0% found this document useful (0 votes)
70 views

Cdi 1 - Fundamental of Criminal Investigation

CDI 1

Uploaded by

novyjeanpalermo2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Cdi 1 - Fundamental of Criminal Investigation

CDI 1

Uploaded by

novyjeanpalermo2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

SOUTHBAY

COLLEGE INC.
PUROK CARMENVILLE,
e BRGY.
CALUMPANG, GENERAL
SANTOS CITY
(A Review notes in
Criminology)
INTRODUCTION TO CRIMINOLOGY

CRIMINOLOGY defined
_______________________________________
Criminology- is____________________
a body of knowledge regarding delinquency and crime as a
social phenomenonName(Tradio, 1999).
of Student, It &may
Year also refer to the study of crimes and
Section
criminals and the attempt of analyzing scientifically their causes and control and the
treatment of criminals.

Criminology - is a multidisciplinary study of crimes (Bartol, 1995). This


means that many disciplines are involved in the collection of knowledge about
criminal action, including, psychology, sociology, anthropology, biology, neurology,
political science and economics. But over the years, sociology, psychology, and
psychiatry have dominated the study of crime.

Sub-Fields of Criminology

Sociological Criminology – the study of crime focused on the group of


people and society as a whole. It is primarily based on the examination of the

AL BIEN D.
relationship of demographic and group variables to crime. Variables such as
socioeconomic status, interpersonal relationships, age, race, gender, and cultural

ESCOBAÑEZ,
groups of people are probed in relation to the environmental factors that are most
conducive to criminal action, such as time, place, and circumstances surrounding
the crime.
R.CRIM, MS CJ
Psychological Criminology – the science of behavior and mental processes
(CAR)
of the criminal. It is focused on the individual criminal behavior-how it is acquired,
evoked, maintained, and modified. Both the environmental and personality
Compiler
influences are considered, along with the mental processes that mediate the
behavior.

Psychiatric Criminology – the science that deals with the study of crime
through forensic psychiatry, the study of criminal behavior in terms of motives and
drives that strongly relies on the individual. (Psychoanalytic Theory - Sigmund Freud
– traditional view). It also explains that criminals are acting out of uncontrollable
animalistic, unconscious, or biological urges (modern view).

Scope of the Study oz


Page 1 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE

I. INTRODUCTION TO CRIMINAL INVESTIGATION AND DETECTION – HANS


GROSS – A noted Criminologist once said that Criminal Investigation is a 95%
perspiration b. 3% inspiration and c. 2% luck.

Definition of Terms:

Criminal investigation - is an art, not science. But we must treat it partially in order
that we will be guided by the general principle and concepts; and the provision of
laws pertinent to our Criminal Justice System.

ART - is simply defined as the POWER of performing certain action especially


acquired by experience, study and observation.

Criminal Investigator – is an artist in his chosen field and who had his skills to
produce the finest work of art by busting blank wall cases. Criminal investigators are
the cream of the police organization. They are removed from the stratum of the
ordinary police man and they belong to the realm of police intellectuals. Hence, their
selection must be based not only on qualifications but competence and nothing less.

CONCEPTS AND PRINCIPLES OF CRIMINAL INVESTIGATION

CRIMINAL INVESTIGATION defined – it is an art, which the identity and location of


the criminal offender and gathering and providing evidence of his guilt in criminal
proceedings.

CRIMINAL INVESTIGATOR defined – He is the skilled person who is charged with


the duty of conducting criminal investigation when a crime is committed.

QUALITIES OF INVESTIGATOR:

1. Perseverance
2. Endurance
3. Incorruptible honesty and integrity
4. The Intelligence and Wisdom of Solomon
5. The knowledge of psychology and other natural sciences
6. Acting Ability
7. Mastery of the Oral and Written Communication
8. The keen power of observation and deception
9. Working knowledge of Criminal Law, Evidence, Criminal Procedures and
Penal special laws.
Page 2 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
10. Sense of justice and Fairy Play.
11. The power to “read between the lines”
12. Working knowledge of martial arts and Fire arms proficiency.

THE THREE TOOLS OR I’S OF INVESTIGATION:

1. INFORMATION defined – It is the knowledge of facts which the investigator had


gathered from persons or documents, which are pertinent relevant concerning the
commission of criminal activities.

INFORMATION CLASSIFIED AS TO SOURCES:


a. Regular Sources
b. Cultivated Sources
c. Grapevines Sources

2. INTERVIEW AND INTERROGATION

a. Interview defined – it is the simple questioning of a person who cooperates with


the investigator.
b. Interrogation defined – It is process of obtaining and admission or confession
from those suspects to have committed a crime. It is confrontational in nature.
c. Field Inquiry defined – It is the general questioning of all persons at the crime
scene conducted by the investigator.

3. INSTRUMENTATION defined - It is the police of applying instruments or tools of


the police sciences in criminal investigation and detection.

CARDINAL QUESTIONS IN INVESTIGATION:

1. THE FIVE W’s and H OF CRIMINAL INVESTIGATION – These are the


questions: WHO, WHAT, WHEN, WHERE, WHY and HOW.
2. RECURRING QUESTIONS - are the MENTAL and PHYSICAL
RECONSTRUCTIONS on how the crime was committed, these questions will
preoccupy the mind of the investigator.

RESPONDING TO THE CRIME SCENE:

When a report of a crime is received, the identity of the person who reported is
noted, to include his address, personal circumstances and possibly contact number.

a. The means of the report


b. The time of the report
c. The receiver of the report
d. The time of dispatch
Page 3 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
CRIME SCENCE INVESTIGATION:

1. THE GOLDEN RULE AT THE CRIME SCENE - Never touch any object at the
crime scene unless photographed, measured and indicated in the sketch.

2. ASSIGNMENT OF DUTIES - The team is headed by the Chief or Senior


Investigator.
The Members include the following:
a. Assistant Team Leader
b. Photographer
c. Sketcher
d. Master note taker
e. Evidence Man
f. Measurer

3. THE CRIME SCENE SEARCH - The investigator places himself at a spot where
there are no physical evidence that will be tampered and make an estimate as to
what form of search will be employed.

4. THE METHODS OF SEARCH:


a. the strip method
b. the double strip method
c. the spiral or circular method
d. the zone method
e. the wheel, radial or spoke method

5. THE PURPOSE OF SEARCH - the purpose of the crime scene search is to find
physical evidence. The afore-stated methods are only general guides for the
investigator.

6. PHOTOGRAPH OF THE CRIME SCENE:


a. general view
b. medium view
c. close up view
d. color photography

7. GUIDES IN PHOTOGRAPHING CRIME SCENES:


a. Series of photographs of the crime scene
b. The depicted object in the photograph should not be immaterial or
irrelevant.

8. THE KINDS OF PHOTOGRAPHS TO BE TAKEN AT THE SCENE


a. The photograph of the deceased showing the relationship of the dead body
with surroundings, especially the physical evidence
Page 4 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
b. Photographs of evidence showing forcible entry destroyed padlocks, broken
doors and windows and other relevant signs of disturbances.

9. THE USE OF SPECIAL PHOTOGRAPHY


a. Such as infrared, ultra violet, orthosterios macro- photography, movie
camera, etc…
b. Photography of environs
c. Close-up photograph of the dead body after removal from the scene.

