CDI 1 Module
CDI 1 Module
for
FUNDAMENTALS OF
INVESTIGATION & INTELLIGENCE
(Week 1-18)
PREFACE
The course will discuss on the origins of Criminal Investigation and recognize the
important personalities, its history & development of forensic science who greatly
contributed to the development and advancement of technology used in our current police
investigation methods and processes. To be familiar with the common terminologies used in
Criminal Investigation. Enumerating and explaining the different objectives and goals of
basic tools needed, and the protocols required to be observed in the conduct of the
investigation.
This course also covers the topics in Police Intelligence, which tackles the historical
cycle, Document & Information security and its clandestine activities, uncover, casing and
surveillance.
1
TABLE OF CONTENTS
Preface 1
Table of Contents 2
Course Guide 3
General Course Information 3
Course Learning Plan 3
Course Forum 4
Policies 4
Unit I – Fundamentals in Investigation 6
Unit II – Crime Scene Search 27
Unit III - Introduction to Police Intelligence 44
Unit IV - Document and Information Security 69
2
COURSE GUIDE
General Course Information
Course Title : Fundamentals of Criminal Investigation & Intelligence
No. of Units : 4 units
Duration : 18 weeks
3
Course Forum
This is a read-and-write forum, which means you can access all learning materials and
related discussions and activities here.
Policies
Class policies may be slightly different depending on the modality in which you
attend class. In this case, you may be using distance learning or distance blended learning. If
you chose distance learning, your activity portfolio must be sent to the school through courier
service or may be hand-carried or dropped at the school campus. Your portfolio must be
secured in a sealed brown envelope and labeled as follows:
For distance blended modality, you may send your activity portfolio to my email
address [email protected], and indicate the following:
I. Study Guide
1. Manage your time well. Be mindful of time requirements to complete weekly
lessons and activities.
2. Focus your attention. Avoid other distractions while working on your weekly
lessons and activities.
3. Submit on time. If you need to mail your Activity Portfolio, take note of the
length of time it will take to send it. You might need to finish all activities
ahead of time, so your Activity Portfolio will reach me as scheduled.
4. Answer confidently. Preparation provides the needed confidence. Put value
on the time you allot to go over your lessons. This will ensure your answers
coming out right.
4
5. Work independently. The whole learning process is about you. Focus on the
goal to learn. There is nothing more satisfying than the safe knowledge that
you completed the course working truly independently.
6. Motivate yourself. The learning process here will certainly depend on the
habits of the mind that you cultivate. An optimistic outlook will help you
finish the course without a hitch. It would help if you start breaking the
routines during the quarantine lockdowns, and take control of your schedule.
Prioritize how you spend your time and set learning goals for yourself.
Remember this is not just about finishing a course, this is about getting a
bigger goal done – like graduating and getting a good job in the future.
To pass the course, you must go through the Learning Packets with care and
do the pre-assessment and self-assessment activities.
Pre-Assessments,
Self-Assessment and
Examination - 40 %
Activities - 20 %
Experiential Reports - 20 %
Final Projects - 20 %
-------------
100%
You may contact me for clarifications and questions when moving through this
learning packet anytime between 9:00am-3:00pm using this format, for easy identification
5
UNIT I: Lesson 1 – Origins of Criminal
Investigation (Week 1-5)
This periodic lesson is about Fundamentals
of Criminal Investigation. At the end of this
lesson, you should be able to:
INTRODUCTION
6
If there is reason to assume that a crime has been indeed been committed, further
investigation is undertaken using scientific methods and techniques. Technological advances
have been incorporated into criminal investigation as well; for example, analyzing trace clues
such as dust, paint, glass, body fluids, and other microscopic evidence is now possible.
Early criminal investigation was a crude process, relying on eyewitnesses, inferences,
and confessions extracted under torture. In early 19th century, for instance, the principal
technique for catching thieves was obtaining evidence from informers who were also engaged
in crime.
Criminal investigations are conducted in accordance with the dictates of the law. The
conduct of an investigation is governed by information obtained from people, records, and
physical evidence. Victims or witnesses still provide the bulk of facts as to when, where,
how, why, and by whom the crime was committed. (Montojo, 2007).
Police science utilizes the methods of natural and related sciences as aid in criminal
investigation. It may be said to have three phases that embraces.
The Industrial Revolution in Europe drew the peasant class from the countryside into
the towns, and the crime wave that swept through the burgeoning cities forced governments
to make hasty, ad hoc responses to the crisis. As it was described, "the rapid expansion of
London, and the increased population was protected merely by a system of purely local
constables and watches which had been inadequate to the needs of a far smaller community,
and was now hopelessly overwhelmed. The situation gave rise to the evolution of the thief-
takers/catchers."
Although the "thief-takers or thief-catchers" were not ordinarily sought from among
those already part of the underworld, it was the criminal element in their midst to which
authorities turned for help. The rank and file of those recruits constituted a distinct breed, but
two clear-cut differences of motivation set some apart from others. One kind was hirelings—
7
with mercenary motives, they would play both sides of the street. The other kind were called
social climbers who, in order to move into respectable society, would incriminate their
confederates (Soriano, 2008).
The earliest police force in England was firs established in 1253 and lasted until 1829.
These constables who worked only at night were first known as the "Watch of England", then
later as the "Old Charleys." In the 1750's, the Novelist Henry Fielding was appointed as Chief
Magistrate. He subsequently appointed parish constables who became successful thief-takers
and later became known in the 1750's as the "Bow Street Hunters". It was the first well-
known investigative body in England (Lyman, 2011).
In 1829, Sir Robert Peel founded the London Metropolitan Police Department as the
world's first paid and full-time police force. They replaced the old constables and the Bow
Street Runners who had ultimately gained a reputation for incompetency and inefficiency.
These officers were dubbed as "Bobbies" and were required to meet rigid standards of
professionalism, including minimum height and weight requirements and standards of
literacy and character (Lyman, 2011).
By the 19th century, technology in crime detection began to flourish with the creation
of a personal identification system by Alphonse Bertillon. In the mid-1840's, a study of
fingerprint patterns became a popular means to identify suspects in crime. In 1892, Sir
Francis Galton published a book entitled "Fingerprints", a landmark book that led to the
identification of criminals based on fingerprint evidence found at the crime scene. Other
scientific developments were applied to the examination of physical evidence, including the
use of comparison microscopes, bloodstain analysis and firearm identification. This led to the
establishment of the first police laboratory by Edmond Locard in 1910 in Lyon, France. The
expansion of crime laboratories in other large cities were slow, but was later coupled with the
creation of university programs in criminalistics.
By this time, police departments have become formally organized, and the use of
informants in criminal investigation has been supplemented by interrogations and other
methods to secure confessions. The term "third-degree" has thus been employed to
characterize the then widely used extraction of confessions accompanied by brute force.
8
Eventually, however, third degree interrogations were banned by the United States Supreme
Court in the 1890's on the ground that it violates the Eight Amendment of the U.S.
Constitution disallowing excessive bails, excessive fines as well as tortures. Moreover, the
potential offered by the application of science to the examination of physical evidence also
contributed to the decreasing popularity of "Third Degree" interrogations (Müftüoglo, 2017).
One significant development in the field of criminal investigation in the United States
is the establishment of the Federal Bureau of Investigation (FBI) in 1924. Today, the FBI is
one of many federal investigative agencies that has made great strides in professionalizing the
field of criminal investigation (Lyman, 2011).
Important Personalities
MATHIEU ORFILA
(1787-1853)
Source: Wikipedia.or
ALPHONSE BERTILLON
(1853-1914)
FRANCIS GALTON
(1822-1911)
LEONE LATTES
(1887-1954)
Source: nanopdf.com
CALVIN GODDARD
(1891-1955)
10
ALBERT S. OSBORN
(1858-1946)
• Developed the fundamental principles of
document examination.
HANS GROSS
(1847-1915)
EDMOND LOCARD
(1877-1966)
• In 1910 started the first police laboratory.
11
ACTIVITY 1:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
1. What was the contribution of Alphonse Bertillon that contributed to the growth of
technology in crime detection?
2. What was the reason why the Bow Street runners were replaced in 1829?
3. How was the population of peasants cause the increase of crime rate in England?
12
ACTIVITY 2:
Answer the question by writing the correct answers in the box
provided.
13
Lesson 2: Basic Principles of
Investigation
The investigative function has three goals. These goals are not separable, nor are they
necessarily harmonious. Pursuit of one goal may help achieve one or both of the other goals.
