0% found this document useful (0 votes)
94 views

CDI 1 Module

This document provides an overview and table of contents for an 18-week course on fundamentals of criminal investigation and intelligence. The course covers topics such as the origins of criminal investigation, crime scene investigation, police intelligence, and document security. It is divided into 4 units that will be completed over 18 weeks through home-based learning modules and activities distributed online or physically. The course guide outlines the learning objectives, teaching strategies, policies, and support services for students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

CDI 1 Module

This document provides an overview and table of contents for an 18-week course on fundamentals of criminal investigation and intelligence. The course covers topics such as the origins of criminal investigation, crime scene investigation, police intelligence, and document security. It is divided into 4 units that will be completed over 18 weeks through home-based learning modules and activities distributed online or physically. The course guide outlines the learning objectives, teaching strategies, policies, and support services for students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 97

LEARNING PACKETS

for
FUNDAMENTALS OF
INVESTIGATION & INTELLIGENCE
(Week 1-18)
PREFACE

The course will discuss on the origins of Criminal Investigation and recognize the

important personalities, its history & development of forensic science who greatly

contributed to the development and advancement of technology used in our current police

investigation methods and processes. To be familiar with the common terminologies used in

Criminal Investigation. Enumerating and explaining the different objectives and goals of

criminal investigation. It also tackles on the responsibilities of a criminal investigator, his

basic tools needed, and the protocols required to be observed in the conduct of the

investigation.

This course also covers the topics in Police Intelligence, which tackles the historical

development of intelligence. The different methods of cultivating informants, intelligence

cycle, Document & Information security and its clandestine activities, uncover, casing and

surveillance.

1
TABLE OF CONTENTS
Preface 1
Table of Contents 2
Course Guide 3
General Course Information 3
Course Learning Plan 3
Course Forum 4
Policies 4
Unit I – Fundamentals in Investigation 6
Unit II – Crime Scene Search 27
Unit III - Introduction to Police Intelligence 44
Unit IV - Document and Information Security 69

2
COURSE GUIDE
General Course Information
Course Title : Fundamentals of Criminal Investigation & Intelligence
No. of Units : 4 units
Duration : 18 weeks

Course Learning Plan


Week Content/Topic Objectives/Competencies Teaching-Learning Modality/
No. Strategies
Week Fundamentals in 1. Know the origins of Criminal Home-based activity with learning
1 Criminal Investigation. modules/activity sheets to be
Investigation 2. Recognize the important distributed through social media
personalities, history & platform (GC) or in hard copy to be
development of forensic picked up in designated area.
science.
Week Basic Principles of 1. Identify terminologies used Home-based activity with learning
2 Investigation in Criminal Investigation. modules/activity sheets to be
2. Enumerate the six cardinal distributed through social media
points of questioning. platform (GC) or in hard copy to be
picked up in designated area.
Week Basic Principles of 1. Enumerate and explain the Home-based activity with learning
3 Investigation objectives and goals of modules/activity sheets to be
criminal investigation. distributed through social media
2. Enumerate the platform (GC) or in hard copy to be
responsibilities of a criminal picked up in designated area.
investigator.
Week Basic Principles of 1. Enumerate the tools and Home-based activity with learning
4 Investigation basic equipment of the modules/activity sheets to be
investigator. distributed through social media
platform (GC), or in hard copy to be
picked-up in designated area.
Week Basic Principles of 1. Explain the protocols to be Home-based activity with learning
5 Investigation observed when conducting modules/activity sheets to be
the investigation. distributed through social media
platform (GC), or in hard copy to be
picked-up in designated area.

3
Course Forum
This is a read-and-write forum, which means you can access all learning materials and
related discussions and activities here.

Policies
Class policies may be slightly different depending on the modality in which you
attend class. In this case, you may be using distance learning or distance blended learning. If
you chose distance learning, your activity portfolio must be sent to the school through courier
service or may be hand-carried or dropped at the school campus. Your portfolio must be
secured in a sealed brown envelope and labeled as follows:

For distance blended modality, you may send your activity portfolio to my email
address [email protected], and indicate the following:

I. Study Guide
1. Manage your time well. Be mindful of time requirements to complete weekly
lessons and activities.
2. Focus your attention. Avoid other distractions while working on your weekly
lessons and activities.
3. Submit on time. If you need to mail your Activity Portfolio, take note of the
length of time it will take to send it. You might need to finish all activities
ahead of time, so your Activity Portfolio will reach me as scheduled.
4. Answer confidently. Preparation provides the needed confidence. Put value
on the time you allot to go over your lessons. This will ensure your answers
coming out right.

4
5. Work independently. The whole learning process is about you. Focus on the
goal to learn. There is nothing more satisfying than the safe knowledge that
you completed the course working truly independently.
6. Motivate yourself. The learning process here will certainly depend on the
habits of the mind that you cultivate. An optimistic outlook will help you
finish the course without a hitch. It would help if you start breaking the
routines during the quarantine lockdowns, and take control of your schedule.
Prioritize how you spend your time and set learning goals for yourself.
Remember this is not just about finishing a course, this is about getting a
bigger goal done – like graduating and getting a good job in the future.

II. Class Assessment and Grading System

To pass the course, you must go through the Learning Packets with care and
do the pre-assessment and self-assessment activities.
Pre-Assessments,
Self-Assessment and
Examination - 40 %

Activities - 20 %
Experiential Reports - 20 %
Final Projects - 20 %
-------------
100%

III. Support and Services


Instructor’s Information:

WINCHESTER M. DELOS RETES, RCrim


Instructor, College of Criminal Justice
09298430843 (Smart)
09756779416 (Globe)
[email protected]
FB Account: Winchester Delos Reyes

You may contact me for clarifications and questions when moving through this
learning packet anytime between 9:00am-3:00pm using this format, for easy identification

5
UNIT I: Lesson 1 – Origins of Criminal
Investigation (Week 1-5)
This periodic lesson is about Fundamentals
of Criminal Investigation. At the end of this
lesson, you should be able to:

1. Know the origins of Criminal


Investigation.
2. Recognize the important personalities,
its history & development of forensic
science.

INTRODUCTION

The responsibility of law enforcement agencies is to detect crimes, apprehend the


perpetrators, and provide evidence that will convince judges that the perpetrators are guilty
beyond a reasonable doubt. To accomplish these aims a variety of methods are used,
including reconstructing the crime, collecting physical clues, and interrogating suspects and
interviewing witnesses.
The methods of detection employed are dictated by the nature of the crime and the
procedures permitted by the legal system. Most investigations begin with careful, objective
observations that are then assembled, collated, and matched against applicable law.

6
If there is reason to assume that a crime has been indeed been committed, further
investigation is undertaken using scientific methods and techniques. Technological advances
have been incorporated into criminal investigation as well; for example, analyzing trace clues
such as dust, paint, glass, body fluids, and other microscopic evidence is now possible.
Early criminal investigation was a crude process, relying on eyewitnesses, inferences,
and confessions extracted under torture. In early 19th century, for instance, the principal
technique for catching thieves was obtaining evidence from informers who were also engaged
in crime.
Criminal investigations are conducted in accordance with the dictates of the law. The
conduct of an investigation is governed by information obtained from people, records, and
physical evidence. Victims or witnesses still provide the bulk of facts as to when, where,
how, why, and by whom the crime was committed. (Montojo, 2007).
Police science utilizes the methods of natural and related sciences as aid in criminal
investigation. It may be said to have three phases that embraces.

 The identification of living and dead persons;


 The field work carried out by specially trained crime scene investigators; and
 The laboratory methods used to examine and analyze physical evidences by the
criminalists.

ORIGINS OF CRIMINAL INVESTIGATION

The Industrial Revolution in Europe drew the peasant class from the countryside into
the towns, and the crime wave that swept through the burgeoning cities forced governments
to make hasty, ad hoc responses to the crisis. As it was described, "the rapid expansion of
London, and the increased population was protected merely by a system of purely local
constables and watches which had been inadequate to the needs of a far smaller community,
and was now hopelessly overwhelmed. The situation gave rise to the evolution of the thief-
takers/catchers."
Although the "thief-takers or thief-catchers" were not ordinarily sought from among
those already part of the underworld, it was the criminal element in their midst to which
authorities turned for help. The rank and file of those recruits constituted a distinct breed, but
two clear-cut differences of motivation set some apart from others. One kind was hirelings—

7
with mercenary motives, they would play both sides of the street. The other kind were called
social climbers who, in order to move into respectable society, would incriminate their
confederates (Soriano, 2008).

The earliest police force in England was firs established in 1253 and lasted until 1829.
These constables who worked only at night were first known as the "Watch of England", then
later as the "Old Charleys." In the 1750's, the Novelist Henry Fielding was appointed as Chief
Magistrate. He subsequently appointed parish constables who became successful thief-takers
and later became known in the 1750's as the "Bow Street Hunters". It was the first well-
known investigative body in England (Lyman, 2011).

In 1829, Sir Robert Peel founded the London Metropolitan Police Department as the
world's first paid and full-time police force. They replaced the old constables and the Bow
Street Runners who had ultimately gained a reputation for incompetency and inefficiency.
These officers were dubbed as "Bobbies" and were required to meet rigid standards of
professionalism, including minimum height and weight requirements and standards of
literacy and character (Lyman, 2011).

By the 19th century, technology in crime detection began to flourish with the creation
of a personal identification system by Alphonse Bertillon. In the mid-1840's, a study of
fingerprint patterns became a popular means to identify suspects in crime. In 1892, Sir
Francis Galton published a book entitled "Fingerprints", a landmark book that led to the
identification of criminals based on fingerprint evidence found at the crime scene. Other
scientific developments were applied to the examination of physical evidence, including the
use of comparison microscopes, bloodstain analysis and firearm identification. This led to the
establishment of the first police laboratory by Edmond Locard in 1910 in Lyon, France. The
expansion of crime laboratories in other large cities were slow, but was later coupled with the
creation of university programs in criminalistics.

By this time, police departments have become formally organized, and the use of
informants in criminal investigation has been supplemented by interrogations and other
methods to secure confessions. The term "third-degree" has thus been employed to
characterize the then widely used extraction of confessions accompanied by brute force.

8
Eventually, however, third degree interrogations were banned by the United States Supreme
Court in the 1890's on the ground that it violates the Eight Amendment of the U.S.
Constitution disallowing excessive bails, excessive fines as well as tortures. Moreover, the
potential offered by the application of science to the examination of physical evidence also
contributed to the decreasing popularity of "Third Degree" interrogations (Müftüoglo, 2017).
One significant development in the field of criminal investigation in the United States
is the establishment of the Federal Bureau of Investigation (FBI) in 1924. Today, the FBI is
one of many federal investigative agencies that has made great strides in professionalizing the
field of criminal investigation (Lyman, 2011).

History and Development of Forensic Science

The study of criminal investigation involves fundamental understanding of forensic


science, which can be broadly defined as the application of science to law. This section
touches on the development of the field (Müftüoglo, 2017).

Important Personalities

MATHIEU ORFILA
(1787-1853)

• Father of Forensic Toxicology

• Published the first scientific article on the detection of


poisons and their effects on animals in 1814, thereby establishing
forensic toxicology as a legitimate scientific endeavor.

Source: Wikipedia.or

ALPHONSE BERTILLON
(1853-1914)

• Father of criminal identification


• Devised the first scientific system of personal
identification.

1879 – Began to develop the science of anthropometry,


a systematic procedure taking a series of body
measurements as a means of distinguishing one
individual from another; this system was considered the
most accurate method but was eventually replaced by
9
fingerprinting in the early 1900's.

FRANCIS GALTON
(1822-1911)

• Undertook the first definitive study of fingerprints and


developed a methodology of classifying them for filing.

• 1892 – Published the book Finger Prints, which


contained the first statistical proof supporting the uniqueness of
his method of personal identification.

• Continued to describe the basic principles that form the


present system of identification by fingerprints.
Source: Wikipedia.org

LEONE LATTES
(1887-1954)

• In 1915, he devised a relatively simple procedure for


determining the blood group of a dried bloodstain, a
technique immediately applied to criminal
investigations and often used by forensic scientists to
this day.

Source: nanopdf.com

CALVIN GODDARD
(1891-1955)

• To determine whether or not a


particular gun has been fired, a bullet requires
comparison of the bullet with one that has been
test-fired form the subject's weapon. Calvin
Goddard, a U.S. Army colonel, refined the
techniques of such an examination by using the
comparison microscope. Goddard's extra
expertise established the comparison
microscope as an indispensable tool of the
modern firearms examiner.
Source: stvalentinemassacre.com

10
ALBERT S. OSBORN
(1858-1946)
• Developed the fundamental principles of
document examination.

• Responsible for the acceptance of


documents as scientific evidence by the
courts.

• 1910 – Authored the first significant text in


the field entitled Questioned Documents,
still considered a primary reference for
document examiners.
Source: twitter.com

HANS GROSS
(1847-1915)

• In 1893, he published a handbook entitled


Criminal Investigation, the first article describing the
application of scientific disciplines to criminal
investigation.

• Detailed the assistance that investigators


could expect from the field of microscopy,
chemistry, physics, mineralogy, zoology, botany,
anthropometry and fingerprinting.

• The founder of Criminalistics and widely


regarded as the Father of Criminal Investigation.
Source: alchetron.com

EDMOND LOCARD
(1877-1966)
• In 1910 started the first police laboratory.

• Strongly believed that every criminal could be


connected to a crime by dust particles carried from
the crime scene, and hence formulated the principle
known as ―Locard‘s Exchange Principle‖.

• Research works and accomplishments became known


throughout the world by forensic scientists and
criminal investigators.
S
o
u
r
ce: google.com

11
ACTIVITY 1:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____

1. What was the contribution of Alphonse Bertillon that contributed to the growth of
technology in crime detection?

2. What was the reason why the Bow Street runners were replaced in 1829?

3. How was the population of peasants cause the increase of crime rate in England?

4. In your observation, what is the equivalent of the Watch of England in today‘s


setting?

5. Explain the ―Locards Exchange Principle‖ and give an example.

12
ACTIVITY 2:
Answer the question by writing the correct answers in the box
provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____

QUESTION QUESTION ANSWER


NO.
Who is the founder of Criminalistics and
1 widely regarded as the Father of Criminal
Investigation?

Who developed the fundamental principles


2 of document examination?

He devised the first scientific system of


3 personal identification and is also known as
the Father of criminal identification

He is considered the Father of Forensic


4 Toxicology.

Founded the London Metropolitan Police


5 Department as the world‘s first paid and
full-time police force

He formulated the principle known as


6 ―Locard‘s Exchange Principle‖.