10. SKETCHING THE CRIME SCENE

a. SKETCH - it is the graphic representation of the scene of the crime. With


complete measurements of the relative distances of relevant object and conditions
obtaining therein.

b. THE GENERAL KINDS OF SKETCH


1. Rough Sketch – It is made by the investigator at the crime scene which is full of
important details. But without the scale of proportion This is used as the basis for the
finished sketch.
2. Finished Sketch- This is a Sketch with a scale of proportion and drawn by the
draftsman. The rough sketch and the finished sketch are fore court presentation.

11. THE SPECIFIC KINDS OF SKETCHES


a. sketch of locality
b. Compass direction
c. Sketch in details/cross projection or the exploded view

12. THE ELEMENTS OF THE SKETCH


a. measurements
b. compass direction
c. essential items
d. scale of proportion
e. legend
f. title

13. COLLECTION, MARKING, TAGGING and PRESERVATION OF THE


EVIDENCE

a. COLLECTION – As evidence is collected, it is individually marked with initials of


the Investigator.
b. MARKING – Every collected evidence is marked.
c. TAGGING - Every piece of evidence the is collected and marked must be tagged
d. PRESERVATION OF THE EVIDENCE – Perishable Materials should be preserve
by the way or the methods of preservation in order that they will reach the court in
Page 5 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
the same physical condition as when they were collected from the crime scene. This
is the work of the laboratory technician

14. CHAIN OF CUSTODY defined - it is the number of persons who handled and
possessed the piece of evidence the moment that they were collected, marked and
tagged, up to the time the final disposition of the case.

15. METHODS OF MARKING SPECIFIC KINDS OF EVIDENCE

a. GUNS:
i. Revolver – frame, butt, cylinder, barrel and stock.
ii. Rifles – barrel, frame, bolt or slide
iii. All magazines and accessories shall also be marked.

b. REVOLBER CYLINDER: The chamber facing the firing pin must be marked as
soon as it is open for examination.

Note: the direction of the rotation of the cylinder must also be sketched and noted.
E.g. Colt clockwise while S&W counter clockwise direction.

c. FIRED EMPTY SHELLS: Fired empty cartridges inside the mouth, In case of. 22
call on the side o0f 6the body of the shell.

d. BULLETS OF SLUG: Ogive or nose avoiding the land and groove. They could
also be marked on the base.

RECONSTRUCTING THE CRIME

1. RECONSTRUCTING THE CRIME defined – It is the assessment made by the


investigator after the crime scene investigation, of how the crime is committed.

2. KINDS OF RECONSTRACTING THE CRIME


a. PHYSICAL RECONSTRUCTION - It is based on the physical appearance of the
crime scene mainly focused on the pieces of physical evidence. And the accounts of
witnesses and suspects
b. MENTAL RECONSTRUCTION - Based on the physical reconstruction; some
conclusion could be formulated taking into account all available pieces o9f evidence.

THE DEVELOPMENT OF THEORIES:

THEORY defined - It is the imaginative contemplation of reality, direct intellectual


apprehension, insight or body of generalization and principles developed in
association with the practice in a certain field of activity (The of the Investigator’s
theory).
Page 6 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
FIELD INQUIRY:

a. FIELD INQUIRY defined – it is the general questioning of all persons at near or


around the crime scene.
b. when to start the field inquiry.
c. how to treat witnesses and suspects retained ate the scene
d. the purpose of separating the witnesses or suspects from one another.

GOING BACK TO THE CRIME SCENE

a. Reason for going back at the crime scene


b. Value of the process

THE THREE PHASES OF CRIMINAL INVESTIGATION

a. The identification of the criminal


b. The facts or evidence to prove his guilt are gathered for introduction during trial.

THE FOUR METHODS OF IDENTIFYING THE CRIMINALS:

a. By confession or admission
b. By accounts or testimonies of witnesses
c. By circumstantial evidence
d. By associative evidence

THE TWO KINDS OF CRIMINALS FOR PURPOSES OF IDENTIFICATION BY


WITNESS:
a. KNOWN FUGITIVES
b. UNKNOWN FUGITVES

FACTORS AFFECTING POSITIVE IDENTIFCATION:


1. The ability of the witnesses to positively identify the unknown criminals
depends upon his level of alertness intelligence, vision, age and health.
2. The prevailing conditions of visibility and observation of the crime scene.
3. The lapse of time between the commission of the crime and the arrest of the
offender.
4. The opportunity of the criminal to vary his personal appearance such as the
removal of moustache, side bums, goatee, the change to hair style, the
addition of tattoo on the face, earrings, nose rings, lip rings or facelift thru
surgery.

METHODS OF IDENTIFICATION BY WITNESSES


1 verbal description
2. Rogue’s gallery
Page 7 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
3. General photographs
4 cartographic sketches

THE POLICE LINE-UP


It is the process of identification by witnesses of the unknown fugitive who is
mixed innocent persons lined before the witness. (Procedures of Police Line-Up)
CENTERPOINTS OF PHYSICAL IDENTIFICATION
1. Face 7. Fingers
2. Hair 8. Manner of walking
3. Neck 9. Voice
4. Shoulder 10. Physical appearance
5. Waist 11. Complexion
6. Hands

THE PHYSICAL EVIDENCE TO IDENTIFY CRIMINAL

KINDS OF PHYSICAL EVIDENCE:

1. CORPUS DELICTI – These are the object or substance, which constitute the
essential parts or elements of the commission of the crime. It is sometimes called
the body of the crime not the body of the victim. The cause of death is one of the
essential element of a crime.
2. ASSOCIATIVE EVIDENCE – Pieces of evidence which will link suspect to the
scene, such as fingerprints, foot or shoe impressions are but some of the examples.
3. TRACING EVIDENCE – Article which assist the investigator in location the
criminal. Stolen goods in the possession of the suspect is the example.

PRESERVATION AND CARE OF EVIDENCE

(Purpose – shell have the same substantial condition when they will be presented
before the court during trial)
(Marking – for positive and defined identification during trial)

MODUS OPERANDI Defined – simply, it is the method of the operation by a


specific criminal or criminal syndicates. (Importance of Modus operandi)

THE ART OF OBTAINING INFORMATION

A. INTERVIEW

1. INTERVIEW defined – it is the questioning of a person believed to possesses


information which is relevant to the investigation of a crime or on criminal activities

Page 8 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
2. THE GOLDEN RULE IN INTERVIEW - Never conduct or let anyone conduct an
interview if the interviewer has not gone to the crime scene.

3. QUALITIES OF AAA GOOD INTERVIEWER:


a. Rapport forceful personality
b. Knowledge of human behavior
c. Conversational tone of voice
d. Common interest
e. Acting qualities
f. Humility

4. COGNITIVE INTERVIEW defined – it is a formed or technique in the conduct of


interview upon will witness and cooperative witness, where they are given the full
opportunity to narrate their accounts without interventions interruption and
interference from the interviewer.

5. REASONS WHY WITNESSES REFUSE TO TALK AND TESTIFY


a. fear of reprisal
b. great inconvenience
c. hatred against the police
d. bias of the witness
e. avoidance of publicity
f. family restriction
g. bigotry
h. cultish indoctrination

6. COMMON TECHNIQUE APPLICABLE TO FOREGOING REASONS


Many of this witness want that they will not be utilized as formal witness but to
remain anonymous. (Note: The power of persuasion plays a key anonymous. (Note:
The power plays key role.)