1. Controlling Crime – Society has three basic mechanisms for controlling the
behaviour of those engaged in crime: deterrence, rehabilitation, and incapacitation.
Deterrence means scaring criminals into desisting from criminal conduct. Rehabilitation
entails directly inducing criminals to stop committing crimes. Incapacitation occurs when
active criminals are caught and removed from free society. Incarceration prevents them from
preying on the public.
3. Addressing Problems – the final goal that is increasingly set for the investigators
is addressing the many and varied problems the citizenry feels the police should resolve.
Citizens‘ reports of crimes are usually investigated individually. However, crimes are often a
14
part of a larger pattern of incidents symptomatic of a set of troublesome circumstances for
which the police may be held responsible (Soriano, 2008).
These Cardinal Points of Criminal Investigation are anchored on the theories of crime,
which involve three interdependent factors: motive, opportunity, and means.
Source: mycrimestudies.wordpress.com
15
Opportunity - refers to the chance or occasion to commit the crime.
Motive is the reason that pushes a person to commit an act with a definite result in
mind. It is not an element of a crime but may be useful when the offender's identity is
unknown.
Means – is the capability of a person to commit a crime using available tools at their
disposal.
Even if the individual has the motive but doesn‘t have the means and the opportunity,
they cannot commit a crime because the three things are interdependent, and the absence of
one would not result in a crime (Müftüoglo, 2017).
1. Identify and, if possible, retain for questioning the person who first notifies the first
responder.
2. Determine the perpetrator by direct inquiry or observe him if his identity is
immediately apparent.
3. Detain all persons present at the scene, if possible.
4. Summons assistance, if necessary.
5. Safeguard the area by issuing appropriate orders and/or by physically isolating it.
6. Permit only authorized persons to enter the area.
7. Separate the witnesses to obtain independent statements.
8. Do not touch or move any object.
9. Assign the duties of search if assistants are present.
An exception to the ―do not touch or move any object rule‖: When the victim is still
alive, the investigator should try to gather or acquire information from the victim himself
with regard to the surrounding circumstances of the crime, while assistance is calling for an
ambulance from the nearest hospital (Tradio, 1993).
16
ACTIVITY 3:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
1. Explain the Golden Rule ―do not touch or move any object.‖
4. If one factor is missing based on the theory of crime, would there be a crime committed?
17
Objectives of Criminal Investigation
1. To detect crime
2. To locate & identify suspect/
3. To arrest the suspect/s
4. To recover stolen property
5. To prepare appropriate criminal cases for prosecution
These objectives are based on the premise that perpetrators make mistakes when
committing crimes, thus leaving some type of evidence of who they are. Due to carelessness,
panic, underestimation of police capabilities, emotional or mental instability or the influence
of drugs or alcohol may result in criminals leaving evidence that could connect them with the
crime scene (Müftüoglo, 2017). For example, a burglar might leave his tools used to force
entry; a murderer might leave weapons used to commit the crime.
• The ability to persevere or stick to a task despite the monotony and the many
obstacles surrounding it.
• He must have certain abilities and intelligence that would enable him to acquire
information easily and readily and use this information truthfully.
• He must be honest. He must be incorruptible and must possess personal integrity.
• He must understand (weaknesses and strengths) the people and the environment
where he/she lives.
• He must have a keen power of observation and accurate description (Tradio, 1993).
18
7. Aid in the prosecution of the offender by providing evidence of guilt which is
admissible in court.
8. Testify effectively as a witness in court.
1. Information – the word ―information‖ is used here to describe the knowledge which
the investigator gathers from other persons. Of the three ―I‘s‖, information is by far
the most important since it answers the question, ―Who did it?‖
There are two kinds of information, namely: 1) information acquired from
regular sources such as conscientious and public-spirited citizens, company records,
and the files of other agencies; and 2) information of particular interest to the
criminal investigator, including knowledge that the experienced investigator gathers
from cultivated sources such as paid informants, former criminals, acquaintances,
drivers, waiters, etc.
19
2. Interrogation – includes the skillful questioning of witnesses and suspects. The
success of ―information‖ depends on the intelligent selection of informative sources.
At the same time, the effectiveness of interrogation varies with the craft, logic, and
psychological insight with which the investigator questions a person who has
information relevant to the case.
The term ―interview‖ means the simple questioning of a person who has no
personal reason to withhold information and is therefore expected to cooperate with
the investigator. On the other hand, ―interrogation‖ is the questioning of a suspect or
person who is normally expected to be reluctant to divulge information concerning the
offense under investigation. The ability to obtain b questioning is the most special
talent of the investigator.
3. Instrumentation – is meant to include applying the instruments and methods of the
physical sciences in the detection of crime. Physics, for example, offers such aids as
microscopy, photography, and the optical methods of analysis. The role of chemistry
is too well known for elaboration here. Biology and pathology are particularly
important in crimes involving physical evidence.
The sum of these physical sciences insofar as they are applied to crime
detection is called criminalistics. Their utility is associated mainly with physical
evidence. By their means, a part of the corpus delicti may be established in certain
crimes – the cause of death in a homicide or the nature of the drug in a narcotic
violation.
They may be used to link the suspect to the crime scene by showing that clue
materials found at the scene possess the same constituents as materials associated
with the suspect. The same procedure identifies the criminal by tracing a substance
found at the scene to a source that can be immediately associated with the suspect.
20
ACTIVITY 4:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
3. Give one example of Forensic Science in conducting an investigation. Explain its process.
4. Give five examples of evidence that a careless perpetrator may leave at the crime scene.
21
PHASES OF CRIMINAL INVESTIGATION (Tradio, 1993).
This division is made for the convenience of discussion since the three phases are
not necessarily separated in time but are usually fused throughout the investigation. The
same evidence, moreover, can often be used for all these objectives. Throughout all
phases of investigation, the three ―Is ―are constantly employed. Although explicit
references to these tools will not be made, their application can be readily seen at each
step.
1. Confession
Admission or confession by a suspect is a major objective of every investigation.
The confession is, of course, an excellent means of identifying the criminal. But from the
point of view of proving guilt at trial, this must be supported by other corroborative evidence.
The corpus delicti must be separately established to support a conviction. A
confession may be denied in court. Unless the prosecution can present an affirmative show of
voluntariness, the objections of defense counsel based on charges of duress and coercion may
prevail regardless of their truth.
2. Eyewitness Testimony
The ideal identification is made by several objective persons who are familiar with
the appearance of the accused and who personally witnessed the commission of the crime.
Where the witness and the accused are strangers and the period of observation was limited to
22
few seconds, the validity of the identification depends upon the ability of the witness to
observe and remember the relative ―distinctiveness‖ of the accuser‘s appearance, the
prevailing conditions of visibility and observations, and the lapse of time between the
criminal event and identification.
3. Circumstantial Evidence
The identifications may be established indirectly by proving other facts or
circumstances from which, either alone or in connection with other points, the perpetrator's
identity can be inferred. Evidence of this nature usually falls into one of the following
classes:
b. Opportunity - It must have been physically possible for the suspects to commit
the crime. He must have had access to an area, was in the vicinity, or had
available means. It must be shown that the suspect could have been in the vicinity
of the crime scene in the sense that it was not improbable for him to have been
there. Thus the search is further limited to those who had the opportunity to
commit the crime by reason of probable physical presence, knowledge of the
criminal objective, and the absence of alibis.
23
4. Associative Evidence - The physical evidence may identify the criminal through
the clue materials, personal property, or the characteristics pattern of procedure deduced from
the arrangement of objects at the crime scene. The perpetrator may leave some clue at the
scene such as weapons, tools, garment, fingerprint, or foot impression; he may unwittingly
carry from a scene a trace in the form of glass, paint, rouge, hair or blood. In crimes of
personally gin, the fruits of the crime may be in the perpetrator‘s possession. Crimes of
violence will leave evidence of a physical struggle. Where the offense involves the
application of force against property, contact with certain materials may be discernible.
A reliable Criminal investigator must see to it that all essentials tools and equipment
used for criminal investigation should be ready at all times. These tools include but are not
limited to the following:
1. Recording Instruments
a. Camera
b. Voice Recorder
c. Video Camera
d. Measuring device (Measuring tape, ruler, protractor)
e. Crime Scene template
f. Evidence Tags
g. Evidence Markers
h. Other electronic recording gadgets (body cams & action cameras)
3. Preservation materials
a. Police Line
b. Evidence Containers (evidence bags, boxes, glass, jars, bottles, canisters, tubes,
vials, etc.).
