CDIN 1 Fundamentals of Investigation and Intelligence

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

Republic of the Philippines

CAVITE STATE UNIVERSITY


Bacoor City Campus
Soldiers Hills IV, Molino VI,
City of Bacoor, Cavite
 (046) 476 - 5029
www.cvsu.edu.ph

FUNDAMENTALS OF CRIMINAL INVESTIGATION

Chapter 1: The Nature Of Criminal Investigation

Investigation
 was derived from the Latin word “INVESTIGARE” which means to trace or to track.
 investigation means the act or process of careful inquiry or research; and/or the systematic
examination of some scientific detail or question whether by experiment or mathematical treatment
(Webster).
 Investigation can also be understood as a patient, step by step and careful examination of
something or someone. It can be legal or non-legal.

Criminal - on the other hand, implies anyone who committed an offense or an act punishable by law. In its
broadest sense, criminal implies any crime or heinous wickedness. Legally, crimes is an act or commission
or omission punishable by law commanding and forbidding it.

Criminal Investigation
 may be defined as the process of carefully examination or researching what transpired in a criminal
act.
 Hans Gross, one of the proponents of modern-day criminal investigation said that the basis and
goal of any form of investigation is to search or discover the truth and that truth is the fundamentals
requirement in giving justice.
 refers to the systematic process of discovering, collecting, preparing, identifying and presenting
evidence to determine what happened and who is responsible (Bennet & Hess, 2007)

Investigation can be identified into six (6) major types:

a. Formal investigation - refers to the official inquiry conducted by a government agency in an effort to
uncover facts and determine the truth.
b. Inquest - is an effort to search the basic cause of an incident such as the commission of a crime. It is
also used to describe a form of judicial inquiry.
c. Inquisition - is a more historical description than a current usage to describe penetrating investigation
concerning a religious issue.
d. Probe - similar to a formal investigation but in a extensive, searching inquiry conducted by a government
agency.
e. Research - is most often employed to refer the careful, patient investigations done by scientist or
scholars in their efforts to identify original sources of data or causes of problem.
f. Investigation reporting - is a recent type of investigation conducted by the members of the press on
their own initiative.

Historical Background of Criminal Investigation


 The field of criminal investigation today is the result of countless developments since policing was
conceived and institutionalized. The history of criminal investigation is vast, and over the years may
writers have attempted to engage the topic.
 Europe’s industrial Revolution attracted the peasant class from the country into towns and cities. The
ensuing crime wave forced law enforcement officials to take drastic measures. As a result, Thief
Catchers were recruited from the riffraff of the streets to aid law enforcement officials in locating
criminals.

Two classes of their catchers were identified:


Hirelings - whose motivations were mercenary in nature.
Social climbers - who would implicate their accomplices in order to move up the social ladder.
History of Criminal Investigation
Jonathan Wild - once hireling, buckle maker, brothel operator and a master criminal, became London’s
most effective criminal investigator for pioneering the logic of employing a thief to catch a thief.
Henry Fielding
 wrote the novel “Tom Jones” was appointed a magistrate (sheriff) for Wismenster and Middlesex in
London.
 While he was magistrate, he formed a group of non-uniformed thief catchers attached to the Bow
Street Court whose function was to detect and watch criminals.
Sir John Fielding
 younger brother of Henry Fielding took over the control of the Bow Street Court in 1753.
 His investigators were then called Bow Street Runners and become quite effective because of his
personal guidance though his blind.
 He introduced the practice of developing paid informants, printing wanted nnotices, employing
criminal raids, and bearing firearms and handcuffs.
The Us Congress - created the office of the General and Revenue Cutter Services. This was the first
organized federal law enforcement and investigative effort made by the US government.
Patrick Colquhoun
 a prominent London resident proposed the unique idea of creating a sizable uniformed force to
police the city of London in order to remedy the public outcry concerning the alarming increase in
criminality during the early 1800s.
 His proposal was considered too radical and was dismissed by the Royal Court.
Eugene ‘Francios’ Vidocg - a former convict who became a Paris investigator who introduced the “trade
protection policy” which became the forerunner of the credit card system.
Sir Robert Peel
 founded the London Metropolitan Police the Scotland Yard. He reiterated the idea of creating a
sizable police force in his recommendations, which lead to the passage of the Metropolitan Police
Act.
 This act had a tremendous impact on the history of criminal justice in general and the development
of the criminal investigation.
 He introduced the techniques of surveillance such as detectives concealing themselves, and
secretly photographing and recording conversations.
England (1833) - Scotland Yard employed the first undercover officer while in USA, the first daytime paid
police department was established in Philadelphia.
Texas Rangers (1835) - was organized as the first law enforcement agency with statewide investigative
authority, the forerunner of the Federal Bureau of Investigation (FBI).
Jacques Mande Daguerre - gave a public demonstration in Paris of his discovery the Daguerreotype, a
product of photographic process he developed in collaboration with Nicephore Niepce.
Charles Dickens - through his story entitled “Bleak House” introduced the term Detective to the English
Language.
Allan Pinkerton
 become the America’s most famous private investigators.
 He is considered as the founder of American Criminal Investigation system.
 He established the practice of handwriting examination in American courts and promoted a plan to
centralize criminal identification records.
 He is called he Father of Modern Policing System in USA.
Kate Wayne - was the first woman detective hired by the Pinkerton agency.
Howard Vincent - headed the newly organized Criminal Investigation Department in Scotland Yard.
Alphose Bertillion
 A French Police Clerk introduced the first systematic identification system based on Anthropometry
or Anthropometrical Signalment.
 He was recognized as the founder of Criminal Identification.
Dr. Arthur Conan Doyle - popularized scientific criminal investigation by creating the fictional detective
Sherlock Holmes and his friend Dr. Watson. Holmes was featured in 6 short stories and 4 novels.
Dr. Hans Gross
 a native of Graz, Austria who published the book “Criminal Investigation” containing the first
comprehensive description of physical evidence in solving crime.
 He is also credited in coining the word “Criminalistics”.
Francis Galton
 an English scientist published his study on classifying fingerprints. While other scientist were
studying fingerprints in their biological nature.
 Galton recognized their uniqueness and potentiality/significance in criminal identification.
Edgar Hoover - The FBI’s newly named director to raise the qualifications of agent personnel and reduced
the number of agents nationwide. After his death in 1972, his many abuses of power surfaced.
Dr. Paul Kirk - one of the best known American criminalist, headed the Department of Criminalistics at the
University of California, USA.
Mapp vs. Ohio (376 vs. 584) (1961) - In this criminal case, the Supreme Court ruled that illegally obtained
evidence is inadmissible in state criminal prosecutions. This case established the Doctrine Of Poisonous
Tree.
Revised Administrative Code Of 1917, Section 825 - The law stated that Philippine Constabulary is a
National Police Institution for preserving the peace, keeping order and enforcing the law.