7. THE STAGES OF HANDLING THE INTERVIEW


1. Preparation
2. Approach
3. Warming up
4. Cognitive interviews

8. RULES IN QUESTIONING
a. One question at a time
b. Avoid implied answer
c. Simplicity of questions
d. saving faces
e. yes and no answer

Page 9 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
9. TYPE OF WITNESSES ACCORDING TO THEIR ATTITUDES
A. Known- nothing type
B. Disinterested type
C. The drunken type
D. Suspicious type
E. Talkative
F. Honest witnesses
G. Deceitful witness
H. Timid witnesses
I. Boasting, egoistic or egocentric witnesses
J. Type refusal to talk witnesses
10. STATEMENT ANALYSIS:
The investigator my exercise the utmost care before concluding the culpability
of suspect. Every compliant and testimonies of witnesses are subject to crucible of
truth, lest the investigator will be ignorant and unmindful weapon of deception, frame
up of incriminatory machination against innocent.

11. COMPLAINT AND TESTIMONIES BE REDUCED IN WRITING (Q&A)

B. INFORMANTS

1. INFORMANT defined - is any person who furnishes the police information


relevant to a criminal case about the activities of criminal or syndicates. The
informant may openly give information or offer himself to a witness.

2. CONFIDENTIAL INFORMANT defined - people who provide the police with


confidential information concerning a past crime or projected and planned crime.

3. THE TYPES OF INFORMANTS:


a. anonymous informant
b. rival- elimination informant
c. false informant
d. frightened informant
e. self- aggrandizing informant
h. woman informant
i. legitimate informant

C. INFORMERS

1. INFORMER defined – the person who provides information to the police on a


regular basis. They are either paid regularly or in a case to case basis, or none at all.

2. THE PROVIAL BASIS – The saying goes: It needs a thief to catch another thief.

Page 10 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
3. SELECTION OF INFORMERS – This is addressed to the sound discretion of the
investigator, the informer may be to a fixed period of assignment or into a case to
case basis.

4. CRITICAL AREAS IN DEVELOPMENT OF INFORMERS


a. Within the ranks of criminals and criminal syndicates
b. associates and friend of criminals
c. Places of hang outs criminals
d. Slum and residential places where criminals have their contacts
e. Detention Centers
f. Places where criminals dispose their loots

5. WOMEN INFORMERS- Most effective among informers because they could


easily penetrate the ranks of criminals with less suspicion.

6. DUAL ROLE OF THE INFOMERS - Identifying and tracing the whereabouts of


the suspects and gathering of information that will lead to the location and recovery
of the evidence such as the loot or the other pieces of evader relevant to criminal
activities.

D. OTHER SOURCES
1. GOVERNMENT RECORDS
2. PRIVATE RECORDS
3. INTERPCEPTED MESSAGES
4. RECORDS OF THE FIREARMS AND EXPLOSIVE UNIT
5. FIRE BUSTING
6. RECORDS OF FOREIGN AND LOCAL MANUFACTURER
7. STORED DATE ON COMPUTERS AND CELLPHONES RULES ON
COMPUTER

Upon arrival when computer is off don’t turn it on. When on don’t turn it off.
The plugging should be done by pulling out the cable directly from the back of the
CPU.

Each plugging cable must be marked; computer must be carefully handled


and packed only computer forensic expert should search for any information or
evidence contained in the hardware and the computer hardware should be
duplicated by the expert and the original should be kept by the evidence custodian.

8. RECORDED MESSAGE FROM THE FILE WITH I.T. COMPANIES –


coordination with the IT CO. on relevant information is desirable. The value of this
information on the files of these companies could not be underestimated.

Page 11 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
THE ART OF INTERROGATION

1. INTERROGATION – it is the vigorous and the confrontational questioning of


suspect about his participation in a crime. It is confrontational in the sense the
navigator places the guilt on the accused. This process is also applied to an
uncooperative or recalcitrant witness.

2. PURPOSE OF INTERROGATION
a. On the part of the suspect, it is to extract a confession or admission.
b. On the part of the uncooperative or unwilling witness, it is to extract the
information he possessed.

3. CONFESSION DISTINGUISHED FROM ADMMISSION


a. CONFESSION – it is the direct acknowledgement of guilt arising from the
commission of crime.
b. ADMISSION – It is the acknowledgement of fact or circumstance without
accepting guilt.

4. KINDS OF CONFFESSION;
a. Extra Judicial confession- is a confession made out of court, and not as a part
of a judicial examination or investigation. Such a confession must be corroborated
by some other proof of the corpus delicti, or else it is insufficient to warrant a
conviction.
b. Judicial Confession- is made before a committing magistrate or in a court in the
due course of legal proceedings. It is also a plea of guilty made by the accused in a
fit state of mind to plead, before a court which is competent to try him for the offense
charged and which, upon the entry of the plea, is competent to enter judgment and
fix the penalty.

5. CUSTODIAL INTERROGATION OR INVESTIGATION - This is the stage of


investigation where there is strict observance of the MIRANDA DOCTRINE.

6. MIRANDA DOCTRINE (MIRANDA VS ARIZONA)

THE RIGHTS OF THE ACCUSED DURING CUSTODIAL INTERROGATION


1. Right to remain silent
2. Right to counsel of his own choice and if he has none, the government must
provide one for him free of charge.
3. Right to be informed of the nature of the charges against him and whatever
he says may be used for or against him.

THIS RIGHT COULD BE VALIDY WAIVED


1. In writing
2. With the assistance of counsel
Page 12 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
3. Signed and sworn by the accused

7. THE TECHNIQUES OF INERROGATION:

A. EMOTIONAL - Combining his skills of an actor and a psychologist.


B. SYMPATHETIC APPEAL - An offer to help, kindness, friendliness
C. FRIENDLINESS - An approach coupled with a posture of sincerity.
D. TRICK AND BLUFF
1. The pretense of Solid Evidence against the accused
2. The Weakest Link
3. Drama
4. Feigning contact with family member
5. Many more trick and bluffs
6. The Line-Up
7. Reverse Line-Up

E. STERN APPROACH – The investigator displays a stern personality


towards the suspect by using the following methods:
1. Pretense of physical evidence
2. Jolting
3. Opportunity to lie
4. Indifference
5. Feigning protection and consideration
F. THE MUTT AND JEFF OR SWEET AND SOUR METHOD
G. REMOVING THE ETHNIC OR CULTURAL BARRIER
H. SEARCHING FOR THE SOFT SPOT

8. ADDITIONAL MODERN TECHNIQUES OF INTERROGATION

a. RATIONALIZATION - it is use of reasons, which is acceptable to the


subject that led to commission of the crime.
b. PROJECTION - it is the process of putting the blame to other person,
not and to suspect
c. MINIMIZATION – It is the act minimizing the culpability of the suspect.

9. PHYSICAL SIGNS OF DECEPTIONS


a. sweating
b. color change
c. dry mouth
d. avoidance of direct eye contact
e. breathing
f. pulse

Page 13 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
METHODS OF INSTRUMENTATIONS
1. POLICE SCIENCE INVOLVED
a. POLYGRAPH OR LIE DETECTOR TEST
b. QUESTIONED DOCUMENT EXAMINATION
c. POLICE PHOTOGRAPHY
d. DACTYLOSCOPY
e. FORENSIC MEDICINE
f. DONTOLOGY
g. FORENSIC CHEMISTRY- (TOXICOLOGY)
h. FORENSIC PSYCHOLOGY
i. FORENSIC BALLISTICS
j. FORENSIC COMPUTER TECHNOLOGY

2. INSTRUMENTATION - it is the application of instrument and the laws of


physical sciences in the investigation and detection of crimes and criminals.
This is otherwise known as CRIMINALISTICS.

3. FORENSIC DETECTIVE - The person applying the forensic science in crime


detection.

