Cdi 1-Full Notes
Cdi 1-Full Notes
Cdi 1-Full Notes
COVERAGE OF LESSON 1
INTRODUCTION TO CRIMINAL INVESTIGATION
HISTORICAL BACKGROUND OF INVESTIGATION
RELEVANT LAWS/ PROVISIONS APPLICABLE IN CRIMINAL INVESTIGATION
CRIMINAL INVESTIGATION PROPER
--------------------------------------------------------------------------------------------------
Criminal Investigation came from the Latin term Investigat, which means “to inquire or
to discover” during the 5th century (Microsoft® Encarta® 2008 © 1993-2007 Microsoft
Corporation).
Page 1 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
4. To arrest suspects ;
5. To recover stolen properties;
6. To present the best possible case to the prosecutor.
F. ROLES OF AN INVESTIGATOR
1. Determine whether a crime has been committed
2. Identify the victim/s and the offender
3. Locate and apprehend the accused
4. Present evidence of guilt for the suspect/s
5. Assist in case follow-up
Page 2 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
9. Working Knowledge- of Criminal Law, Evidence, Criminal Procedure, and Penal Special
Laws.
10.The power to “read between the lines.”- This is the ability of the investigator to
interpret the words or phrases encountered in the process of investigation in their deeper
meaning in order to arrive with concrete meaning of a certain statement.
11.Working knowledge of martial arts and firearms proficiency- The investigator will
find himself in many occasions that he will be alone in confronting, arresting, bringing to
headquarters and interrogating the suspect.
This is related to critical thinking. This method of reasoning challenges one to adopt
an attitude of fair mindedness, intellectual caution and an openness to questions common or
assumed beliefs. Critical thinkers will find supportable reasons to accept or reject an assumption
and are never hesitant to seek an explanation of the “why” of an event.
Definition of terms:
Fact- is a statement or observation that can be verified by other verifiable points of
information, whereas an OPINION is merely one’s impression or personal belief. Factual data
will generally guide the course and direction of the case, whereas opinions serve only as
secondary, less valuable functions.
Cause-and-effect-thinking often serves as a directional purpose during the investigative
process, as one or more facts generate further related factual insights.
Faulty reasoning often centers on generalization, stereotyping, oversimplifying, or
incorrect assumptions
Deductive reasoning-forms a general conclusion prior to having a complete explanation
based on facts. With the deductive conclusion in mind, the investigator considers the
emerging evidence, contrasting it with the conclusion to determine its validity.
An inductive reasoning - is base on the results of further investigation and evidence
gathering.
3. Intuition
This is the immediate apprehension or cognition – quick and ready insight without the
conscious use of reasoning. It has been pointed out that many police investigators have a “sixth
sense” resulting in hunches that those outside the profession rarely perceive. This is often the
result of experience and training.
4. Observational ability
The act of observing is a noting and recording of facts. Under most circumstances, the
investigator will use the sense of seeing and hearing, the former being the more significant.
Page 3 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
5. Organizational ability
Like the successful business executive, the police investigator is continually processing
various types of information. Written information, verbal information, current case assignments,
and follow-ups of past investigation all require an ability to organize. The investigating officer is
receiving and processing formal reports from a multitude of sources. This demands an orderly
method of information retention that will result in the availability of records and facts when
needed.
6. Legal knowledge
Today’s investigator must possess a solid grounding in criminal and to a lesser degree,
in civil law. The office must be able to distinguish between a criminal violation and a civil
violation in order to determine appropriate action.
8. Persistence
It is the ability of continuing the case in the face of opposition, or refusing to give up
when faced with an adverse situation. To persist until all available facts of an investigation are
known and until satisfied that further effort will be unproductive is the working definition of
persistence for the investigator.
K. FORMS OF INVESTIGATION
Six Major Types:
1. Formal Investigation
Refers to official inquiry conducted by a government agency in an effort to uncover facts
and determine the truth.
It is usually considered as some form of inquiry concerning of criminal activity.
2. Inquest
It is an effort to search the basic cause of an incident such as the commission of a crime.
3. Inquisition
A historical description than a current usage to describe any penetrating investigation
concerning a religious issue.
4. Probe
Similar to formal investigation, is an extensive, searching inquiry conducted by a
government agency.
5. Research
It is the most employed type of investigation refers to the careful, patient investigations
done by scientist or scholars in their efforts to identify original sources of data or causes
of problem.
6. Investigative Reporting
Relatively speaking, is a recent type of investigation pursued by the members of the press
on their own initiative. It is design to satisfy two purposes.
To attract readers/viewers
To get to the roots of the problem
Page 4 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Three categories of reactive investigation
a. walk-through-The suspect could be easily determined and located. The detective
must only observe the legal guidelines to reach a solution.
b. where-are-they-The appropriate type of investigation to use in cases to which the
suspect is identified tentatively but has not been located. The case may have simple
solution or it involves complex mystery.
c. whodunit-It refers to cases in which no suspects are initially identified. The majority
of
crimes reported to the police under this category are rarely solved.
--------------------------------------------------------------------------------------------------
5th CENTURY B.C., ROME: Rome created the first specialized investigative unit. It was
named as QUESTORS/TRACKERS/MURDERERS due to their cruel treatment to suspects in
investigating crimes.
6th CENTURY B.C. ATHENS: Unpaid magistrates (judges), were appointed by the
citizens to make decisions for the cases presented to them.
9th CENTURY. ENGLAND: King Alfred the Great established a system of “mutual pledge”
(social Control), which organized for the security of the country into several levels;
AT ABOUT THE TIME OF CHRIST, ROME: The Roman Emperor Augustus picked out
special, highly qualified members of the military to form the Praetorian Guard, the
Praefectus Urbi and the Vigiles of Rome.
1720’s, ENGLAND: JONATHAN WILD – He was a buckle maker and a brothel operator;
a master criminal who became the London’s most effective criminal investigator.
1750s, ENGLAND: HENRY FIELDING – An English man who wrote a novel entitled
“TOM JONES” and was appointed as magistrate (sheriff) for the areas of Westminster and
Page 5 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Middle Age, London. He was the creator of the Bow Street Runners.
1753, ENGLAND: JOHN FIELDING – The younger brother of Henry Fielding who took
over the control of Bow Street Court in 1753. DESPITE OF HIS CLOSED VISION (BLIND),
HE GUIDED THE RUNNERS, THEY BECAME QUITE EFFECTIVE.