Important Years and Dates


1948 - In Aberdeen, England, new concept was introduced in the field of criminal investigation. This known
as Team Policing. In this concept, there was no patrol division or criminal investigation. In this system, a
team of police officers is assigned to patrol and investigate all criminal matters within their area of
jurisdiction or district.
 Team policing required that police officers that will respond to call regarding a criminal case should
investigate the case to its conclusion. This is still being observed in small police community
precincts in the Philippines today particularly in the investigation of minor cases.
1859, USA - Appellate courts recognized/accepted photographs as admissible evidence when they are
relevant and properly verified.
1884 - The Chicago Police Department established the first American Criminal Identification Bureau.
1924 - The Federal Bureau of Investigation was established originating the Justice Department’s Bureau of
Investigation in 1907.
1865, US Secret Service - was founded to investigate counterfeiting activity in post-civil war America.
1835 - Henry Goddard use of ballistics to solve a murder was first conducted by Bow Street Runners
1839 - This was the birth year of Photography, where in William Henry Fox Talbot explained a photographic
process he had invented the Royal Society of London.
1851 - In Boston, Massachusetts, USA - Multi - Suspect Line-Up was employed for the first time.
1866 - In Liberty, Missouri, USA, the JESSE JAMES GANG made the first bank hold-up which marked the
beginning of the gang’s 15-year hold-up and robbery spree (12 bank hold-ups and 12 train stage coach
robberies in 11 states). Clay County Savings Association was the first victim and their take was $60,000.00.
May 19, 1945 - The PC Crime Laboratory was created following the end of the 2nd World War.
It started as a section G-2 Division of the Military Police Command or the AFPWESPAC.
It became later as the Fingerprint Record Section then grow into branch as a vital unit of the PC.
January 1, 1964 - The rules of court took effect. The procedural law was construed to promote the broad
objective of criminal justice system as to assist the parties in obtaining just, speedy, and inexpensive
determination of every action and proceeding.

Criminal Investigation

Criminal Investigation as an Art:


 It is considered as art because it uses a various technique of identifying and locating criminal
offenders and then proving their guilt thru a criminal proceeding.
 It is no governed by rigid rules or principles, most often it is governed by intuition, felicity or
inspiration. And to minor extent by chance or luck.
 Hans Gross also said that criminal investigation is 95% perspiration, 3% inspiration and 2% luck,
which means 100% of effort must be exerted (Garcia, 2004)

Criminal Investigation as a Science:


 It involves a systematic method if inquiry therefore it is a science.
 In here it usually applies scientific knowledge, principles and methodologies in order to discover,
identify, collect process facts/info to promote justice.
 The use of scientific method must be supplemented by initiative and resourcefulness. Th sequence
of criminal investigation must follow a scientific operating framework that requires imagination,
innovation and creativeness on the part of the investigator.
Criminal Investigation as a Process
 Criminal investigation involves a systematic process of identifying, collecting, preserving a and
evaluating data or raw facts to produce valuable information for the purpose of bringing a criminal
offender to justice. As a process, it is based on systematic plan.

Criminal Investigation as a process involves the following steps.


1. Identification - recognition of facts, information, evidence.
3 Kinds of Person Involved in a Case
a. Suspects
b. Witnesses
c. Victims
2. Collection of facts, information, evidence gathering and sorting out (Marking &
Tagging)
3. Preservation of forensic value (legal integrity) - protect the forensic value.
4. Evaluation/ processing of evidence and case - assessment of collected evidence and
criminal case as a whole.
5. Presentation of evidence and criminal case - present first the strong evidence then the
weak later as corroborative evidence.

The 3 main objectives of criminal investigation are as follows (PNP-CIDG)


1. To identify the guilty party
2. To trace and locate the guilty party
3. To provide evidence of the criminal guilt

The 5 Function of Criminal Investigation - As a process, criminal investigation is composed of five


function stated as follows:
1. Recognition or Identification of facts, information, evidence, etc.
2. Collection of facts, information, evidence, etc.
3. Preservation of forensic value (legal integrity) of facts, information, evidence, etc.
4. Evaluation of processing of evidence and case.
5. Presentation of evidence and criminal case.

Trichotomy of Criminal Investigation


a. Training - refers to the academic and technical preparations of criminal investigation
b. Tools - refers to the devices and equipment used in criminal investigation
c. Technique - is more on the unique means and processes applied in dealing with varied crime and
incidents.

The Legal Aspect Of Criminal Investigation

At the heart of criminal investigative process is the RULE OF LAW. As it applies to the duties of the
investigator, the rule of law dictates what officers can and cannot do while performing their duties. The law
governs not only such functions as the arrest and interrogation of suspects, but also the manner in which
investigators deal with the searching, seizing, and handling of evidence. The following are some legal
doctrines in criminal law basically used in criminal investigation.

Legal Doctrines of Criminal Investigation


1. Exclusionary Rule - In 1914, in Weeks vs. USA, the supreme court decided a rule that federal
courts may not accept evidence obtained by unreasonable search and seizure, regardless of its
relevance to a case.
2. Fruit-of-the-Poisonous-Tree-Doctrine - provides that evidence obtained as a result of an illegal
operation must be excluded from the trial (Mapp vs. Ohio, as earlier stated).
3. Miranda Doctrine - requires that suspect must be informed of their right to remain silent, and to
have an attorney present during questioning process. It also mandates that prior to any questioning,
the police must inform the suspect of his right: right to remain silent; right to consult with an attorney;
and his right cannot be waived except in writing and in the presence of the counsel.
4. Doctrine of Warrant-less Arrest
5. Plain view Doctrine
6. Doctrine of Hot Pursuit

Due Process - In the Philippines, due process is mentioned in the 1987 Constitution where due process
seeks to ensure that no person is deprived of life, liberty, or property without notice of charges, assistance
from legal counsel, a hearing, and a chance to confront one’s accusers. In short, due process can be
defined as it hears before it condemns.
Types of Due Process
1. Substantive Due Process - determines whether the statute is fair and reasonable, and
2. Procedural Due Process - can be defined as the essential element of fairness under the law.

Criminal Law - is that branch of municipal or substantive law that defines crimes, treats of their nature, and
provides for their punishment.
Purpose of Criminal Law:
1. To identify public wrongs.
2. To exercise social control.
3. To deter antisocial conducts, and
4. To administer punishments.
5. Legal Provisions Significant to the Development of Criminal Investigation in the Philippine
Setting:

1973, Philippine Constitution - Article III, Section 20


“No person shall be compelled to be a witness against himself. Any person under investigation for the
commission of an offense shall have the right to remain silent and to counsel, and to be informed if such
rights. No force, violence, threat, intimidation, nor any means which vitiate the free will shall be used against
him. Any confession obtained in violation of this section shall be inadmissible as evidence”.

The warning of the right to remain silent must be accompanied with an explanation that anything said
can and will be used against the individual in court. This warning is needed in order to make him aware not
only of the privilege, but also of the consequences of forgetting it (People vs. Duerto, 104 SCRA, 379,
1981).

1983, Morales Vs. Juan Ponce Enrile - (GR #61016-17; April 26, 1983; SCRA 538)
 The ruling in this made it clear that the miranda warning, as it is generally called, have to made so
that a confession can be admitted. Therefore, while upon police custody for investigation, the
accused must be appraised of his:
a. Right to remain silent with explanation that anything he might say may be used against him
in the court of law;
b. Right to talk to a lawyer, a relative or a friend, and have a lawyer ready and a friend present
while he is being questioned; and
c. Right to the appointment of a lawyer, if he cannot afford one.

1984, People vs. Galit - (GR #51770; March 20, 1985) - The right to a counsel maybe waived but the
waiver, to be valid, must be made with the assistance of a counsel.

1987, Philippine Constitution (Article II, Section 12) - “Any person under investigation for the
commission of an offense shall have the right to be informed of his right to remian silent and to have a
competent and an independent counsel preferably of his own choice. These right cannot be waived except
in writing and in the presence of a counsel.