4. Fingerprint Kit
24
8. Investigator’s Checklist and Forms
2. Official Blotter - A police blotter is an 18‖ x 12‖ hard-bound logbook that contains
the daily register of all crime incident reports, official summary of arrests and other
significant events reported in a police station. The duty officer shall record all information
using the 5 W‘s and 1 H in gathering the whereabouts of the case or complaint.
3. Investigation Team and Equipment - All investigators in any police unit must be
a graduate of the prescribed investigation course with a rank of at least Police Corporal
4. Duties of first responder - When the criminal has not been caught red-handed and
has fled the crime scene before the first police officer arrives, the first responder assumes
several responsibilities:
a. To ascertain any facts pertinent to the criminals that should be immediately transmitted
to the patrol force – personal description, make and model of vehicle used, and direction
of flight from the crime scene.
b. To isolate the crime scene, and if necessary, it environs, limiting access to those
responsible for its examination and processing.
c. To detain and separate eyewitnesses so they cannot discuss their observations with each
other.
d. To call for medical aid for the injured. In those cases where a person is seriously
injured, the first three steps may be deferred until this is attended to.
e. To continue to protect the crime scene until the officer who is responsible for the
continuing investigation arrives.
The sworn statements or affidavits of the complainants and witnesses must be taken
immediately by the investigator-on-case. The affidavit of arrest of the arresting officers must
be taken not later than 24 hours. In inquest cases, the investigator-on-case and the arresting
officer shall observe Art. 125 of the Revised Penal Code.
9. Procedure in the release of the crime scene - Release of the crime scene is
accomplished only after completing the survey. It should be done with proper documentation
of evidence, witness, victims, and suspects has been achieved. If the crime scene is private
property, it must be released to the lawful owner and witnessed by any barangay official. If
the property is a government facility, it shall be released to the administrator.
10. Follow up a case - The investigator shall conduct a police operation to identify
and apprehend suspects based on the initial investigation results.
The conduct of police operations involving sensational or high profile cases and
heinous crimes must be covered by a Case Investigation Plan (CIPLAN).
12. Attendance to court duties – the investigator-on-case and arresting officers shall
endeavor to ensure their attendance during court hearings while head of units shall supervise
and ensure the attendance of witnesses.
END OF MODULE 1:
26
UNIT II: Lesson 3 – Crime Scene Search
(Week 6-9)
This periodic lesson is about
Fundamentals of Criminal Investigation.
At the end of this lesson, you should be
able to:
27
Week Crime Scene 1. Define and explain the Müftüoglo, E. (2017).
No. Search importance of crime Fundamentals of Criminal
6 scene search in Investigation 2nd Ed.
criminal investigation. Chapterhouse Publishing Inc.
Quezon City (pp 80-88).
2. Explain the procedures
when searching for Tradio, C. (1993). Handbook of
evidence at a crime Criminal Investigation. Central
scene. Professional Books, Inc. Quezon
City (pp. 5-8)
3. Explain the different
crime scene search Oster-burg, J and Ward, R.
methods (2004). Encyclopedia of Police
Science. Retrieved from
http://what-when-
how.com/police-science/crime-
scene-search-and-evidence-
collection-police.
Soriano, O. (2008).
Fundamentals of Criminal
Investigation. Great Books
Publishing. Quezon City. (pp.
139-147).
Week Crime Scene 1. Enumerate the most Müftüoglo, E. (2017).
No. Documentati common method of Fundamentals of Criminal
7 on crime scene Investigation 2nd Ed.
documentation. Chapterhouse Publishing Inc.
Quezon City (pp 80-88).
2. Explain the importance
of crime scene Bulan E., Magadia, M.E. (2017).
photography. Police Photography 2nd ed.
Chapterhouse Publishing Inc.
3. Discuss what is crime Quezon City (pp 77-82).
scene sketch and its
importance in the Negosa, H. and Gabao, G.
investigation (2019). Fundamentals in
Criminal Investigation and
Intelligence. Rex Bookstore.
28
Week Physical 1. Identify & Differentiate Müftüoglo, E. (2017).
No. Evidences the different types of Fundamentals of Criminal
8 evidence. Investigation 2nd Ed.
Chapterhouse Publishing Inc.
2. Identify & explain the Quezon City (pp 91-120).
three main sources of
physical evidence. Gabao, R. (2016). Law on
Evidence: A guidebook for
Criminology Students.
Chapterhouse Publishing Inc.
Quezon City (pp 1-8).
Week Basic 1. Discuss the definition, Müftüoglo, E. (2017).
No. Criminal requisites and validity of Fundamentals of Criminal
9 Procedure search warrants Investigation 2nd Ed.
Chapterhouse Publishing Inc.
2. Explain the procedures Quezon City (pp 107-120).
in conducting search.
3. Enumerate examples of
valid searches and
seizures without a
search warrant.
29
The Crime Scene
CRIME SCENE – A venue or place where the alleged crime/incident/event has been
committed (PNP Criminal Investigation Manual, 2011).
It can comprise several sites and encompasses all areas over which victims, criminals,
and eyewitnesses move during the commission of the crime. When committing a crime, the
perpetrator may inadvertently leave evidence at the crime scene. Therefore, it is important
that once its position and boundaries are defined, the scene must be made secure for physical
evidence to be discovered and collected (Müftüoglo, 2017).
Source: vecteezy.com
The primary purpose of a crime scene search is to develop associative evidence that
could link a suspect to the scene or a victim, and to answer questions crucial to the
investigation, such as who perpetrated the crime, how the crime was committed, the
circumstances surrounding the commission of the crime, and why the crime was committed.
Additionally, police search crime scenes to identify evidence through which a psychological
profile of the suspect can be developed, to identify an object(s) that does not logically belong
at the crime scene and that could potentially be linked to a suspect, and to identify the
suspect‘s modus operandi (MO), or motive for committing the crime (Oster-burg and Ward
2004; Swanson, Chamelin, and Territo 2003). It is important to note that although these
principles apply to all crime scenes, more specific tasks may be undertaken, depending on
what type of crime has been committed.
There are five primary considerations for conducting a crime scene search:
Determining the boundary of the crime scene is critical. Numerous factors affect
boundary determination, such as whether the crime scene has more than one location and
whether the crime scene is indoor or outdoor. Crime scenes may be categorized into primary
30
and secondary. However, secondary crime scenes do not always exist when the crime
occurred in only one area. Typically, boundaries are restricted and more easily identifiable
when a crime scene is inside a physical structure (indoors). In contrast, with an outdoor crime
scene, determining accurate boundaries is more challenging.
Additionally, crime scenes are divided into inner and outer perimeters. The inner
perimeter is where the actual crime took place and the outer perimeter is the boundary for
maintaining control of the crime scene (Swanson, Chamelin, and Territo 2003).
Selecting an ideal search pattern will depend on the size of the crime scene.
Particularly its area and the extent of actions performed by the suspect during the commission
of the crime. The number of available personnel will also dictate what type of search is
practical and achievable during that particular time of investigation.
The basic step through a crime scene search normally progresses as follows:
Different search methods or patterns are designed to locate evidence thoroughly and
systematically. Some of these methods are best suited for indoor scenes, while others are
more applicable to outdoor crime scenes (Müftüoglo, 2017).
31
If the crime scene is indoors, the search plan will naturally be dictated by the size of the
room and its contents. The unlimited variety of indoor situations precludes systematic
discussion. Where the scene is outdoors, one of the methods below can be selected to suit the
terrain. The following methods assume that three investigators are performing the actual
search (Soriano, 2008).
1. Strip or Line Method – In this method, the area is blocked out in the form of a
rectangle. The three searchers A, B, and C proceed slowly at the same pace along a
path parallel to one side of the rectangle.
Source: Fundamentals in
Criminal Investigation,
Soriano, 2008
2. Double Strip Method or Grid Method – this is a modification of the strip method.
Here, the rectangle is first traversed parallel to the base and then parallel to a side.
Source: Fundamentals in
Criminal Investigation,
Soriano, 2008
3. Spiral Method – the three searchers, follow each other along the spiral path,
beginning from the outside and spiraling in towards the center.
Source: Fundamentals in
Criminal Investigation,
Soriano, 2008
32
4. Zone Method – One searcher is assigned to each subdivision of a quadrant.
Depending on the size of the area, each quadrant is cut into another set of quadrants.