EARLY 18TH CENTURY, ENGLAND: The first body of public-order officers to be named
police in England was the Marine Police, a force established in 1798 to protect merchandise
in the port of London.
1829, LONDON: ROBERT PEEL – The founder and chief organizer of London
Metropolitan Police. He introduced the techniques in detecting crimes such as detectives
concealing themselves, and secretly photographing and recording conversations.
1833, ENGLAND: London Metropolitan Police employed the first undercover officer.
1835, TEXAS RANGERS was organized as the first law enforcement agency with
statewide investigative authority. This is the forerunner of the Federal Bureau of
Investigation (FBI).
1852, U.S.A: CHARLES DICKENS is a great novelist in which through his story entitled
bleak house, he introduced the term detective to the English language (Adams & Taylor,
1995).
1852, U.S.A: ALLAN PINKERTON was the America’s foremost private detective. This
individual truly deserves the title of “America’s Founder of Criminal Investigation.” Among
methods pioneered were “shadowing,” the art of suspects surveillance, “roping,” working in
undercover capacity, they have the motto, “We never sleep.”
1856, U.S.A: KATE WAYNE: The first woman detective in the history of criminal
investigation. She was hired by the Pinkerton Agency and contributed to the resolutions of
big cases of the United States of America.
1866, LIBERTY, MISSOURI, USA: THE JESSIE JAMES GANG made the first hold-up
which marks the beginning of the gang’s 15 year hold-up and robbery spree (12 bank hold-
ups and 12 train stage coach robberies in 11 states). Clay County Savings Association was
their first victim and their take was $60,000.00.
Page 6 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1877, ENGLAND: HOWARD VINCENT – He headed the newly organized Criminal
Investigation Department in Scotland Yard.
1882, FRANCE: ALPHONSE BERTILLON – A French Police Clerk who introduced and
established the first systematic identification system based on the Anthropological
Signalment (Anthropometry). He is considered as the founder of Criminal Investigation.
1887, DR. ARTHUR CONAN DOYLE – He popularized the scientific Criminal Investigation
by creating the fictional detective Sherlock Holmes and his friend Watson.
1892, ENGLAND: FRANCIS GALTON – An English man who published his study on
classifying fingerprints and recognized the uniqueness of the fingerprints to be used as
evidence against a suspect
1909-1924 JOHN EDGAR HOOVER – He became the head of the Federal Bureau of
Investigation, which was established by the attorney general from 1909 to 1924.
1918, ENGLAND, a new concept was introduced in the field of Criminal Investigation. This
is known as “Team Policing.”
1954, USA: DR. PAUL KIRK – The best known Criminalist who headed the Department
of Criminalistics at the University of California, USA.
ACT No. 175 = The law that establishes the Insular Police Force which was entitled “An
Act Providing For The Organization And Government of an Insular Constabulary.” It is the
organic act creating the Philippine Constabulary (PC). Approved July 18, 1901.
ACT No. 225 = This is the law which established the Philippine Constabulary. Approved
October 3, 1901.
REVISED ADMINISTRATIVE CODE OF 1917, SECTION 825 = The Law stated that
the Philippine Constabulary is a national Police Institution for preserving the peace, keeping
the order and enforcing the law.
RA No. 4864 = The law otherwise known as the Police Act of 1966, It created the Office
of the Police Commission (now National Police Commission). It was under the Office of the
President and was created as the supervisory agency to oversee the training and
professionalization of the local Police forces.
Proclamation No. 1081 = was the date of declaration of Martial Law in the country by
the former president of the Philippines Ferdinand E. Marcos on September 21, 1972.
Consequently, military officers from the Philippine Constabulary (PC) were designated as
Officers-in-Charge of the respective police department of the different cities and
municipalities and took control of the supervision, administration and operation thereof.
Those were the days where a young first lieutenant of the PC requires a peace officer with
a higher rank including the chief of police to salute him.
PD No. 421= This is the law that integrates the police force in greater scope in Manila
area to test its effectiveness particularly the first four cities: Manila, Quezon, Caloocan and
Page 7 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Pasay. It was Mayor Arsenio Lacson who proposed the idea that police should be
integrated.
PD No. 482 = The law that integrates the police force in the provincial level particularly
the provinces of Pampanga, Nueva Ecija, Bulacan, and Misamis Oriental. This was approved
June 13, 1974.
PD No. 765 = The law which stipulated that the office of the National Police Commission
was under the office of the Ministry of the National Defense (now Department of National
Defense). Approved August 8, 1975.
RA No. 6975 = The law otherwise known as the Department of Interior and Local
Government (DILG) Act of 1990. This is the law that created the PNP and subsequently
dissolving the PC whose officers and rank and file were given the privilege either to join the
AFP or the PNP within the period as provided therein.
RA No. 8551 = This law is known as The PNP Reform and Reorganization Act of 1998
which is at present is the operational law that governs over the PNP. This was approved
February 25, 1998.
1987 PHIL CONSTITUTION, Art 3, Sec. 12(1) = “Any person under investigation for
the commission of an offense shall have the right to be informed of his right to remain
silent and to have a competent and independent counsel preferably of his choice. If the
person cannot afford the services of a counsel, he must be provided with one. These rights
cannot be waived EXCEPT in writing, signed and in the presence of a counsel.”
1987 PHIL CONSTITUTION, Art 16, Sec 6 = “The state established and maintained
one police force, which shall be National in Scope and Civilian in Character, to be
administered and controlled by the National Police Commission. The authority of the local
executives over the police shall be provided by law.”
RA No. 7438 = An act defining certain rights of person arrested, detained or under
custodial investigation as well as the duties of the arresting, detaining, and investigation
officers and providing penalties for violation thereof.
--------------------------------------------------------------------------------------------------
II. CRIMINAL INVESTIGATION PROPER
Page 8 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
gather information concerning a certain person, thing, or organization related to
criminal activities or criminals.
--------------------------------------------------------------------------------------------------
D. THE GOLDEN RULE IN CRIMINAL INVESTIGATION
The golden rule states “Do not touch, alter, move, or transfer any object at the
crime scene unless it is properly marked, measured, sketched and/or
photographed.”
The purpose of this rule is to avoid the mutilation, alteration and contamination (MAC) of
the physical evidences found at the crime scene.