Constables who became successful thief-


7 takers and later became known in the 1750s
as the ________?
Who authored the first significant text in the
8 field entitled Questioned Documents, which
is still considered a primary reference for
document examiners?
Who was the U.S. Army colonel who
9 refined the techniques of bullet examination
by using the comparison microscope?
Who devised a relatively simple procedure
10 for determining the blood group of a dried
bloodstain, a technique immediately applied
to criminal investigations and often used by
forensic scientists today?

13
Lesson 2: Basic Principles of
Investigation

DEFINITION OF CRIMINAL INVESTIGATION Source: canstockphoto.com

Criminal Investigation is an activity that collects facts; accomplish the threefold


aims of the criminal investigators: 1) to identify, 2) to locate the guilty party, and 3) to
provide evidence for his guilt.

Investigation is the process of inquiring, eliciting, soliciting, and getting vital


information, facts, and circumstances to establish the truth (PNP Criminal Investigation
Manual, 2011).

GOALS OF CRIMINAL INVESTIGATION

The investigative function has three goals. These goals are not separable, nor are they
necessarily harmonious. Pursuit of one goal may help achieve one or both of the other goals.

1. Controlling Crime – Society has three basic mechanisms for controlling the
behaviour of those engaged in crime: deterrence, rehabilitation, and incapacitation.
Deterrence means scaring criminals into desisting from criminal conduct. Rehabilitation
entails directly inducing criminals to stop committing crimes. Incapacitation occurs when
active criminals are caught and removed from free society. Incarceration prevents them from
preying on the public.

2. Pursuing Justice – an important function of the police is to help uphold


community norms. The police should help the community draw the line between acceptable
and unacceptable behaviour. As an arm of government, the police should enhance citizens‘
feelings that people who seriously misbehave will be punished.

3. Addressing Problems – the final goal that is increasingly set for the investigators
is addressing the many and varied problems the citizenry feels the police should resolve.
Citizens‘ reports of crimes are usually investigated individually. However, crimes are often a
14
part of a larger pattern of incidents symptomatic of a set of troublesome circumstances for
which the police may be held responsible (Soriano, 2008).

SIX CARDINAL POINTS OF CRIMINAL INVESTIGATION

The investigator‘s effectiveness rests on his skills, techniques, methods, and


procedures in investigative work. It includes knowledge on the six cardinal points of criminal
investigation, such as 5W‘s & 1H. The investigator can find the truth about a crime as he
persistently endeavours to answer the following:

1. What specific offenses have been committed?


- This refers to the specific violation of criminal law.
2. Where were the offenses committed?
- Refers to the place or location of the commission of the offense.
3. When was the offense committed?
- This refers to the time and date of the commission of the offense.
4. Who committed the offense?
- This refers to the identity of the person or group persons who committed the
offense.
5. Why was the offenses committed?
- This refers to the motives or reasons for the commission of the offense
6. How was the offenses committed?
- This refers to the means and procedure in which the offense was committed

These Cardinal Points of Criminal Investigation are anchored on the theories of crime,
which involve three interdependent factors: motive, opportunity, and means.

Source: mycrimestudies.wordpress.com

15
Opportunity - refers to the chance or occasion to commit the crime.

Motive is the reason that pushes a person to commit an act with a definite result in
mind. It is not an element of a crime but may be useful when the offender's identity is
unknown.

Means – is the capability of a person to commit a crime using available tools at their
disposal.

Even if the individual has the motive but doesn‘t have the means and the opportunity,
they cannot commit a crime because the three things are interdependent, and the absence of
one would not result in a crime (Müftüoglo, 2017).

Golden Rules to be observed by the Investigator:

1. Identify and, if possible, retain for questioning the person who first notifies the first
responder.
2. Determine the perpetrator by direct inquiry or observe him if his identity is
immediately apparent.
3. Detain all persons present at the scene, if possible.
4. Summons assistance, if necessary.
5. Safeguard the area by issuing appropriate orders and/or by physically isolating it.
6. Permit only authorized persons to enter the area.
7. Separate the witnesses to obtain independent statements.
8. Do not touch or move any object.
9. Assign the duties of search if assistants are present.

An exception to the ―do not touch or move any object rule‖: When the victim is still
alive, the investigator should try to gather or acquire information from the victim himself
with regard to the surrounding circumstances of the crime, while assistance is calling for an
ambulance from the nearest hospital (Tradio, 1993).

16
ACTIVITY 3:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____

1. Explain the Golden Rule ―do not touch or move any object.‖

2. What is Criminal Investigation?

3. Explain the Theory of Crime

4. If one factor is missing based on the theory of crime, would there be a crime committed?

5. What are the three-fold aims of the criminal investigator?

17
Objectives of Criminal Investigation

1. To detect crime
2. To locate & identify suspect/
3. To arrest the suspect/s
4. To recover stolen property
5. To prepare appropriate criminal cases for prosecution

These objectives are based on the premise that perpetrators make mistakes when
committing crimes, thus leaving some type of evidence of who they are. Due to carelessness,
panic, underestimation of police capabilities, emotional or mental instability or the influence
of drugs or alcohol may result in criminals leaving evidence that could connect them with the
crime scene (Müftüoglo, 2017). For example, a burglar might leave his tools used to force
entry; a murderer might leave weapons used to commit the crime.

Criminal investigator - is a public safety officer tasked to conduct the investigation


of all criminal cases as provided for and embodied under the Revised Penal Code, Criminal
Law, Special Laws that are criminal in nature. He or she is well-trained, disciplined and
experienced professional in the field of criminal investigation duties and responsibilities
(PNP Criminal Investigation Manual, 2011).

Qualities of a Good Investigator:

• The ability to persevere or stick to a task despite the monotony and the many
obstacles surrounding it.
• He must have certain abilities and intelligence that would enable him to acquire
information easily and readily and use this information truthfully.
• He must be honest. He must be incorruptible and must possess personal integrity.
• He must understand (weaknesses and strengths) the people and the environment
where he/she lives.
• He must have a keen power of observation and accurate description (Tradio, 1993).

RESPONSIBILITIES OF CRIMINAL INVESTIGATORS (Müftüoglo, 2017).

Hereunder is the list of the responsibilities of the criminal investigators:


1. Decide of the crime was committed within the investigator‘s jurisdictions.
2. Determine whether or not a crime has been committed.
3. Discover all facts pertaining to the complainant, i.e., gather and preserve physical
evidence and develop and follow-up clues.
4. Recover stolen property.
5. Identify the perpetrator.
6. Locate and apprehend the perpetrator.

18
7. Aid in the prosecution of the offender by providing evidence of guilt which is
admissible in court.
8. Testify effectively as a witness in court.

TRAITS OF THE CRIMINAL INVESTIGATORS


The following are traits that are desirable and help to qualify an individual for
investigative work:
1. Intelligence and reasoning ability.
2. Curiosity and imagination.
3. Observation and memory
4. Knowledge of life and people.
5. Possession of technical ―know-how‖.
6. Perseverance and energy.
7. Ability to recognize and control bias and prejudice in one‘s self and on the job.
8. Sensitivity to people‘s feelings; acts with discretion and tact; respect and confidence.
9. Honesty and courage to withstand temptation and corruption.
10. Not overzealous and does not commit perjury when testifying.
11. Miscellaneous characteristics, such as the ability to communicate effectively, verbally
and in writing.

TOOLS OF CRIMINAL INVESTIGATION (Tradio, 1993).


For the sake of simplicity, the investigator's tools are the three ―I‘s‖.

1. Information – the word ―information‖ is used here to describe the knowledge which
the investigator gathers from other persons. Of the three ―I‘s‖, information is by far
the most important since it answers the question, ―Who did it?‖
There are two kinds of information, namely: 1) information acquired from
regular sources such as conscientious and public-spirited citizens, company records,
and the files of other agencies; and 2) information of particular interest to the
criminal investigator, including knowledge that the experienced investigator gathers
from cultivated sources such as paid informants, former criminals, acquaintances,
drivers, waiters, etc.

19
2. Interrogation – includes the skillful questioning of witnesses and suspects. The
success of ―information‖ depends on the intelligent selection of informative sources.
At the same time, the effectiveness of interrogation varies with the craft, logic, and
psychological insight with which the investigator questions a person who has
information relevant to the case.
The term ―interview‖ means the simple questioning of a person who has no
personal reason to withhold information and is therefore expected to cooperate with
the investigator. On the other hand, ―interrogation‖ is the questioning of a suspect or
person who is normally expected to be reluctant to divulge information concerning the
offense under investigation. The ability to obtain b questioning is the most special
talent of the investigator.
3. Instrumentation – is meant to include applying the instruments and methods of the
physical sciences in the detection of crime. Physics, for example, offers such aids as
microscopy, photography, and the optical methods of analysis. The role of chemistry
is too well known for elaboration here. Biology and pathology are particularly
important in crimes involving physical evidence.
The sum of these physical sciences insofar as they are applied to crime
detection is called criminalistics. Their utility is associated mainly with physical
evidence. By their means, a part of the corpus delicti may be established in certain
crimes – the cause of death in a homicide or the nature of the drug in a narcotic
violation.
They may be used to link the suspect to the crime scene by showing that clue
materials found at the scene possess the same constituents as materials associated
with the suspect. The same procedure identifies the criminal by tracing a substance
found at the scene to a source that can be immediately associated with the suspect.

20
ACTIVITY 4:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____

1. Differentiate interview from interrogation?

2. Can anyone in the police force be a Criminal Investigator?

3. Give one example of Forensic Science in conducting an investigation. Explain its process.

4. Give five examples of evidence that a careless perpetrator may leave at the crime scene.

5. Give a specific example of information acquired from regular sources.

21
PHASES OF CRIMINAL INVESTIGATION (Tradio, 1993).

The objectives of the investigator, as earlier stated, provide a convenient division of


investigation into three phases:

1. The criminal is identified;


2. He is traced and located; and
3. The facts proving his guilt are gathered for court presentation.

This division is made for the convenience of discussion since the three phases are
not necessarily separated in time but are usually fused throughout the investigation. The
same evidence, moreover, can often be used for all these objectives. Throughout all
phases of investigation, the three ―Is ―are constantly employed. Although explicit
references to these tools will not be made, their application can be readily seen at each
step.

IDENTIFYING THE CRIMINAL OFFENDERS (Müftüoglo, 2017).


Ordinary the identity of the criminals is discovered in one or more of the following
ways:

1. Confession
Admission or confession by a suspect is a major objective of every investigation.
The confession is, of course, an excellent means of identifying the criminal. But from the
point of view of proving guilt at trial, this must be supported by other corroborative evidence.
The corpus delicti must be separately established to support a conviction. A
confession may be denied in court. Unless the prosecution can present an affirmative show of
voluntariness, the objections of defense counsel based on charges of duress and coercion may
prevail regardless of their truth.

2. Eyewitness Testimony
The ideal identification is made by several objective persons who are familiar with
the appearance of the accused and who personally witnessed the commission of the crime.
Where the witness and the accused are strangers and the period of observation was limited to
22
few seconds, the validity of the identification depends upon the ability of the witness to
observe and remember the relative ―distinctiveness‖ of the accuser‘s appearance, the
prevailing conditions of visibility and observations, and the lapse of time between the
criminal event and identification.

3. Circumstantial Evidence
The identifications may be established indirectly by proving other facts or
circumstances from which, either alone or in connection with other points, the perpetrator's
identity can be inferred. Evidence of this nature usually falls into one of the following
classes:

a. Motive - It may be inferred from circumstances and witnesses' statements that


the suspect could have been motivated by a desire for revenge or personal gain. In
offenses such as theft and robbery, the obvious motive is monetary gain, and
persons in financial straits may become suspects. In crimes of personal violence
such as murder, homicide or physical injuries, the existence of strong personal
hatred would be significant, and evidence of quarries and angry statements would
be relevant.
Closely related to motive is a desire for criminal action formed by a
pathologically disordered mind. Evidence pertaining to motive or state of mind is
usually obtained by interviewing witnesses. In addition, a study of the crime
scene and reconstruction of the occurrence, including the suspect‘s prior and
subsequent acts, may often be helpful.

b. Opportunity - It must have been physically possible for the suspects to commit
the crime. He must have had access to an area, was in the vicinity, or had
available means. It must be shown that the suspect could have been in the vicinity
of the crime scene in the sense that it was not improbable for him to have been
there. Thus the search is further limited to those who had the opportunity to
commit the crime by reason of probable physical presence, knowledge of the
criminal objective, and the absence of alibis.

23
4. Associative Evidence - The physical evidence may identify the criminal through
the clue materials, personal property, or the characteristics pattern of procedure deduced from
the arrangement of objects at the crime scene. The perpetrator may leave some clue at the
scene such as weapons, tools, garment, fingerprint, or foot impression; he may unwittingly
carry from a scene a trace in the form of glass, paint, rouge, hair or blood. In crimes of
personally gin, the fruits of the crime may be in the perpetrator‘s possession. Crimes of
violence will leave evidence of a physical struggle. Where the offense involves the
application of force against property, contact with certain materials may be discernible.

Basic & Necessary Investigative Equipment of the Investigator (Müftüoglo, 2017).

A reliable Criminal investigator must see to it that all essentials tools and equipment
used for criminal investigation should be ready at all times. These tools include but are not
limited to the following:

1. Recording Instruments
a. Camera
b. Voice Recorder
c. Video Camera
d. Measuring device (Measuring tape, ruler, protractor)
e. Crime Scene template
f. Evidence Tags
g. Evidence Markers
h. Other electronic recording gadgets (body cams & action cameras)

2. Personal Protective Equipment (PPE)


a. Eye protection
b. Hand protection
c. Foot protection
d. Respiratory protection
e. Head protection

3. Preservation materials
a. Police Line
b. Evidence Containers (evidence bags, boxes, glass, jars, bottles, canisters, tubes,
vials, etc.).

4. Fingerprint Kit

5. General Crime Scene Kit

6. Evidence Collection Kit

7. Documentation and Investigative Forms

24
8. Investigator’s Checklist and Forms

In conducting an investigation, certain standards must be followed to ensure the


successful prosecution of cases. These consist of standard operating procedures, protocols,
and legal requirements of the law that must be observed in handling criminal cases, resulting
in an unsuccessful investigation if undermined. The following are the PNP‘s protocols to be
observed when conducting an investigation (PNP Criminal Investigation Manual, 2011).

Protocols in Investigation (Müftüoglo, 2017).

1. Jurisdictional Investigation by the territorial unit concerned. - The police


station which has the territorial jurisdiction of the area or place where the crime happened
shall have jurisdiction of the case and shall immediately undertake the necessary
investigation and processing of the crime scene, unless otherwise directed by higher
authorities for a certain case to be investigated by other units or agencies.

2. Official Blotter - A police blotter is an 18‖ x 12‖ hard-bound logbook that contains
the daily register of all crime incident reports, official summary of arrests and other
significant events reported in a police station. The duty officer shall record all information
using the 5 W‘s and 1 H in gathering the whereabouts of the case or complaint.