4. MODERN DISCOVERIES OF INSTRUMENTATION


a. DNA (Deoxyribonucleic Acid) - The discovery in genetics is that no two
persons have the same DNA profile, expect the identical twins. The
father of DNA is Sir ALEC JEFFREY. The DNA of an individual is
formed by the combination of DNA’s of the father and the mother.
Brothers and sisters of the same parents have different DNA’s and
there is never a chance that it would result to identical or similar profile.
b. HAIR EXAMINATION - The roots of the hair when examined under the
new technology will determine the presence of drugs taken by the
person two years prior to the said examination.
c. GLOBAL POSITIONING SYSTEM (GPS) - This is for the effective
identification on the location of criminals and objects thru modern and
special gadgets.

SURVEILLANCE AND UNDERCOVER OPERATIONS

A. PRINCIPLE AND CONCEPT OF SURVEILLANCE


1. SURVEILLANCE - It is the observation of persons, place and vehicles for
the purpose of obtaining information concerning the identities of criminals
and their activities.

2. SURVEILLANT - The person who conducts the surveillance or performs


the observation.

Page 14 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
3. Subject - is the person, place, vehicle being observed by the surveillant.

4. THE KINDS OF SURVEILLANCE:


a. COVERT- Subject is not aware that he is being observed.
b. Overt - Subject is aware that he is being tailed.

5. THE PURPOSE OF SURVEILLANCE


a. To get information on criminal
b. To discover the identities of persons frequenting the place to
established their criminal activities.

6. OTHER TYPES OF SURVEILLANCE


a. FIXED SURVEILLANCE - watching a house or building
b. MOVING SURVEILLANCE - on foot or by motor

7. PROCEDURES IN FIXED SURVEILLANCE

8. TOOLS USED IN FIXED SURVEILLANCE

9. PERSONNEL APPEARANCE OF THE SURVEILLANT

B.SURVEILLANT ON FOOT

1. SHADOWING or TAILING

2. PURPOSE OF FOOT SURVEILLANCE

3. THE DON’TS IN FOOT SURVEILLANCE

4. PREPERATION FOR THE SHADOWING

5. THE METHODS OF FOOT SURVEILLANCE


a. One man shadow
b. Two man shadow and
c. Three man shadow or ABC technique of shadowing

6. TACTICS AND TECHNIQUES OF SHADOWING


a. Turning corners
b. Entering a building
c. Riding a bus
d. Riding a taxi
e. Riding a train
f. In a hotel
g. In a telephone booth
Page 15 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
h. In a theater
i. Inside a private house
j. Inside a small private or public office

7. THE CONSTANT RISK OF THE SHADOWER - if he is organized, he is


recognized, he is recognized, he is “burned out”. The other is losing the
subject.
8. THE COMMON TRICKS OF SUBJECT
a. Test for tailing
b. Use of convoy

C. VEHICLE SURVEILLANCE

1. Technique in automobile surveillance.


2. Distinguishing the shadower’s cars.

D. UNDERCOVER OPERATION

1. UNDERCOVER OPERATION - It is a police operation wherein the


investigator assumes a fictitious identity in order to infiltrate the ranks of the
criminals for the purpose of obtaining information.

2. PURPOSE OF UNDERCOVER OPERATION


a. Gathering of evidence
b. Gathering of information
c. Installation of surveillance equipment
d. Loyalty check
e. Penetrating subversive organizations
f. Counter intelligence
g. Basis for a successful raid

3. QUALITIES OF A GOOD UNDERCOVER AGENT


a. A good actor and a psychologist.
b. Be able to adapt himself in the field of assignment.
c. Knowledge of general information and the varied ways of life, profession
and occupation.
d. Temperament – a calm, enduring and affable personality. Self-control and
self-confidence.
e. Photographic memory

4. SPECIFIC TYPES OF UNDERCOVER ASSIGNMENT


a. Work assignment
b. Social assignment
c. Subversive organization
Page 16 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
d. Residential assignment

5. THE FICTITIOUS PERSONALITY – The preparation should include the


fictitious background of the undercover agent

6. THE DON’TS IN THE ASSIGNMENT


a. Don’t drink too much in the assignment
b. Don’t court women.
c. Do not fail to provide person in the place who could vouch for the agent.
d. Bragging
e. Woman agent
f. Expenditures must be moderate and commensurate with the fictitious
identity.

7. MEANS OF CONTACT WITH HEADQUARTERS


a. Telephone
b. Coded messages
c. Secret meeting

TRACING AND ARRESTING CRIMINALS

1. METHODS OF TRACING AND LOCATING CRIMINAL


a. By informers
b. By informant
c. Grapevine sources
d. Tailings
e. Using children
f. Courting the girlfriend
g. Harassing the known associate and friends of the criminals
h. Interrogate arrested criminals known to the subject
i. In fresh cases, the use of bloodhound dog or K-9
j. In very recent cases, find out the ethnic group of the criminal
k. A thorough search at the hiding place
l. Disguises
m. Publication of rewards for the capture of the criminal
n. Corrupting with money of known associate of the criminal
o. Thru undercover operation
p. Issuance of general alarm
q. Tapping the communication of the facility, friends, and associate
criminals.
r. The use of postal notice of package or registered letter.
s. The use of trick to flush out the criminal from a house where he is
believed to be hiding.

Page 17 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
t. There are many more methods or techniques in tracing and locating
criminals which most often defend on resourcefulness and ingenuity of
the investigator.

2. PLANNING THE ARREST OR RAID


a. Always plan for the worst scenario.
b. The raid or arrest must be well planned always accompanied by the
element of surprise.
c. More than one arresting officer must be employed.
d. Always presume that the criminal is armed and dangerous.
e. Never allow the criminal to change his clothes as the place of arrest.
f. Follow- up operation
g. In conducting raid on residence buildings the officer should always
bring a ten –pound sledgehammer for easy opening doors.
h. In raids, do not stay longer than necessary along the lines of fire.
i. In night time raids 2:00 am to 3:00 am is the ideal time
j. In all arrest and raids, the commanding loud voice of the arresting
officer and serious look.
k. Always rush towards the criminal ion a grapping distance but never
place your gun within his reach.
l. The entering parties should wear bulletproof vest if available.
m. In night raids, be equipped with powerful flashlight
n. Flexibility in the planning and execution should be encouraged
o. The use of marked vehicles from the uniformed units such as Mobile
Patrol Bureau shall be the second perimeter cordon ready for
assistance to the raiding team.
p. The use of automatic fire is discouraged
q. In case of vehicle interception, the car should be immobilized by firing
at the tire, not on the occupants.

INTELLIGENCE

Defined as the product resulting from the collection, analysis, integration,


evaluation and interpretation of all available information which concerns one or more
aspects of area of operation potentially significant to planning. Others would simply
give the definition of intelligence in the sense that it is the output or end product
resulting from the processing of information for future action.

In the study of criminology, the focus is given to police intelligence. As a


process intelligence is an activity which treats processed information as the basis of
departmental policy and decision making.
Page 18 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
IMPORTANCE OF INTELLIGENCE:

1. It is vital to enable a nation to formulate its policies, strategic plans and


conduct its diplomacy.
2. Intelligence is needed in order to enable a nation to forestall the activities of
its internal and external enemies
3. It is necessary to detect and prosecute the activities of criminals and
subversive elements.
4. It is vital in providing ample security for the people and the state.
5. Intelligence plays an important role in the life and survival of a country by
providing advance and exact knowledge of the intentions and design of its
enemies.