Doyle, A.C (2016). A study in scarlet. Retrieved on August 19, 2021, from
https://www.gutenberg.org/files/244/244-h/244-h.htm
Page 9 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE
COVERAGE OF LESSON 2
D. GOLDEN RULE IN CRIMINAL INVESTIGATION
THE THREE (3) I’s OF INVESTIGATION
ARREST, SEARCH AND SEIZURE
THE CRIME SCENE: METHODS OF SEARCH AND SKETCH
INFORMATION AND PHYSICAL EVIDENCE
HOW PHYSICAL EVIDENCES ARE COLLECTED, MARKED, TAGGED AND PRESERVED?
INTRODUCTION TO CRIMINALISTICS
--------------------------------------------------------------------------------------------------
2. INTERVIEW AND INTERROGATION - Interview and interrogation are similar with each
other, in the sense that, they are both ways of obtaining information from a certain suspect
or person that has knowledge on a crime.
a. Interview
Interview is the simple questioning of a person believed to possess information, which
are relevant to the investigation of a crime or on criminal activities.
b. Interrogation
Interrogation is the vigorous and confrontational questioning of a reluctant suspect
about his participation in a crime. This process is also applied to an uncooperative or
recalcitrant witness. The purpose of Interrogation is to obtain confession or admission from
the suspect and to learn relevant information from uncooperative witnesses.
--------------------------------------------------------------------------------------------------
Page 10 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
B. RELATED TERMS:
Warrant of Arrest is an order in writing issued in the name of the People of the
Philippines, signed by a judge directed to a peace officer, commanding him to arrest the
person designated and take him into custody of the law in order that he may be bound to
answer for the commission of an offense.
Alias Warrant refers to the warrant of arrest issued by a judge to the peace officer after
returning the original warrant of arrest after the lapse of the 10-day validity period.
Search Warrant is another order in writing issued in the name of the People of the
Philippines, signed by the judge and directed to a peace officer commanding him to search
for personal property and bring it before the court.
John Doe Warrant (Richard Doe/ Jane Doe) is a warrant containing no specific name
of person to be arrested but only descriptions based from the testimonies of the victim/s or
the witnesses/es. It contains the physical description of the accused as well as other factors
to be considered for the identification of the accused (Sadili & Pena, 1998).
Arrest is the actual taking of a person or persons into custody by an authority in order that
he/they may be bound to answer for the commission of an offense.
Search is the act of examining documents, papers and effects.
Complaint is a sworn written statement charging a person or a group of persons of an
offense that is subscribed by the offended party such as the victim/s of the offense
committed, or any other peace officer charged with the enforcement of the law violated.
Information is an accusation in writing charging a person or a group of persons of an
offense that is subscribed by the prosecutor or fiscal. It is substantiated on oath and
includes the name of the party, the offense committed, facts of the offense and other
factors relevant (Curton,1989) .
Page 11 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Some of the suggested procedure for a team of responders are the following:
1. The Means of Reporting - Refers to the method of reporting the crime whether it
reached the station through phone call, personal appearance or others means.
2. The Time of Report - The exact time of the report to include minute must be recorded.
3. The Receiver of Report - The identity of the one who received the report in the station
must be properly noted.
4. The Time of Dispatch - The time when the Desk Officer dispatches the investigator/s is
also recorded, together with the names of the investigator, with the means of
transportation, either by mobile car, taxi or other means.
5. The Time of Arrival -The time of arrival of the investigating team at the crime scene
should be noted. The situation in the area should also be noted whether it is windy, rainy,
sunny or any other description of the climate in the immediate area.
Page 12 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
6. Evidence Custodian – The one in charge in the collection, preservation, tagging of the
articles of evidence found at the crime scene.
7. Measurer – Makes all relevant measurements of the scene such as: the distance of the
body of the victim to the firearm used; in motor vehicle collision, the distances of the two
vehicles to the points of references.
---------------------------------------------------------------------------------------------------------------------
C. CLASSES OF EVIDENCE
1. Testimonial Evidence – most common form of evidence obtained by interview and
interrogation of which witnesses smell, hear, taste and touch are being describe through
oral and written testimony.
2. Documentary Evidence – are writings, including official records, or contents “could speak
for themselves” when read by the investigation and the court. They may be collected
through voluntary relinquishment or by a Subpoena Duces Tecum (court order) which
compels the party to bring the records to the court.
3. Physical/ Real/ Object Evidence – are physical objects used as evidence w/c are
obtained through searches at the scene of the crime. Articles and material found in
connection with investigation, which aid in establishing the identity of the perpetrator.
KINDS OF EVIDENCE:
Considering the kinds of evidence written in the Rules of Criminal Evidence, the
following are included:
1.
Page 13 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1. Direct evidence 12. Corroborative evidence
2. Circumstantial evidence 13. 1Cumulative evidence
3. Primary evidence 14. Prima facie evidence
4. Secondary evidence 15. Conclusive evidence
5. Positive evidence 16. Relevant evidence
6. Negative evidence 17. Material evidence
7. Competent evidence
8. Object (real) evidence
9. Documentary evidence
10. Testimonial evidence
11. Substantial evidence
Page 14 of 54
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
BURDEN OF PROOF
Presented below is a summary on who shall have the burden of proof on the different given
situations:
SITUATION WHO SHALL HAVE THE BURDEN OF PROOF?
Intent
Page 15
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
the lighting conditions, the distance of normal visibility, the volume of pedestrian and vehicle
traffic and other things and conditions relevant to his investigation.
The other reason is that during the progress of the investigation, new matters may crop up
which maybe inadvertently considered irrelevant during the crime scene investigation. Thus,
there is a need to go back.
1. COLLECTING EVIDENCE – All items that were found in the crime scene should be
collected. The collecting officer should not decide whether a certain item is relevant or
irrelevant. Small pieces of evidences also must have to be given importance, thus collecting
them is necessary.
In collecting firearm as evidence found in the crime scene, cautious action should be
employed. The firearm should be lifted using string or handkerchief in its trigger guard to avoid
destruction of possible latent prints in the firearm.
Liquid evidences such as blood, mucous, urine and other body fluid can be collected
using dropper and stored in a sealed container to maintain the same physical nature as found in
the crime scene. However, clotted blood and other hardened evidences can be collected by
Page 16
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
scraping with the use of any available instrument. Samples are very important for laboratory
testing.
6. Bullets/ Slugs/ Balls – A bullet or slug can be marked on the ogive or nose as well
as in the base. The initials of the investigators and/ or date should be marked on those
parts so that the rifling (land and grooves) found in the bullet or slug will not be
disturbed because they are very important for laboratory examination.