Source: Fundamentals in
Criminal Investigation,
Soriano, 2008
Source: Fundamentals in
Criminal Investigation,
Soriano, 2008
33
Crime Scene Documentation
Documentation of the crime scene is critical to the processing because this allows the
investigators to back up claims regarding the original condition and context of the scene.
Furthermore, it is relatively non-intrusive, although taking measurements could present
opportunities to change or damage the condition of the scene. Therefore, crime scene
personnel in charge of documentation should employ the least intrusive methods first
(Müftüoglo, 2017).
In processing the crime scene, the investigating team must consider the proper taking
of photographs and sketch making. Photographs should depict the actual scenario of the
crime scene and portray the proper placement of the individual evidence. Moreover, all
individual pieces of evidence must be shown in the sketch with precise measurements. All
these procedures must be written in the investigator‘s notebook.
34
ACTIVITY 5:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
5. Does size of the crime scene dictate the method of search to be used?
35
Photographing the Crime Scene (Soriano, 2008)
In photographing the crime scene, the investigator should endeavor to provide a series
of shots that supply a maximum of useful information and enable the viewer to understand
how the crime was committed. The photographer should show the relationships of the various
objects to one another. Locations of articles should be seen to recognizable backgrounds.
1. Overall Photographs
2. Photographs of the Deceased
3. Photographs of Articles of Evidence
4. Special Techniques
5. Photographing the Environs
6. Photographing the Body After Removal
7. Photographic Data
36
8. All fingerprints that do not need further development or cannot be lifted should be
photographed; areas where fingerprints were discovered, are photographed to show
the location if this area was not included in other photographs.
9. Colour film is desirable for bloodstains, including locations, although not necessary:
black and white pictures must also be taken.
Photographs of the crime scene are usually taken in three stages: the general view, the
medium-range view, and the close-up view. This approach enables a picture of all
circumstances to be pointed out to the court while leading up to most critical part of the crime
scene.
1. General Views – the general photographs is a sweeping view of the crime scene area.
It demonstrates what the crime scene looks like in its own environment.
Source: Rappler.com
2. Medium-Range Views – as the investigator moves closer to the subject of the crime
scene, additional photos should be taken. These photos should be taken at a distance
not greater than 20 feet away from the subject or item being photographed.
Source:youtube.com
37
3. Close-up views – moving from the broad to the specific, the last phase in
photographing the crime scene is the close-up. These photos are taken at a distance of
less than 5 feet and should focus on small segments of a larger surface or on specific
objects in the crime scene (Soriano, 2008).
Source: Alamy.com
Crime Scene Sketch – is a measured drawing of a scene showing the location of all
important items, particularly physical evidence.
38
The Crime Scene Sketch: (Montojo, 2007)
• The sketch is useful in questioning the suspects and witnesses and the writing of the
investigation report.
• A sketch indicates the actual measurement of things with scale and proportion
observed and oriented to the North. All necessary information is placed in the sketch
in connection with the crime being investigated.
1. Sketch of Locality- give a picture of the scene, the crime and, its environment,
including buildings roads, to show the possible entrance and exit points.
39
2. Sketch of Ground – picture of the scene of the crime with its nearest physical
surroundings.
40
Types of Sketch:
1. Rough – made by the prober at the crime scene. No scale proportion is ignored,
and everything is approximated. It is to be used as a basis for the finished sketch.
1. Never forget to determine the direction of the compass. Draw it on the sketch.
2. Control measurements. Do not rely on others to give them.
3. Do not draw things where are clearly irrelevant to the case.
4. Never rely on memory to make corrections at the station or any other place
removed from the scene of the crime.
5. The scale must be drawn on the sketch. If the camera has been used, mark its
position on the sketch.
Physical Evidence – the means of ascertaining in a judicial proceeding the truth respecting a
matter of fact (Rule 128, RPC). Evidence can be anything that tends to
prove or disprove an issue in question (Müftüoglo, 2017).
41
4. Demonstrative evidence – includes mockups or scale models of objects or places
related to the crime scene. It helps the court visualize what they are unable to view personally
(Müftüoglo, 2017).
Once physical evidence has been collected, it must be properly handled by each
person who comes in contact with it. A record must be attached to the evidence package
listing each person who has been in custody of the evidence and the dates on which that
authorized person has possession of the evidence.
In order for the evidence to be admissible in court, the chain of custody must remain
unbroken from the time the evidence was collected until it is presented in court. The purpose
is to assure that the evidence remains authentic and that there has been no opportunity for
tampering, switching, or otherwise mistreating the item by any persons deliberately or
negligently (Montojo, 2007).
1. Alteration of Evidence
a. Natural Causes
b. Negligence and Accident
c. Intentional damage or Theft
2. At the Crime Scene
3. Receiving Evidence
4. Transporting Evidence
5. Evidence not at the Crime Scene
6. Standards of Comparison
7. Containers and Packaging
8. Storage
a. Date the physical evidence was received
b. File number of the case
c. Title of the case
42
d. Person or place from whom or at which received
e. Person who received the physical evidence
f. Complete description of evidential items, including size, color, serial number
etc.
g. Disposition – the name of the person to whom the physical evidence was
delivered
h. Identity through the signature of the officer in control of the evidence room.
43
one cubic inch need not be marked, instead, they may be placed in a container such as
a pillbox, and the container then sealed and labeled.
2. Sealing of Physical Evidence – whenever practicable, articles of physical evidence
should be enclosed in separate containers. The investigator‘s initials or name and the
date of sealing in abbreviated forms should be placed on the seal in ink.
3. Labeling of Physical Evidence – a label should be affixed bearing the identifying
case information. This may take the form of paper pasted on the container or a tag tied
to the object. The following information should appear on the label or tag:
a. Case Number
b. Date & time of finding the article
c. Name and description of the article
d. Location and time of discovery
e. Signature of investigator who made the discovery
f. Name and witness to the discovery.
The communication should indicate that the evidence has not been and will not be
examined b an expert other than one of the NBI Crime Lab or PNP crime Laboratory. In
transmitting certain types of evidence by mail, cognizance should be taken of current postal
regulations.
For legal and scientific reasons, delivering physical evidence to the crime laboratory
is best done in person. If this is not possible, the Philippine Postal Corporation can deliver the
packaged physical evidence. Proper packing, wrapping, and sealing are extremely important
when evidence is shipped (Soriano, 2008).
END OF MODULE 2:
Please prepare for Midterm Examination Covering the entire Learning Packet
Module 1 & 2. Announcement will be posted in the group chats regarding the specific
schedule and collection of examination.
44
UNIT III: Lesson 3 – Introduction to
Police Intelligence
(Week 10-14)
This periodic lesson is about Introduction to Police
Intelligence. At the end of this lesson, you should
be able to:
Source: Vectorstock.com
45
Week Introduction to 1. Discuss the definition of Police Home-based activity
No. Police intelligence and other terminologies with learning
10 Intelligence used in the subject matter. modules/activity sheets
to be distributed through
2. identify the different Major social media platform
Categories of Intelligence (GC), or in hard copy to
be picked-up in
designated area.
Week Historical 1. Describe the Historical Home-based activity
No. Development of development and personalities with learning
11 Intelligence behind the evolution of Police modules/activity sheets
Intelligence. to be distributed through
social media platform
(GC), or in hard copy to
be picked-up in
designated area.
Week Informant 1. Discuss the different type of Home-based activity
No. Cultivation & informants and its purpose in with learning
12 Motivation intelligence operations modules/activity sheets
to be distributed through
2. Enumerate the different social media platform
categories of informants (GC), or in hard copy to
be picked-up in
designated area.
Week Intelligence 1. Discuss the different phases in Home-based activity
No. Cycle gathering information and with learning
13 intelligence cycle. modules/activity sheets
to be distributed through
social media platform
(GC), or in hard copy to
be picked-up in
designated area.
Week Document and 1. Discuss the different Home-based activity
No. Information terminologies used in document with learning
14 Security and information security modules/activity sheets
to be distributed through
2. Determine the different social media platform
categories of classified matters. (GC), or in hard copy to
be picked-up in
designated area.
46
INTELLIGENCE
Intelligence results from the collection, collation, evaluation, analysis, integration, and
interpretation of collected information (Interagency OPSEC Support Staff, 1991). It is a
specialized information product that provides the United States or an adversary with
information required to further its national interests.