TYPES OF INTELLIGENCE:

a. Military Intelligence – refers to the use of processed information in


formulating military plans, programs and policies. This would include strategic
and combat intelligence. Strategic intelligence gives attention to the
capability, vulnerability and possible course of action of the enemy. Combat
intelligence, highlights knowledge pertaining to weather, enemy and terrain.
b. Police Intelligence – refers to the output or end product resulting from the
collection, evaluation, analysis, integration and interpretation of all available
facts which concerns the activities of criminal elements and its activities
significant to the police planning and operation. This covers line strategic and
counter intelligence.
Line Intelligence- refers to processed information which immediate in nature.
Strategic Intelligence- refers to a long term or future use of processed
information.
Counter Intelligence- it deals primarily with the building of the organization
against internal enemies.
c. Strategic Intelligence- refers to the process of gathering information
designed to disturb and disrupt the enemy’s state of finances and destroy the
stability and foundation of its organization.
d. Combat intelligence- refers to that intelligence utilized in designing plans
and conducting tactical and administrative operation.
e. Counter Intelligence- are measures undertaken to deny the enemy of any
information consisting of passive and active intelligence measures. In
passive counter intelligence; secrecy discipline, movement control,
camouflage and proper handling of information is practiced. Active counter
intelligence on the other hand covers reconnaissance, patrolling, sabotage,
espionage, interior guard duty and fortification of vital facilities.

Page 19 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
HISTORICAL BACKGROUND OF INTELLIGENCE:

The art of intelligence or acquiring knowledge of one’s opponent is firmly


entrenched in historic precedent. The ability or capacity of law enforcement agencies
to effectively gauge and react to criminal issues is dependent upon their capability of
gathering and evaluating data. Knowledge is power and with power of knowledge
police managers and administrators is better equipped to deal with the vast array of
today’s problematic law enforcement issues.

Others personalities regarded as military and non military masters:

a. Frederick the great- Frederick II (German: Friedrich II. Von Preuben;


January 24, 1712- August 17, 1786) ruled the kingdom of Prussia from 1740
to 1786. A member of the Hohenzollern dynasty, he was the third and last
“King in Prussia”; beginning in 1772 he used the title “king of Prussia”. In his
role as a prince –elector of the Holy Roman Empire, he was Frederick IV of
Brandenburg (Friedrich IV. Von Brandenburg). He is regarded by military
historians as the “Father of organized military espionage”.

b. Alexander the Great- a renowned Greek conqueror had his share of


advance information when rumors of discontent circulated from among the
ranks of his me. He was able to identify those disloyal ones by ordering the
communication letters opened and was successful in curtailing the decline of
esprit de corpse and morale of his men.

c. Hannibal- known as one of the greatest Roman enemy, who ruled and
conquered Rome for 15 years by obtaining common street knowledge by
posing as a beggar to gather first hand information on the pulse of the people.
Hannibal, son of hamilcar Barca, (247 BC) was a Carthagian tactician and
military commander, who is widely recognized as one of the finest
commanders in history.

d. Frey Tomas de Toquemada- master planner planner who conducted


espionage during the 15th century under the inquisition wherein purging and
ecclesiastical cleansing was undertaken to fortify and solidify the church.

e. Delilah- a biblical personality who was able to gain information by using her
beauty and charm. She was responsible for the fall of Samson as known
Israelite leader who terrorized the Philistines.

f. Edward I- an English monarch who stated utilizing state informants especially


to determine seditious writings against the crown and identify of his enemies.
Rewards are given to wards for every useful information gathered.
Page 20 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
g. Walsingham of England- the protector of Queen Elizabeth I who organized
the secret police and established a spy network to detect fleet movement of
enemies of the British Empire Particularly the Portuguese.

h. Schulmeister- renowned as Napoleon’s eye. He was credited for


establishing counter intelligence conducted against spies. He is a master of
deceit who used black mail to obtain vital information pertaining to the
personality and identify of the enemies of Napoleon during the 18th century.

i. Steiber- known as the Prussia’s King of Sleuthhounds, as minister of police


he started the use of propaganda and censorship as well as utilizing statistical
intelligence accounting.

j. Redl- a double spy who while working as intelligence director of Austria and
Hungary and spied for the Russians. He was the infamous person who was
responsible for a staggering estimate of the death of half million people during
his 13 year career.

k. William J. Donovan- known as wild Bill Donovan, he headed the office of


strategic service responsible to establishing centralized military intelligence
for the United States whose valuable contribution was vital to American
Victory in the 2nd world war. Through his laid down principles the Central
Intelligence Agency was established for defense purposes.

Notable Intelligence Organizations:

a. CIA- established by virtue of the US National Security Act of 1947 signed into
law by President Harry S. Truman, the Central Intelligence Agency took the
cudgels from the OSS, the national Intelligence Authority and the Central
Intelligence Group. The function this famous organization is to ascertain all
aspects concerning national security and coordinated efforts of various
agencies that are in the nature of intelligence gathering. This centralized
information stream was used as basis to national policy.

b. KGB- komitet Gosudarstvennoy Bezopasnosti, or the Committee for the State


Security, during the height of the cold war and the prominence of the defunct
USSR, it was the Russian Agency whose works are comparable to that of its
American counter-part the CIA. KGB was the umbrella organization name for
the Soviet Union’s premier security, secret police and intelligence agency,
from1945 to 1991. On the 21 December 1995, Russian President Boris
Yeltsin signed the decree that disbanded the KGB, to be substituted by the
Federal Security service of the Russian Federation (FSB).

Page 21 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
c. The British Secret Service (M-I-6)- a parallel ally and intelligence
organization of the western powers. Established by the Committee of Imperial
Defense I October 1909. The secret Service Bureau was soon abbreviated to
Secret Service, SS Bureau or even ‘SS’. The first head of the Foreign
Section. Captain Sir Mansfield Cumming RN, signed himself ‘MC’ or ‘C’ in
green ink. Thus began the long tradition of the head of the service adopting
the initial ‘C’ as his symbol. ‘M16’ has become an almost interchangeable title
for SIS, at least in the minds of those outside the service.

d. Mossad- the esraeli intelligence Agency which are renowned by many as the
best due to the fact that Israel despite of having countless enemies in the
middle East was able to survive and flourish. Formerly known as the Central
Institute for Coordination and the central institute for intelligence and security,
Mossad was formed on 01 April 195. Mossad was established by then prime
Minister David Ben Gurion, who gave as Mossad’s primary directive: for our
state which since its creation has been under siege by its enemies.
Intelligence constitutes the first line of defense …we must learn well how to
recognize what is going on around us.”
Mossad also is responsible for the clandestine movement of Jewish
refugees out of Syria, Iran, and Ethiopia. Mossad agents are active in the
former communist countries, in the west and at the UN.

Law Enforcement Intelligence Organizations:

a. Scotland yard- in September 29, 1829, Sir Robert peel, 2 nd Baronet prime
Minister of England created the modern concept of the police force. The
1,000 constables employed were nicknamed “Bobbies” or “Peelers”.
Scotland Yard was called ‘New Scotland Yard” when moved, in
November 1890, to the Victoria Embankment. The named was derived from
the headquarters original location on Great Scotland Yard, a street of
Whitehall.
Scotland was founded along with the Metropolitan Police by Sir Robert
peel, with the help of Francois-Eugene Vidocq. It opened for business as
administrative headquarters of the sevice.
Scotland Yard’s crime database is called (HOLMES) Home Office
Large Major Enquiry System its training program is called “Elementary in
honor of the famous fictional stective sherlock Holmes.

b. FBI- the Federal Bureau was established in 1908 and designated as the
investigative arm of the US Department of Justice. Under the leadership of
John Edgar Hoover, it was vested with the responsibility of handling domestic
intelligence of the United States.