3. TAGGING EVIDENCE - Evidence which by their nature could not be marked on each
surface such as blood, hairs, fibers, are placed in the plastic container where that container is
then marked, we call such practice as tagging the physical evidence with the use of card
where the initials of the investigator, date and time of collection, specific case and other
information can be written.
Chain of custody is the number of persons who handled and possessed the pieces of
evidence the moment that they were collected, marked and tagged, up to the time of the final
disposition of the case.
---------------------------------------------------------------------------------------------------------------------
Page 17
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. POLICE PHOTOGRAPHY = The photograph of the crime scene and the pieces of evidence
thereat are real evidences because they are addressed to the senses of the court. Motion
pictures taken during bank heist are important in the prosecution of criminals. William
Henry Fox Talbot, Joseph Nicephore Niepce and Jacques Mande Daguerre are
considered the pioneers of photography. They were the individuals who spread the
photographic process that was patented by them.
Page 18
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
MODERN DISCOVERIES OF INSTRUMENTATION:
1. DNA (DEOXYRIBONUCLEIC ACID) = DNA Fingerprinting is considered to be the
ultimate identification test in the conduct of criminal investigation. It provides 100
percent positive identification of a suspect whose blood, semen and/or other DNA-
bearing body tissues of fluids were found at the crime scene or with the victim.The
discovery in genetics is that no two persons have the same DNA profile, except the
identical twins.
The father of DNA is Sir Alec Jeffreys who discovered this branch of genetics in
England. The DNA of an individual is formed by a combination of the DNA’s of the father
and mother. The DNA profile is like a bar code that is found in every commercial
product, printed on their package, wrapper, box, or container.
2. HAIR EXAMINATION = The roots of the hair when examined under this new
technology will determine the presence of drugs taken by the person two years prior to
the said examination.
Page 19
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE
COVERAGE OF LESSON 3
INTRODUCTION TO INTELLIGENCE
INTELLIGENCE CYCLE
--------------------------------------------------------------------------------------------------
I. INTRODUCTION TO INTELLIGENCE
A. HISTORY OF INTELLIGENCE
1. Holy Bible- is here you can find the just recorded intelligence operations in history.
a. Moses - One of the first recorded formalized intelligence efforts, with format, can be
found in the Scripture; also named the 12 intelligence agents when the Lord directed Moses to
send into the Land of Canaan and records that “all those men were heads of the children of
Israel”.
b. Rahab - “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and concealed
the agents of Israel, made a covenant with the agent sand duped their pursuers. She was not
only an impromptu confederate of immense value to the Jewish leaders of that far-distant day,
but also established a plot- pattern which is still of periodic relief to motion- picture producers.
c. Delilah - a Palestine agent who used her charm to gain information from the
powerful enemy.
Mao- Tse-Tung- applied this during the long march and by the Japanese prior to Pearl
Harbor. Sun Tzu believed that to wage war economically while defending the state against
other, it was necessary to employ a permanent espionage service spying on neighbors and
enemies. Sun Tzu introduced a rigid hierarchy of spies to include:
a. local spies
b. internal spies
c. converted spies
d. condemned spies
The captured agents should be treated with benevolence, tempted with bribes, led away
and comfortably housed. Sun Tzu realized that if such mean could be turn, they would be in
position to report on their previous master strengths and weaknesses. The condemned spies
were less fortunate; Unknown to them they were fed completely false information by Sun Tzu’s
agents, sent into enemy territory and if necessary, compromised. When they were captured and
tortured, the information that they were able to divulge was wholly incorrect, leading the
enemy to miscalculate his response. When the enemy learned of his mistake the spy was put
to death, but by then it was often too late.
3. Alexander “The Great” - Under the tutelage of Aristotle, Alexander the Great King of
Macedonia, became the first ruler to utilize intelligence as a weapon of government. He divided
Page 20
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
a simple but highly effective system of covert ciphers. He introduced a primitive form of
“Cabinet Noir” (Internal Monitoring) when he instigated postal censorship into the army and
investigated letters and malcontents. By then, he was considered as the Father of
Censorship.
4. Belle Boyd-The daughter of Shenandoah Valley. She spied for the Confederacy. She
became a confederated courier running messages and medicines through the Union lines. She
traveled far into the enemy lines and beyond occasionally bringing back intelligence of the
greatest timeliness and importance. Belle’s greatest failings were her extrovert nature and her
love of publicity. She talked incessantly about her exploits to reporters and allowed herself to
be a celebrity of the south. Eventually late in the war, Union authorities lost patience with her
and had her deported to Canada. Her biographer described her as the most famous woman
concerned w/ official secret activities in the Civil War.
5. Sir Francis Walsingham of England- He was credited with creating the first viable secret
service in England. He protected Queen Elizabeth I from countless assassins.
6. Lord Baden – Powell- Known as the founder of the Boy scout Movement and was
also an active spy. Baden- Powell exploited his powers of tracking and observation, coupled
with his considerable skills as a Thespian (theatrical), to the benefit of the British Secret
Service. Subsequently, when ordered to investigate a rumor that a large dry dock was being
constructed in Hambur, he posed as a drunk, saturating his clothes in brandy to enhance the
effect. He was swiftly arrested by the German military, but believing him to be too drunkard
incapable of finding out any secrets, they released him.
7. Mata Hari (1876-1917) -she is one of the best known spies in history, yet she was one of
the worst.
When World War I broke out, she was in Berlin, where she had befriended the Chief of police,
who subsequently enlisted her into the ranks of the German Secret Service. She carried on her
life as before dancing naked on the stage and dispensing her services liberally to those who
could afford her.
8. Sertorius- When he was the Roman Commander in Spain, according to Polyaenus, the
possessor of a white fawn that he trained to follow him everywhere. This little fawn was taught
to approach at a given signal, and Sertorius himself the signal, when about to pronounce his
decision in judicial cases. The fawn appeared to convey information to the Roman general; and
Sertorius allowed it become widely known that he derived both secrets and guidance from the
fawn. His intelligence agents meanwhile, were everywhere active and all that they learned was
credited to the supernatural powers of the animal.
10. Hannibal- Hannibal’s invasion of Italy, the most brilliant and futile raid in history, gained
him victories
and nearly bleed Rome to death, but the mere slaughter of Romans and a great city’s despair
would not
have sustained him for fifteen years if he had not also made powerful allies and developed an
excellent intelligence system. He often dressed as a beggar and went into the streets of Rome.