Desirable Traits Of A Criminal Investigator


a. To identify and locate the guilty party, the offended party, witnesses, and other facts or information
that leads to the solution of the criminal cases;
b. To trace, locate, and then to apprehend the guilty party; and
c. To provide evidence of the suspect’s guilt.

What characteristics best define a good and professional criminal investigator?


 Certainly, standards vary from one law enforcement agency to the next, but certain commonalities can
be identified, The following are some of the suggested personal traits for a good criminal investigator:

Intellectual Characteristics
1. A criminal investigator must be capable of absorbing and retaining information whether it
concerns
2. He must be able to apply technical and legal theories in his daily work.
3. He must be capable of practicing objectivity, logic and common sense in his decision making
4. He must be versatile enough to adopt with any situation. During training and while already in the
field he must develop knowledge and skill in investigative techniques.
5. He must never stop learning or tell himself that he has learned enough knowledge in his
profession.
6. He must continue enhancing his knowledge through academic activities, field training, personal
experience and street learning.

Psychological Characteristics - A criminal investigator must be:


1. Emotionally well balanced
2. Detached
3. Inquisitive
4. Reasonably suspicious
5. Discerning or perceptive

Physical Characteristics
1. He must be physically fit and have a good vision and hearing.
2. He must have a working knowledge on martial arts and firearms proficiency and capable of applying
them in combat situations.
3. He must be fit enough to apply defense tactics in confronting, disabling an arresting suspect.

According to Cirilo M. Tradio: a good criminal investigator must possess the following:
1. Intelligence
2. Honesty (integrity)
3. Patience (perseverance)
4. Must be understanding with the people around him (psychologist)
5. Keen Observer
According to Michael Lyman According to Paul Weston

Motivation Alertness
Intuition Integrity
Stability Logical Mind Power of self-control
Judgement Playing a part
Street Knowledge Sound common sense
Teamwork Good judgement
Persistence Perseverance of hard work
Reliability General Knowledge of police Science
Intelligence
Dedication
Integrity

STARTING POINT OF INVESTIGATION (THE 6 CARDINAL POINTS)

The primary job of an investigator is to discover facts then establish whether a crime or an offense has been
committed. After which, he must identify the guilty party or parties if a crime exists, and then obtain pieces of
evidence for the successful apprehension and prosecution of the case in a court of law. In the performance of
his duties, the criminal investigator must seek to establish the six cardinal points or principles of investigation:
the 5Ws and 1H.

1. WHAT - The purpose of these type of questions is to find out what happened or what took place, during and
immediately after the commission of an offense.
2. HOW - These are designed to help the investigator determine how the crime was committed, the means/tools
are employed, the crime was discovered, the culprit entered the building/room.
3. WHO - These questions used to inquire on the identity of the victim or offended party, name of the suspect/s,
accomplices, accessories, and witnesses of the crime.
4. WHERE - These are questions that localize the place of the incident - the province, city or town, barangay,
street or road, the house or building number. These questions are necessary in specifically pinpointing the
particular location of the crime scene.
5. WHEN - These questions are needed primarily to determine and fix the time, day, month and year when the
crime was committed. WHEN questions should be specified and as accurate as possible.
6. WHY - These are questions that primarily endeavor to ascertain the motives, causes, antecedents, previous
incidents, related facts, background occurrences that might help explain the commission of the offense.

Chapter 2 - The Crime And The Investigation

A. Distinction Of Crime, Investigator, And Investigation


Crime - pertains to the act or omission. Some social acts or behaviors are detrimental to the people. Some
causes eventual death, injury or damage to property. To prevent these (death, injury, etc), the people made
their law prohibiting or forbidding such social acts and behaviors. These criminal laws further define and set the
elements of violate acts or behaviors.

However, when the crime is committed someone should gather, document, and evaluate facts about the crime,
and that is the investigator. On the other hand, investigation is the process through which these (gathering,
documenting, evaluating, etc.) are accomplished.

B. Reasons For Investigating Crimes


As stated earlier, policing was conceived purposely to protect the people from threats, whether of human origin
or not. There where causes however, that a criminal activity was done without detecting and identifying the
culprit. Thus leaving the victim seeking for justice. Justice can only be accorded to the victim if the offender
could be identified, apprehended, tried and convicted.

Sometimes, some criminal elements remain undetected and misapprehended thus making them scoot free in
performing other criminal activities. When this things happens, other criminal groups may tend to follow thinking
that the police could not detect and arrest them anyway. Eventually, crime occurrence increase due to the
inefficiency of the police in apprehending criminal elements. With in increasing criminality, the people become
constantly threatened by criminal elements.

Increasing of criminality and problems on peace and order do not only cause fear in the people but they directly
and indirectly affects the economy. Businesses become stagnant because investors will rather pour their money
on other countries rather than risking their lives and limbs in a country where lawlessness is a common sight.

With this scenario, criminal detection and investigation is conducted not only to identify, apprehend and prove
the guilt of the offender but also to protect the people from criminal attack.

Specifically, crimes are investigated for the following reasons:


 To established, in fact, a crime was committed;
 To identify and apprehend the suspect;
 To recover stolen properties;
 To preserve knowledge/information about a case;
 To provide accurate details about a case;
 To aid other investigation and other agencies concerned;
 To coordinate investigation activities within the organization;
 To serve as reference by competent authorities;
 To solve crimes accurately and surely;
 To know what are the cause of the crimes;
 To serve as an evidence for court presentation;
 To present the best possible case to the prosecution; and
 To identify, collect, examine and process physical evidence

C. Two Theories To Protect Citizens From Criminal Attacks

Crime Prevention - This is the first line of defense, manned by the uniformed policemen, performing patrol
work on foot, motor boats, bicycles or aircraft on a 24-hour duty basis to prevent criminal element from
having an opportunity to commit crimes.
Criminal Investigation - The second line of defense wherein in the event a crime is committed and the
criminal escapes from the first line (crime prevention), the second line of defense is composed of
investigators who will take over by following-up the case, identifying, detecting and arresting the
perpetrators.

D. Nature And Role Of Investigator

Nature of an Investigator - The premise behind the criminal investigation field is that people makes
mistakes while committing crimes. For example:
 A burglar may leave behind footprints, latent prints, broken glass or clothing fibers;
 A rapist may leave fingerprints, skin tissue, semen or blood;
 A a murderer may leave his fatal weapon, his own blood, latent prints; and etc.

As a result of these oversight, evidence of who they are is also left behind. It is the job of the investigator to
know how, when and where to look for evidence. In doing so, he or she must be able to draw on various
resources, such as:
 Witnesses and informants, for firsthand information about the crime;
 Technological advances in evidence collection and preservation; and
 Their own training and experience in investigative techniques.

E. Role Of Criminal Investigator


 The impression that a detective has difficult-to-come-by qualifications and skills;
 That investigating crime is a real science;
 That a detective does more important work than other police officers;
 That all detective work is existing; and
PREPARED BY : JAMES E. DALIS
 That a good detective can solve any crime.

It borders on hearsay to point out that, in fact, much of what detective do consists of very routine and very
elementary chores, including much paper processing; that a good deal of their work is not only not exciting
but downright boring; that the situations they confront are often less demanding and challenging than those
handled by patrol officers; that it is arguable whether special skills and knowledge are required for detective
work; that a considerable amount of detective work is usually undertaken on a hit-or-miss basis; and that
the capacity of detectives to solve crimes is greatly exaggerated.