Page 22 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
The FBI has motu propiu investigative jurisdiction over violations of
more than 200 categories of federal crimes, making the FBI the defacto lead
law enforcement agency of the United States government.
The FBI headquarters is located in Washington, D.C., it has 56 field
offices located in major cities throughout the United States as well as over
400 resident agencies in smaller cities and towns, and more than 50
international offices called “Legal Attaches”, in U.S. embassies worldwide.

c. NBI- the National Bureau of Investigations was established primarily for the
purpose of handling scientific and modern investigation of crimes. It was
formerly the Bureau of Investigation created under Republic Act 157 passed
into law June 19, 1947. It is the equivalent organization of the FBI in the
Philippines.

d. The FSB (Federal Security Service) is the leading secret police organization
of the Russian Federation and main successor of the Soviet Checka, NKVD,
and KGB. Its headquarters are still in Lubyanka Square, Moscow. FSB is
engaged mostly in domestic affairs and is responsible for internal security of
the Russian state, counterespionage, and the fight against organized crime
terrorism, and drug smuggling. The espionage duties were taken over the
Russian Foreign Intelligence Service.

e. INTERPOL. Known as the International Police Organization established after


the World War II, with its headquarters in Paris; it serves as a clearinghouse
of records that provides communicating information from the police force of
one country to those of another. Interpol has been the official means of
international co-operation between police forces since 1956. There are
currently 146 members states, each with its own Interpol National Central
Bureau, the British NCB being based at Scotland Yard.

National Criminal Intelligence service (NCIS)

The role of this service, set up in 1992, is to provide law enforcement


agencies with criminal intelligence and information, nationally and internationally,
about major criminals and serious crimes such as homicides, sexual offenses,
armed robberies and drug trafficking. The NCIS incorporate a number of established
national units, such as the NDIU, together with the regional criminal intelligence
offices. It is seen as having a particularly important part in the fight against all forms
of organized crime.

Police National Computer

Since 1974 the police have had the police National Computer to give them
round-the-clock access to vital information, from details of all registered vehicles and
Page 23 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
their owners to an index of more than five million criminal records. It also holds
details of people sought by the people in connection with crime, or who have been
reported missing, or who are disqualified from driving. It can give the police a
person’s description, what aliases they use, and known associates, any criminal
record and last known address.

Updated in 1991 and capable of expanding and adapting to meet the police’s
changing needs, the PNC2 may deal with over 100,000 inquires in a day, and gives
immediate access to information that would otherwise take days or weeks of effort to
gather.

National Identification Bureau

Run by the met Police and housed at Scotland yard but financed by all police
forces, it maintains a record of criminals, their fingerprints and their convictions for
the whole of the UK. Information is made available to the police nationally through
the PNC2 computer.

The National Intelligence Model

The purpose of this report is to inform members about the introduction of a


National Intelligence Model the association of Chief officers crime committee
recognized the police activity has shifted emphasis away from reactive investigations
towards a more proactive targeting of criminals and problems, based in intelligence
and assessment. They identified a need to professionalize this aspect of police work
to ensure that forces are able to share and use intelligence while working to
common standard.

The model is designed to provide a framework in which the intelligence


processes within a force should operate. However, the principles are capable of use
in relation to new or emerging problems for all law enforcement needs from
organized crime to road safety. The model should provide more professional
approach to the intelligence discipline, in particular in the areas of:

 Best practice
 Professional knowledge
 Selection and identification of staff
 Training requirements

The Model will also facilitate the following:


 Support the neighborhood policing philosophy

Page 24 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
 Plan and work in co-operation with partners to secure community
safety
 Manage performance and risk
 Account for budgets

Accuracy of Information
1 - Confirmed By Other Sources
2 - Probably True
3 - Possibly True
4 - Doubtfully True
5 - Improbable
6 - Truth Can Not Be Judged

Alexander The Great - A Greek Conqueror, was able to identify those who are
disloyal to him by ordering the opening of communication letter of his men and was
successful in uplifting the esprit de corps and morale of his men.

ASIS - Australian Secret Intelligence Service - Primary responsibility is gathering


intelligence from mainly Asian and Pacific interest using agents stationed in wide
variety of areas. Its main purpose like other most agencies is to protect the country's
political and economic interest and ensure the safety of its citizens against national
threats.

Categories of Intelligence

1. National Intelligence - integrated product of intelligence developed by all


government departments concerning the broad aspect of national policy and
national security.

2. Departmental Intelligence - the intelligence required by the department or


agencies of the government to execute its mission and discharge its
responsibilities.

3. Military Intelligence - refers to the knowledge by the military institution


essential in the preparation and execution of military plans, policies and
programs.

CIA - Central Intelligence Agency is the civilian intelligence agency


of the USA. It is the largest intelligence agency in the world.

Page 25 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Classifications of Documents

1. Top Secret - calls for the utmost degree of protection, Unauthorized revelation of
this materials and information will cause extremely severe damage to the nation,
politically, economically, or militarily.

2. Secret - unauthorized disclosure of this documents or things may put at risk the
national security, cause serious injury to the reputation of the nation.
3. Confidential - Unauthorized revelation of which may be injurious to the reputation
of the nation or governmental activity or will cause administrative humiliation or
unnecessary injury.

4. Restricted - this are information which should not be published or communicated


to anyone except for official purposes. These records are daily files, routine in nature
even if lost or destroyed will not affect operation or administration.

Classification of Sources of Information

1. Open Sources - 99% of the information collected are coming from open sources
or obtained from overt operation.

2. Close Sources - only 1% of information are obtained from covert operation.


Elements of Clandestine Operation

1. Sponsor - directs the organization conducting the clandestine


activity.
2. Target - person, place or things against which the clandestine activity is to
be conducted.

3. Agent - refers to a person who conducts the clandestine operations,


includes principal agents, action agents, and support agents.

Principal Agent - leader or management agent in clandestine operation usually


undertaken by the case officer.

Action Agent - one who conducts the clandestine operation that includes:

a. Espionage Agent - agent who clandestinely procures or collect


information.

b. Propagandist - agents who molds the attitudes, opinions and actions of an


individual group or nation.

Page 26 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Support Agent - agent who is engaged in activities which supports the clandestine
operations that includes the ff:

a. Surveillant - agent who observes persons and places of operation of


interest.

b. Investigator - agent who undertakes to procure information or things of


clandestine operation.
Procurer of Funds - agent who obtains money when needed for operational use.

Safe House Keeper - agents who manages and maintains a safe house for
clandestine operations like meetings, safe heavens, training, briefing and debriefing.

Communication Agent - agent who is detailed to secure clandestine


communications.

Coding - the changing of message from plain clear text to unintelligible


form, also known as encrypting.

Decoding - transforming of coded message into plain text, also known as


decrypting.

Counter Intelligence - phase of intelligence covering the activity devoted in


destroying the effectiveness of hostile foreign activities and the protection of
information against espionage, subversion and sabotage.

Types of Counter Intelligence

1. Passive CI Measures - protection of classified and sensitive information against


unauthorized access through secrecy, communication security and other
safeguards.

2. Active CI Measures - are those measures which seek actively to block enemies
effort to gain information or engage in espionage, subversion and sabotage.

Categories of Counter Intelligence Operations

1. Military Security - it encompasses the measures taken by a command to protect


itself against espionage, enemy operation, sabotage, subversion, or surprise.