11. Schulmeister, “Napoleon’s Eyes”- He was the Napoleon’s military secret service.
12. Wilhelm Stieber- He made two major contributions to the sequence of military
intelligence, namely military censorship and organized military propaganda.
13. Alfred Red- One of the most brilliant intelligence agents, though he was a homosexual. He
rose to become chief of the Austro- Hungarian Secret Service, or in other terms, director of
their military intelligence system. For more than half of his time as director of intelligence, Red
was acting as an intelligence agent of Russia.
Page 21
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
B. SOME INTELLIGENCE UNITS IN THE WORLD:
1. CIA- Central Intelligence Agency- Military intelligence agency of United States of
America and engaged in many undercover activities throughout the world.
2. KGB- Komitet Gusodarstevenoy Bezopasnosti- Russia
3. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim M-eyudim)-“ Central Institute for
Intelligence and Security”- Israel.
4. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known by its
wartime designation, “MI6”, equivalent to US’s CIA, in charge with gathering information
overseas and with other strategic services ranging from foreign espionage to covert political
intervention.
5. SDECE- (Secret de Documentation Exterieure et Contre- Espionage)- France.
6. SAD- (Social Affairs Department)- China.
7. FBI- Federal Bureau of Investigation- its primary role is counter intelligence limited to
internal security within the United States of America.
8. “MI-5” - Great Britain’s civilian intelligence agency for internal counter intelligence,
equivalent of US’ FBI and equivalent to Internal Security Section of Russia’s KGB.
9. NICA- National Intelligence Coordinating Agency- Philippines.
Col. Rudolph Abel - (Russian) - was probably the highest ranking and most successful
spy whoever infiltrated the United States.
Mathew Cevetic - a famous undercover agent of FBI infiltrated the communist party.
C. ASPECTS OF INTELLIGENCE
What is Intelligence?
Intelligence the end product resulting from the collection, evaluation, analysis,
integration, and interpretation of all available information which may have immediate or
potential significance to the development and execution of plan, policies and programs of the
user.
Webster defined intelligence as:
1. Capacity for understanding and for other forms of adaptive intellect of behavior; the mind in
operation.
2. Knowledge of an event, circumstances etc., received or imparted; the gathering or
distribution of information; the staff of persons engaged in obtaining such information.
What is Information?
Information is any evaluated materials of every description including those derived from
observation, reports, rumors, imagery, and other sources from which intelligence is produced.
Page 22
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
b. Internal Security Intelligence – the knowledge essential to the maintenance of peace
and order.
c. Public Safety Intelligence – knowledge essential to ensure the protection of lives and
properties.
F. PRINCIPLES OF INTELLIGENCE
1. Intelligence and operation are interdependent – It is separate and distinct activities
but complement each other.
2. Intelligence requires continuous security measures – It denies unauthorized
personnel information about operation and intelligence product.
3. Intelligence must be useful – It must serve the commander’s need and requirements.
4. Intelligence must be timely – must reach the user in time to serve as basis for
appropriate action.
5. Intelligence must be flexible
6. Intelligence requires imagination and foresight
Page 23
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1. Position of the Armed Forces – constitutional and legal basis of its creation and actual
role.
2. Organization and structure and territorial disposition
3. Military Manpower Recruitment
4. Order of Battle
g. Geographical Intelligence – deals with the natural as well as man-made features of the
physical environment of man considered from the point in view of military operations.
1. Location – military and economic importance
2. Size – measurement of which a nation can exchange space or time during war.
3. Shape
4. Weather and Climate
h. Scientific Intelligence – deals with the progress of the research and development as it
affects the economic and military potential of a nation.
Page 24
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
d. against sabotage
Page 25
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Two General Types of Counterintelligence are;
1. Passive Measures – are those measures, which seek to conceal information from the
enemy.
2. Active Measures – are those measures, which seek actively to block the enemies’
effort to gain
information or engage in espionage, subversion, and sabotage.
2. Port Frontier and Travel Security – has to do with the application of both military and
civil security measures for counterintelligence control at point of entry and departure,
international borders and boundaries. Example:
- scty. control of merchants, seamen & crew of commercial aircraft
- scty. screening and control of frontier
- scty. control of sea ports
- scty. control of frontier/border crossing point
Page 26
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Counter Intelligence Investigation is an activity, which constitutes the value of the
counterintelligence workload, worldwide and includes specific investigation of individual and
incidence, which for the most part are conducted in an overt but discreet manner.
2. Detection Measures
a. PSI (Personnel Background Investigation) c. challenge or password
b. security tag or pass card d. reconnaissance
3. Deception Measures
a. ruse –use of escape & evasion
b. dummy position
c. fabricated information
--------------------------------------------------------------------------------------------------
3. Establishment of Priorities
- Priorities reflect the criticality of the need for the particular information. No formula
exists which can automatically determine priorities. Such determination is a matter of
judgment.
Collection of Information
Page 27
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
1. Determine collecting agency 4. Use tools or technique in collection
2. Send orders or request 5. Ensure timely collection
3. Supervise collection efforts
Judging Credibility:
It is possible for the reported fact or event to have taken place.
Is the report consistent within itself?
Is the report confirmed or corroborated by information from different sources or
agencies?
If the report does not agree with information from other sources, which one is
more likely to be true?
EVALUATION GUIDE
Reliability of Information Accuracy of Information
A – Completely Reliable 1 – Confirmed By Other Sources
B – Usually Reliable 2 – Probably True
C - Fairly Reliable 3 – Possibly True
D – Not Usually Reliable 4 – Doubtfully True
E – Unreliable 5 – Improbable
F – Reliability Cannot Be Judged 6 – Truth Cannot Be Judged
Sources of Information
Page 28
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
S – Signal Intercept W – Interrogation of Captured Enemy
T – Direct Observation by Commander/Chief Agent/Foreigner
of a Unit X – Observation of Government/Civilian
U – Report by Penetration Agent or Resident Employee or Officials
Agent Y – Observation by a Member of the
V – Report by PNP/AFP Troops Involved in Populace
Encounter Z – Documentary
2. Planning
3. Spotting
4. Investigation
Background Investigation (BI)
Partial Background Investigation (PBI)
Complete Background Investigation (CBI)
Personnel Background Investigation (PSI)
5. Recruitment - The most preferred qualification of an agent is his/her access to the target.
6. Training
7. Briefing
8. Dispatching
9. Communication
Technical – telephone/radio
Non-technical – personal meeting
10. Debriefing
- Let your agent talk all he encountered during the operation.