Indeed, some studies have suggested that role played by investigators is overrated and that and that their
time could be probably be spent more productively by focusing on those crimes with the best likelihood of
clearance. Other researchers suggest that the investigative process is a valid utility in crime detection but
should be augmented by the use of proactive patrol programs.

In final analysis, the role of the criminal investigator is to locate and evaluate pieces of evidence that will
establish the 5Ws and 1H of a criminal incident.

F. Investigative Theories And Methods

Types of Criminal Investigation


When people choose to violate the laws, the perpetrators must be identified and brought before the court. It is
the task of identifying such offenders that is the quintessence of criminal investigation.

Criminal investigation will confront investigations in several areas in the regular course of their duites:
1. Personal background - to determine the person’s suitability for appointment to sensitive public trust
positions.
2. Suspected violations ojbf criminal laws.
3. Vice - drugs and organized crime activity.
4. Infraction of civil law.

Modes of Investigation
A. Reactive Response - addresses crimes that have already occurred, such as murder, robbery and burglary.
In this case, investigators typically respond to a crime, collect evidence and interview witnesses, and identify
and arrest suspected perpetrator.
2 Types of Reactive Investigation
1. Initial Investigation
2. Latent Investigation
3 Kinds of reactive investigation according to jack kyundall are:
1. Walk-Through
2. Where Are They
3. Whodunit
B. Proactive Response - this anticipates criminal activity, as with many vice and organized crime
investigations. Here, the investigation is conducted before the crime is committed (rather than after), and the
suspect is identified before he or she commits the crime.

Proactive investigation maybe in the form of:


A. Decoy Operation
B. Repeat - Offender Program (Rop)
C. Undercover Operation
i. Buy-Bust Operation
ii. Entrapmet Operation

C. Preventive Response - prevention through deterrence is sometimes achieved by arresting the criminal and
by aggressive prosecution.

Chapter 3 - Phases Of Criminal Investigation

Complaint - is addressed or given to law enforcement agencies by the victims or witnesses of crime.
Information
 on the other hand, is usually furnished to law enforcement agencies by witnesses and group of
persons know as informants and informer. In some instances, information disclosed by the media
or the press pressures the police or other concerned authorities to conduct an inquiry or
investigation on the matter.

PREPARED BY : JAMES E. DALIS


 There instances however that the police initiate actions in the detection and investigation of
criminal activities through intelligence gathering and undercover works. In either case, the police
respond to the crime scene and conducts investigation.

Aims And Objectives


The primarily purpose of criminal investigation is the establishment of facts and the removing of doubts that a
crime has in fact been committed and it aims to:
1. Prevent crime;
2. Apprehend criminals; and
3. Recover stolen properties.

The obvious goal of criminal Investigation is to solve a case by discovering or establishing WHODUNIT.
However, it is not that simple, it is actually involving the process of collecting facts to accomplish a three-fold
aim, which are;

1. To identify the guilty party (including the offended party, witness/es, and other involved individuals);
2. To trace and locate the guilty party; and
3. To provide evidence of the criminal guilt.

In order to achieve these aims of criminal investigation, there are three basic elements involved in the
investigation:
1. Searching the crime scene;
2. Collecting and preserving evidence; and
3. Locating and interviewing witnesses.

Criminal investigation is conducted into three phases or stages:

Preliminary (initial) investigation - focuses in identifying the perpetrators or suspects;


In-depth (follow-up) investigation - focuses in tracing, locating, and eventually arresting suspects; and
Final (concluding) investigation - focuses in evaluating and presenting evidence to prove the criminal guilt of
the accused.

A. The Preliminary Investigation


 This is the initially inquiry by officers to establish facts and circumstances of a suspected crime and to
preserve any evidence related to the crime. Preliminary investigation focuses at the crime scene where
it includes:
1. Securing the crime scene;
2. Considering the possible arrest of the suspect;
3. Locating and questioning witnesses and victims;
4. Documenting the crime scene; and
5. Identifying and collecting evidence.

Who performs the first step in Preliminary Investigation?


1. Police Desk Officer.
2. Police Officer who received a call about a criminal incident.
3. The First Responder.

The function of the preliminary investigation is closely linked with the duties of the first officer to arrive at the
crime scene, who in most cases, is a respondent from the patrol division. Upon arrival at the scene, it is
basically the duty and responsibility of the first responding officer to start the preliminary investigation.
To fulfil this responsibility, the first police officer should take these actions:
1. Establish that a crime has in fact been committed.
2. Protect the crime scene and the physical evidence it contains.
3. Assist injured persons if there are any.
4. Establish the type of crime committed.
5. Apprehended/arrest perpetrators if they are still present at the crime scene.
6. Secure/obtain facts describing the criminal incident, I.e. eyewitnesses description of the criminal or
the vehicle/transportation used.
7. Determine the direction of the light of the culprits.
8. Radio call to the police dispatcher on flash reports and other data.
9. Locate and interview victims and/or eyewitnesses - obtain a brief account of what happened.
10. Establish the time and how the crime was committed.
11. Take field notes systematically.
12. If there is ample time, start photographing and sketching the crime scene.
PREPARED BY : JAMES E. DALIS
13. Conduct crime scene search.

Upon arrival at the crime scene or while proceeding to the crime scene, the investigator should plan his
initial course of action. Once he arrives at the crime scene, he should immediately obtain an accurate report as
to the time of the commission of the crime. The time of the commission is one of the vital factors in comparing
the stories told by all persons involved I the crime.

The Crime Scene


 It is the place or location where the crime was alleged to have been committed or it pertains to the specific
location of the commission of the crime.
 As with almost any crime in which there is a known crime scene, both the first officer and investigators
should consider the scene itself as evidence. This is because much valuable information can be learned
from items left on the scene provided that it has not been tampered with or altered in anyway.

Further, the crime scene represents an exceptional situation that places many responsibilities on the first officer
arriving at the scene. These include:
 Making an arrest;
 Rendering first aid to injured persons/parties; and
 Protecting evidence on the scene.

Stages Of Crime Scene Investigation


There are three stages in crime scene investigation. Further discussions of these shall be done on latter
chapters particularly under the SOCO and CSI sub-titles. In the meantime, the following are the three general
stages in crime scene investigation:
A. Preservation of the Crime Scene
1. Physically isolating
2. Securing the area
3. Using police line
B. Processing the Crime Scene
1. Documentation - record/photograph/sketch,etc.
2. Crime scene search - for the pieces of physical evidence such as object, fluids, impressions etc.
3. Marking, handling, tagging of physical evidence.
C. Preservation of Physical Evidence - observe the proper chain of custody and security in transmitting
and transporting evidence.

The Apprehension Process - In the Crime Scene Investigation, apprehension of the perpetrator if he or she is
still around is part of it.
 A crime is reported discovered or detected.
 The police respond
 Search for the perpetrator is conducted
 Suspect are identified and checked out.
 Pieces of evidence are collected to support a charge.
 Primary suspects are finally arrested.

Criminals Bad Luck (VEBRECHERPECH) - These are unconscious or subliminal act aiming at self-betrayal,
clues which may a result of the perpetrators:
 Faulty Acts
 Carelessness
 Negligence
 Vanity

B. In-Depth Investigation
 Encompasses the identification and apprehension of offender and full development of the case.
 At this stage, when pieces of evidence collected are not sufficient, the investigator gathers more
information by:
1. Going back to the crime scene if necessary
2. Conducting surveillance as to the reported whereabouts of the suspects or where the stolen
properties are kept.
3. Locating the witnesses.
4. Following up results of medico legal examination and/or technical or laboratory examinations of
physical evidence
5. Coordinating with other law enforcement agencies or police stations
6. Analyzing the crime through physical or mental reconstruction.