2. Port Boundary and Travel Security - application of both military and civil

Page 27 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
security measures for counter-intelligence control at point of entry and departure,
international borders and boundaries.

3. Civil Security - active and passive counter-intelligence measures affecting the


non-military nationals permanently or temporarily residing in an area under military
jurisdiction.

4. Special Operations - counter subversion, sabotage and espionage.

Objectives of Counter-Intelligence

1. It denies information to the enemy


2. It reduces the risk of a command
3. Aid in achieving surprises
4. Increases the security of the command
5. Decrease the ability of the enemy to create information about he forces.

Functions/Activities of Counter-Intelligence

1. Protection of Information against espionage


2. Protection of personnel against subversion
3. Protection of installations and materials against sabotage

Cryptography - arts and science of codes and ciphers.

Crypto Analyst - refers to those persons who break intercepted codes.

Cryptographer - refers to a person who is highly skilled in converting message from


clear to unintelligible forms by use of codes and ciphers.

Delilah - a biblical personality, she was able to gain information by using her beauty
and charm, she was responsible for the fall of Samson, a known Israelite leader and
enemy of the Philistines.

Frederick The Great - Father of organized military espionage.

FSD - Federal Security Service of the Russian Federation, is the main domestic
security agency of the Russian Federation, and the main successor of the Cheka,
NKVD and the KGB.

General Directorate For External Security - France external intelligence agency,


operating under the direction of the French Ministry of Defense.

Page 28 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Informants - any person who hand over information to the agents which is relevant
to the subject.

Type of Informants

1. Anonymous - unidentified or unknown informants.


2. False Informant - reveals information of no consequences or value.
3. Frightened Informants - weakest link in criminal chain, motivated by anxiety.
4. Self-Aggrandizing - moves around the center of criminals delight in surprising
the police about bits of information.
5. Mercenary - information for sale needed something for exchange of information.
6. Double Crosser - wants to get more information from the police more than what
he gives.
7. Women Informant - most dangerous type of informant.
8. Legitimate - operators of business.

Motives of Informants

1. Vanity - conceited act/character of the criminal resulting to self-betrayal or


tantamount to guilt, gaining favorable attention and importance by the police.

2. Civic-Mindedness - sense of duty and obligation to assist the police.

3. Fear - a person under an illusion of oppression by enemies or of other impending


danger.

4. Repentance - one who has a change of heart and wishes to report a crime that is
preying on his conscience.

5. Gratitude or Gain - an expression of appreciation to obtain a privilege or an


interest in the welfare of his family during his detention.

6. Revenge - to settle a grudge due to settle a previous injury.

7. Jealousy - envious of the accomplishments or possessions of another and


wishes to humiliate him.

8. Remuneration - a person who informs solely for the pecuniary or other material
gain he is to receive.

Page 29 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Informers - refers to any person who provides information to the agents
in a regular basis regarding a subject, they are paid either on a
regular or case to case basis.

Intelligence - the organized effort to collect information, to assist it Little by little, and
piece it together until it forms larger and clear pattern.

(intelligence as an activity) - the end product resulting from the collection,


evaluation, analysis, integration and interpretation of all available information which
may have immediate or potential significance to the development and execution of
plan, policies and programs of the user.

(intelligence as a product) - an institution composed of person who prepares a


plan or formulating policies.(intelligence as an institution)

Intelligence Cycle
1. Planning
2. Collection
3. Processing
4. Dissemination

Planning - the intelligence officer must have a thorough knowledge of the available
sources of information, the collecting agencies and type of information the latter can
provide.

Collection - the intelligence officer must have thorough knowledge of the available
sources of information and collecting agencies and the type of information they can
provide and consider the following:
a. Determine collecting agency
b. Send orders or request
c. Supervise collection efforts
d. Use tools or techniques in collection
e. Ensure timely collection

Factors in Choosing Collection Agents


a. Capability - agents placement or access to target
b. Multiplicity - more agents
c. Balance

Page 30 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Processing - Five Steps

1. Recording - is the reduction of information in writing or other form of graphical


representation and arranging the information into groups of related items.

2. Evaluation - is the determination of the pertinence of the information to the


operation, reliability of the source or agency and the accuracy of the information.

Pertinence - does it holds some value to current operation.

Reliability - judging the source of information or agency

Credibility - truth of information


3. Analysis - is the stage in which the collected information is subjected to review in
order to satisfy significant facts and derive conclusions there from.

4. Integration - the combination of the elements isolated analysis with other known
information related to the operation.

5. Interpretation - process of determining the significance of new information and its


meaning.

Dissemination - processed information or intelligence data are disseminated to end


users, common methods of disseminating intel data are conferences, briefing and
person to person exchanges. In this process, consider the factors of timeliness,
correctness and security.

ISI - Inter-Services Intelligence, Pakistan's premier intelligence agency. It was


established in 1948. Its office is located in Islamabad.

Julius Caesar - in his time, the staff of each legion includes ten speculators who
served as an information collecting agency. The Speculators were the first
intelligence personnel to appear in a military organization. Military success of the
Romans was aided by the communication system. Made use of pigeons as carrier
which made intelligence transmittal very fast.

Karl Schulmeister - known as Napoleon's Eye, he was credited for establishing


counter-intelligence against spies. He is a master of deceit who used black mail to
obtain vital information to identify the enemy's of Napoleon.

Page 31 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Kinds of Covert Operation

1. Surveillance - is the covert, discreet observation of people and places for the
purpose of obtaining information concerning the identities or activities of subjects.

Surveillant - is the plainclothes investigator assigned to make the


observation.

Subject - can be a person, place, property and vehicle, of people,


organization, or object.

Safe house - refers to place where agents meet each other for purposes of
debriefing and reporting.

Live Drop - refers to a place where agents or informants leave their


messages to the other agents.
Decoy - a person or object used by the subject in an attempt to elude the
surveillant.

Convoy - an associate of the subject who follows him to detect surveillance.

Log - chronological records of activities that took place in the establishment


under surveillance.

Methods of Surveillance

1. Stationary Surveillance - also referred to as Fixed or Stakeout


Surveillance - is used when you know or suspect that a person is at or will
come to a known location, when you suspect that stolen goods are to be
dropped or when informants have told you that a crime is going to be
committed.

2. Moving Surveillance/Shadowing/Tailing - simply the act of following a


person.

Forms of Shadowing/Tailing

1. Loose Tail - employed where a general impression of the subject's habits and
associates is required.

2. Rough Shadowing - employed without special precautions, subject maybe aware


of the surveillance, employed also when the subject is a material witness and must
be protected from harm or other undesirable influences.
Page 32 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
3. Close Tail - extreme precautions are taken against losing the subject is employed
where constant surveillance is necessary.

4. Casing - it is the careful inspection of a place to determine its suitability for a


particular operational purpose.

3. Elicitation - the process of extracting information from a person believe to be in


possession of vital information without his knowledge or suspicion.

4. Employment of Technical Means

Bugging - the use of an equipment or tool to listen and record discreetly


conversation of other people.

Wiretapping - a method of collecting information through interception of telephone


conversation.
5. Tactical Interrogation - it is the process or method of obtaining information from
a captured enemy who is reluctant to divulge information.

6. Observation and Description - it is a method of collecting information by just


merely using the different senses.

Methods and Techniques of Collecting Information

Information - all evaluated materials of every description including those derived


from observation, reports, rumors, imagery and other sources from which
intelligence is produced.