One of the most important functions of intelligence is reducing the ambiguity inherent
in the observation of external activities. In the most obvious case, adversary intelligence
organizations may seek information concerning military capabilities or other matters that
directly threaten the United States' national security. In other instances, adversary nations, or
other groups, may seek information about U.S. diplomatic negotiating positions, economic
programs, or proprietary information from U.S. corporations.
In each of these cases, the information sought may provide the adversary with an edge
and allow him to implement a well-developed strategy to reach his goals. In most cases, the
development of an intelligence product involves collecting information from several different
sources. In some cases, information may be disseminated immediately upon collection based
upon operational necessity and potential impact on current operations. This type of raw
intelligence is usually based on incomplete information about fast-breaking events and may
contain substantial inaccuracies or uncertainties that must be resolved through subsequent
report and analysis. Finished intelligence products contain information that is compared,
analyzed, and weighted to develop conclusions. Finished intelligence is produced through
analytical review in the intelligence process. The intelligence process confirms a fact or set of
facts through a multiplicity of sources to reduce the chance of erroneous conclusions and
susceptibility to deception.
Intelligence is divided into strategic and operational intelligence. Strategic intelligence
provides policymakers with the information needed to make national policy or decisions of
long-lasting importance. Strategic intelligence collection often requires integrating
information concerning politics, military affairs, economics, societal interactions, and
technological developments. It typically evolves over a long period of time and results in the
development of intelligence studies and estimates. Operational intelligence is concerned with
current or near-term events. It is used to determine the current and projected capability or
operation on an ongoing basis and does not result in long-term projections. Most intelligence
activities support the development of operational intelligence (Berkowitz and Goodman,
1989).
47
DEFINITION OF TERMS
Intelligence- is the end product resulting from the processing of information. It is a
knowledge resulting
Information – is an unprocessed material of every description, including those
derived from observation from observations, communications, reports, rumors, imagery, and
other sources from which intelligence is produced. It is an unprocessed information or raw
data
Intelligence information – information gathered or received which is of intelligence
interest.
Intelligence Community – an integrated and nearly organized entity composed of
units or agencies with intelligence interests and responsibilities.
Informer – one who gives information for a reward or price.
Informant – anyone who can furnish information.
CATEGORIES OF INTELLIGENCE
Tactical Intelligence
- Concerned with the effects of the enemy, weather, or terrain on the enemy and
friendly operations. It deals with capabilities rather than intentions. It offers the
tactical commander the answer to questions concerning the enemy‘s capabilities and
conditions.
- Focuses directly on a specific operation.
Strategic Intelligence
- Deals with political, economic, and military capabilities and vulnerabilities of all
nations.
Counterintelligence
- Aspect of intelligence, which comprises civil and police/military measures to
counter the enemy or prevent sabotage or subversive activities. It is inseparable from
intelligence. It makes valuable contributions to the overall production of intelligence.
48
BASIC PRINCIPLE OF INTELLIGENCE OPERATIONS (Manwong, 2008)
1. Intelligence is continuous
- All intelligence activities follow a simple continuous intelligence cycle. At the
same time, at any level of command. The term intelligence officer includes all the different
levels of classification when PS I&I and I, PPO S2 or PRO RIID and DI and emphasized
techniques and considerations which are primarily applicable to the I&I officer.
4. Intelligence must be timely - Best intelligence is worthless if it does not reach the user in
time for appropriate consideration or action. Sometimes, the sacrifice of completeness and
accuracy may have to be accepted because situations require decisions to be made
immediately before intelligence can be produced. Therefore, the user must be advised of the
completeness and accuracy.
4. What are the two division of intelligence and how do they differ from one another
50
HISTORICAL DEVELOPMENT OF INTELLIGENCE (Manwong, 2008).
Moses
He sent 12 spies from the twelve tribes of Israel to
secretly scout the land of Canaan. Eventually, they returned
reporting that the land was fertile but heavily guarded.
Moses is considered as the “forefather of intelligence
gathering”. (Holy Bible, Book of Numbers, Chapter 13)
Sun Tzu
He is a Chinese philosopher who posited that
foreknowledge cannot be elicited from spirits or from gods,
from analogy with past events nor from calculations.
Accordingly, it must be obtained from men who knew the
enemy situation. He also wrote the famous book “Art of
War”.
“If you know the enemy and know yourself, you
need not fear the result of hundred battles; if you know
yourself and not the enemy, for every victory you suffer
defeat; if you know neither yourself nor the enemy, then,
you are a fool who will suffer defeat in every battle.”
51
Alexander the Great
When Alexander the Great and his troops were
marching towards Asia, rumor of disaffection coming
from his allies and mercenaries grew. In or der to find
out the truth, Alexander utilized the simplest mean. He
told his subordinates he was writing a letter home and
told them to do likewise. Then, when the couriers
were laden and had set out for Greece, he ordered
them quietly recalled and proceeded to investigate all
the letters that they carried. Malcontents were
detected; legitimate causes of grievances exposed. He
devised the first letter sorting and opening of letter to
obtain information.
Moreover, he is also known for developing a
systematic way in delivering a message. He utilized
horses, carrier pigeons and fire beacons. Source.gettyimages.com.au
Genghis Khan
Hannibal
52
Frederick the Great
Napoleon Bonaparte
Source:biography.com
Source: headstuff.org
53
Sir Francis Walsingham (Elizabeth’s Spymaster)
Source:ancientimages.com
Source: findagrave.com
Alfred Redl
Source:faculty.atu.edu
54
Nathan Hale
Source: biography.com
Source: factfiend.com
55
Allen Dulles (CIA Leader)
S
ourc
e:
en.
wiki
pedi
a.or
g
Source: imdb.com
Reuven Shiloah
Source: mossad.gov.il
56
Rear Admiral Roscoe Hillenkoetter
Source:en.wikipedia.org
Delilah
She was a biblical personality and an impromptu intelligence agent of the Philistines.
Apart from her tonsorial specialty, she allowed Philistine to hide in her house (Judges 16:9)
and was able to gain information by using her beauty and charm. She was responsible for the
fall of Samson.
Her real name is Freda Josephine McDonald and was born in the United States of
America. She became a French citizen in 1937 and worked for French intelligence during
WWII. She was a singer and dancer before WWII and used her celebrity status by smuggling
documents for French resistance knowing that Germans would not think to search such as a
popular entertainer.
She was a Dutch nationality who worked for the French intelligence in WWI. She had
known many important German officers. Before 1914, the French government asked her to
travel to Germany and spy on them. The French became suspicious that she was also working
for the Germans.
On February 13, 1917, she was arrested in her room at the Hotel Elysee Palace on the
Champs Elysee in Paris. She was tried for treason and sentenced to death through execution
by firing squad. She is otherwise known as “The Entertainer” and Mata Hari code name H-
21.
She was an American nationality who worked for Confederates in the American Civil
War. She was well known in Washington D.C., USA and used her connections with enemy
57
Union generals and politicians to pass on information to the Confederates. She was caught by
the Union and was briefly imprisoned before being deported in 1862.
Stella Remington (Female Chief Spy)
She served as the first female Director General of MI5. She also gave the public
much more information about MI5 than ever before. In 1996, she retired from MI5 and has
written spy novels.
This is the intelligence collecting organization of the United States of America which
was created under the United State National Security Act of 1947.
It is otherwise known as “Federal Security Service” and is the successor to the Soviet
domestic intelligence known as KGB Second Chief Directorate. The FSB is the security
service of the Russian Federation.
58
DCRI (Direction Centrale du Renseignement Interieur)
It is otherwise known as Central Directorate for Domestic Intelligence France.
DGSE ( Direction Generale de la Securite Exterieure)
It is otherwise known as General Directorate of External Security France.
Red Gestapo
It is the security service organized by East Germany to combat the covert activities of
the West Germany when it was still divided by the Berlin walls.
MOSSAD
It was formed on April 1, 1951 by then Prime Minister David Ben Gurion. The
MOSSAD has two branches, the “Aman” which is Military Intelligence and Israel Defense
Force, “Shabak” (means defender) the General Security Service
59
ACTIVITY 7:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
60
INFORMANT CULTIVATION AND MOTIVATION
Definition of Informant
1. Anonymous informant
He/she maybe an anonymous phone caller, letter writer or a text sender. The duty of the
investigator is to receive information, not to reveal any other information to the caller about
facts already known.
2. Confidential informant
This is a person who provides the police with confidential information concerning a
previous crime or a projected and planned crime. He/she does not want to be identified as
the source of information. Under the law, these informants are protected and their identity
could not be revealed by the police even under the order of the court unless on exceptional
case where there is a claim of the defense that the informant framed up the accused.