PREPARED BY : JAMES E. DALIS


Action Necessary in Continuing Investigation
A. Continue basic investigative leads to the identification and apprehension of perpetrators - As a
general principle, the probability of a success case decreases with the passage of time, starting from when the
suspects commits the offense.
B. Reconstruct the crime to a rational theory through:
a. Deductive Reasoning - assuming a theory of the crime and attempting to support by a careful
appraisal of how the information collected in the investigation support the theory.
b. Inductive Reasoning - collected information is analyzed carefully to develop the theory of the
crime.
Reconstruction - it is an effort made to determine the appearance of the place and object as to what actually
occurred and the circumstances of the crime.
Kinds of Reconstruction
1. Physical Reconstruction - based on the description of witnesses and the indication of the pieces of
physical evidence recovered and observed.
2. Mental Reconstruction - some conclusions can be made concerning the consistency of the
account of various witnesses. Assumptions should be supported by pieces of evidence.

C. Focusing the Investigation


 Search for other witnesses and other perpetrators or accomplices
 Liaison with lab technicians must assess their report on the analysis of physical evidence.
 Conduct appropriate surveillance and interrogation
 Develop and revise scheme of the crime
 Establish sufficient clarity to focus the remainder of the investigation on collecting evidence against the
suspect.
 Linking the theory of the crime to the suspect.
 Consider the skill, knowledge, benefit and motive factors of the suspect.

D. Analyze legal significance of information and evidence - determine whether it will pass the test of
admissibility.
a. Relevant - when it has a tendency in reason to establish the probability or improbability of the fact in
issue or having any value as tending to prove any fact.
b. Material - it is the directed to prove a fact in issue.
c. Competent - not excluded by law in a particular case.

Evidence
 may tend to prove a fact or may be sufficiently strong to compel a conclusion of facts or just strong
enough to create a reasonable doubt.
 It is also a means sanctioned by the Rules of Court of ascertaining in a judicial proceeding the truth
respecting a matter of fact.

Fact
 The truth or effect of evidence
 Investigator must know what evidence is required to establish the guilt of the accuse or to counter
evidence offered by the defense.
 The state has the burden of proving the guilt of the accused beyond reasonable doubt.
 The investigator is responsible for bringing an investigation to successful conclusion.

Reasonable Doubt
 it is the state of the art which after the entire comparison and consideration of all the evidence, leaves
the mind of the court in that condition that they feel an abiding, conviction, to a moral certainty of the
truth of the charge.
 The doctrine of the reasonable doubt should be successfully hurdled by the investigator with the proper
collection of legally significant evidence on guilt of the accused and evidence that will negate the
defense of the respondent.

C. The Final Investigation - At this stage, after a thorough examination of all recovered and collected
information and pieces of physical evidence, the case is declared either closed and ready for prosecution or
remains unsolved.

NOTE: Due to case load, the investigator should assist the prosecutor in the prosecution of the case.
1. Preparation of records of the case.
2. Review the suspects arrest to ascertain its legality.
3. Review suspects statements and admission as to their legality.
4. Review the manner in which the relevant evidence were secured.
PREPARED BY : JAMES E. DALIS
5. Review the compile notes, reports and documents that may be used during the trial.

Identifying The Criminal - the following are the scope of identifying the criminal
1. Suspect Identification
2. Identification of actual perpetrator
3. Identification of dead body and other victims.

Two kinds of criminal identified by witnesses.


1. Known Fugitives - usually, police records and pictures are available about the known fugitives. Their
friends and relatives can offer description. Further description may be obtained from local police files,
background investigation and from verbal description of others.
2. Unknown Fugitives - identification of unknown criminals by eyewitnesses must be approached with
caution by the investigator. The description and characteristics may be vague that identification is difficult.

The value of identification by eyewitness depends on:


1. The ability of the eyewitness to observe and remember
2. The prevailing conditions of visibility and observations.
3. The lapse of time.

Two types of Suspect Identification

1. Positive Identification - This uses information that identifies an individual beyond question and is legally
acceptable as pertaining to and originating from a particular individual such:
A. Information developed after comparing questioned latent prints with inked fingerprints.
B. Result of DNA analysis of blood and semen.

2. Tracing Identification - This involves the use of all other information that maybe indicative of the
personal identity of an individual such as:
A. Description of witnesses as to the appearance of culprits
B. Information about the presence of a suspect’s personal belongings at the crime scene.

A. Identification of Criminal by Confession.

Confession
 It is the declaration of an accused expressly acknowledging his guilt of the offense charged.
 Or it is an express acknowledgement by the accused in a criminal case of the truth of his guilt as to the
crime charged, or of some essential part thereof. This is usually done by the suspect during the
custodial tactical interrogation.
Admission
 it is the acknowledgement of a fact or circumstance from which guilt may be inferred. It implicates but
does not directly incriminate.

B. Identification of Criminals by Eyewitnesses Testimony


1. Portrait Parle (Verbal Description) - the success of this method depends on the ability of the witness to
describe the person he saw committing the crime. The witness will provide vivid description or pictorial
physical appearance of the criminal.
2. Rogues Gallery (Photographic Files) - this method is successful if there is an existing photograph of
the perpetrator in the files/gallery of the police or any law enforcement agencies.
3. General Photograph Method - The investigator shows variety of facial types that may not
necessarily/directly represent the face of the criminal. The photograph that is shown to the witness only
represents different features of the face.
4. Cartography (Artist’s Assistance) - Base on the description provided by the witness, the artist draws
on composite face that approximates the criminal’s facial appearance.
5. Police Lineup (Show ups) - This involves a process of letting/allowing a witness to select the primary
suspect from a group of chosen persons. The primary purpose of using police line-up is to eliminate the
element or power of suggestion of the investigator or any assistant of the investigator while the witnesses
are in the process of identifying the offender.

C. Identifying the Criminal by Circumstantial Evidence - In here identification is established indirectly by


proving other facts or circumstances from which either alone or in connection with other fact, the identity of the
perpetrator can be inferred.

PREPARED BY : JAMES E. DALIS


When may circumstantial evidence be sufficient to produce conviction?
1. There are more than one circumstances.
2. When the facts from which the inferences derived and proven.
3. The combination of all the circumstances is such as to produce a conviction beyond reasonable doubt.

When must be inferred to prove the identity by circumstantial evidence?


1. Motive - it may be inferred from circumstances and from the statement of the witnesses that the suspect
has been motivated by a desire for revenge or personal gain.
2. Opportunity - this is the physical possibility that the suspect could have committed the crime. It may be
deduced from the following.
a. The Suspect could have been in the vicinity of the crime.
b. Knowledge of the Criminal Objectives
c. Absence of Alibi

D. Identification of Criminal by Associative Evidence


 This are evidence are the pieces of the evidence which may identify the criminal by means of clues,
personal properties, or the characteristics patterns of procedure deduced from the arrangement of objects
at the crime scene.

Associative Evidence - Those evidence which link the suspect to the crime scene or offense.
Tracing Evidence - pertains to this articles which assist the investigator in locating the suspect.

Identification of Dead Body and Other Victims


1. By Comparison - comparing identification criteria recovered during investigation with records on
findings.
2. By Exclusion - the process of elimination where two or more persons have to be identified and all but
one is not yet identified then the one whose identity has not been established may be known.