3. Investigation Team and Equipment - All investigators in any police unit must be
a graduate of the prescribed investigation course with a rank of at least Police Corporal

4. Duties of first responder - When the criminal has not been caught red-handed and
has fled the crime scene before the first police officer arrives, the first responder assumes
several responsibilities:
a. To ascertain any facts pertinent to the criminals that should be immediately transmitted
to the patrol force – personal description, make and model of vehicle used, and direction
of flight from the crime scene.
b. To isolate the crime scene, and if necessary, it environs, limiting access to those
responsible for its examination and processing.
c. To detain and separate eyewitnesses so they cannot discuss their observations with each
other.
d. To call for medical aid for the injured. In those cases where a person is seriously
injured, the first three steps may be deferred until this is attended to.
e. To continue to protect the crime scene until the officer who is responsible for the
continuing investigation arrives.

5. Duties and responsibilities of the investigating team - Members of the


investigating have their own assignments or roles to perform during the conduct of the
investigation. In addition, each member of the investigating team has its functions that would
be crucial in the investigation's success and probably the solving of the case.
25
6. Investigation of Suspects - Protocols regarding the investigation of suspects
involve procedures when an arrest is made and the booking procedures of the arrested person.

7. Taking of sworn statements of suspects and witnesses - The execution of a


suspect‘s ―waiver‖ as stipulated in Article 125 of the Revised Penal Code shall always be
done in the presence of his chosen counsel or any independent lawyer.

The sworn statements or affidavits of the complainants and witnesses must be taken
immediately by the investigator-on-case. The affidavit of arrest of the arresting officers must
be taken not later than 24 hours. In inquest cases, the investigator-on-case and the arresting
officer shall observe Art. 125 of the Revised Penal Code.

8. Preparation of reports and filing of charges - The investigator-on-case shall


submit the spot report within 24 hours. Progress reports, after-operation reports, final reports
shall be filed after the case is filed before the court. Lastly, an accomplishment report should
also be submitted.

9. Procedure in the release of the crime scene - Release of the crime scene is
accomplished only after completing the survey. It should be done with proper documentation
of evidence, witness, victims, and suspects has been achieved. If the crime scene is private
property, it must be released to the lawful owner and witnessed by any barangay official. If
the property is a government facility, it shall be released to the administrator.

10. Follow up a case - The investigator shall conduct a police operation to identify
and apprehend suspects based on the initial investigation results.

11. Preparation of case investigation plan

The conduct of police operations involving sensational or high profile cases and
heinous crimes must be covered by a Case Investigation Plan (CIPLAN).

12. Attendance to court duties – the investigator-on-case and arresting officers shall
endeavor to ensure their attendance during court hearings while head of units shall supervise
and ensure the attendance of witnesses.

13. Uniform of the investigator – Prescribed uniforms should be worn by


investigators when investigating to identify them as PNP Personnel.

END OF MODULE 1:

26
UNIT II: Lesson 3 – Crime Scene Search
(Week 6-9)
This periodic lesson is about
Fundamentals of Criminal Investigation.
At the end of this lesson, you should be
able to:

1. Define and explain the importance of


crime scene search in criminal
investigation.

2. Explain the procedures when


searching for evidence at a crime
scene.

3. Enumerate the most common


method of crime scene
documentation.

4. Explain the importance of crime


scene photography.

5. Identify & Differentiate the different


types of evidence.

6. Identify & explain the three main


Source: dreamstime.com sources of physical evidence.

7. Discuss the definition, requisites and


validity of search warrants.

8. Explain the procedures in conducting


search.

9. Enumerate examples of valid


searches and seizures without a
search warrant.

27
Week Crime Scene 1. Define and explain the Müftüoglo, E. (2017).
No. Search importance of crime Fundamentals of Criminal
6 scene search in Investigation 2nd Ed.
criminal investigation. Chapterhouse Publishing Inc.
Quezon City (pp 80-88).
2. Explain the procedures
when searching for Tradio, C. (1993). Handbook of
evidence at a crime Criminal Investigation. Central
scene. Professional Books, Inc. Quezon
City (pp. 5-8)
3. Explain the different
crime scene search Oster-burg, J and Ward, R.
methods (2004). Encyclopedia of Police
Science. Retrieved from
http://what-when-
how.com/police-science/crime-
scene-search-and-evidence-
collection-police.

Swanson, C. Chamelin, N. and


Territo, L. (2003). Encyclopedia
of Police Science. Retrieved
from http://what-when-
how.com/police-science/crime-
scene-search-and-evidence-
collection-police.

Soriano, O. (2008).
Fundamentals of Criminal
Investigation. Great Books
Publishing. Quezon City. (pp.
139-147).
Week Crime Scene 1. Enumerate the most Müftüoglo, E. (2017).
No. Documentati common method of Fundamentals of Criminal
7 on crime scene Investigation 2nd Ed.
documentation. Chapterhouse Publishing Inc.
Quezon City (pp 80-88).
2. Explain the importance
of crime scene Bulan E., Magadia, M.E. (2017).
photography. Police Photography 2nd ed.
Chapterhouse Publishing Inc.
3. Discuss what is crime Quezon City (pp 77-82).
scene sketch and its
importance in the Negosa, H. and Gabao, G.
investigation (2019). Fundamentals in
Criminal Investigation and
Intelligence. Rex Bookstore.
28
Week Physical 1. Identify & Differentiate Müftüoglo, E. (2017).
No. Evidences the different types of Fundamentals of Criminal
8 evidence. Investigation 2nd Ed.
Chapterhouse Publishing Inc.
2. Identify & explain the Quezon City (pp 91-120).
three main sources of
physical evidence. Gabao, R. (2016). Law on
Evidence: A guidebook for
Criminology Students.
Chapterhouse Publishing Inc.
Quezon City (pp 1-8).
Week Basic 1. Discuss the definition, Müftüoglo, E. (2017).
No. Criminal requisites and validity of Fundamentals of Criminal
9 Procedure search warrants Investigation 2nd Ed.
Chapterhouse Publishing Inc.
2. Explain the procedures Quezon City (pp 107-120).
in conducting search.

3. Enumerate examples of
valid searches and
seizures without a
search warrant.

29
The Crime Scene

CRIME SCENE – A venue or place where the alleged crime/incident/event has been
committed (PNP Criminal Investigation Manual, 2011).

It can comprise several sites and encompasses all areas over which victims, criminals,
and eyewitnesses move during the commission of the crime. When committing a crime, the
perpetrator may inadvertently leave evidence at the crime scene. Therefore, it is important
that once its position and boundaries are defined, the scene must be made secure for physical
evidence to be discovered and collected (Müftüoglo, 2017).

Source: vecteezy.com

Purpose of a Crime Scene Search

The primary purpose of a crime scene search is to develop associative evidence that
could link a suspect to the scene or a victim, and to answer questions crucial to the
investigation, such as who perpetrated the crime, how the crime was committed, the
circumstances surrounding the commission of the crime, and why the crime was committed.
Additionally, police search crime scenes to identify evidence through which a psychological
profile of the suspect can be developed, to identify an object(s) that does not logically belong
at the crime scene and that could potentially be linked to a suspect, and to identify the
suspect‘s modus operandi (MO), or motive for committing the crime (Oster-burg and Ward
2004; Swanson, Chamelin, and Territo 2003). It is important to note that although these
principles apply to all crime scenes, more specific tasks may be undertaken, depending on
what type of crime has been committed.

There are five primary considerations for conducting a crime scene search:

(1) boundary determination,


(2) choice of search pattern,
(3) instruction of personnel,
(4) coordination of efforts, and
(5) processing of the evidence (Swanson, Chamelin, and Territo, 2003).

Determining the boundary of the crime scene is critical. Numerous factors affect
boundary determination, such as whether the crime scene has more than one location and
whether the crime scene is indoor or outdoor. Crime scenes may be categorized into primary
30
and secondary. However, secondary crime scenes do not always exist when the crime
occurred in only one area. Typically, boundaries are restricted and more easily identifiable
when a crime scene is inside a physical structure (indoors). In contrast, with an outdoor crime
scene, determining accurate boundaries is more challenging.

Additionally, crime scenes are divided into inner and outer perimeters. The inner
perimeter is where the actual crime took place and the outer perimeter is the boundary for
maintaining control of the crime scene (Swanson, Chamelin, and Territo 2003).

Selecting an ideal search pattern will depend on the size of the crime scene.
Particularly its area and the extent of actions performed by the suspect during the commission
of the crime. The number of available personnel will also dictate what type of search is
practical and achievable during that particular time of investigation.

The basic step through a crime scene search normally progresses as follows:

1. Approach the crime scene;


2. Secure and protect the crime scene;
3. Preliminary survey of the crime scene;
4. Narrative description of the crime scene;
5. Photographing the crime scene;
6. Sketching the crime scene;
7. Evaluation of latent fingerprint evidence;
8. Evaluation of physical and clue materials;
9. Detailed crime scene search;
10. Collection, recording, marking and preservation of physical evidence and clue
materials;
11. Final survey to ensure that conditions of the crime scene have been documented as
thoroughly as possible; and
12. Release of the crime scene (Soriano, 2008).

Methods of Conducting Crime Scene Search

Different search methods or patterns are designed to locate evidence thoroughly and
systematically. Some of these methods are best suited for indoor scenes, while others are
more applicable to outdoor crime scenes (Müftüoglo, 2017).

31
If the crime scene is indoors, the search plan will naturally be dictated by the size of the
room and its contents. The unlimited variety of indoor situations precludes systematic
discussion. Where the scene is outdoors, one of the methods below can be selected to suit the
terrain. The following methods assume that three investigators are performing the actual
search (Soriano, 2008).

1. Strip or Line Method – In this method, the area is blocked out in the form of a
rectangle. The three searchers A, B, and C proceed slowly at the same pace along a
path parallel to one side of the rectangle.

Source: Fundamentals in
Criminal Investigation,
Soriano, 2008

2. Double Strip Method or Grid Method – this is a modification of the strip method.
Here, the rectangle is first traversed parallel to the base and then parallel to a side.

Source: Fundamentals in
Criminal Investigation,
Soriano, 2008

3. Spiral Method – the three searchers, follow each other along the spiral path,
beginning from the outside and spiraling in towards the center.

Source: Fundamentals in
Criminal Investigation,
Soriano, 2008

32
4. Zone Method – One searcher is assigned to each subdivision of a quadrant.
Depending on the size of the area, each quadrant is cut into another set of quadrants.

Source: Fundamentals in
Criminal Investigation,
Soriano, 2008

5. Wheel Method – In this method, the area is considered as being approximately


circular. The searchers gather at the center and proceed outward along the spokes. The
procedure should be repeated several times, depending on the size of the circle and
the number of searchers. One shortcoming of this method is the vast extent of the
relative area to be observed as the searchers depart from the center.

Source: Fundamentals in
Criminal Investigation,
Soriano, 2008

33
Crime Scene Documentation

Documentation of the crime scene is critical to the processing because this allows the
investigators to back up claims regarding the original condition and context of the scene.
Furthermore, it is relatively non-intrusive, although taking measurements could present
opportunities to change or damage the condition of the scene. Therefore, crime scene
personnel in charge of documentation should employ the least intrusive methods first
(Müftüoglo, 2017).

In processing the crime scene, the investigating team must consider the proper taking
of photographs and sketch making. Photographs should depict the actual scenario of the
crime scene and portray the proper placement of the individual evidence. Moreover, all
individual pieces of evidence must be shown in the sketch with precise measurements. All
these procedures must be written in the investigator‘s notebook.

An Investigator’s notebook refers to a pad of paper such as a work pad, tickler, or


notepad and the likes which is used to remember the details regarding the commission of the
crime and in any manner aids the investigator in refreshing his memory to recall matters
related to the case under investigation (Negosa, and Gabao, 2019).

34
ACTIVITY 5:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____
1. What is the main purpose of doing crime scene search?

2. What is a Crime Scene?

3. Is it possible to have multiple crime scenes? How is it possible?

4. What is an Investigator‘s Notebook?

5. Does size of the crime scene dictate the method of search to be used?

35
Photographing the Crime Scene (Soriano, 2008)

In photographing the crime scene, the investigator should endeavor to provide a series
of shots that supply a maximum of useful information and enable the viewer to understand
how the crime was committed. The photographer should show the relationships of the various
objects to one another. Locations of articles should be seen to recognizable backgrounds.

1. Overall Photographs
2. Photographs of the Deceased
3. Photographs of Articles of Evidence
4. Special Techniques
5. Photographing the Environs
6. Photographing the Body After Removal
7. Photographic Data

Requirements of Critical Crime Scene Photography


The following is the list of the requirements of critical crime scene photography:
1. Approaches to the crime scene.
2. Surrounding areas, such as the yard of the house where the homicide occurred, the
general areas surrounding and outdoor crime scene, and so forth.
3. Close-up photographs should be taken of the entrance and exit to the crime scene or
those likely to have been used if these are not obvious
4. A general scenario shot showing the location of the body and its position in relation to
the room or area in which it was found.
5. At least two photographs of the body at 90-degree angles to each other; the camera
should be placed as high as possible, pointing downward toward the body.
6. As many close-ups of the body should be taken as needed to show wounds or injuries,
weapons lying near the body, and the immediate surroundings.
7. After the body is moved, and after the removal of each item of evidence, the area
underneath these should be photographed if there are any marks, stains or other
apparent changes.

36
8. All fingerprints that do not need further development or cannot be lifted should be
photographed; areas where fingerprints were discovered, are photographed to show
the location if this area was not included in other photographs.
9. Colour film is desirable for bloodstains, including locations, although not necessary:
black and white pictures must also be taken.

Stages of Crime Scene Photography

Photographs of the crime scene are usually taken in three stages: the general view, the
medium-range view, and the close-up view. This approach enables a picture of all
circumstances to be pointed out to the court while leading up to most critical part of the crime
scene.
1. General Views – the general photographs is a sweeping view of the crime scene area.
It demonstrates what the crime scene looks like in its own environment.

Source: Rappler.com

2. Medium-Range Views – as the investigator moves closer to the subject of the crime
scene, additional photos should be taken. These photos should be taken at a distance
not greater than 20 feet away from the subject or item being photographed.

Source:youtube.com

37
3. Close-up views – moving from the broad to the specific, the last phase in
photographing the crime scene is the close-up. These photos are taken at a distance of
less than 5 feet and should focus on small segments of a larger surface or on specific
objects in the crime scene (Soriano, 2008).

Source: Alamy.com

Crime Scene Sketch – is a measured drawing of a scene showing the location of all
important items, particularly physical evidence.