3. Rival-elimination informant
This kind of informant mostly maintains to be anonymous. His/her purpose is to
eliminate the rival person or gang due to competition or other motives such as revenge, etc.
4. False informant
This informant usually reveals information of no consequence, value or stuff connected
with thin air. His/her purpose is to appear to be on the side of the law and for throwing out
the suspicion form himself/herself or form gang or associate.
5. Frightened informant
He/she is prodded by fear or self-interest in giving information to the police.
6. Self-aggrandizing informant
This kind of informant moves around the centers of criminals, group or syndicate and
delights in surprising the police about bits of information. His/her information may be of
value by way of authentication in intelligence operation.
61
7. Mercenary informant
The informant has information for sale. He/she may have been victimized in a double
cross or little share in the loot or given a dirty deal and seeks revenge as he/she will profit
in the disclosure.
8. Double-crosser informant
He/she uses his/her seeming desire to divulge information as an excuse to talk to the
police in order to get more information from them more than what is given.
9. Women informant
She maybe the female associate of the criminals, who was roughed up, marginalized in
the deal or being eased out from the group (Manwong, 2008).
Categories of Informants
1. Incidental Informants
These are individuals who furnish information with no intention of repeating
their services or furnishing information on a continuing basis.
2. Casual Informants
Individuals who by social or professional position, possess or have access to
information of continuing interest and who willingly provide information either in
response to a specific request or on their own initiatives.
3. Automatic Informants
Those who by virtue of their official positions, are expected or obligated to furnish
information openly in the normal course of their duties, e.g., government officials, AFP
and PNP members and various technical experts.
62
4. Recruited Informants
Individuals that were selected, trained and utilize continuous and covert sources of
information concerning specific intelligence targets.
a. Ordinary Informants
These are individuals who obtain the desired information during their normal daily
routine, but whose affiliation with the counter-intelligence unit is covert and under the
control of that unit. It is used primarily to achieve counter-intelligence area coverage.
b. Penetration Informants
Those assigned with the mission of obtaining information within a specific target.
They may be recruited outside the target organization and placed there or more usually
selected and recruited from among the personnel within the target itself.
c. Full-time Informants
These are those who are available for counter-intelligence missions at all times and
who may derive the major part of their income from their work as informants. They are
normally trained in investigative procedures.
5. Others
a. Double Agents - These are individuals who are simultaneously employed by
two opposing intelligence agencies with one of the agencies being aware of his dual
role.
b. Dual Agents - These are individuals who are simultaneously and
independently employed by two or more friendly intelligence units, and who do not
show preference for either, and normally motivated by material gain.
1. Vanity
Ordinary citizens as well as reformed criminals are motivated by vanity to provide
information, believing it will win favorable attention from authorities.
2. Civic Mindedness
A significant motivating factor for informing is a sense of good citizenship. When an
eyewitness tells the police of observations made while a crime was being committed, or
of suspicious behavior noted, the person carries out a civic duty.
3. Fear
Fear is a powerful inducement to becoming an informer; however, protection must be
negotiated with authorities. It may be for one‘s self fear for one‘s family being killed,
tortured, or harmed in some fashion. Fear of imprisonment will cause some people to seek
a trade off.
63
4. Repentance
Just as those who have ―got religion‖ will be led by a need for forgiveness and re-
establishment in the community to furnish what they would not have discovered before,
so that the outcasts make amends by informing on confederates in past crimes.
5. Avoidance of Punishment
6. Gratitude or Gain
Gratitude is not usually a major factor in prompting an individual to furnish
information but it can be potent at times.
7. Competition
In specialized crimes, particularly dangerous drugs and illegal gambling, one
lawbreaker may, most often anonymously betray a rival to eliminate competition.
9. Remuneration
1. English System
This system involves gathering information that has a little consideration on paid
informants. This system relies more on the information provided voluntarily or willingly by
patriots or civic-minded informants.
2. French System
This involves the practice of obtaining information that relies heavily on buying
information that relies heavily on buying information; this advocates the extensive use of
informers.
64
ACTIVITY 8:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
2. What is an informant?
3. What is an informer?
65
INTELLIGENCE CYCLE
PHASE I
Planning and Direction of the Collection Efforts
(Salamanca, Estoque, & Aclis, 2017).
It is the management of the entire effort, from identifying the need for data to
delivering intelligence product to a consumer.
It is the phase of the cycle that involved in determining the intelligence requirements
and in identifying the so-called essential elements of information (EEI).
Determination of Requirements
enemy capabilities, including time, place, strength or other details.
enemy vulnerabilities, terrain, including natural and artificial obstacles and
weather.
66
EEI- is an item of intelligence or information of characteristics of the area of
operations and the enemy, which the commander feels he needs before he can reasonably
arrive at a decision.
IR- information requirement regarding the enemy and its environment which needs to
be collected and processed in order to meet the PIR of a Chief or Head.
In relation to use:
a. Executive
Intelligence required by executive, governmental and military commanders; the executive
requirements are the basis for decision and national policy.
b. Contributory
The intelligence required to complete the staff process--make staff plans and estimates that
contribute to the decision and policy making.
c. Operational
Additional intelligence required in the planning and carrying out effectively the decision or
policy announced.
d. Collateral
Higher or adjacent echelon of the government or military establishment may require
information.
As to the type
a. Basic
These are general reference materials for use in the planning regarding the enemies, area of
operations, capabilities and vulnerabilities.
b. Current
This is temporary in nature and narrower in scope.
c. Estimative intelligence
It determines future courses of action required by the executives to plan future military
operations and policies.
PHASE II
Collection of Information
67
These are persons, things, or actions from which information about criminal and or
subversives, weather and terrain is derived.
• Ex. Maps, photos, enemy documents, enemy materials, prisoners of war, and weather
forecasts.
Collection Agency
This is a generic term that refers to any person, unit, or activity that collects and
processes information by research, surveillance, or exploits sources.
PHASE III
Production or Processing of Collected Information
Collation - It is the organization of raw data and information into a usable form. This
can actually be done by grouping similar items of information so that they will be readily
accessible.
68
Evaluation - This is the examination of raw information to determine intelligence
value, pertinence of the information, reliability of the source of information and its credibility
or truthfulness of the information.
a) Pertinence- relevance by virtue of being applicable to the matter at hand
b) Reliability- judging the source of information
c) Credibility- truthfulness of information
E---Unreliable 5---Improbable
69
UNIT IV: Lesson 4 –
Document & Information
Security (Week 14-18)
This periodic lesson is about Introduction
to Police Intelligence. At the end of this
lesson, you should be able to:
70
DOCUMENT AND INFORMATION SECURITY (Manwong, 2008)
Related Terminologies:
Classified Matters- information that, in any form which in the interest of national
security, must be safeguarded in the manner and to extent requires by its importance.
Compromise- refers to the loss of security which results from an unauthorized person
obtaining knowledge of classified matter.
71
Properly Authorized Person- a person who has been authorized to work with
classified information.
Classification is limited to the information and material that require the highest degree
of protection. Refers to information or materials that are extremely important for defense, and
the unauthorized disclosure would cause exceptionally grave damage to the country.
Example/s:
a. Military/Police defense plans- a strategic plan that documents the complete operations
of war.
b. Major government projects such as drastic proposal to adjust the nation‘s economy or
political set up (CHA CHA or CON CON)
c. Definite severance of diplomatic relationship that would damage the defense of the
nation.
d. Important political documents dealing with negotiations for major alliances.
e. Information on which would relate capabilities of major successes of our intelligence
service.
f. Strategic plan documenting the overall conduct of activity.
SECRET MATTER
Example/s:
a. Intelligence plans and estimates and watch list information
b. Documents showing dispositions of PNP or AFP forces
c. Information and material that would jeopardize international relations
d. Information and material that would compromise defense plans and scientific or
technological development important to national defense
e. Information and material that would reveal important intelligence operations
f. Complete plans for future operation of war not under top secret
g. New design of aircraft, projectiles, tanks, radar and other devices
CONFIDENTIAL MATTER
Information and material whose unauthorized disclosure, while not endangering the
national security, would be prejudicial to the interest or prestige of the nation or government
activity or would cause administrative embarrassment or unwarranted injury to an individual
or would be an advantage to a foreign nation.