Identification of of Persons
1. Ordinary Method - Those which laymen used to prove identity where , training or special skill or any
instrument or procedure is not required for the identifier.
2. Scientific Method - Mostly the application of criminalistics and other related fields.

E. Undercover Assignment (Undercover Or Roping)


 more often gathering of information during investigation is very difficult when the sources are reluctant
to disclose vital information because of the personality of the investigator as a police. During this
instances, the investigator should utilize ways and means to cover his true identity for him to infiltrate
the source.
 In the investigation of specific crimes, undercover assignment is very essential in gathering essential
additional evidence or information particularly when the identity of the investigator compromises the
investigation.

Some Forms of Undercover Operations used in Criminal Investigation.


1. Surveillance
2. Roping
3. Entrapment
4. Buy-bust operation
5. Infiltration or penetration
6. Counter Intelligence

Factors Considered Before Initiating Undercover Operation


1. Mission
2. Jurisdiction
3. Importance of the cover investigation
4. Available information for planning the operation
5. Availability of qualified personnel
6. Equipment Needed
7. Preparation
8. Hazards of the operation

PREPARED BY : JAMES E. DALIS


Preparation For Undercover Operation

1. (Pre-surveillance activities)

a. Planning
 Anticipate contingencies that arise and plan what to do.
 Determine exits and have them covered.
b. Physical Preparation
 Arrange for transportation
 Ready materials for recording or documentation
 Prepare weapons appropriate for the situation
c. Coordination and Communication

d. Briefing
 Use sketches, photos and maps in the briefing
 Provide physical description of the subjects
 Search warrant on short notice
 Pre-arrange code and signals
 Maintain contact among the participants
 Consider the possibility of counter intelligence

Cover - any device utilized by a person, organization to insure the one who does not have the right to know
must not be aware of the real purpose of the mission.

Cover Story - a biological data through fictional which will portray the personality of the agent he assumed; or
any scenario to cover up the operations.

Cover Support - an agent assigned in target areas with the primary mission of supporting the cover story.

Four Types of Cover


1. Natural cover Hazards to Cover
2. Artificial cover 1. Static or dormant opposition
3. Cover within a cover 2. Non - hostile active opposition
4. Multiple cover 3. Hostile active opposition

Uses of Undercover Assignment


1. Use independently to get firsthand information about the subject of investigation.
2. Supplement other investigative techniques.

F. Surveillance
 Involves covert observation of persons, places a thing for the purpose of obtaining information
concerning the identities and or activities of suspected criminals.

Classification of Surveillance Operations


1. Depending on the nature of the investigation
a. Continuous Surveillance
b. Sporadic Surveillance

2. Base on observation post


a. Fixed Surveillance - this is suitable for surveillance of places which could either be long range in time
b. Moving Surveillance - shadowing and tailing by means of vehicle or by foot.

3. Depending on technical feasibility


a. Visual Surveillance - may be aided with telescope or zoom binoculars.
b. Audio Surveillance - may be done thru wiretapping which involves the interception of telephone lines
of the subject and electronic eavesdropping where listening and recording verbal or spoken
interactions are done by the use of concealed listening devices that gather and amplify sound.
c. Contact Surveillance - this pertains to the surveillance of valuable objects, articles, equipment and
including contraband.

Some Don’ts in Foot Surveillance


1. Do not meet the eye of the subject
2. Do not adopt a slinking, creeping, peeking manner
3. Do not wear story book disguise
PREPARED BY : JAMES E. DALIS
4. Do not carry articles that attract attention
5. Do not greet fellows officers or allow them to greet you.
6. Do not make notations or entries ostensibly
Chapter 4. Tools Of Investigation
Information
 This is the most important among the tools of investigation. In criminal investigation this pertains to any
matters relating to the offense under investigation.
 Broadly, information includes any knowledge, data, news, opinion or the like transmitted from one
person to another.

Objectives of Information
1. Develops Leads
2. Establish Prima Facie Evidence
3. Establish Corpus Delicti
4. Establish identification of persons

Sources of Information
A. Open Source - those that are obtained without resorting to special effort or clandestine operation such
as newspaper files, libraries, magazine, books.
B. Closed Source - those that cannot be obtained openly such as those possessed by the suspects,
witnesses, complainants, victims or those located inside a building, safe or vaults.

Sources of information in Criminal Investigation


A. Crime Scene 3. Suspect
1. The gathered evidence 4. Informant or informer
2. Appearance of the crime scene itself C. Documents
3. Physical description of the crime scene 1. Newspaper
B. Persons 2. Books
1. Victims 3. Police Files
2. Complainant

Ways of Obtaining Information


A. Overt - the source of information knows that an information is taken from him/her like in interview and
interrogation.
B. Covert - the source of information is not aware about the gathering of facts from him/her.
Following are examples:
 Casing
 Elicitation
 Surreptitious Entry
 Employment of technical means
 Tactical interrogation
 Observation and description
 Photography
 Eavesdropping

Interview And Interrogation


Interview - this pertains to the casual questioning of a person or persons, who possess knowledge or facts that
is of official interest to the investigator.
Interrogation - this pertains to the systematic and forceful questioning of a person who is reluctant todivulge
information.

Similarities:
Interview Interrogation
Planning Important Critical
Controlling Surroundings Important Critical
Privacy Desirable Absolute/Essential
Establishing Rapport Important Important
Asking Good Questions Important Important
Careful Listening Essential/Must Essential/Must
Proper Documentation Important Important

Differences:
Interview Interrogation
Purpose To obtain information To test information already
PREPARED BY : JAMES E. DALIS
obtained
Pre-interview legal Minimal Required/Mandatory
requirement and warning of
rights
Relationship between the Likely/cooperative Adversarial/Hostile
interviewer and subject
Guilt Uncertain/No Guilt Suggested/Likely
Planning/Preparation Moderate Extensive
Privacy Desirable Essential
Subject Victim, Complainant, Witnesses, Suspects
Suspects.

Qualifications of An Interviewer
1. Rapport
2. Forceful Personality
3. Breadth of Interest
4. Salesman, an actor and psychologist

Steps in Conducting Interview


1. Preparation - Includes reviewing case and the possible contribution of the subject.
2. Approach - Investigator must show his credential and his identity during the first meeting.
3. Warming Up - to promote cordiality and trust with each other.
4. Questioning - focused on the significant points, elements of crime, etc.

Interview Format - The format of interview usually follows the police standard from the initial interview, follow
up and final interview.

Rules to be Observed in Questioning:


1. One question at a time.
2. Avoiding Implied Answer
3. Simplicity of Questions
4. Saving Faces
5. Should not be answerable by yes or no
6. Positive Attitude

General Requirements to Qualify a Witness


1. Must have actually seen the commission of a crime.
2. Must have personal knowledge regarding the matter under investigation.
3. Must be free from prejudices
4. Must have the capability to perceive.

Categories Of Witnesses

A. Subjects Personality and Techniques in Interviewing


Children - tendency to fantasize things. Those under six may invent stories, from six to ten may distort
story. However older child has the ability to observe, remember and express himself and the absence of
motive and prejudice which can be caused by hate, ambition and jealousy.
Boys - Most are alert and his perception is not dulled by preoccupation.
Girls - They have the ability to observe intrinsically boring things. However may be dangerous because of
tendency of fantastic interpretation
Young Persons - usually preoccupied which prevents the m from being ideal witnesses, inclined to be
truthful but their testimony is not strengthened by any power of great observation.
Middle aged Persons - ideal witnesses, aware of their fellow beings, their judgement and faculties are
mature and unimpaired.
Older Persons - physically impaired, tendency to regress, but intelligent older persons are effective due to
their maturity of judgement.