- Don’t interrupt your agent while he is talking.
- Never postpone or pause and set for another time for the briefing
12. Disposition
-Reroute
-Retraining
-Retesting
-Termination
Page 29
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
13. Reporting
14. Operational Testing
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE
COVERAGE OF LESSON 3
POLICE INTELLIGENCE OPERATION
--------------------------------------------------------------------------------------------------
Essentials of Cover:
1. Secrecy of operation against enemy intelligence.
2. Secrecy of operation against friendly agencies that do not have the need to know.
3. Successful accomplishment of the mission.
Hazards to Cover:
1. Static or Dormant Opposition (Ordinary Citizens)
2. Unhostile Active Opposition (Political Security Agencies)
3. Hostile Active Opposition (Enemy International Operatives)
Page 30
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
4. Use circuitous routes and provide careful counter surveillance measure.
5. Be specifically careful of former contacts with non-intelligence personnel.
6. Be patient, slowly and careful.
Page 31
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
5. Freedom for movement 8. Optional alternate plan
6. Means of communication 9. Safe departure
7. Social and financial status
Page 32
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
3. Special Employee – informants who are of a specific operational nature.
Information Net – This is a controlled group of persons who work through the
direction of the agent handler. The informants, principal or cutouts supply the agent
handler directly or indirectly with intelligence information.
Page 33
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. Access – it is the capability or ability of a prospective agent to obtain the desired
information for the intelligence organization or to perform the intelligence collection
mission in the area.
Primary Access – has direct access to the desired information.
Secondary Access – it is the access to the desired information through a
principal source where the latter has the direct access.
Outside Access – the agent is employed outside the target and merely monitors
information from a third person who is monitoring information in the area.
Control – This refers to the authority to direct the agent to carryout the task or
requirement on behalf of the clandestine organization in ac acceptable manner and
security.
Page 34
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
3. Moral obligation to the agent – the cause of loss incurred by him as a result of his
connection with the intelligence service.
3. Report – involve in the identifying the name in one’s own mind and some facts,
which has been perceived, narrated and identified.
Factors governing Report
a. Vocabulary – the word which and individual uses to press himself
b. Time Log – accurate reporting depends entirely on timeliness, delays in
reporting results in unconscious omission of details
c. Recurrence of similar incidents
Three Phases
1. Determination of the Mission
2. Selection of the Subject
3. Accomplishment of the Mission
Page 35
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Two Techniques in the Conduct of Elicitation
1. Approach – process of setting people to start talking
Types of Approach:
a. Flattery Approach – people are susceptible to praise
Variants:
Teacher-Pupil Approach- the subject is treated as an authority. We request him to
enlighten us and solicit his viewpoints and opinions.
Kindred Sole Approach- the subject had been placed in a pedestal having some
specialized quality and you flatter him by showing enough concern for his welfare to
pay special attention to his enjoyment.
Good Samaritan Approach- is sincere and valid offers to help and assistance are
made to the subject
Partial-Disagreement Approach- seek to produce talking by the word “I not am sure
if I fully agree”.
b. Provocative Approach – discover a wide range of conversational gambits
Variants:
Teaser Bait Approach- elicitor accumulates the sources of knowledge about a
particular
subject
Manhattan from Missouri Approach- the elicitor adopts an unbelievable attitude
above anything. He questions all statements and oppositions.
Joe Blow Approach- is “I know the answer to everything” approach. The elicitor
adopts the attitude of being approachable of any field.
National Pride Approach- nature propensity of all person to defend their country and
its policies.
E. CASING
Casing – is a reconnaissance or surveillance of a building, place or area to determine its
suitability for intelligence use or its vulnerability in operations.
Page 36
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
knowingly about the area of operation. Casing is also considered a security measure because it
offers some degree of protection for those operating in an area unfamiliar to them.
Page 37
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE
COVERAGE OF LESSON 5
SURVEILLANCE
CLANDESTINE OPERATION
--------------------------------------------------------------------------------------------------
I. SURVEILLANCE
Objectives of Surveillance
1. To confirm or deny allegations
2. To identify persons involved in certain activities
3. Provide background information for undercover assignment
4. Develop leads to vital information
5. To obtain upon which to conduct additional investigation
6. To check on sources of information
7. Locate addresses, or places frequently by subject as well as his associates
8. To obtain detailed information about the nature, scope of subject’s activities
9. To secure basis for securing search warrant
10. To provide protection
Definition of terms:
Pre-Surveillance conference – a conference held among the team members, the police
intelligence unit before surveillance is conducted
Subject/Rabbit- it is the subject either person or place.
Surveillant – a person conducting surveillance which includes observations only.
Stakeout or Plant – is the observation of places or areas from a fixed point.
Tailing or Shadowing - it is the observation of a person’s movement.
Undercover Man – it refers to a person trained to observe and penetrate a certain
organization suspected of illegal activities and later reports the observations and information
so that proper operational action can be made.
Safehouse – is a place, building, enclosed mobile, or an apartment, where police
undercover man meet his action agent for debriefing or reporting purposes.
Drop – is a convenient secure and unsuspecting place where a police undercover man,
informer or informant by a pre-arrangement leaves a note leaves a note, a small package,
an envelope or item for the action agent, supervisor or another agent.
Convoy – an accomplice or associate of the subject.
Decoy – any person or object, almost similar to the subject used to avoid or elude the
surveillant.
Contact – any person whom the subject picks or deals while he is under surveillance.
Made or Burnout – when subject under surveillance becomes aware that he is under
observation and identifies the observer.
Lost – when the surveillant does not know the whereabouts of his subject or the subject
had eluded the surveillant.
Finger man - any individual who can positively point the subject.
Put to bed - when the subject under surveillance returns to quarter & apparently retire
for the night.
Page 38
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
3. Loose – applied frequently or infrequently, period of observation varied on each
occasion.
B. According to Methods
1. Stationary – this is observation of place, usually a bookie stall, a gambling joint, or a
residence where illegal activities are going on. ( fixed location )
2. Moving – surveillant follows the subject from place to place to maintain continuous
watch of his activities.
3. Technical – a surveillant uses telecommunication hardware, gadgets, systems and
equipment.