72
Example/s:
a. Personnel record and staff matters
b. Routine intelligence reports
c. Plans of government projects such as roads, buildings or developmental areas
d. Routine service reports such as operations and exercises of foreign power
e. Investigation and documents of personnel which are disciplinary in nature, the
knowledge of which is desirable form of safeguard for administrative reason.
RESTRICTED MATTER
Information and material that requires special protection other than those determined
to be top secret, secret, or confidential.
Example/s:
a. Department books or instruction, training and technical documents intended for
official use only and not intended for release to the public.
b. Routine information relating to supply and procurements
c. Minor modifications and routine tests of equipment
d. Certain compilations of data or items that individually may be unclassified but which
in the aggregate warrants a classification.
The cover of classified material is used to call the attention of the personnel handling it, to the
fact that it is a classified document, and to protect it against unauthorized scrutiny. The cover
shall have the stamp identifying the classification of the document.
73
Plans. The commander and chief responsible for the protection of classified material
will make formal plans for the destruction or safer transfer of all classified material under its
jurisdiction, in case of civilian disturbance, disaster, or enemy action.
On board aircraft or ships. If the aircraft carrying classified material is forced to land
or a ship captured, the material should be destroyed in a way that it will not be recognized; it
is preferable to burn it.
Security of the typewriter ribbons. The typewriter ribbons, whether made of cotton,
rayon, paper or silk, which are used to write classified information are not safe until they
have been written over twice. Many of the ribbons for typewriter machines can only be used
once, therefore, have in mind that the impressions of the letters remain in the ribbons and
these are significantly valuable to the enemy as is the paper in which the information was
typed. These ribbons should be protected accordingly.
1. Top Secret
Classification. The original classification authority for assignments of top secrets
categories exclusively rest with the head of the department. This may however be
delegated to certain cleared officers in instances when the necessity for such arises.
Officials who are authorized to assign top secret classification are the chief of the PNP;
the regional directors of police regional offices; the secretary of staff of the AFP; and the
major service commanders of AFP.
Reproduction. Top secret documents may be copied, extracted, reproduced only when
all the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
2. Secret
Classification. Those persons authorized to classify top secret. The other authorized
officers are: PNP directorates and staff, directorate of separate units; political attaches,
and AFP and civil government agencies.
74
Reproduction. Secret documents may be copied, extracted, reproduced only when all
the classifying authority has authorized such action. Reproduction shall be carried out
under the supervision of an authorized officer.
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
3. Confidential
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
4. Restricted
Storage. Safe, steel cabinets with combination lock of such weight, size and
contraction to minimize possibility of physical theft or damage of fire.
75
ACTIVITY 9:
Answer the question by explaining and giving
examples. Provide your answers in the box provided.
2. Define evaluation?
76
CLANDESTINE ACTIVITIES
Related Terminologies:
Agent
This is a person who engages in spying or in support of those who do, or who seeks to
detect them and whose primary objective is to obtain information pertaining to processes,
activities, movements or operations of others.
Clandestine Communication
It is all means of operational contacts between person within the clandestine
organization as well as the transmission of messages on data, or the transportation of supplies
or equipment.
Casing
This is an inspection of place to determine its suitability for a particular clandestine
operation of organization.
Clandestine operation
This is an operation conducted in secrecy, but with no effort to disguise its nature.
Debriefing
An interview with personnel from a mission or captivity to get information of
particular interest.
Safe site
Any secured area or any structure which can provide concealment to a clandestine
meeting. Example: home apartment, office, beach house
1. Personal meeting
It is any face-to-face contact between two or more members of clandestine net. The
meeting may last several hours or may be only long enough for agent to pass a report to
another.
77
Advantages of Personal Meeting
In planning a contact with an agent, the emphasis is on simplicity, clarity and security.
The seven most important considerations in personal meeting are as follows:
a. Location
b. Time, date, frequency and duration
c. Cover story
d. Cover conversation
e. Signals
f. Detection of Surveillance
g. Escape Planning
2. Impersonal Meeting
It is a means of communication wherein the case officer and the agent do not meet but
continuously communicate with each other through the use of cut-out.
Cut-out
It is a person or device interposed between two persons and groups to provide
communication at the same time.
Intermediary
It is an individual who serves as cut-out. Intermediaries may be witting and therefore,
members of the organization or unwitting as to the nature of their activity. In either case,
introduction of another person carries with it security hazards.
ELICITATION
Characteristic of Elicitation
Conversation Means:
Techniques in Elicitation
1. Talk topics of interest to the subject
2. Be a good listener and be patient
3. Switch topic when there is a logical opening
4. Try not to get too much quickly
5. Talk and act naturally
6. Avoid direct question
7. Pay particular to non-verbal reactions
8. Use approaches and probes when opportunity arises
9. Switch to an innocent subject before departing/terminating the interview.
Principles of Elicitation
Two basic devices:
a. Approach- used to start a conversation or to shift the direction of an existing
conversation.
• Flattery approach- effective because they appeal to the ego, self esteem and
prominence of an individual.
i. Teacher/pupil- make the person express topics about him/herself. Most people like to
talk about themselves.
ii. Kindred Sole-people express a need for recognition, particularly the lonely,
neglected, the vain and those with feelings of inferiority.
iii. Good Samaritan- do good deeds or favors to the source.
iv. Partial disagreement approach- seeks to produce talking by the word ― I‘m not sure
if I fully agree.‖
• Provocative approach- designed to induce the source to defend a position, state a
creed, or correct a wrong impression.
i. Teaser-bait: make the source believe you know more than him or her about the topic.
ii. Joe blow: purposely disagree with the source to induce anger.
iii. Manhattan and Missouri approach: the elicitor adopts an unbelievable attitude
above anything. He questions all statements and oppositions.
iv. National pride approach: natural propensity of all persons to defend their country
and its policies.
b. Probes- an attempt to obtain more information after the subject gives a vague,
incomplete general response. A probe is used with an approach in order to sustain a
conversation.
80
i. Completion: By inserting bits of factual information on a particular topic, the
source may be influenced to confirm and further expand on the topic.
ii. Clarity: A request for additional information where the sources response is
unclear. For example: I agree, but what do you mean by…………..?
iii. Hypothetical: Can be associated with a thought or idea expressed by the source.
Many people who might not make a comment concerning an actual event may
express an opinion on hypothetical situation.
iv. High Pressure Probe: It serves to pin down a subject in a specific area or it may be
used to point out contradictions in what the subject said (Salamanca, Estoque, &
Aclis, 2017).
Definition of Cover
It is a strategy by which the investigator conceals his identity and his relation with the
investigative agency (Salamanca, Estoque, & Aclis, 2017).
It is used so that intelligence agencies may operate with minimal interference from the
outside elements. By “outside elements”, it means those not having the need to know.
Undercover is a person with cover.
Cover story- a false story or identity used by spies or undercover agent to cover up their
spying activities.
81
Deep penetration- it is a type of undercover operation in which technique is applied
continuously and not over a limited period of time.
Defector- a person who has decided to work for an opposing country or intelligence
organization; it is a person who turns away or against his allegiance to the government.
Handler- another word for controller or an agent who directs and support spies working
undercover.
Functions of Cover
a. Defensive cover-- it serves to prevent detection.
b. Offensive cover—it gives access to the target and facilities for the achievement of the
clandestine activities.
Nature of Cover
a. Witting or unwitting exposure.
b. Any cover that is subjected to close scrutiny for an extended period of time will
probably be compromised.
c. Cover might appear plausible to the user, however, it is not so to the observer.
d. The cover must prove undercover identity with the opportunity to get the work done.
CONCEPTS OF COVER
3. Natural cover
A cover which completely fits the true background and capabilities of the agent. It
affords maximum security protection to any clandestine activity and allows greater
operational flexibility.
82
4. Official cover
A cover sponsored by an overt agency of a government.
5. Non-official cover
A person adopted by a person free of any official connection.
6. Artificial
Cover using biographical data adopted for a fictitious purpose.
1. Natural cover
Using true or actual personal background to fit the purpose.
2. Artificial cover
A cover using biographical data adopted for a fictitious purpose.
4. Multiple cover
Any cover identity wished.
83
Guidelines for Organizational Cover
1. Organizational cover must appear to produce something.
2. Should device that not all personnel will work together at the same time.
3. Cover should be devoted to mission.
4. Start with a small organizational cover and provide room for expansion as it continues
to grow.
1. Deep Cover
It may be someone with extensive experience in undercover work, or a young person
selected from an academy training class. Novices are actually preferred sometimes because
they have not acquired the typical authoritarian habits that might give them away as police
officers, and also because they are less likely to be recognized by regular police officers in
the field who might unknowingly reveal their identity in a chance encounter.