B. Types and Attitude of Subject


Know Nothing Type - reluctant like uneducated persons; needs extensive warm-up, and presenting him
multiple questions then lead him to relevant questions.
Disinterested type - Uncooperative, indifferent; needs: must be aroused, use of flattery, let him feel
important to the issue.
Drunken Type - Flattery may be applicable but it is not advisable to take written statements.
Suspicious type - Remove his anxiety/fear; let him think that his uncooperativeness will work against him.
PREPARED BY : JAMES E. DALIS
Talkative - Shift his talkativeness to those matters useful in the investigation.
Honest - Ideal and needs little care and guidance.
Deceitful - Permit him to lie until enmeshed with falsehoods an inconsistency; recorder is needed, playback
the inconsistencies then bluff him with perjury.
Timid - Shy and easily frightened; employ friendly approach; explain him the interview will be confidential.
Boasting, Egoistic or Egocentric - Patience and flattery are necessary; they are good witnesses but are
prone to exaggeration.
Refusal to Talk - Most difficult; perseverance and use of neutral topic must first be taken.

Approaches which can be utilized in an interview


 Direct approach is the most effective for willing witnesses;
 for difficult witnesses, start with friendly conversation; those who dislike police officers and who fear
retaliation - direct questioning is necessary.

Following are different approaches to persons to be interviewed:


1. Complainant - sympathetic but the investigator should:
a) Determine whether all the elements of the offense is present;
b) Whether complainant is a “chronic complainant”; and
c) Determine the complainant’s motivation.
2. Person complainant of - Know first the elements of the crime and the records of the persons complained of.
3. Informant - permitted to talk freely; praise him; must be questioned in detail.
4. Victim - approach should be sympathetic; listen to the complete story; be permitted to offer his own opinion;
should not be discouraged to give suggestion.

Evaluation of the Interviewee.


1. Physical Mannerism
2. Frankness - compare the subject’s account of certain events with the facts, significant omissions should
be noted.
3. Emotional - should be noted, partial guilt can be detected by unwarranted indignation or excessive
protest.
4. Content of Statement - information given by different witnesses should be compared so with other
known facts.

Scientific Interrogation
Interrogation - it is the scientific questioning of a person suspected of having committed an offense or of
persons who are reluctant to make a full disclosure of information in his possession which is pertinent to the
investigation.
Different Types of Criminal Offenders
1. Based on Behavioral Attitude
a. Active Aggressive Offenders - person who commit crime in an impulse manner usually on account of
their aggressive behavior.
b. Passive Inadequate Offenders - Persons who commit a crime because of inducement promise or
reward.
2. Based on the State of Mind
a. Rational Offenders - those who commit crime with motive or intention.
b. Irrational Offenders - they commit crime without knowing the nature and quality of their acts.
3. Based on Proficiency
a. Ordinary Offenders - Lowest form of criminal career. They only engaged in crime which require limited
skills.
b. Professional Offenders - Highly skilled offenders, they commit crime with the least chance to be
detected.
4. Psychological Classification
a. Emotional Offenders - Persons who commit crimes in the heat of passion, anger or revenge and
also who commit offenses of accidental nature.
b. Non-Emotional Offenders - Persons who commit crime for financial gain and are usually recidivist.

Techniques Of Interrogation
1. Emotional Appeal - The interrogator must create a mood that is conducive to confession. He may be friendly
to the subject.
2. Mutt and Jeff Technique - In this technique there must be two interrogators which have an opposite
character.
3. Bluff on split pair Technique - Applicable where there are two or more persons allegedly participated in the
commission of a crime. All of them are interrogated separately and the results of the of individual statements are
not known to one another.
PREPARED BY : JAMES E. DALIS
4. Stern Approach - The questions must be answered clearly, and the interrogator utilizes harsh language.
Immediate response from the subject is demanded.
5. The subject is given the opportunity to make lengthy time consuming narration - There may be a
moment when the subject becomes more confused from making further statement for fear of contracting his
previous statement.

Confession
 It is an express acknowledgement by the accused in a criminal case of the truth of his guilt as to the crime
charged, or of some essentials thereof.

Kinds of Confession
1. Extra Judicial Confession
a. Voluntary Extra Judicial Confession
b. Involuntary Extra Judicial Confession
Judicial Confession

Purposes or Objectives of Interrogation


1. Obtain valuable fact
2. Eliminate the innocent
3. Identify the guilty party
4. Obtain Confession

Legal Requirements in Interrogation


 The observation of the constitutional rights of the person is required.
 Investigator must appraise first the suspect/subject of his rights in consonance with the Miranda
Doctrine.
 Failure on the investigator may lead to the dismissal of the case and the filing of administrative or
criminal case against the police.

Attitudes of the Interrogator in the interrogation room


1. Dominate the Interview - never loss self-control; hesitant in the face of any violent reaction, should not
fumble, etc.
2. No distracting mannerisms - passing in the room, smoking, ringing of phone
3. Appropriate language - in consonance with the level of the subject’s mentality
4. Dress - civilian is more likely to inspire confidence; sight of protruding gun may arouse defensive
attitude.
5. Preliminary Conduct - identify first himself to the subject; inform the purpose of the interrogation and
appraise his/her rights.
6. Presence of other persons - should be limited.

Controlling the Investigation/Interrogation.


1. Initial Phase - suspect may be permitted to tell his story without interruption
2. Questioning - it should be planned to unmask the suspect
3. Emotional Appeal - if the subject is uncooperative, exert all effort to be calm.
4. Strategic Interruption - Pause one in a while

Psychological Symptoms of Guilt - investigator should observe this reaction.


1. Sweating
2. Color Change
3. Dry Mouth
4. Blushing
5. Rapid Breathing
6. Rapid Pulse Rate

Documenting the Interrogation or Interview


1. Mental Note - has the advantage of permitting an uninterrupted flow if information without inspiring
caution due to the appearance of a pencil and paper.
2. Written Note - must be sketchy, should only include significant details, if accompanied by oral
confession, requires more exact reproduction.
3. Stenographic Note - may deter hesitant subject
4. Sound Recording - found to be the simplest and most practical means of reproducing.
5. Sound and Motion Picture - most ideal method because it can show all the physical appearance of the
subject

PREPARED BY : JAMES E. DALIS


General Types of Recording
1. Overt Transcript - Recording is known by the subject
2. Surreptitious Transcript - without the knowledge of the subject.

Deception Detection
A. Use of a lie Detector or Polygraph
 Records physiological changes that occur in association with lying in a polygraph. It is fear of detection
of the subject which allows the determination. The fear of the subject when not telling the truth activate
the sympathetic nervous system to a series of automatic and involuntary physiological changes which
are recorded by he instrument.
 It is like an electrocardiogram or electroencephalogram with recording style making tracings on moving
paper at the rate of 6 inches per minute.

