is the duty of all personnel to be
discreet in the use and handling of any information obtained in an official capacity.

General Principles
1. The authority and responsibility for the classification of classified matters rest exclusively
with the originating office.

Page 49
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. Classified matters should be classified according to content and not the classification of the
file in which they are held or of another document to which they refer except radiogram or
telegram referring to previously classified radiogram or telegram.
3. Classification should be made as soon as possible by placing the appropriate marks on the
matter to be classified.
4. Each individual whose duty allows access to classified matter is responsible for the
protection of the classified matter while it is in his possession and shall insure that the
dissemination of such classified matter is on the Need-to-Know basis and to properly cleared
persons only.

C. SECURITY OF CLASSIFIED MATTER

Official matter, w/c requires a protection in the interest of national security, is categories
into four:
1. Top Secret 3. Confidential
2. Secret 4. Restricted

Categories of Classified Matter


1. Top Secret – information and materials the unauthorized disclosure of which would cause
exceptionally grave damage to the nation, politically, economically or militarily.

Examples:
a. Very important documents dealing with such negotiations for major alliance;
b. Major governmental projects such as proposal to adjust the nation’s economy;
c. Military defense plan;
d. Strategic plan documenting the overall conduct of war;
e. Intelligence documents which reveal major intelligence production effort of the
Philippines, which would permit an evaluation by recipients of success and capabilities of
the Philippine Intelligence Agencies.

Authority to Classify Top Secret


1. Head of office; maybe delegated to authorized officers; action officers
2. Secretary of National Defense
3. Chief of Staff ,AFP/Chief of PNP
4. Major Service Commanders
5. Area and Unified Commanders of PA, PAF, and PN.
Original classification authority for assignment of Top Secret classification rests exclusively
with the Head of the Department. However, this can be delegated to authorize officers when
necessity arises.

Reproduction of Top Secret Matter


It is prohibited unless expressly authorized.
1. Top Secret matter may be copied, extracted or reproduced only when classifying
authority has authorized such action.
2. When so authorized, the reproduction of Top Secret matter shall be carried out under the
supervision of an authorized officer.

Inventory of Top Secret Matter


The inventory to Top Secret matter shall be every 01 January and 01 June every year or
semi-annually.

Transmission of Top Secret Matter


1. Top Secret matter shall be transmitted in the following;
a. by direct contact of officer concern;
b. by official courier;
c. through the Department of Foreign Affairs Diplomatic pouch.
- Top Secret matter shall not be transmitted by mail, express or electrical means unless in
cryptographic form, must be double envelope; receipt is mandatory

Page 50
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Storage of Top Secret Matter
Storage shall be in safe, steel file cabinet or other steel container equipped with built-in
three position, dial type combination lock of such weight, size and construction to minimized the
possibility of physical theft or damage by fire.

Destruction of Top Secret Matter


1. Destruction shall be accomplished by Burning by custodian with the presence of the witness
cleared for Top Secret.
2. A certification of destruction shall be prepared and forwarded to the originating office.

2. Secret – information or material, the unauthorized disclosure of which would endanger


national security, cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be of great advantage to a foreign nation.

Examples:
a. Jeopardize international relations of the Philippines;
b. Compromise defense plans, scientific or technological development important to the national
defense;
c. Reveal important intelligence operations;
d. War plans or complete plans for future operations of war not included under Top Secret;
e. Documents showing disposition of our forces;
f. Intelligence plans and estimates; and
g. Order of battle information.

Authority to Classify Secret Matter


1. Persons authorized to classify Secret matter are enumerated under Top Secret
2. Commanders of Infantry Divisions
3. Special and Personal Staff
4. General and Special Staff of Major Services Areas and Unified Commanders
5. Superintendent, PMA/PNPA
6. Commanders of Posts, Depots, Stations or Separate Units
7. Chief of Military Mission or Group
8. Commandants of Service School

Reproduction of Secret Matter


It is prohibited unless expressly authorized.
3. Top Secret matter may be copied, extracted or reproduced only when classifying
authority has authorized such action.
4. When so authorized, the reproduction of Top Secret matter shall be carried out under the
supervision of an authorized officer.

Storage of Secret Matter


Storage shall be in safe, steel file cabinet or other steel container equipped with built-in
three position, dial type combination lock of such weight, size and construction to minimized the
possibility of physical theft or damage by fire.

Transmission of Secret Matter


1. Direct contact of officers concerned;
2. By official couriers;
3. Electrical means in cryptographic
form;

Page 51
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Destruction of Secret Matter
Same as TOP SECRET matter, except that there is no need to prepare Certification of
Destruction instead a record of destruction is prepared and the witnessing officer need have
Secret clearance only.