84
2. Light Cover
Any undercover police officer working under ―light‖ may have a spurious document to
establish a fictitious identification, i.e., ID, driver‘s license, etc., but will most likely go
home to his family and ―real‖ life. Sometimes drug enforcement officers and other specially
trained agents will be called for these assignments.
1. To gain confidence of the suspect and to gain unquestioning acceptance to the target
organization.
2. To penetrate a reported crime syndicate or a subversive organization.
3. To verify information submitted by informants or witnesses.
4. To trace security leaks and violations in police or military offices.
5. To support surveillance operations by providing an acceptable and logical basis for
surveillance personnel being in a particular area or location during surveillance.
• Dwelling assignment- is one where the agent establishes residence in or near the
dwelling houses of the subject.
85
• Personal contact or Roping (Rope Job) - investigator is required to develop friendship
and trust of target for the purpose of obtaining information and evidence.
Cover Story
It is a biographical account, true or fictitious, or a combination of truth or fiction
which portrays the undercover agent‘s past history, and current status. This may be a natural
cover story, artificial cover story and a combination of true or false persona data.
3. Complete Background
The cover story must include the material on all aspects of the undercover agent‘s
previous background, regardless of whether or not it is anticipated that this information will
be required.
4. Continuous Contact
It includes provisions for sufficient contact between the undercover agent and the target
of interest to produce worthwhile results.
5. Safe Departure
It must consider the removal of the undercover agent from the target area in the event the
operation is compromised, or the conclusion of the investigation or collection of information.
CBI is entirely different from partial background investigation since the latter is
limited only to some of the circumstances of subject‘s personal life.
It is also a detailed check on an individual‘s activity from the town a person was born
and life 15 years ago.
86
Requisites of a Complete Background Investigation
d. Residence History
e. Educational Background
i. Elementary/High School
ii. Name of School
iii. Year Graduated
iv. College (degree, school or university, year graduated)
v. Post Graduate degree (if any)
f. Employment History
g. Citizenship History
i. Credit Record
j. Foreign Travel
k. Neighborhood Check
l. Organizational Membership
m. Character References
n. Criminal Records
87
ACTIVITY 10:
Answer the question by explaining and giving
o.
examples. Provide your answers in the box provided.
2. Differentiate Deep cover agent from Light cover agent and site an example.
88
CASING
Casing maybe used to locate and/or provide information on meeting sites, safe
houses, dead drops, air and sea reception sites, catching sites, air fields and radio sites, VIP
security coverage, etc.
Types of Casing
a. Exterior Casing- it is the observation of the whole area, building and installation,
possible exits and approaches, type of vicinity that may be of help to any intelligence
or counter-intelligence operation.
Methods of casing
1. Personal Reconnaissance
This is the most effective method and will produce the most information since you
know the details.
2. Map Reconnaissance
It produces a good picture of the area. Through the map, you can make visual survey
or observation of the target area.
3. Research
It is the study of unclassified sources like local newspaper, periodical, public bulletin
and radio broadcast and from telecast.
4. Prior information
This is a study of on-file report or activities of the target place or file reports of other
intelligence units.
5. Hearsay
This type of information is not reliable.
Information Desired
a. Active Opposition
It consists of all elements of opposing security system to prevent intelligence activity in
the area. It includes also the security system of friendly forces in the area that does not
have the „need to know‟.
• Professional services
• Civil service such as the police, fire department, any local government agency or
other intelligence units.
• Observing Public—it includes informers, sympathizers and any other who are
willing to report information of any careless casing activity.
c. Disposal Plan
It is the disposal of information in case of possible compromise.
SURVEILLANCE
Definition of Surveillance
It is a secret observation of persons, places, and vehicles for the purpose of obtaining,
information concerning the identities of criminals and their activities (Garcia, 2003).
90
Related Terminologies:
Objectives of Surveillance
1. Learn the identity of the persons involved in a given activity and obtained detailed
information concerning the scope and nature of its activities.
2. To locate the residence, place of business, dead drops, and other places frequented by
associates and accomplices of persons of interest to the investigation.
3. To locate a subject by watching his haunts or associates.
4. Secure basis for obtaining search warrant and obtain advisable legal evidences for use
in court.
5. To check on the reliability of informants.
6. Prevent the commission of espionage, sabotage or subversion.
7. To obtain information for later use in interrogation.
8. To know at all times the whereabouts of individual.
91
9. To locate hidden property or contraband.
1. Covert surveillance
This is a type of surveillance conducted to a subject who is unaware that he/she is
under surveillance.
2. Overt surveillance
This occurs if the subject is aware that he/she is under surveillance.
Kinds of Surveillance based on the location of the subject (Negosa, and Gabao, 2019).
1. Moving surveillance- conducted when the person, object or activity being watched
moves from one place to another.
It is performed by foot or by the use of any transportation vehicle in order to observe
the subject.
2. Fixed surveillance- conducted when the person, object or activity being watched is not
expected to move from one area.
Method of Surveillance
92
Tools Used in Fixed Surveillance
1. Binocular
2. Telescope
3. Cameras with telephoto lens
4. Wiretapping devices
5. Listening devices
6. In case there is difficulty in wire tapping device, an expert in lip reading must be
employed.
1. He/she must be of an average height, built and general appearance of a person who
could easily mingle with the crowd without being conspicuous.
2. Adapt an inconspicuous clothes and jewelry.
3. Grooming and body accessories must blend with the crowd to avoid unnecessary
attraction or attention or to avoid him/her being fixed in the mind of a very observant
person.
4. Avoid noticeable peculiarities in appearance and mannerisms.
5. He/she must be resourceful, alert, quick-witted, and versatile to reason out once accused
by others.
6. A good actor by being able to avoid suspicion in an embarrassing situation.
7. Be prepared for a ‗cover story‟. The cover story must be believable regarding his/her
personal appearance. If he acts as a vendor, he/she must look as one without the display
of manicured fingernails or attire at odds with fictitious personality.
2. Dress of surveillant
The surveillant attire should be in harmony with the area or neighborhood in which
surveillance is conducted.
3. Precautions
• Do not make abrupt, unnatural move.
• Do not use theatrical disguises.
• Never stare directly at the subject.
• Never look directly at the subject‘s eye.
• Do not attempt to appear innocent.
• When in dangerous neighborhood, walk near the curb to reduce the possibility of
attack from doorways and alleys.
• Exercise extreme caution in dark alleys.
93
• Never speak to or appear to recognize another surveillant unless absolutely necessary
to accomplish the mission.
• Inexperienced surveillants must conquer the tendency to believe in themselves ‗made‘
when the subject glances in their direction several times.
Shadowing by Foot
It employs the use of one or more surveillants where the surveillant and the subject
travel by foot and the surveillant has to shadow him for the rest of the operation.
Shadowing by Vehicle
It may involve the use of one or more vehicle normal to the area.
4. Leapfrog method
Only one member of the team maintains contact with the subject. It is a close tail, with the
other members of the squad keeping contact with those immediately ahead of them. At
stated intervals of five to six minutes or upon signal, the man immediately behind the one
keeping contact will move up and take his place; the one that had been in contact will stop,
look in a show window or wait at a traffic light, then take his place behind the last man of
the group. This procedure is continued in rotation as long as the tail is maintained (Negosa,
H. and Gabao, 2019).
94
Counter-Surveillance Techniques
Please prepare for Final Examination Covering the entire Learning Packet
Module 3 & 4. Announcement will be posted in the group chats regarding the specific
schedule and collection of examination.
95
REFERENCES
Interagency OPSEC Support Staff, Compendium of OPSEC Terms, Greenbelt, MD: IOSS,
April 1991.
Lyman, M.D. (2011). Criminal Investigation: The Art and the Science (6 th ed.) New Jersey:
Pearson Education, Inc.
Montojo, F. (2007). Special Crime Investigation: Lesson for Criminology Students. National
Bookstore, Mandaluyong City.
Soriano. O. (2004). Handbook on Police Intelligence. Great Books Publishing. Quezon City,
(p-13-14).
Swanson, C. Chamelin, N. and Territo, L. (2003). Encyclopedia of Police Science. Retrieved
from http://what-when-how.com/police-science/crime-scene-search-and-evidence-
collection-police.
Tradio, C. (1993). Handbook of Criminal Investigation. Central Professional Books, Inc.
Quezon City (pp. 4-5).
96