Crime Scene Sketch in General

The photograph, ordinarily, is a two-dimensional representation of the crime scene


and, as such, does not provide accurate information concerning the distance between
various points in the crime scene. The relationship between objects present in the crime
scene cannot be clearly understood unless the measured distances are known. Certain
objects, moreover, are not visible in a photograph or cannot be clearly identified. A
drawing or crime scene sketch is the simplest and most effective way of showing actual
measurements and identifying significant items of evidence in their location at the crime
scene (Soriano, 2008).

38
The Crime Scene Sketch: (Montojo, 2007)

• The sketch is useful in questioning the suspects and witnesses and the writing of the
investigation report.

• A sketch indicates the actual measurement of things with scale and proportion
observed and oriented to the North. All necessary information is placed in the sketch
in connection with the crime being investigated.

• The sketch is an excellent companion to photograph. A photograph provides exact


details, while Sketch offers accurate information about the placement of objects and
shows the relationship and distance between things.

The Elements of Sketch


1.Measurement 4. Scale & Proportion
2. Compass Direction 5. Legend
3. Essential Elements 6. Title

Specific Kinds Sketch:

1. Sketch of Locality- give a picture of the scene, the crime and, its environment,
including buildings roads, to show the possible entrance and exit points.

39
2. Sketch of Ground – picture of the scene of the crime with its nearest physical
surroundings.

3. Sketch of Details - the immediate scene only.

40
Types of Sketch:

1. Rough – made by the prober at the crime scene. No scale proportion is ignored,
and everything is approximated. It is to be used as a basis for the finished sketch.

2. Finished – made primarily for courtroom presentation. All elements of sketching


must be present.

Rules for Sketching :

1. Never forget to determine the direction of the compass. Draw it on the sketch.
2. Control measurements. Do not rely on others to give them.
3. Do not draw things where are clearly irrelevant to the case.
4. Never rely on memory to make corrections at the station or any other place
removed from the scene of the crime.
5. The scale must be drawn on the sketch. If the camera has been used, mark its
position on the sketch.

CONSIDERATIONS IN PHYSICAL EVIDENCE

Physical Evidence – the means of ascertaining in a judicial proceeding the truth respecting a
matter of fact (Rule 128, RPC). Evidence can be anything that tends to
prove or disprove an issue in question (Müftüoglo, 2017).

Types of Physical Evidence

1. Physical Evidence – is any type of evidence that is real or has an objective


existence. It has dimension, size or shape, it can be seen, touched, smelled or tasted; it can be
solid, semi-solid or liquid

2. Testimonial evidence – is information obtained through interviewing and


interrogating individuals about what they saw, heard, or know. A testimony or confession can
add considerable value to physical evidence when presented in court. In addition, it can help
in understanding motives or explaining those things found at the crime scene.

3. Documentary evidence – consists of writings or any material containing letters,


words, numbers, figures, symbols, or other modes of written expressions offered as proof of
their content.

41
4. Demonstrative evidence – includes mockups or scale models of objects or places
related to the crime scene. It helps the court visualize what they are unable to view personally
(Müftüoglo, 2017).

Chain of Custody of Physical Evidence

Once physical evidence has been collected, it must be properly handled by each
person who comes in contact with it. A record must be attached to the evidence package
listing each person who has been in custody of the evidence and the dates on which that
authorized person has possession of the evidence.

In order for the evidence to be admissible in court, the chain of custody must remain
unbroken from the time the evidence was collected until it is presented in court. The purpose
is to assure that the evidence remains authentic and that there has been no opportunity for
tampering, switching, or otherwise mistreating the item by any persons deliberately or
negligently (Montojo, 2007).

Protection of Physical Evidence

1. Alteration of Evidence
a. Natural Causes
b. Negligence and Accident
c. Intentional damage or Theft
2. At the Crime Scene
3. Receiving Evidence
4. Transporting Evidence
5. Evidence not at the Crime Scene
6. Standards of Comparison
7. Containers and Packaging
8. Storage
a. Date the physical evidence was received
b. File number of the case
c. Title of the case

42
d. Person or place from whom or at which received
e. Person who received the physical evidence
f. Complete description of evidential items, including size, color, serial number
etc.
g. Disposition – the name of the person to whom the physical evidence was
delivered
h. Identity through the signature of the officer in control of the evidence room.

Rules for Collecting Physical Evidence (Soriano, 2008)

Physical evidence must be collected in a comprehensive non-destructive manner,


within a reasonable period, and with a minimum of unnecessary movement about the crime
scene.

1. If there is an indication that the physical evidence is deteriorating significantly, it


must have priority. In addition, the investigator should always wear protective
clothing to protect physical evidence from contamination.
2. All the major items are examined, photographed, recorded, and collected, as
appropriate, taking them in the most logical order, considering the requirement to
conserve movement.
3. Fingerprints should be taken or at least developed and covered with tape before the
object is moved.
4. After processing the more obvious physical evidence, the collection of additional
trace materials begins. Trace materials should be collected before dusting for latent
fingerprints.

Identification of Physical Evidence


Evidence should be properly marked or labeled for identification as it is collected or
as soon as practicable thereafter.
1. Marking of Physical Evidence – Solid objects that have a volume of approximately
one cubic inch or greater should be marked for identification with the initials of the
investigator receiving of finding the physical evidence. Objects that are smaller than

43
one cubic inch need not be marked, instead, they may be placed in a container such as
a pillbox, and the container then sealed and labeled.
2. Sealing of Physical Evidence – whenever practicable, articles of physical evidence
should be enclosed in separate containers. The investigator‘s initials or name and the
date of sealing in abbreviated forms should be placed on the seal in ink.
3. Labeling of Physical Evidence – a label should be affixed bearing the identifying
case information. This may take the form of paper pasted on the container or a tag tied
to the object. The following information should appear on the label or tag:
a. Case Number
b. Date & time of finding the article
c. Name and description of the article
d. Location and time of discovery
e. Signature of investigator who made the discovery
f. Name and witness to the discovery.

Transportation of Physical Evidence


If transportation to a crime laboratory is desired, the physical evidence must be
carefully packed to prevent loss or damage. In the absence of local crime laboratory facilities,
law enforcement agencies may seek the services of the NBI Crime Laboratory or the PNP
Crime Laboratory. In communicating to the NBI and PNP requesting examinations, a letter of
transmittal should accompany the physical evidence.

The communication should indicate that the evidence has not been and will not be
examined b an expert other than one of the NBI Crime Lab or PNP crime Laboratory. In
transmitting certain types of evidence by mail, cognizance should be taken of current postal
regulations.
For legal and scientific reasons, delivering physical evidence to the crime laboratory
is best done in person. If this is not possible, the Philippine Postal Corporation can deliver the
packaged physical evidence. Proper packing, wrapping, and sealing are extremely important
when evidence is shipped (Soriano, 2008).

END OF MODULE 2:
Please prepare for Midterm Examination Covering the entire Learning Packet
Module 1 & 2. Announcement will be posted in the group chats regarding the specific
schedule and collection of examination.
44
UNIT III: Lesson 3 – Introduction to
Police Intelligence
(Week 10-14)
This periodic lesson is about Introduction to Police
Intelligence. At the end of this lesson, you should
be able to:

1. Discuss the definition of Police intelligence and


other terminologies used in the subject matter.
2. Identify the different Major Categories of
Intelligence.
3. Describe the Historical development and
personalities behind the evolution of Police
Intelligence.
4. Discuss the different type of informants and its
purpose in intelligence operations
5. Enumerate the different categories of informants
6. Discuss the different phases in gathering
information and intelligence cycle.
7. Discuss the different terminologies used in
document and information security
8. Determine the different categories of classified
matters.

Source: Vectorstock.com

45
Week Introduction to 1. Discuss the definition of Police Home-based activity
No. Police intelligence and other terminologies with learning
10 Intelligence used in the subject matter. modules/activity sheets
to be distributed through
2. identify the different Major social media platform
Categories of Intelligence (GC), or in hard copy to
be picked-up in
designated area.
Week Historical 1. Describe the Historical Home-based activity
No. Development of development and personalities with learning
11 Intelligence behind the evolution of Police modules/activity sheets
Intelligence. to be distributed through
social media platform
(GC), or in hard copy to
be picked-up in
designated area.
Week Informant 1. Discuss the different type of Home-based activity
No. Cultivation & informants and its purpose in with learning
12 Motivation intelligence operations modules/activity sheets
to be distributed through
2. Enumerate the different social media platform
categories of informants (GC), or in hard copy to
be picked-up in
designated area.
Week Intelligence 1. Discuss the different phases in Home-based activity
No. Cycle gathering information and with learning
13 intelligence cycle. modules/activity sheets
to be distributed through
social media platform
(GC), or in hard copy to
be picked-up in
designated area.
Week Document and 1. Discuss the different Home-based activity
No. Information terminologies used in document with learning
14 Security and information security modules/activity sheets
to be distributed through
2. Determine the different social media platform
categories of classified matters. (GC), or in hard copy to
be picked-up in
designated area.

46
INTELLIGENCE
Intelligence results from the collection, collation, evaluation, analysis, integration, and
interpretation of collected information (Interagency OPSEC Support Staff, 1991). It is a
specialized information product that provides the United States or an adversary with
information required to further its national interests.
One of the most important functions of intelligence is reducing the ambiguity inherent
in the observation of external activities. In the most obvious case, adversary intelligence
organizations may seek information concerning military capabilities or other matters that
directly threaten the United States' national security. In other instances, adversary nations, or
other groups, may seek information about U.S. diplomatic negotiating positions, economic
programs, or proprietary information from U.S. corporations.
In each of these cases, the information sought may provide the adversary with an edge
and allow him to implement a well-developed strategy to reach his goals. In most cases, the
development of an intelligence product involves collecting information from several different
sources. In some cases, information may be disseminated immediately upon collection based
upon operational necessity and potential impact on current operations. This type of raw
intelligence is usually based on incomplete information about fast-breaking events and may
contain substantial inaccuracies or uncertainties that must be resolved through subsequent
report and analysis. Finished intelligence products contain information that is compared,
analyzed, and weighted to develop conclusions. Finished intelligence is produced through
analytical review in the intelligence process. The intelligence process confirms a fact or set of
facts through a multiplicity of sources to reduce the chance of erroneous conclusions and
susceptibility to deception.
Intelligence is divided into strategic and operational intelligence. Strategic intelligence
provides policymakers with the information needed to make national policy or decisions of
long-lasting importance. Strategic intelligence collection often requires integrating
information concerning politics, military affairs, economics, societal interactions, and
technological developments. It typically evolves over a long period of time and results in the
development of intelligence studies and estimates. Operational intelligence is concerned with
current or near-term events. It is used to determine the current and projected capability or
operation on an ongoing basis and does not result in long-term projections. Most intelligence
activities support the development of operational intelligence (Berkowitz and Goodman,
1989).

47
DEFINITION OF TERMS
Intelligence- is the end product resulting from the processing of information. It is a
knowledge resulting
Information – is an unprocessed material of every description, including those
derived from observation from observations, communications, reports, rumors, imagery, and
other sources from which intelligence is produced. It is an unprocessed information or raw
data
Intelligence information – information gathered or received which is of intelligence
interest.
Intelligence Community – an integrated and nearly organized entity composed of
units or agencies with intelligence interests and responsibilities.
Informer – one who gives information for a reward or price.
Informant – anyone who can furnish information.

CATEGORIES OF INTELLIGENCE
 Tactical Intelligence
- Concerned with the effects of the enemy, weather, or terrain on the enemy and
friendly operations. It deals with capabilities rather than intentions. It offers the
tactical commander the answer to questions concerning the enemy‘s capabilities and
conditions.
- Focuses directly on a specific operation.

 Strategic Intelligence
- Deals with political, economic, and military capabilities and vulnerabilities of all
nations.

 Counterintelligence
- Aspect of intelligence, which comprises civil and police/military measures to
counter the enemy or prevent sabotage or subversive activities. It is inseparable from
intelligence. It makes valuable contributions to the overall production of intelligence.

RELATIONSHIP BETWEEN STRATEGIC AND TACTICAL INTELLIGENCE


- Both are concerned with significant information pertaining to actual or potential
enemy operations/activities.
- Distinction is in scope, perspective and level of use.

48
BASIC PRINCIPLE OF INTELLIGENCE OPERATIONS (Manwong, 2008)

1. Intelligence is continuous
- All intelligence activities follow a simple continuous intelligence cycle. At the
same time, at any level of command. The term intelligence officer includes all the different
levels of classification when PS I&I and I, PPO S2 or PRO RIID and DI and emphasized
techniques and considerations which are primarily applicable to the I&I officer.

BASIC PRINCIPLE OF INTELLIGENCE OPERATIONS


1. Intelligence is continuous – all intelligence activities follow a simple endless intelligence
cycle. When new information is being collected in response to direction, other Information is
being processed, and intelligence is used.

2. Intelligence operations and tactical operations are inter-dependent - intelligence


operation is an integral part of the operation of all units. The success of the mission is
dependent on the quality and effectiveness of intelligence. Tactics and strategy are the cause
of intelligence operations.

3. Intelligence must be useful - Useful intelligence enhances understanding of the


problems to be solved. It results in assisting the commander‘s problem is essential to
determine what intelligence is useful.

4. Intelligence must be timely - Best intelligence is worthless if it does not reach the user in
time for appropriate consideration or action. Sometimes, the sacrifice of completeness and
accuracy may have to be accepted because situations require decisions to be made
immediately before intelligence can be produced. Therefore, the user must be advised of the
completeness and accuracy.

5. Intelligence operations must be flexible - Intelligence operations are based on reason,


and sound judgment and procedures must adapt to given situations.

6. Intelligence operations require imagination and foresight - Policies and procedures


with limited imagination or initiative are avoided; acceptance and satisfaction with
continuance of the current situation can lead to disaster.

7. Intelligence requires constant security measures - Security measures are necessary to


insure that authorized personnel are denied information and intelligence produced. Secrecy
counts to hide the form or covered information or intelligence. Security measures must not
deter dossier of information or intelligence to persons who ―need to know.‖.
49
ACTIVITY 6:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____
1. What is Intelligence?