Types of Agents Used in Collecting Information

1. Agent of Influence - agent who uses authority to gain information.

2. Agent in Place - agent who has been recruited within a highly sensitive target

3. Penetration Agent - agent who have reached the enemy, gather information and
able to get back without being caught.

4. Expendable Agent - agent who leaks false information to the enemy.

5. Double Agent - an enemy agent who has been taken into custody turned around
and sent back where he came from as an agent of his captors.

Page 33 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
MI6 - Secret Intelligence Service, supplies the British government of foreign
intelligence.

MSS - Ministry of State Security, is the security agency of the Peoples Republic of
China.

Mole - also known as sleeper agent. Tasked with monitoring an organization or


individual. A mole can spend years in the same place only responding to missions
when assigned. They are trained to be visible but to keep their motives unknown.

Mossad - Institute for Intelligence and Special Operations, is responsible for the
intelligence collection and covert operation of the Israel government, Its Director
reports directly to the Israel Prime Minister. It is one of the entities of the Israeli
intelligence community along with AMAN (Military Intelligence) and SHIN BET
(Internal Security)

Moses - sent 12 scouts to the land of Canaan to survey the land, the people, their
location and the nature of their cities.

NICA - National Intelligence Coordinating Agency, the primary


intelligence gathering arm of the Philippines. Its motto is
Knowledge is Safety. It is headed by a Director General and is
assisted by a Deputy Director General. The Director General reports
directly to the President of the Philippines.

EO 492 issued on February 1, 2006, ordered the NICA to activate the National
Maritime Aerial Reconnaissance and Surveillance Center or NMARSC. The
NMARSC shall serve as the primary intel provider for the Philippine intelligence
community. Under the supervision and oversight of the National Security Adviser,
the NICA-NMARSC will operate unmanned aerial vehicles or UAV's to cater to the
imagery intelligence demands of various government agencies.

Police Intelligence - the end product resulting from the collection, evaluation,
analysis, integration and interpretation of all available information regarding the
activities of criminals and other law violators for the purpose of effecting their arrest,
obtaining evidence and prevent plan to commit crimes.

Categories of Police Intelligence

1. Strategic Intelligence - knowledge pertaining to the capabilities and


vulnerabilities of a foreign nation which is required by the national planners for the
formulation of an adequate national defense. Intelligence is for long range.

Page 34 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
2. Counter-Intelligence - preparation and execution of plans and programs to
neutralize or prevent any activities undesirable to the police organization.
3. Line or Tactical Intelligence - intelligence information directly contributes to the
accomplishment of specific objectives and immediate in nature and necessary for
more effective police planning and operation.

Components of Strategic Intelligence

1. Political Intelligence - deals with domestic and foreign affairs and


relations of government operations.

2. Economic Intelligence - deals with the extent and utilization of natural and
human resources to the industrial potential of the nation.

3. Transportation and Telecommunication intelligence - concerned with


the operations and facilities of the military and civilians.

Functional Classification of Police Intelligence

1. Criminal Intelligence - refers to the knowledge essential to the prevention


of crimes and the investigation, arrest and prosecution of criminal offenders.

2. Internal Security Intelligence - refers to the knowledge essential to the


maintenance of peace and order.

3. Public Safety Intelligence - refers to the knowledge essential to ensure


the protection of lives and properties.

Principles of Intelligence

1. Intelligence and Operation are interdependent


2. Intelligence is continuous
3. Intelligence must be useful
4. Intelligence operation requires imagination and foresight
5. intelligence must be available on time
6. Intelligence must be flexible
7. Intelligence requires continuous security measures

RAW - Research and Analysis Wing is India's external intelligence agency. Its
primary function is collection of external intelligence, counter-terrorism and covert
operations.

Page 35 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Reliability of Information

A - Completely Reliable
B - Usually Reliable
C - Fairly Reliable
D - Not Usually Reliable
E – Unreliable
F - Reliability Can Not Be Judge

Security Clearance - is a certification by a responsible authority that the person


described is clear to access and classify matters at appropriate levels.

Interim Clearance - effective for 2 years.

Final Clearance - effective for 5 years.

Security Measures and Operations in Relation To Intelligence

1. Physical Security - the broadest type of security that is concerned with the
physical measures designed to safeguard personnel and prevent unauthorized
access to equipment, facilities, materials, documents and to protect them from
espionage, sabotage, damage, or theft.

2. Communication Security - the protection resulting from the application of


various measures which prevent or delay the enemy or unauthorized person in
gaining information through communication. This includes transmission,
cryptographic and physical security.

3. Documentary Security - protection of documents, classified matters and vital


records from loss, access to unauthorized persons, damage, theft and compromise
through proper storage and procedure.

4. Personnel security - the sum total procedures followed, inquiries conducted and
criteria applied to determine the work suitable to a particular applicant or the
retention or transfer of a particular employee.

Page 36 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Personnel Security Investigation - is an inquiry into the character, reputation,
discretion, integrity, morals and loyalty of an individual in order to determine a
person's suitability for appointment and access to classified matters.

Types of PSI

1. Local Agency Check - refers to the investigation of the records and files of
agency in the area of principal residence of the individual being investigated: Mayor,
Police, Fiscal where the individual is a resident.

2. National Agency Check - it consist of LAC supplemented by investigation of the


records and files of the following agencies: PNP. ISAFP, NBI, CSC, Bureau of
Immigration and other agencies.

3. Background Investigation - a check made on an individual usually seeking


employment through subject's records in the police files, educational institutions,
place of residence and former employers.

Complete Background Investigation - a type of BI which is more comprehensive,


it consist of detailed information regarding the subject.
Partial Background Investigation - investigation of the background of an individual
but limited only to some of the circumstances.
Sun Tzu - author of the art of war.

Undercover Operation - also called Roping - is disguising one's own identity or


using an assumed identity for the purpose of gaining the trust of an individual or
organization to learn secret information or to gain the trust of targeted individuals in
order to gain information or evidence.

Cover - it refers to the changing, forging, or falsifying agent's real personality


including but not limited to things, location, job and others that will be used in
undercover assignments.

Types of Cover

1. Artificial -altering the background that will correspond to the operation.


2. Multiple - includes different cover
3. Natural - actual or true background

Page 37 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice
Hazards of Undercover Operations

1. Reintegration back to normal duty

2. Maintenance of identity

Uses and Types of Undercover Assignment

1. Residential Assignment - it is related to the neighborhood of the subject, where


the agent will live as a new resident without making any suspicion. His mission is to
make friends within its neighborhood and gather information regarding the subject
and possibly getting closer to the subject.

2. Social Assignment - the agent will gain access to the subject by going to the
different hangout places of the subject and gather information like knowing how to
drink socially without getting drunk.

3. Work Assignment - the agent will be employed where the subject work to
acquire information. The agent must know his work and focus his mind set and habit
to his work assignment

4. Subversive Organization - this is the most dangerous of all the undercover


assignment, the agent will join the organization of the subject itself, he must know
the ideologies of the group and the actions while inside should conform to the
organization to avoid any suspicion.

“If you know the enemy and know yourself, you need not fear the result
of a hundred battles. If you yourself but not the enemy, for every
victory, you will suffer defeat. If you know neither yourself nor the
enemy, you are a fool who will meet defeat in every battle”.

“KEEP ON RESEARCHING AND STUDYING”


GOD BLESS YOU

-ABDE-

Page 38 of 38
Instructor: AL BIEN D. ESCOBAÑEZ, R.Crim., MS CJ
Registered Criminologist
Master of Science in Criminal Justice

You might also like