Preparation of Surveillance
A. Area and Target Study – all available information about the areas should be collected
and analyzed.
B. Surveillance Plan – the plan should establish the required type of personnel, the general
and specific instruction for surveillant. Ensure that the overall objective of the surveillance is
understood. All participating personnel will have common understanding of the operational
limitations, signals and special instruction, which have been improved.
C. Selection of Personnel
1. Inconspicuous physical character
2. Ability to remain unnoticed
3. Resourcefulness
4. Patience and physical stamina
5. Keen sensory perception and retentive memory
6. Driving ability
7. Personal courage
8. Area knowledge
9. Security consciousness
Equipment in Surveillance:
1. Camera with telephoto lens 3. Mini-video camera and others
2. Voice recorder
Page 39
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel on the
base of operation
A. Kinds of Surveillance
Stake Out or Surveillance of Places
Two types of place surveillance
1. Using a room in a nearby house or business establishment and remaining undercover.
2. Remaining outdoors and posing as a person who would normally conduct his business in
such an area, ex. a laborer, carpenter, street vendor, etc.
Tailing or shadowing
Don’ts in Shadowing:
1. Don’t make abrupt or unnatural movements.
2. Do not make use of disguise that will attract attention.
3. Don’t meet the eye of the subject. Doing so tends to fix the shadower in the mind of the
subject. If the subject turns and it seems as if a face to face encounter will result, the
shadower must look anywhere except the subject’s face.
4. Don’t adopt a slinking, sleuthing, creeping, peeking manner. Don’t slink in and out of
doorways, sleuth behind the subject, creep from around parked cars, peek for around corners,
it is unnecessary, ineffectual and above all attract attention.
5. Don’t wear story- book disguises. False whiskers, artificial noses, simulated deformities
and the like rarely. If ever, are convincing when worn by an amateur and seldom convincing for
any length of time even when worn by a professional actor or when applied by a professional
make- up artist. These disguises maybe good in theaters but not in the street.
6. Don’t carry briefcases, notebooks, papers or other noticeable objects.
7. Don’t greet or never speak to fellow officers or allow them to greet you. It must be an
established policy that other officer in or out of uniform do not greet each other on the streets
if there is any possibility that one may be on a job.
8. Don’t make notations or entries ostensibly. Strangely enough sometimes, the more
experience shadower fails to observe this precaution. This is so to avoid suspicion of his
mission.
9. Beware of bulging concealed weapons.
10. Don’t attempt to appear too innocent if accosted by the subject.
11. Maintain distance
12. Note taking should be done in safe areas.
Page 40
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
B. Methods of Shadowing
Foot Surveillance
1. One- man shadow 3. Three- man Shadow or ABC method
2. Two- Man Shadow
Automobile Surveillance
This requires careful preparation, wherein the shadowers must use a vehicle if the
subject uses a vehicle. The vehicle used by the shadowers must be non-descript, preferably
rented vehicles since they can be changed often. The license plates must be anonymous if the
car used in shadowing is official or government vehicles. The “tail” car may be changed several
times a day to lessen chances of being detected. It is preferred that there be three men in
shadow car. Number one man is the driver, number two watches for a convoy, number three
takes notes. The notation includes place, every act and every contact of the subject’s vehicle
Page 41
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
and its passengers. Complete descriptions are made of all persons contacted if their identities
are unknown. If number two catches a convoy, then the tail job is switched to the convoy car.
The driver will avoid attracting attention by deriving at normal speed in reasonable manner. He
will avoid unnecessary turning, twisting, stating, stopping and other maneuvers. If the subject
leaves his vehicle, number two and three leave the shadow car then take up the surveillance on
foot. Number one remains with the car.
In automobile surveillance, the vehicle used should conform to the same characteristics
as the investigation or surveillance. The make and model of the car should not be spectacular
or readily unidentifiable, and it should not carry any distinctive license plates.
b. Appearance- Various devices may be used to change the appearance of a car. Placing and
removing stickers, wind shield adornments, shifting head lights from dim to bright , re-
arranging the seats of occupants, changing the occupants cloths, changing or removing hats,
changing the number of occupants, etc.
Page 42
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
In business and industry, the vast majority of undercover agents are found in here, not
law enforcement. They are employed directly by corporations or employed by private agencies
for internal investigation. Their importance in business and industry is the prevention and
control of employee theft.
Special Qualification
1. knowledge of the language
2. area background regarding events
3. knowledge about the customs and habits
4. physical appearance
Cover - It is a means by which an individual group or organization conceal the true nature
of its acts and or existence from the observer.
Page 43
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Code Name – It is the alias or symbolic designations used by intelligence officer/
informants and even criminals for security.
Cover Story – It refers to any scenario made to cover up the operation. It may include:
1. A biographical data through fictional, which will portray the personality of the agent, he
assumed any scenario to cover up the operation.
2. A fictitious background and history for the new character of the investigation should be
prepared, including the names, address and descriptions of the assumed places of
education, employment, associates, neighborhoods, trades and travels.
3. The investigator’s background story should seldom, or ever, be wholly fictitious.
4. It is usually advisable for the investigator to maintain his reputation that he is from a
city wherein he has lived and which he is acquainted of. He can avoid the hometown of the
subjects by not selecting it as the origin of the investigation.
Cover support- an agent assigned in target areas with the primary mission of supporting
the cover story.
Hazard to Cover:
1. Passive opposition- refers to people who are not directly involved in security and CI
activities.
2. Friendly or not hostile opposition- refers to friendly organizations that may hinder the
operations.
3. Unfriendly or hostile active opposition- refers to the enemy intelligence operations that
may
compromise the undercover.
Page 44
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
6. Don’t spend too much money. Expenditure maybe in keeping with the part, if not,
suspicion is aroused. Many agents have given themselves away by spending more money
than the amount justified.
Means of communications:
Communication may be done through technical and non- technical.
1. Technical Communications:
a. Telephone- Communication between headquarters and the undercover investigator must
be accomplished by secret method. In calling headquarters by telephone it is best to use a
dial tone in a public booth not connected with the local switch board operator. To lessen
the possibility of wire tapping, the investigator should use a different telephone for each
call.
b. Secret Writings
c. Radio
d. Cell Phone (SMS)
2. Non-technical
Forms of non- technical communications:
1. Personal meetings:
a. Car pick-up
b. Hotel meeting
c. Safe house meeting
d. Restaurant meeting
2. Brief encounter – personal meeting between agent handler and the agent not more than
60 seconds in order to pass an urgent message.