2. Differentiate informer from an informant?

3. What is Counter Intelligence?

4. What are the two division of intelligence and how do they differ from one another

50
HISTORICAL DEVELOPMENT OF INTELLIGENCE (Manwong, 2008).

Intelligence gathering is considered one of the essentials in policing, particularly


because of its efficacy in providing vital and accurate information necessary for the success
of the implementation of various police programs and operations. Nevertheless, an
organization cannot achieve its objectives without careful and thorough planning. Intelligence
is what makes it possible, and that is how valuable it is. With this in view, it is imperative that
we know the historical development of intelligence to fully contemplate the metamorphosis it
had undertaken prior to its current set-up.
It is clearly undeniable that minute recognition has been given to the persons and
organizations involved in this colorful yet strikingly dangerous world of intelligence
collection. These unsung heroes are worthy to be recognized in light of the fact that we will
never be where we are today if not for their gallant efforts in collecting information so as to
restore and preserve peace in the world might as well as leveling up the bar in the collection
and utilization of intelligence to its maximum potential.
In view thereof, we have various personalities who have significant contributions in
the development of the world of intelligence collection, to wit:

Moses
He sent 12 spies from the twelve tribes of Israel to
secretly scout the land of Canaan. Eventually, they returned
reporting that the land was fertile but heavily guarded.
Moses is considered as the “forefather of intelligence
gathering”. (Holy Bible, Book of Numbers, Chapter 13)

Sun Tzu
He is a Chinese philosopher who posited that
foreknowledge cannot be elicited from spirits or from gods,
from analogy with past events nor from calculations.
Accordingly, it must be obtained from men who knew the
enemy situation. He also wrote the famous book “Art of
War”.
“If you know the enemy and know yourself, you
need not fear the result of hundred battles; if you know
yourself and not the enemy, for every victory you suffer
defeat; if you know neither yourself nor the enemy, then,
you are a fool who will suffer defeat in every battle.”

51
Alexander the Great
When Alexander the Great and his troops were
marching towards Asia, rumor of disaffection coming
from his allies and mercenaries grew. In or der to find
out the truth, Alexander utilized the simplest mean. He
told his subordinates he was writing a letter home and
told them to do likewise. Then, when the couriers
were laden and had set out for Greece, he ordered
them quietly recalled and proceeded to investigate all
the letters that they carried. Malcontents were
detected; legitimate causes of grievances exposed. He
devised the first letter sorting and opening of letter to
obtain information.
Moreover, he is also known for developing a
systematic way in delivering a message. He utilized
horses, carrier pigeons and fire beacons. Source.gettyimages.com.au

Genghis Khan

He was born “Temujin” but later changed his


name. He was also the leader of the so-called Mongol
conquerors who used effective propaganda machine by
spreading rumors of Mongol terror. They collected
information on the weaknesses of rivals by posing
themselves as disguised merchants.

Hannibal

He was a Carthaginian military commander and


tactician, known as the “Father of Strategy”. He was
considered as one of the brilliant military strategist in
military intelligence.

52
Frederick the Great

He was known as the “Father of Organized Military


Espionage”. He divided his agents into four classes:
a. Common Spies- those recruited among poor folk
glad to earn a small sum or to accommodate as
military officer.
b. Double Spies- the unreliable renegades chiefly
involved in spreading false information to the
enemy.
c. Spies of Consequences- couriers and noblemen,
staff officers and kindred conspirators requiring
substantial bait.
d. Persons who are forced to undertake espionage
against their own will. Source: www.duhaime.org

Napoleon Bonaparte

He maintained military intelligence and secret Political Police


Service all over Europe. During his time, counter-espionage came
into popular use.

Source:biography.com

Joseph Fouche He created a network of agent, modern system


of spying on spies later known as counter espionage. He is the
most feared and respected intelligence Director in French
history.

Source: headstuff.org

53
Sir Francis Walsingham (Elizabeth’s Spymaster)

He was an English nationality who worked for


Queen Elizabeth I, setting up an espionage system in
England and abroad. He organized the first national
intelligence service and employed spies on the staff of
the admiral in command of the Spanish army and
obtained information regarding Spanish army as to
their ships, equipment, forces and stores. He protected
Queen Elizabeth I from countless assassins.

Source:ancientimages.com

William “Wild Bill” Donovan

He was a Major-General who organized the OSS


(Office of Strategic Service) and builder of Central
Intelligence Service wherein OSS‘s exploits became
legendary in WWII. He is also known as “Father of
American Intelligence” and “Father of Central
Intelligence.”

Source: findagrave.com

Alfred Redl

One of the most brilliant intelligence agent


though a homosexual who became Chief of the
Austro-Hungarian Secret Service but in fact a
double agent of Russia. In 1913, his treason was
discovered and was forced to commit suicide.

Source:faculty.atu.edu

54
Nathan Hale

He was the America‘s first spy who worked for the


USA against the British. His life was working undercover in
British-occupied New York, USA. Hale was recognized by
a British officer and was arrested in 1776. Eventually, he
was hanged by the British for spying at the age of 21.
In 1985, he was officially designated as the state
hero of Connecticut. It is said that he uttered these words
before he was hanged, “I only regret that I have but only
one life to lose for my country.”
Source:onthisday.com

John Edgar Hoover (FBI’s Public Face)

He became the first and longest FBI Director from


1924 until his death at the age of 77 in 1972. He used
FBI to maintain secret information about politicians in
the US government and was considered too powerful
to sack.

Source: biography.com

Sir George Mansfield Smith- Cumming

He was a British nationality who served as the first


Chief of MI6 from 1909 to 1923. He had a leg
amputated after a car accident in 1914 and from then on
uses a child scooter to speed around the corridors of his
office. He is regarded as the “Founder of MI6”.

Source: factfiend.com

55
Allen Dulles (CIA Leader)

He was a CIA Director from 1953 to 1961. He ordered


coup de etat against the government of Iran and Guatemala in
the 1950‘s and was also responsible for failed attempt to
overthrow Fidel Castro‘s communist government in Cuba in
1961.

S
ourc
e:
en.
wiki
pedi
a.or
g

Kim Philby (Ultimate Mole)

He was a British nationality who worked for


Soviet Intelligence against Britain. He began working
for the Soviets in the 1930s and joined MI5 in 1939. He
was forced to leave MI6 in 1951. In 1963, he fled to the
Soviet Union and spent the rest of his life there.

Source: imdb.com

Reuven Shiloah

He is an Israelite who served as the first


Director of MOSSAD, an intelligence
collecting agency of Israel.

Source: mossad.gov.il

56
Rear Admiral Roscoe Hillenkoetter

He served as the first Director of the


CIA (Central Intelligence Agency).

Source:en.wikipedia.org

Famous Female Spies

Delilah

She was a biblical personality and an impromptu intelligence agent of the Philistines.
Apart from her tonsorial specialty, she allowed Philistine to hide in her house (Judges 16:9)
and was able to gain information by using her beauty and charm. She was responsible for the
fall of Samson.

Josephine Baker (Celebrity Spy)

Her real name is Freda Josephine McDonald and was born in the United States of
America. She became a French citizen in 1937 and worked for French intelligence during
WWII. She was a singer and dancer before WWII and used her celebrity status by smuggling
documents for French resistance knowing that Germans would not think to search such as a
popular entertainer.

Margaretha Geertruida (Grietje) Zelle

She was a Dutch nationality who worked for the French intelligence in WWI. She had
known many important German officers. Before 1914, the French government asked her to
travel to Germany and spy on them. The French became suspicious that she was also working
for the Germans.
On February 13, 1917, she was arrested in her room at the Hotel Elysee Palace on the
Champs Elysee in Paris. She was tried for treason and sentenced to death through execution
by firing squad. She is otherwise known as “The Entertainer” and Mata Hari code name H-
21.

Rose O’neal Greenhow (Society Spy)

She was an American nationality who worked for Confederates in the American Civil
War. She was well known in Washington D.C., USA and used her connections with enemy
57
Union generals and politicians to pass on information to the Confederates. She was caught by
the Union and was briefly imprisoned before being deported in 1862.
Stella Remington (Female Chief Spy)

She served as the first female Director General of MI5. She also gave the public
much more information about MI5 than ever before. In 1996, she retired from MI5 and has
written spy novels.

Famous Intelligence Organizations

CIA (Central Intelligence Agency)

This is the intelligence collecting organization of the United States of America which
was created under the United State National Security Act of 1947.

FBI (Federal Bureau of Investigation)

It was first established in 1908 as an investigative arm of the United States


Department of Justice. On September 6, 1939 via Presidential directive, it came to its
responsibility the task of a domestic intelligence. At present, it is the security service of the
USA.

KGB ( Komitet Gosudartvennoy Besopasnosti)

It is otherwise known as the “Commission of State Security”. It is the official secret


police agency of the Soviet Union in charge of the State Security. However, it was disbanded
by former Russian President Boris Yeltsin on the 21st of December 1995.

FSB (Federalnaya Sluzhba Besopasnosti)

It is otherwise known as “Federal Security Service” and is the successor to the Soviet
domestic intelligence known as KGB Second Chief Directorate. The FSB is the security
service of the Russian Federation.

SVR (Sluzhba Vneshney Razvedki)


It is the successor to the Soviet foreign intelligence known as KGB First Chief
Directorate. The SVR is the foreign intelligence service of the Russian Federation.

British Secret Service (SIS, coloquially MI6 in popular culture)


It was established by the Committee of Imperial Defense in October 1909. MI6 stands
for Military Intelligence Section 6 or A.K.A. Box 850 which collects secret information
around the world.

Security Service (MI5)


MI5 stands for Military Intelligence Section 5 and was founded in 1909 devoted to
counter-espionage. The MI5 is responsible for preventing spying and terrorism.

58
DCRI (Direction Centrale du Renseignement Interieur)
It is otherwise known as Central Directorate for Domestic Intelligence France.
DGSE ( Direction Generale de la Securite Exterieure)
It is otherwise known as General Directorate of External Security France.

BND (Bundes Nachrichten Deinst)


It is the Federal Intelligence Service of West Germany.

Red Gestapo
It is the security service organized by East Germany to combat the covert activities of
the West Germany when it was still divided by the Berlin walls.

NICA (National Intelligence Coordinating Agency)


It is the national intelligence organization of the Philippines which is directly under
the Office of the President. It was formed in 1949 which has its HQ in Quezon City with the
motto “Kaalaman ay Kaligtasan” or “Intelligence is Security”.

MOSSAD
It was formed on April 1, 1951 by then Prime Minister David Ben Gurion. The
MOSSAD has two branches, the “Aman” which is Military Intelligence and Israel Defense
Force, “Shabak” (means defender) the General Security Service

Branch of Service in the Government involved in Intelligence Work

1. NICA- National Intelligence Coordinating Agency


2. ISAFP- Intelligence Service Armed Forces of the Philippines
3. PNP- Philippine National Police
• RIU- Regional Intelligence Unit
• CIDG- Criminal Investigation Detection Group
• RID- Regional Intelligence Division
4. NBI- National Bureau of Investigation. It is the investigative arm of the Philippine
DOJ (created under R.A. 157 which was passed into law last June 19, 1947).
5. PDEA- Philippine Drug Enforcement Agency, created by virtue of R.A. 9165;
directly under the Office of the President and administration of the Dangerous Drug
Board (DDB).
6. AFP- Armed Forces of the Philippines
• MIG- Military Intelligence Group
• MIB- Military Intelligence Battalion
• ISG- Intelligence Security Group
7. 300th Squadron (Air Force Intelligence and Security Group)

59
ACTIVITY 7:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


Instruction: Write the correct answer in the blank provided before the question
by selecting from the choices.

ANSWER QUESTION CHOICES


1. Father of American Intelligence  Federal Bureau of
investigation
2. Wrote the famous book ―Art of War‖.  Hannibal
 William Donovan
3. This was established in 1908 as an  Stella Remington
investigative arm of the USDOJ.  Sun Tzu
4. He was known as the ―Father of  Frederick the
Organized Military Espionage.‖ Great
5. Father of Strategy  John Edgar
Hoover
6. First female Director General of MI5  Joseph Fouche
 Delilah
7. She was a biblical personality and an  Moses
impromptu intelligence agent of the
 Josephine Baker
Philistines.
 Red Gestapo
8. He is an Israelite who served as the
 Reuven Shiloah
first Director of MOSSAD
9. He became the first and longest FBI
Director
10. He created a network of agents and a
modern system of spying on spies, later
known as counter espionage.

60
INFORMANT CULTIVATION AND MOTIVATION

Definition of Informant

It is an individual who openly or secretly obtains or assists in obtaining information


for intelligence and counter-intelligence purposes without expecting any reward.
This is entirely different from an “informer” who gives information in exchange for
some recompense, monetary or otherwise.

Purposes of Informants in Intelligence Operations

1. Gain access to areas and targets inaccessible to intelligence.


2. Provide anonymity to investigations and operations.
3. Increase the scope of area of operation and target coverage within the capability of a
particular unit.

Types of Informant (Manwong, 2008):

1. Anonymous informant
He/she maybe an anonymous phone caller, letter writer or a text sender. The duty of the
investigator is to receive information, not to reveal any other information to the caller about
facts already known.

2. Confidential informant
This is a person who provides the police with confidential information concerning a
previous crime or a projected and planned crime. He/she does not want to be identified as
the source of information. Under the law, these informants are protected and their identity
could not be revealed by the police even under the order of the court unless on exceptional
case where there is a claim of the defense that the informant framed up the accused.

3. Rival-elimination informant
This kind of informant mostly maintains to be anonymous. His/her purpose is to
eliminate the rival person or gang due to competition or other motives such as revenge, etc.

4. False informant
This informant usually reveals information of no consequence, value or stuff connected
with thin air. His/her purpose is to appear to be on the side of the law and for throwing out
the suspicion form himself/herself or form gang or associate.

5. Frightened informant
He/she is prodded by fear or self-interest in giving information to the police.

6. Self-aggrandizing informant
This kind of informant moves around the centers of criminals, group or syndicate and
delights in surprising the police about bits of information. His/her information may be of
value by way of authentication in intelligence operation.
61
7. Mercenary informant
The informant has information for sale. He/she may have been victimized in a double
cross or little share in the loot or given a dirty deal and seeks revenge as he/she will profit
in the disclosure.

8. Double-crosser informant
He/she uses his/her seeming desire to divulge information as an excuse to talk to the
police in order to get more information from them more than what is given.

9. Women informant
She maybe the female associate of the criminals, who was roughed up, marginalized in
the deal or being eased out from the group (Manwong, 2008).

Categories of Informants

1. Incidental Informants
These are individuals who furnish information with no intention of repeating
their services or furnishing information on a continuing basis.

Types of Incidental Informants:

a. Interviewees - Individuals contacted by investigation or summoned by


an intelligence unit for questioning, and who are aware that they are in contact with an
official police or military agency.

b. Walk-ins or Volunteers - Individuals who, of their own accord,


contact an intelligence operative in order to divulge information they believe to be of
intelligence interest, e.g., well-meaning, patriotic citizens, and a wide range of
persons motivated by malice, avarice, revenge or jealousy who may volunteer biased,
distorted or completely false information for personal reasons.

c. Unwitting informants - These are those who provide information of


intelligence interest, and who are aware that they are imparting such information that
may be obtained from such person by subtle elicitation techniques or through
technical surveillance.

2. Casual Informants
Individuals who by social or professional position, possess or have access to
information of continuing interest and who willingly provide information either in
response to a specific request or on their own initiatives.