3. Confidential – information and material, the unauthorized disclosure of which would be


prejudicial to the interest or prestige of the nation or government activity or would cause
administrative embarrassment or unwarranted injury to an individual or would be an advantage
to a foreign nation.

Examples:
1. Plans of government projects such as roads, building, or development of area;
2. Routine service reports such as operations and exercise of foreign powers;
3. Routine intelligence report ;
4. Certain personal records and staff matters;
5. Compilation of data which individually maybe classified restricted, but which its aggregation
enhance their security value; and
6. Matters, investigations and documents of personnel and that, which is disciplinary in nature,
the knowledge of which is desirable to safeguard for administrative reasons.

Authority to Classify Confidential Matter


Persons authorized to assign Confidential classification in the performance of his duties –
Any commissioned officers in the active service.

Reproduction of Confidential Matter


The copying, extracting from or reproduction of Confidential matter is authorized unless
the originator or higher authority has specifically denied such authority.

Transmission of Confidential Matter


Same as SECRET, single envelope; receipt (when required)

Destruction of Confidential Matter


Same as SECRET, only there is no need to prepare record of destruction and without
any witnessing officer.

4. Restricted – information and material that requires special protection other than that
determined to be Confidential, Secret, and Top Secret.

Examples:
1. Departmental books of instruction and training and technical documents intended for official
use only or not intended for public release;
2. Routine information relating to the supply and procurement of military stores; and
3. Minor modifications of data or items, which individually maybe classified unclassified in
which the aggregate warrants higher classification.

D. INTRODUCTION TO NATIONAL SECURITY

Definition of national security:

Page 52
College of Criminal Justice Education
Organized Crime with Simulation in Interview and Interrogation
 In furtherance of our national principles and policies, the leader of our nation are then
able to formulate our strategy. Generally, most all will define national strategy as the art
and science of developing and using political, economic, and psychological power of a
nation, together with its armed forces, during peace and war, to secure national
objectives. It is the long-range plan through which a nation applies its strength towards
the attainment of its objectives.
 defined as the protection of nation’s people and territories from physical assault
 national security was properly equated with national defense, and the threats to a
nation’s security were perceived to emanate solely from outside the country.
 refers to that state or condition wherein the people’s way of life and institutions, their
territorial integrity and sovereignty, as well as their welfare and well-being, are
protected or advanced.

Definition of national interest:


Each nation, regardless of creed or form, has their national interests, people would willingly
go to war to succeed or perish.
 the general and continuing end for which a nation acts
 used to refer to the general concept of national security and well-being
 National are what the decision-making body in the government determines which
beliefs, matters or dictates of conscience are important to the maintenance of the
nation. To secure or support national interests, certain objectives maybe set by a nation.
 National interests include self-preservation, freedom and independence, territorial
integrity, political stability and socio-economic welfare. This is enshrined in the preamble
of our constitution.

National Principles and Policies


From the national interests, national principles and policies are derived. These are:
1. That our country shall be a Republican State.
2. That the defense of the state shall be the concern of all citizens.
3. That we, as the people, renounce war to further our national interest.
4. That our government shall promote social justice.
5. That as a matter of concept, civilian authority is supreme at all times over the military. This
concept is actualized when the President assumes at the same time the position of the
Commander-in-Chief of the AFP.

 National Power- The elements of national powers are numerical strength and character of
population, cultural development, character of government, geographical location,
resources, economic development and military potential. The degree to which a nation is
strong or deficient in these elements is normally a measure of its national power.

Components of National Powers


1. Political Strength – stems from the character of the people and from the type and
stability of the government and the soundness of its foreign policy.
2. Economic Strength – stems from a combination of factor such as geographic location,
climatic conditions, supply of natural resources, industrial capacity, internal and external
communication systems, international trades, and the size, health and technical competence
of the population.
3. Cultural Strength – stems from the national unity, the social and moral fiber of the
people and the things they believe in, and from the nature and vigor of national institutions-
political, social, religious, educational, scientific and cultural.
4. Military Strength – is the ability of a nation to exert pressure by armed forces in
furtherance of national security. It consists of all the armed forces in combination with other
elements of national power depending heavily on natural resources, economic strength, a broad
base of war industries and a vigorous population, military, economic and political alliances.

---------------------------------------------------------------------------------------------------------------------

Page 53
College of Criminal Justice Education
Organized Crime with Simulation in Interview and Interrogation
Page 54
College of Criminal Justice Education
Organized Crime with Simulation in Interview and Interrogation

You might also like