3. Written report- The written report may be addressed to a fictitious girl –friend at a pre-
arranged general delivery address which is under the control of officials from headquarters.
It is best not to put the undercover investigator’s return address in the envelope as the
post office department might return it to the investigator’s dwelling for insufficient postage
or other reasons, in which case, it might fall into improper hands. Since criminals, usually
have few correspondence, the investigators should not become conspicuous by the posting
of numerous letters. To preclude the possibility of the report falling into improper hands
before mailing, they may be written in the post office.
4. Brush pass- passing of an object between two persons going in opposite directions.
5. MBU meeting- is the use visual signals, verbal signals and danger signals.
6. Cut- outs- a person or devices interpose between two persons or groups in order to
provide communication.
---------------------------------------------------------------------------------------------------------------------
Page 45
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
II. CLANDESTINE OPERATION
Page 46
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
CDI 1
FUNDAMENTALS OF INVESTIGATION AND INTELLIGENCE
COVERAGE OF LESSON 6
INTRODUCTION TO SECURITY
A. VIP SECURITY
B. DOCUMENT SECURITY
C. SECURITY OF CLASSIFIED MATTER
D. INTRODUCTION TO NATIONAL SECURITY
--------------------------------------------------------------------------------------------------
Security – is the protection of all classified information, material and equipment from
disclosure to unauthorized person
VIP (Very Important Person) Security – protection accorded to VIP to protect his
image from harm, death, annoyance and embarrassment.
Assassination – murder of state leaders or persons occupying high position.
A. VIP SECURITY
Classes of Adversaries
1. Lunatics - neurotic persons
2. Public seekers
Page 47
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
6. Weapons with long range - rifle
b. Physical Implements
1. Fence
2. Protective Illumination
3. Alarm System
c. Animal
d. Human (Guards - uniformed & non-uniformed)
e. Planning of Protection - considers the following:
1. Approach route
2. Entrance - limit number of entrance and exits
3. Internal passage
4. Patrols
Means of Protection
1. Preliminary inspection of the hall 3. Control of the exit
2. Physical guarding of the hall 4. Deception
Page 48
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. The attending cars should pass all the qualities of VIP's car
3. Generally speaking, the car should run at the maximum speed
4. A priority alternative road should be decided
B. Protection of Route
1. guards
2. patrols
C. Protection of vehicles
D. Protection of VIP
E. Information and development of unit and the guards during a ride on different roads.
B. DOCUMENT SECURITY
General Principles
1. The authority and responsibility for the classification of classified matters rest exclusively
with the originating office.
Page 49
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
2. Classified matters should be classified according to content and not the classification of the
file in which they are held or of another document to which they refer except radiogram or
telegram referring to previously classified radiogram or telegram.
3. Classification should be made as soon as possible by placing the appropriate marks on the
matter to be classified.
4. Each individual whose duty allows access to classified matter is responsible for the
protection of the classified matter while it is in his possession and shall insure that the
dissemination of such classified matter is on the Need-to-Know basis and to properly cleared
persons only.
Official matter, w/c requires a protection in the interest of national security, is categories
into four:
1. Top Secret 3. Confidential
2. Secret 4. Restricted
Examples:
a. Very important documents dealing with such negotiations for major alliance;
b. Major governmental projects such as proposal to adjust the nation’s economy;
c. Military defense plan;
d. Strategic plan documenting the overall conduct of war;
e. Intelligence documents which reveal major intelligence production effort of the
Philippines, which would permit an evaluation by recipients of success and capabilities of
the Philippine Intelligence Agencies.
Page 50
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Storage of Top Secret Matter
Storage shall be in safe, steel file cabinet or other steel container equipped with built-in
three position, dial type combination lock of such weight, size and construction to minimized the
possibility of physical theft or damage by fire.
Examples:
a. Jeopardize international relations of the Philippines;
b. Compromise defense plans, scientific or technological development important to the national
defense;
c. Reveal important intelligence operations;
d. War plans or complete plans for future operations of war not included under Top Secret;
e. Documents showing disposition of our forces;
f. Intelligence plans and estimates; and
g. Order of battle information.
Page 51
College of Criminal Justice Education
Fundamentals of Investigation and Intelligence
Destruction of Secret Matter
Same as TOP SECRET matter, except that there is no need to prepare Certification of
Destruction instead a record of destruction is prepared and the witnessing officer need have
Secret clearance only.
Examples:
1. Plans of government projects such as roads, building, or development of area;
2. Routine service reports such as operations and exercise of foreign powers;
3. Routine intelligence report ;
4. Certain personal records and staff matters;
5. Compilation of data which individually maybe classified restricted, but which its aggregation
enhance their security value; and
6. Matters, investigations and documents of personnel and that, which is disciplinary in nature,
the knowledge of which is desirable to safeguard for administrative reasons.
4. Restricted – information and material that requires special protection other than that
determined to be Confidential, Secret, and Top Secret.
Examples:
1. Departmental books of instruction and training and technical documents intended for official
use only or not intended for public release;
2. Routine information relating to the supply and procurement of military stores; and
3. Minor modifications of data or items, which individually maybe classified unclassified in
which the aggregate warrants higher classification.
Page 52
College of Criminal Justice Education
Organized Crime with Simulation in Interview and Interrogation
In furtherance of our national principles and policies, the leader of our nation are then
able to formulate our strategy. Generally, most all will define national strategy as the art
and science of developing and using political, economic, and psychological power of a
nation, together with its armed forces, during peace and war, to secure national
objectives. It is the long-range plan through which a nation applies its strength towards
the attainment of its objectives.
defined as the protection of nation’s people and territories from physical assault
national security was properly equated with national defense, and the threats to a
nation’s security were perceived to emanate solely from outside the country.
refers to that state or condition wherein the people’s way of life and institutions, their
territorial integrity and sovereignty, as well as their welfare and well-being, are
protected or advanced.
National Power- The elements of national powers are numerical strength and character of
population, cultural development, character of government, geographical location,
resources, economic development and military potential. The degree to which a nation is
strong or deficient in these elements is normally a measure of its national power.
---------------------------------------------------------------------------------------------------------------------
Page 53
College of Criminal Justice Education
Organized Crime with Simulation in Interview and Interrogation
Page 54
College of Criminal Justice Education
Organized Crime with Simulation in Interview and Interrogation