3. Automatic Informants
Those who by virtue of their official positions, are expected or obligated to furnish
information openly in the normal course of their duties, e.g., government officials, AFP
and PNP members and various technical experts.
62
4. Recruited Informants
Individuals that were selected, trained and utilize continuous and covert sources of
information concerning specific intelligence targets.

Types of Recruited Informants

a. Ordinary Informants
These are individuals who obtain the desired information during their normal daily
routine, but whose affiliation with the counter-intelligence unit is covert and under the
control of that unit. It is used primarily to achieve counter-intelligence area coverage.

b. Penetration Informants
Those assigned with the mission of obtaining information within a specific target.
They may be recruited outside the target organization and placed there or more usually
selected and recruited from among the personnel within the target itself.

c. Full-time Informants
These are those who are available for counter-intelligence missions at all times and
who may derive the major part of their income from their work as informants. They are
normally trained in investigative procedures.

5. Others
a. Double Agents - These are individuals who are simultaneously employed by
two opposing intelligence agencies with one of the agencies being aware of his dual
role.
b. Dual Agents - These are individuals who are simultaneously and
independently employed by two or more friendly intelligence units, and who do not
show preference for either, and normally motivated by material gain.

Motives of the Informant in Giving Information (Soriano, 2004)

1. Vanity
Ordinary citizens as well as reformed criminals are motivated by vanity to provide
information, believing it will win favorable attention from authorities.

2. Civic Mindedness
A significant motivating factor for informing is a sense of good citizenship. When an
eyewitness tells the police of observations made while a crime was being committed, or
of suspicious behavior noted, the person carries out a civic duty.

3. Fear
Fear is a powerful inducement to becoming an informer; however, protection must be
negotiated with authorities. It may be for one‘s self fear for one‘s family being killed,
tortured, or harmed in some fashion. Fear of imprisonment will cause some people to seek
a trade off.

63
4. Repentance
Just as those who have ―got religion‖ will be led by a need for forgiveness and re-
establishment in the community to furnish what they would not have discovered before,
so that the outcasts make amends by informing on confederates in past crimes.

5. Avoidance of Punishment

6. Gratitude or Gain
Gratitude is not usually a major factor in prompting an individual to furnish
information but it can be potent at times.

7. Competition
In specialized crimes, particularly dangerous drugs and illegal gambling, one
lawbreaker may, most often anonymously betray a rival to eliminate competition.

8. Revenge & Jealousy


A grudge is based on a perception of unfair treatment can provoke a desire for
revenge. However hackneyed the expression, ―hell hath no fury like a woman scorned,‖ it
still seems to speak for the pain of rejection. Indeed, any pain or distress induced by
another can result in jealousy and the need for revenge, and turn a person to informing.
The need to get even is deep in the human psyche.

9. Remuneration

Two Classical Systems of Gathering Information

1. English System
This system involves gathering information that has a little consideration on paid
informants. This system relies more on the information provided voluntarily or willingly by
patriots or civic-minded informants.

2. French System
This involves the practice of obtaining information that relies heavily on buying
information that relies heavily on buying information; this advocates the extensive use of
informers.

64
ACTIVITY 8:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____
1. Differentiate dual agent from double agent?

2. What is an informant?

3. What is an informer?

4. How useful are informants in intelligence operations?

65
INTELLIGENCE CYCLE

It is a repetitive process to produce intelligence from information. It is a process of


developing raw information into finished intelligence for policy makers to use in decision
making and action. There are steps or phases which constitute the intelligence cycle (Negosa
& Gabao, 2019).
.

PHASE I
Planning and Direction of the Collection Efforts
(Salamanca, Estoque, & Aclis, 2017).

It is the management of the entire effort, from identifying the need for data to
delivering intelligence product to a consumer.

It is the phase of the cycle that involved in determining the intelligence requirements
and in identifying the so-called essential elements of information (EEI).

Determination of Requirements
 enemy capabilities, including time, place, strength or other details.
 enemy vulnerabilities, terrain, including natural and artificial obstacles and
weather.

Determination of the Essential Elements of Information (EEI)

66
EEI- is an item of intelligence or information of characteristics of the area of
operations and the enemy, which the commander feels he needs before he can reasonably
arrive at a decision.
IR- information requirement regarding the enemy and its environment which needs to
be collected and processed in order to meet the PIR of a Chief or Head.

Categories of Intelligence Requirements:

In relation to use:
a. Executive
Intelligence required by executive, governmental and military commanders; the executive
requirements are the basis for decision and national policy.

b. Contributory
The intelligence required to complete the staff process--make staff plans and estimates that
contribute to the decision and policy making.

c. Operational
Additional intelligence required in the planning and carrying out effectively the decision or
policy announced.

d. Collateral
Higher or adjacent echelon of the government or military establishment may require
information.

As to the type
a. Basic
These are general reference materials for use in the planning regarding the enemies, area of
operations, capabilities and vulnerabilities.

b. Current
This is temporary in nature and narrower in scope.

c. Estimative intelligence
It determines future courses of action required by the executives to plan future military
operations and policies.

PHASE II
Collection of Information

It is the procurement of information or the systematic exploitation of sources of


information by collection agencies, and the delivery of information obtained to the proper
intelligence agency.

Sources of information (SOI)

67
These are persons, things, or actions from which information about criminal and or
subversives, weather and terrain is derived.
• Ex. Maps, photos, enemy documents, enemy materials, prisoners of war, and weather
forecasts.

Collection Agency

This is a generic term that refers to any person, unit, or activity that collects and
processes information by research, surveillance, or exploits sources.

Criteria in the selection of collection agency/ies:

a. Suitability-the collection agency‘s mission must be suitable to the assigned task.


b. Multiplicity-means more than one collection agency/agent must be used to obtain each
item of required information.
c. Balance- the collection workload must be balanced among the collection agency.
d. Capability- collection agency must be capable of providing information in a timely
manner.

PHASE III
Production or Processing of Collected Information

It is the conversion of basic information into a finished intelligence.

Collation - It is the organization of raw data and information into a usable form. This
can actually be done by grouping similar items of information so that they will be readily
accessible.

Recording - It is the reduction of information into writing or some other form of


graphical representation and arranging of this into groups of related items.

In an attempt to reduce collected information, the following are being utilized:

a. Intelligence Journal - It is simply a daybook or log of the activities of an intelligence


officer during a particular period or specific mission.
b. Enemy Situation Map - It contains information regarding enemy disposition,
location and terrain information and deployment.
c. Intelligence Worksheet - This is an indexed memorandum pad for recording
information regarding the enemy, its movement, locations and anticipated actions.
d. Intelligence Files- it consists of the following:
• Order of battle file
• Journal file
• Modus Operandi file
• Rouges Gallery

68
Evaluation - This is the examination of raw information to determine intelligence
value, pertinence of the information, reliability of the source of information and its credibility
or truthfulness of the information.
a) Pertinence- relevance by virtue of being applicable to the matter at hand
b) Reliability- judging the source of information
c) Credibility- truthfulness of information

INFORMATION EVALUATION RATING


(Salamanca, Estoque, & Aclis, 2017).

Reliability of Information Accuracy of Information

A---Completely Reliable 1---Confirmed by other sources

B---Usually Reliable 2---Probably True

C---Fairly Reliable 3---Possibly True

D---Not Usually Reliable 4---Doubtfully True

E---Unreliable 5---Improbable

F---Reliability Cannot be Judged 6---Truth Cannot be Determined

According to the Source of Information (SOI)

T—Direct observation by the Unit Commander/ Chief of Unit


U—Report by DPA (Deep Penetrating Agent)
V— Report by Government troops/AFP Troops and PNP Personnel
W—Tactical Interrogation of Captured Enemy
X—Observation of Government Civilian Employee
Y—Observation by members of the Populace
Z—Obtained from Documents

69
UNIT IV: Lesson 4 –
Document & Information
Security (Week 14-18)
This periodic lesson is about Introduction
to Police Intelligence. At the end of this
lesson, you should be able to:

1. Discuss the different terminologies


used in document and information security
2. Determine the different categories of
classified matters.
3. Discuss the different terminologies
used in clandestine activities.
4. Determine the different means of
clandestine communication.
5. Discuss the different terminologies
used in Elicitation.
6. Determine the different elicitation
tricks and techniques.
7. Discuss the different terminologies
used in undercover and surveillance
8. Differentiate the general use and
specific use of undercover technique
9. Discuss the different types of
undercover assignments.
10. Discuss the definition of casing and
surveillance and its types.
11. Determine the objectives of
conducting surveillance.
12. Enumerate the different type of
Source: Vectorstock.com surveillance methods.

70
DOCUMENT AND INFORMATION SECURITY (Manwong, 2008)

Document Security- aspect of security which involves the application of security


measures for the proper protection and safeguarding of classified information. (in a
document)

Information Security- is the protection of information of value from the enemy


force.

Related Terminologies:

Documents- it is any recorded information without considering its form or


characteristics and includes, without being limited to the following handwritten and
typewritten or printed material; all drawn, painted or engraved material ; all sound
recordings, voices, tapes, or records and all types of photographs and films, in negatives or
processed, fixed or in motion.

Classify- to assign info by one of the four classification categories.

Classified Matters- information that, in any form which in the interest of national
security, must be safeguarded in the manner and to extent requires by its importance.

Compromise- refers to the loss of security which results from an unauthorized person
obtaining knowledge of classified matter.

Custodian- a person in possession or that has the responsibility of protecting and


accounting for classified material.

Certificate of Destruction- it is the certification by a witnessing officer that the


classified matters describe therein has been disposed of in his presence by approved
destruction methods.

Security clearance- this is an administrative or directorial administration that an


individual is eligible from security standpoint for access to a classified matter of specific
category.

Compartmentalization- the grant of access to classified matter is limited only to


properly cleared persons in the performance of their official functions.

Declassify- removal of security classification from classified matter.

Reclassify- act of changing the assigned classification of matter.

Upgrading- act of assigning to matter of higher classification to a classified


document.

71
Properly Authorized Person- a person who has been authorized to work with
classified information.

CATEGORIES OF CLASSIFIED MATTERS (Manwong, 2008)

TOP SECRET MATTER

Classification is limited to the information and material that require the highest degree
of protection. Refers to information or materials that are extremely important for defense, and
the unauthorized disclosure would cause exceptionally grave damage to the country.
Example/s:
a. Military/Police defense plans- a strategic plan that documents the complete operations
of war.
b. Major government projects such as drastic proposal to adjust the nation‘s economy or
political set up (CHA CHA or CON CON)
c. Definite severance of diplomatic relationship that would damage the defense of the
nation.
d. Important political documents dealing with negotiations for major alliances.
e. Information on which would relate capabilities of major successes of our intelligence
service.
f. Strategic plan documenting the overall conduct of activity.

SECRET MATTER

Classification will be limited to defense information and material whose unauthorized


disclosure would endanger national security, cause serious injury to the interest and prestige
of a nation or of any government activity or would be of great advantage to a foreign nation.

Example/s:
a. Intelligence plans and estimates and watch list information
b. Documents showing dispositions of PNP or AFP forces
c. Information and material that would jeopardize international relations
d. Information and material that would compromise defense plans and scientific or
technological development important to national defense
e. Information and material that would reveal important intelligence operations
f. Complete plans for future operation of war not under top secret
g. New design of aircraft, projectiles, tanks, radar and other devices

CONFIDENTIAL MATTER

Information and material whose unauthorized disclosure, while not endangering the
national security, would be prejudicial to the interest or prestige of the nation or government
activity or would cause administrative embarrassment or unwarranted injury to an individual
or would be an advantage to a foreign nation.
72
Example/s:
a. Personnel record and staff matters
b. Routine intelligence reports
c. Plans of government projects such as roads, buildings or developmental areas
d. Routine service reports such as operations and exercises of foreign power
e. Investigation and documents of personnel which are disciplinary in nature, the
knowledge of which is desirable form of safeguard for administrative reason.

RESTRICTED MATTER

Information and material that requires special protection other than those determined
to be top secret, secret, or confidential.

Example/s:
a. Department books or instruction, training and technical documents intended for
official use only and not intended for release to the public.
b. Routine information relating to supply and procurements
c. Minor modifications and routine tests of equipment
d. Certain compilations of data or items that individually may be unclassified but which
in the aggregate warrants a classification.

Covers of Classified Material

The cover of classified material is used to call the attention of the personnel handling it, to the
fact that it is a classified document, and to protect it against unauthorized scrutiny. The cover
shall have the stamp identifying the classification of the document.

Handling of Classified Documents

Protection of classified material in the hands of persons that are travelling:


1. A person receiving travel orders, and who is unauthorized to carry classified material,
will protect such material by the following methods:
a. He will contact his commander in order to obtain the corresponding means of
protection, according to the particular classification of the material.
b. Keep the material under his personal control continuously. It is the responsibility of
the carrier of classified material to do his best judgment for his actions, in order to
avoid risky situations that might compromise the classified material.
2. The personnel on travel mission will not carry classified material when crossing
international borders where the classified material might be subject of scrutiny by
―unauthorized‖ persons. Such material when forwarded previously is by mail.

Destruction in Case of Emergency

73
Plans. The commander and chief responsible for the protection of classified material
will make formal plans for the destruction or safer transfer of all classified material under its
jurisdiction, in case of civilian disturbance, disaster, or enemy action.

On board aircraft or ships. If the aircraft carrying classified material is forced to land
or a ship captured, the material should be destroyed in a way that it will not be recognized; it
is preferable to burn it.

Security of the typewriter ribbons. The typewriter ribbons, whether made of cotton,
rayon, paper or silk, which are used to write classified information are not safe until they
have been written over twice. Many of the ribbons for typewriter machines can only be used
once, therefore, have in mind that the impressions of the letters remain in the ribbons and
these are significantly valuable to the enemy as is the paper in which the information was
typed. These ribbons should be protected accordingly.

Classified trash. Trash such as drafts, minutes, notes, Dictaphone recordings,


typewriter ribbons, carbon paper, rolls of film, and similar articles, containing information of
national defense shall be protected by a responsible person, according to their classification,
until they can be destroyed in an orderly fashion the same as for the material of similar
classification. It is necessary to have a certificate of destruction.

Classification, Reproduction, Storage and Destruction of Classified Documents

1. Top Secret
Classification. The original classification authority for assignments of top secrets
categories exclusively rest with the head of the department. This may however be
delegated to certain cleared officers in instances when the necessity for such arises.
Officials who are authorized to assign top secret classification are the chief of the PNP;
the regional directors of police regional offices; the secretary of staff of the AFP; and the
major service commanders of AFP.
Reproduction. Top secret documents may be copied, extracted, reproduced only when
all the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for top secret.

2. Secret

Classification. Those persons authorized to classify top secret. The other authorized
officers are: PNP directorates and staff, directorate of separate units; political attaches,
and AFP and civil government agencies.

74
Reproduction. Secret documents may be copied, extracted, reproduced only when all
the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for secret. Except that there is no need to prepare certificate of
destruction, instead a record of destruction is prepared and the witnessing officer must be
cleared for secret matter.

3. Confidential

Classification. Persons authorized to assigned confidential classification in the


performance of official duties are the commissioned officers in the active PNP service.

Reproduction. The copying, extracting of confidential document is authorized, unless


the higher authority has specifically denied such authority.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for confidential. There is no need to prepare records of destruction,
and is done without any witnessing officer.

4. Restricted

Classification. Persons authorized to assign restricted classification in the


performance of official duties are the commissioned officers in the active PNP service.

Reproduction. The copying, extracting of confidential document is authorized, unless


the higher authority has specifically denied such authority.

Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.

Destruction. Shall be by burning or pulping by the custodian in the presence of a


witness who is cleared for restricted. There is no need to prepare records of destruction,
and is done without any witnessing officer (Manwong, 2008).

75
ACTIVITY 9:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____
1. What is Collation?

2. Define evaluation?

3. Differentiate document security from information security

76
CLANDESTINE ACTIVITIES

It is an action used to accomplish intelligence, counter-intelligence and other similar


activities, sponsored or concocted by government, all departments in such a way to guarantee
secrecy or concealment.

Clandestine Operation – is a secret action undertaken by an intelligence/counter-


intelligence organization in behalf of the government or other friendly forces (Salamanca,
Estoque, & Aclis, 2017).

Related Terminologies:

Agent
This is a person who engages in spying or in support of those who do, or who seeks to
detect them and whose primary objective is to obtain information pertaining to processes,
activities, movements or operations of others.

Clandestine Communication
It is all means of operational contacts between person within the clandestine
organization as well as the transmission of messages on data, or the transportation of supplies
or equipment.

Casing
This is an inspection of place to determine its suitability for a particular clandestine
operation of organization.

Clandestine operation
This is an operation conducted in secrecy, but with no effort to disguise its nature.

Debriefing
An interview with personnel from a mission or captivity to get information of
particular interest.

Safe site
Any secured area or any structure which can provide concealment to a clandestine
meeting. Example: home apartment, office, beach house

Means of Clandestine Communication

1. Personal meeting
It is any face-to-face contact between two or more members of clandestine net. The
meeting may last several hours or may be only long enough for agent to pass a report to
another.

77
Advantages of Personal Meeting

a. There is an opportunity to pass a maximum amount of oral/written examination.


b. It offers an opportunity for the participants to ask question, answered and clear up
misunderstanding.
c. It allows a chance to make ―on the spot‖ decisions or giving specific instructions.
d. Provide opportunity to bolster the morale of the agent.
e. Opportunity provided to exchange information, money, or equipment.
f. Assessment can be made of the agent‘s attitude, truthfulness and physical and mental
condition.
g. More information can be exchanged quickly and with better understanding.

Important Considerations in Planning a Personal Meeting

In planning a contact with an agent, the emphasis is on simplicity, clarity and security.
The seven most important considerations in personal meeting are as follows:
a. Location
b. Time, date, frequency and duration
c. Cover story
d. Cover conversation
e. Signals
f. Detection of Surveillance
g. Escape Planning

2. Impersonal Meeting
It is a means of communication wherein the case officer and the agent do not meet but
continuously communicate with each other through the use of cut-out.

Cut-out
It is a person or device interposed between two persons and groups to provide
communication at the same time.

Cut-out may be:


 Live drop or Dead drop
 Witting or unwitting
 Moving or Stationary

Intermediary
It is an individual who serves as cut-out. Intermediaries may be witting and therefore,
members of the organization or unwitting as to the nature of their activity. In either case,
introduction of another person carries with it security hazards.

Advantages of Impersonal Meeting


a. Hide a relationship from the opposition.
78
b. Provide compartmentalization within the clandestine organization.
c. Provide security for the rest of the organization in case one part of it is penetrated.

An intermediary may be any of the following:


1. Live Drop (witting/unwitting live drop)
2. Cut-out devices
a. Dead drops- moving dead drops or mail
b. Couriers

ELICITATION

It is the technique of acquiring information of intelligence or of operational value in


conversation with a person who is not aware of your real interest or that you are purposely
collecting this information.
Elicitation is the gaining of information through direct communication and where one
or more of the involved parties is not aware of the specific purpose of the conversation.

It is a system or plan whereby information of intelligence value is obtained through


the process of direct communication where one or more of the parties to the communication
is/are aware of the specific purpose of the conversation (Salamanca, Estoque, & Aclis, 2017).

There are basic assumptions considered:


 Elicitation requires good skills in both verbal and non-verbal communications.
 The elicitor must have a general understanding of individual and cultural
idiosyncrasies. The source is probably operating under motivational forces to conceal
the desired information. Additionally, the source may have his/her own elicitation
skills and attempt to elicit information from the elicitor.

Characteristic of Elicitation

1. The person is not aware


2. There is little or no control over the individual
3. An isolated fragments of information

Conversation Means:

a. Interview – the conversation partner is cooperative, he is aware and he is not under


your control.
b. Debriefing – the conversation partner is cooperative, he is aware and he is under
some degree of your control.
c. Interrogation – the conversation partner is uncooperative or hostile, he is aware and
he is under your control.

Some of Elicitation Tricks


1. Quote a fact
79
2. Disagree partially
3. Use flattery but sensibly words
4. Share confidence
5. Make fragmentary remarks
6. Use analogous situation
7. Use negative approach
8. Use refreshments

Techniques in Elicitation
1. Talk topics of interest to the subject
2. Be a good listener and be patient
3. Switch topic when there is a logical opening
4. Try not to get too much quickly
5. Talk and act naturally
6. Avoid direct question
7. Pay particular to non-verbal reactions
8. Use approaches and probes when opportunity arises
9. Switch to an innocent subject before departing/terminating the interview.

Principles of Elicitation
Two basic devices:
a. Approach- used to start a conversation or to shift the direction of an existing
conversation.
• Flattery approach- effective because they appeal to the ego, self esteem and
prominence of an individual.
i. Teacher/pupil- make the person express topics about him/herself. Most people like to
talk about themselves.
ii. Kindred Sole-people express a need for recognition, particularly the lonely,
neglected, the vain and those with feelings of inferiority.
iii. Good Samaritan- do good deeds or favors to the source.
iv. Partial disagreement approach- seeks to produce talking by the word ― I‘m not sure
if I fully agree.‖
• Provocative approach- designed to induce the source to defend a position, state a
creed, or correct a wrong impression.
i. Teaser-bait: make the source believe you know more than him or her about the topic.
ii. Joe blow: purposely disagree with the source to induce anger.
iii. Manhattan and Missouri approach: the elicitor adopts an unbelievable attitude
above anything. He questions all statements and oppositions.
iv. National pride approach: natural propensity of all persons to defend their country
and its policies.

b. Probes- an attempt to obtain more information after the subject gives a vague,
incomplete general response. A probe is used with an approach in order to sustain a
conversation.
80
i. Completion: By inserting bits of factual information on a particular topic, the
source may be influenced to confirm and further expand on the topic.
ii. Clarity: A request for additional information where the sources response is
unclear. For example: I agree, but what do you mean by…………..?
iii. Hypothetical: Can be associated with a thought or idea expressed by the source.
Many people who might not make a comment concerning an actual event may
express an opinion on hypothetical situation.
iv. High Pressure Probe: It serves to pin down a subject in a specific area or it may be
used to point out contradictions in what the subject said (Salamanca, Estoque, &
Aclis, 2017).

Human weakness that can be exploited in elicitation


1. There is general inability to keep secrets.
2. It is a natural tendency for people to talk about matters that may or may not concern
him directly.
3. The enjoyment of gossip.
4. The need for recognition, particularly the lonely, neglected, vain and those with
feelings of inferiority.
5. There is tendency to underestimate the importance of the information imparted.
6. The habit of advising, contradicting, teaching, correcting and challenging.
7. The tendency to be indiscreet when emotion is involved.
8. The tendency of professionals to share confidence or show off expertise to another of
his/her profession.

Cardinal Rule of Elicitation


You must never arouse suspicion that curiosity is prompted by more than a casual or
personal interest. In other words, you must never appear to be “fishing for information”.

UNDERCOVER AND SURVEILLANCE

Definition of Cover

It is a strategy by which the investigator conceals his identity and his relation with the
investigative agency (Salamanca, Estoque, & Aclis, 2017).

It is also a mean by which individual, group or an organization conceals the true


nature of their activity and existence from the observer or outside elements (Soriano, 2004).

It is used so that intelligence agencies may operate with minimal interference from the
outside elements. By “outside elements”, it means those not having the need to know.
Undercover is a person with cover.

Cover story- a false story or identity used by spies or undercover agent to cover up their
spying activities.
81
Deep penetration- it is a type of undercover operation in which technique is applied
continuously and not over a limited period of time.

Deep Penetrating Agent- an agent who utilizes deep penetration.

Defector- a person who has decided to work for an opposing country or intelligence
organization; it is a person who turns away or against his allegiance to the government.

Handler- another word for controller or an agent who directs and support spies working
undercover.

Essential Uses of Cover


a. Secrecy of operation against enemy intelligence
b. Secrecy of operation against friendly agencies, who do not have the “need to know”
c. Pursue successful accomplishment of the mission

Functions of Cover
a. Defensive cover-- it serves to prevent detection.
b. Offensive cover—it gives access to the target and facilities for the achievement of the
clandestine activities.

Nature of Cover
a. Witting or unwitting exposure.
b. Any cover that is subjected to close scrutiny for an extended period of time will
probably be compromised.
c. Cover might appear plausible to the user, however, it is not so to the observer.
d. The cover must prove undercover identity with the opportunity to get the work done.

CONCEPTS OF COVER

1. Cover for status


A cover that is general in nature and relatively permanently adopted to explain the
presence in any given area.

2. Cover for action


A cover designed to explain away or allow to perform a given clandestine activity. It
may be an extension of cover for status.

3. Natural cover
A cover which completely fits the true background and capabilities of the agent. It
affords maximum security protection to any clandestine activity and allows greater
operational flexibility.

82
4. Official cover
A cover sponsored by an overt agency of a government.
5. Non-official cover
A person adopted by a person free of any official connection.

6. Artificial
Cover using biographical data adopted for a fictitious purpose.

7. Living One’s Cover


The agent must make sure that every public action he takes fits his assumed cover and
that a total picture presented to others accurately reflects his cover.

Requirements for Cover


1. It must provide freedom of movement.
2. It must protect the investigator from compromise.
3. It must be consistent with the social status of the target personalities.
4. It must provide adequate leisure time.
5. It must be sufficiently flexible to meet changes in the situations.
6. It must be consistent with the financial resources available to the investigator.

Types of Cover (Manwong, 2008)

1. Natural cover
Using true or actual personal background to fit the purpose.

2. Artificial cover
A cover using biographical data adopted for a fictitious purpose.

3. Cover within a cover


Use of secondary cover in case of compromise which necessitates the admission of a
lesser crime.

4. Multiple cover
Any cover identity wished.

Definition of Organizational Cover


An account consisting of biographical data which when adopted by an individual will
assume the personality he wants to adopt.

Objectives of Organizational Cover


1. To camouflage and protect operating personnel and their activities.
2. Protect installation in which clandestine activities are based.

83
Guidelines for Organizational Cover
1. Organizational cover must appear to produce something.
2. Should device that not all personnel will work together at the same time.
3. Cover should be devoted to mission.
4. Start with a small organizational cover and provide room for expansion as it continues
to grow.

Guidelines when Cover and Organizational Cover are Compromised

In case cover is compromised, the following must be observed:


1. Move out immediately.
2. Start new facility for operations and develop it.
3. Build entirely new cover.
4. Use circuitous route and provide careful counter-surveillance.
5. Be patient, build slowly and carefully.

If organizational cover is compromised, following are the things to be considered:


1. Make a physical move or relocate.
2. Start new facility for old operation and let it grow.
3. Use new personnel.
4. Let old personnel remain in place.
5. Build entirely new cover identity.

General Qualifications of an Undercover


1. Emotional stability
2. Willingness
3. High level of intelligence
4. Physical stamina and courage
5. Retentive memory
6. Free from domestic problems

Definition of Undercover Assignment/Operations

A form of surveillance or investigative technique wherein the investigator discards his


true identities, assume another one, and makes a direct contact with the person, place, or
situation under investigation.

Broad Categories of Undercover Agents

1. Deep Cover
It may be someone with extensive experience in undercover work, or a young person
selected from an academy training class. Novices are actually preferred sometimes because
they have not acquired the typical authoritarian habits that might give them away as police
officers, and also because they are less likely to be recognized by regular police officers in
the field who might unknowingly reveal their identity in a chance encounter.
84
2. Light Cover
Any undercover police officer working under ―light‖ may have a spurious document to
establish a fictitious identification, i.e., ID, driver‘s license, etc., but will most likely go
home to his family and ―real‖ life. Sometimes drug enforcement officers and other specially
trained agents will be called for these assignments.

Factors to be Considered in Planning an Undercover Assignment


1. Determine the level of investigation intended.
2. Developing appropriate cover story and cover, and selection of qualified personnel.
3. Consideration of all operation details including documentation, briefing, coaching and
rehearsing.

General Uses of Undercover Technique


1. When information or evidence would not be accessible by overt investigation or
through reliable informants.
2. When overt action might endanger the intelligence operations or investigation.
3. When overt action will arouse suspicion or alarm thus compromising the investigation
or otherwise alerting the subject.
4. When it is desirable to conceal the unit‘s interest in a particular case or certain field of
investigation.
5. When all feasible means of overt investigation have been tried and proven unsuccessful.

Specific Uses of Undercover Techniques

1. To gain confidence of the suspect and to gain unquestioning acceptance to the target
organization.
2. To penetrate a reported crime syndicate or a subversive organization.
3. To verify information submitted by informants or witnesses.
4. To trace security leaks and violations in police or military offices.
5. To support surveillance operations by providing an acceptable and logical basis for
surveillance personnel being in a particular area or location during surveillance.

Types of Undercover Assignments

• Dwelling assignment- is one where the agent establishes residence in or near the
dwelling houses of the subject.

• Work assignment- places the investigator in a type of employment where he can


observe the activities of subject at his place of work.

• Social assignment- requires investigator to frequent places of entertainment and


amusement known to be habitually visited by target personalities and their associates.

85
• Personal contact or Roping (Rope Job) - investigator is required to develop friendship
and trust of target for the purpose of obtaining information and evidence.

Methods of Undercover Operations

1. Direct—employment and utilization of special agents.


2. Indirect—employment and utilization of controlled informants.

Cover Story
It is a biographical account, true or fictitious, or a combination of truth or fiction
which portrays the undercover agent‘s past history, and current status. This may be a natural
cover story, artificial cover story and a combination of true or false persona data.

Factors to be Considered in Choosing a Cover Story

1. Justification for Presence and Activities


The story must include a logical explanation for the undercover agent‘s presence, and
consistent with the activities in which he must engage during the investigation or collection
of information.

2. Mutual Point of Interest


The story must provide point of mutual interest between the target personalities,
undercover agents, undercover operations and cover story.

3. Complete Background
The cover story must include the material on all aspects of the undercover agent‘s
previous background, regardless of whether or not it is anticipated that this information will
be required.

4. Continuous Contact
It includes provisions for sufficient contact between the undercover agent and the target
of interest to produce worthwhile results.

5. Safe Departure
It must consider the removal of the undercover agent from the target area in the event the
operation is compromised, or the conclusion of the investigation or collection of information.

Complete Background Investigation


It is a type of personnel security investigation as form of counter-intelligence of an
organization. Background investigation is an inquiry or to check the specific phase and all
aspects of a person‘s life history.

CBI is entirely different from partial background investigation since the latter is
limited only to some of the circumstances of subject‘s personal life.
It is also a detailed check on an individual‘s activity from the town a person was born
and life 15 years ago.
86
Requisites of a Complete Background Investigation

a. National Agency Check


This is an investigation of an individual made upon the basis of written information
supplied by him in an official inquiry.
Examples are inquiry on the records or clearances from NBI, PNP, ISAFP and other
related agencies of the government.
b. Local Agency Check
This is a type of investigation which consists of written inquiries sent to appropriate
local government agencies.
This includes check with local police, Municipal Trial Court and Regional Trial
Court.
c. Personal History (see personal backgorund)

d. Residence History

e. Educational Background
i. Elementary/High School
ii. Name of School
iii. Year Graduated
iv. College (degree, school or university, year graduated)
v. Post Graduate degree (if any)
f. Employment History

g. Citizenship History

h. Family Background and Associates


i. Father‘s name/Mother‘s name
ii. Address/Occupation
iii. College/Degree, year graduated
iv. Brothers/sisters
v. Name of Associates

i. Credit Record

j. Foreign Travel

k. Neighborhood Check

l. Organizational Membership

m. Character References

n. Criminal Records
87
ACTIVITY 10:
Answer the question by explaining and giving
o.
examples. Provide your answers in the box provided.

Name:__________________________ Subject/ Code: ______________ Rating:


_____
1. What is a cover story?

2. Differentiate Deep cover agent from Light cover agent and site an example.

3. Explain the Cardinal Rule in Elicitation

88
CASING

It is a reconnaissance or surveillance of buildings, places or areas to determine its


suitability for intelligence use or its vulnerability to an intelligence operation.

The purpose of casing is to draw up a report with sufficient detailed information to


enable the reader to use the installation or area in the most secured and successful manner.

Casing maybe used to locate and/or provide information on meeting sites, safe
houses, dead drops, air and sea reception sites, catching sites, air fields and radio sites, VIP
security coverage, etc.

Types of Casing

a. Exterior Casing- it is the observation of the whole area, building and installation,
possible exits and approaches, type of vicinity that may be of help to any intelligence
or counter-intelligence operation.

b. Interior Casing- it is the close observation of the layout of the building.

Methods of casing

1. Personal Reconnaissance
This is the most effective method and will produce the most information since you
know the details.

2. Map Reconnaissance
It produces a good picture of the area. Through the map, you can make visual survey
or observation of the target area.

3. Research
It is the study of unclassified sources like local newspaper, periodical, public bulletin
and radio broadcast and from telecast.

4. Prior information
This is a study of on-file report or activities of the target place or file reports of other
intelligence units.

5. Hearsay
This type of information is not reliable.

Steps or Guide in the Conduct of Casing

1. Preparation of a general location map.


2. Sketch of the adjoining establishments and prominent features
3. Specific sketch or floor plan of main target
89
4. Detailed features of inner portion of target and its description
5. Photograph of the casing target

Guidelines in the Conduct of Casing

1. To gain contact as soon as possible and maintain continuously


2. Maneuver freely in conformity with operations (dry run)
3. To fight only when necessary
4. To report all items of information
5. To develop the situation

Information Desired

a. Active Opposition
It consists of all elements of opposing security system to prevent intelligence activity in
the area. It includes also the security system of friendly forces in the area that does not
have the „need to know‟.

• Professional services
• Civil service such as the police, fire department, any local government agency or
other intelligence units.
• Observing Public—it includes informers, sympathizers and any other who are
willing to report information of any careless casing activity.

b. Area conditions and Habits


This is the description of the place as to rural or urban area, its transportation facilities,
the custom and tradition, habits of the people including operational data. (Time where the
area is useful-closing time)

c. Disposal Plan
It is the disposal of information in case of possible compromise.

d. Escape and Evasion Plan


This is the exit planning in case of emergencies, the knowledge of the escape route and
means of travel is very important.

SURVEILLANCE

Definition of Surveillance

It is a secret observation of persons, places, and vehicles for the purpose of obtaining,
information concerning the identities of criminals and their activities (Garcia, 2003).

90
Related Terminologies:

• Surveillant- the person who conduct surveillance.


• Subject- is the person, place or thing under surveillance.
• Convoy- an associate of the subject who follows him in an attempt to detect
surveillance.
• Decoy- a person or object used by the subject to elude surveillance.
• Contact- is any person with whom the subject speaks, to whom he passes articles or
from which he receives articles.
• Shadow- to follow secretly; to place a person under surveillance.
• Lost- when the surveillant does not know the whereabouts of his subject or the
subject has eluded the surveillance.
• Eyeball- the channel which has direct observation of the subject.
• Made- to be detected or suspected of being surveillant of the subject.
• Rabbit- refers to the subject or person being followed in a surveillance operation.
• Stakeout- a process wherein a part of the surveillant group clandestinely position
himself in an advantageous and fixed position to clearly monitor and observe the
subject and his activities.
• Technical surveillance- surveillance involving the use of scientific devices to
enhance hearing or seeing the subject‘s activities.
• Pre-surveillance conference- a conference held among the team members before
surveillance is conducted.
• After Mission Report-account submitted immediately upon completion of mission
by an undercover agent.
• Burn the surveillance- when the surveillant behavior causes the subject to surmise or
know that s/he is under surveillance.
• Mustard plaster- the subject is followed so closely that the surveillant and subject
are almost in lock step.
• Tailgaiting- a form of open surveillance in which the subject‘s vehicle is closely
followed.

Objectives of Surveillance

1. Learn the identity of the persons involved in a given activity and obtained detailed
information concerning the scope and nature of its activities.
2. To locate the residence, place of business, dead drops, and other places frequented by
associates and accomplices of persons of interest to the investigation.
3. To locate a subject by watching his haunts or associates.
4. Secure basis for obtaining search warrant and obtain advisable legal evidences for use
in court.
5. To check on the reliability of informants.
6. Prevent the commission of espionage, sabotage or subversion.
7. To obtain information for later use in interrogation.
8. To know at all times the whereabouts of individual.
91
9. To locate hidden property or contraband.

Types of surveillance based on the knowledge of the subject:

1. Covert surveillance
This is a type of surveillance conducted to a subject who is unaware that he/she is
under surveillance.

2. Overt surveillance
This occurs if the subject is aware that he/she is under surveillance.

Kinds of Surveillance based on the location of the subject (Negosa, and Gabao, 2019).

1. Moving surveillance- conducted when the person, object or activity being watched
moves from one place to another.
It is performed by foot or by the use of any transportation vehicle in order to observe
the subject.

2. Fixed surveillance- conducted when the person, object or activity being watched is not
expected to move from one area.

Method of Surveillance

1. Loose surveillance-also known as “discreet surveillance”. Observation of the subject


is not continuous and the objective is not to be “made”. It may be called off when the
subject becomes suspicious.
2.
3. Close surveillance- it also termed as ―tight surveillance‖. Continuous observation of
the subject is maintained at all times, even if it appears to become suspicious and the
objective is not to get “lost”.

4. Combination of loose and close surveillance- circumstances which usually depend


on a specific act of the subject may necessitate a change from a loose surveillance to a
close surveillance.

Procedures in Fixed Surveillance

1. Use a room nearby house or building.


2. Use camera with telephoto lens and powerful binoculars in order to get pictures of
subject, visitors and activities.
3. Use listening devices, if situation allows.
4. Some surveillants may remain outside, posing as carpenters, plumbers, etc.

92
Tools Used in Fixed Surveillance
1. Binocular
2. Telescope
3. Cameras with telephoto lens
4. Wiretapping devices
5. Listening devices
6. In case there is difficulty in wire tapping device, an expert in lip reading must be
employed.

Personal Appearance of Surveillant

1. He/she must be of an average height, built and general appearance of a person who
could easily mingle with the crowd without being conspicuous.
2. Adapt an inconspicuous clothes and jewelry.
3. Grooming and body accessories must blend with the crowd to avoid unnecessary
attraction or attention or to avoid him/her being fixed in the mind of a very observant
person.
4. Avoid noticeable peculiarities in appearance and mannerisms.
5. He/she must be resourceful, alert, quick-witted, and versatile to reason out once accused
by others.
6. A good actor by being able to avoid suspicion in an embarrassing situation.
7. Be prepared for a ‗cover story‟. The cover story must be believable regarding his/her
personal appearance. If he acts as a vendor, he/she must look as one without the display
of manicured fingernails or attire at odds with fictitious personality.

General Procedures of Surveillance

1. Identify the subject


A positive identification of the subject is important. It should be obtained before any
surveillance is conducted.

2. Dress of surveillant
The surveillant attire should be in harmony with the area or neighborhood in which
surveillance is conducted.

3. Precautions
• Do not make abrupt, unnatural move.
• Do not use theatrical disguises.
• Never stare directly at the subject.
• Never look directly at the subject‘s eye.
• Do not attempt to appear innocent.
• When in dangerous neighborhood, walk near the curb to reduce the possibility of
attack from doorways and alleys.
• Exercise extreme caution in dark alleys.

93
• Never speak to or appear to recognize another surveillant unless absolutely necessary
to accomplish the mission.
• Inexperienced surveillants must conquer the tendency to believe in themselves ‗made‘
when the subject glances in their direction several times.

4. Techniques of Surveillance (shadowing/tailing)

Shadowing by Foot

It employs the use of one or more surveillants where the surveillant and the subject
travel by foot and the surveillant has to shadow him for the rest of the operation.

Shadowing by Vehicle

It may involve the use of one or more vehicle normal to the area.

Techniques in Shadowing by Foot

1. One-man surveillance (A method)


One investigator is used to conduct the surveillance. It is best employed in stakeout. It
should be avoided in moving surveillance because it provides the least amount of flexibility
in surveillance.

2. Two-man surveillance (AB method)


In this technique, the surveillant behind the subject is always known as the A
surveillant. A follows the subject and and B either follows on the same side of the street or
from across the street. When both A and B operate on the same side of the street with the
subject, and the subject turns a corner, B turns the corner behind the subject and assumes
the position of A. A now becomes B and operates across the street from the subject and to
the rear of A.

3. Three-man surveillance (ABC method)


It employs three surveillants, and is intended to keep two sides of the subject is covered.
A follows the subject. The normal position for B is behind A. C normally operates across
the street.

4. Leapfrog method
Only one member of the team maintains contact with the subject. It is a close tail, with the
other members of the squad keeping contact with those immediately ahead of them. At
stated intervals of five to six minutes or upon signal, the man immediately behind the one
keeping contact will move up and take his place; the one that had been in contact will stop,
look in a show window or wait at a traffic light, then take his place behind the last man of
the group. This procedure is continued in rotation as long as the tail is maintained (Negosa,
H. and Gabao, 2019).

94
Counter-Surveillance Techniques

Testing for Surveillance


a. Window shopping
b. Paper Drop
c. Retracing the course
d. Stopping immediately after turning a street/corner
e. Watching persons getting on a succession of conveyances
f. Suddenly leaving a public conveyance
g. Convoys
h. Watching the procession
i. Talking to acquaintance
j. In urban area
k. Theaters
l. Use of law enforcement agencies
m. Changes of traffic lights
n. Decoys
o. Changing appearance

Vehicle (Automobile) Surveillance

1. One vehicle technique


One vehicle follows the subject alone to observe the movements and to stay far
enough to avoid ready detection.

2. Two vehicle technique


One vehicle follows the subject at a varying distance and another on a parallel street.
The two vehicles can exchange place from time to time.

3. Four vehicle technique


Provide greater flexibility than the two vehicle technique. The eyeball keeps track of
the subject while another vehicle follows the eyeball.

Please prepare for Final Examination Covering the entire Learning Packet
Module 3 & 4. Announcement will be posted in the group chats regarding the specific
schedule and collection of examination.

95
REFERENCES

Berkowitz, B. and Goodman, A. StraJegic Intelligence for American National Security,


Princeton, NJ: Princeton University Press, 1989.
Garcia, R. (2003). The Art of Criminal Investigation & Detection. Central Book Supply, Inc.

Interagency OPSEC Support Staff, Compendium of OPSEC Terms, Greenbelt, MD: IOSS,
April 1991.

Lyman, M.D. (2011). Criminal Investigation: The Art and the Science (6 th ed.) New Jersey:
Pearson Education, Inc.

Montojo, F. (2007). Special Crime Investigation: Lesson for Criminology Students. National
Bookstore, Mandaluyong City.

Müftüoglo, E. (2017). Fundamentals of Criminal Investigation 2nd Ed. Chapterhouse


Publishing Inc. Quezon City (pp 2-6).

Negosa, H. and Gabao, G. (2019). Fundamentals in Criminal Investigation and Intelligence.


Rex Bookstore. Manila.
Oster-burg, J and Ward, R. (2004) Encyclopedia of Police Science. Retrieved from
http://what-when-how.com/police-science/crime-scene-search-and-evidence-
collection-police.
PNP Criminal Investigation Manual 2011. https://rb.gy/gbrkas

Soriano, O. (2008). Fundamentals of Criminal Investigation. Great Books Publishing.


Quezon City. (pp. 139-147).

Soriano. O. (2004). Handbook on Police Intelligence. Great Books Publishing. Quezon City,
(p-13-14).
Swanson, C. Chamelin, N. and Territo, L. (2003). Encyclopedia of Police Science. Retrieved
from http://what-when-how.com/police-science/crime-scene-search-and-evidence-
collection-police.
Tradio, C. (1993). Handbook of Criminal Investigation. Central Professional Books, Inc.
Quezon City (pp. 4-5).

96

You might also like