Phases of the Examination:


1. Pre-Test Interview - an informal interview of the subject which may last to 20 - 30 minutes.
Purposes:
A. To determine whether the subject has any medical or psychiatric condition or has used drugs
that will prevent the testing.
B. To explain to the subject the purpose of the examination.
C. To develop the test questions, particularly those the type to be asked.
D. To relieve the truthful subject of any apprehension as well as to satisfy the deceptive subject
as to the efficiency of the technique.
E. To know any anti-social activity or criminal record of the subject.
2. Actual Interrogation and Recording
a. Irrelevant Questions
 Questions which have no bearing to the case under investigation.
 Questions may refer to the subject’s age, education, moral studies and others.
 Purpose is to ascertain the subject’s normal pattern of response by eliminating the feeling of
apprehension.
b. Relevant Question
 This are questions pertaining to the issue under investigation.
 Questioning must be unambiguous, unequivocal and understandable to the subject.
 Must be very specific to obtain accurate result.
 Must be related to one issue or criminal act.
3. Post Test Interrogation - The purpose of further questioning is to obtain additional information and
clarification.
4. Supplementary Tests
a. Peak of tension test
b. Guilt Complex Test
c. Silent Answer Test

Use of Word Association Test


 This is a list of stimulus and non-stimulus words are read to the subject who is instructed to answer as
quickly as possible.
 The answer to the question may be yes or no.
 Unlike the lie detector, the time interval between the words uttered by the examiner and the answer of
the subject is recorded.
 When the subject is ask question with reference to his name, address, civil status, nationality, which
has no relation to the subject matter of the investigation, the tendency is to answer quickly.
 But when question bear some words which have to do with the criminal act which was used in killing,
the tendency is to delay the answer.
 The test is not concerned with the answer, be it yes or no.
 The important factor is the time of response in relation to stimulus or non-stimulus words.

Use of the Psychological Stress Evaluation:


 When a person speaks, there are audible voice frequencies, and superimposed on this are the
inaudible frequency modulation which are products of minute oscillation of the muscles of the voice
mechanism.
 Such oscillation of the muscles or micro-tremor occur at the rate of 8 to 14 cycles per second and
control by the central nervous system.
 When a person is under stress as when he is lying, the micro-tremor in the voice utterance is
moderately or completely suppressed.
 The PSE detects, measures and graphically displays the voice modulation the we cannot hear.
PREPARED BY : JAMES E. DALIS
Use of Drugs that Inhibit the Inhibitor
A. Administration of Truth Serum
 The term truth serum is a misnomer. The procedure does not make someone tell the truth and the
thing administered is not a serum but actually a drug.
 Hyoscine Hydro-bromide is given hypodermic is repeated doses until a state of delirium is induced.
 The drug acts as depressant on the nervous system.
B. Narcoanalysis or Narcosynthesis
 The drug used is psychiatric sodium amytal or sodium penthotal.
 It is claimed that the drug causes depression of the inhibitory mechanism of the brain and the
subject talks freely.
C. Intoxication with Alcohol
 The ability of the alcohol to reveal the real person behind the mask which all of us are said to wear
is reflected in the old maxim “In Vino Veritas”

Hypnosis
 It pertains to the alteration of consciousness and concentration in which the subject manifest a
heightened of suggestibility while awareness is maintained.
 Not all persons are susceptible to hypnotic induction. Subjects who are compulsive-depressive
type, strong willed like lawyers, accountant, physicians and other professionals are usually
non-hypnotizable.

Inadmissibility of Evidence obtained through Hypnosis


a. It lacks the general scientific acceptance of the reliability of hypnosis per se in ascertaining the truth from
falsity.
b. The fear that the trier of fact will give uncritical and absolute reliability of hypnosis per se in ascertaining
veracity.
c. The possibility that the hypnotized subject will deliberately fabricate.
d. The prospect that the state of heightened susceptibility in which the hypnotized subject is suspended will
produced distortion of the fact rather than the truth.
e. The state of mind, skill and professionalism of the examiner are too subjective to permit admissibility of
the expert testimony.

Observation
 Good criminal investigator must be a keen observer and a good psychologist. A subject under stress
on account of the stimulation of the sympathetic nervous system may exhibit changes which may be
used as potential clue of deception.

Instrumentation
 Crimes are properly investigated with the aid of scientific knowledge. Advent of science and technology
totally changed the outlook of criminal investigation.
 Advancement of science resulted to the birth of forensic science and/or criminalistics. This field of science
mandates the use of instruments or devices for the purpose of collecting, preserving, examination and
evaluation of physical evidence.

Forensic Sciences as Applied to Criminal Investigation

Forensic Science - is that part of science applied to answering legal questions. It is the examination, evaluation
and explanation of physical evidence in law that encompasses the following:
1. Pathology
2. Toxicology
3. Physical Anthropology
4. Odontology
5. Psychiatry
6. Questioned Documents
7. Forensic Ballistics
8. Tool mark comparison
9. Serology

Criminalistics - can be considered a branch of forensic science that deals with the study of physical evidence
related to crime. From such study, a crime may be reconstructed. Further, it is also interdisciplinary.
Chapter 5 - The Crime Scene

PREPARED BY : JAMES E. DALIS


The crime scene represents an exceptional situation that places many responsibilities on the first officer
arriving at the scene. These include making an arrest, rendering first aid to injured parties, and protecting
evidence on the scene. The latter responsibility includes the preservation of evidence.

Crime Scene Investigation


 Crime scene investigation ( CSI ) is the process of recognizing,searching,collecting,preserving
and documenting physical evidence at the crime scene (CS). It covers the process of identifying and
interviewing witnesses and/or at the victims at the Crime Scene including on-the-spot arrest of suspects.

2 Primary Objectives Of CSI


1. To established what happened and
2. To identify responsible person/s

Types of Crime Scene


A. Indoor Crime Scene
B. Outdoor Crime Scene

Initial Steps At Crime Scene


A. Initial Steps Upon Arrival at the Scene.
 Record the date, arrival time, and weather condition.
 If a person is injured at the crime scene, arrange for medical attention, identification and removal.
The scene should not be disturbed, to have medical aid rendered to the injured or to have a doctor
examine a deceased victim. Each alteration should be accurately recorded.
 Apprehend the offender if at the scene.
 If the scene is not fully protected, put a police line ensure its protection, and request other
policemen or responsible persons to keep witnesses, suspects and victims who are present from
disturbing the scene.
 Determine and record the names of persons at the scene who may be witnesses and separate
them. Removed them from the area as soon as practicable.
 Conduct preliminary questioning of witnesses, suspects, victims to determine the extent of the
incident of the crime.
 Note all the names of all persons officially present.

Based on the 2010 PNP Operational Procedures Manual, if the PNP is resible in investigating

The CS, the procedure would be as follows:


1. Mandatory briefing
2. Initiation of preliminary survey
3. Conduct of interview
4. Preparation of narrative report
5. SOCO team detailed search
6. Final survey
7. Release the crime scene

As a basic guide for first responders, the acronym P-R-E-L-I-M-I-N-A-R-Y summarized the
duties of the first investigator who arrive the crime scene.

P - Proceed to the scene promptly and safety


R - Render assistance of preliminary survey
E - Effect arrest to the criminal
L - Locate and identify witnesses
I - Interview complainant/Victim and witness
M - Maintain integrity of crime scene and protect evidence/s
I - Interrogate suspects if necessary
N - Note conditions, events and remarks
A - Arrange for collection of evidences
R - Report the entire incident fully and accurately
Y - Yield responsibilities, to follow-up investigator or superior officer

GOLDEN RULE :“Never move, alter, contaminate and touch an object at the crime scene unless such
object Was properly photograped,sketched,marked,and measured.”

PREPARED BY : JAMES E. DALIS


THE CSI TEAM
In the Philippine setting, CSI is better known as SOCO if this is done by group of trained
PNP personnel, such group is called SOCO team. In cases evidence encountered needs
special Processing due to controversial and sensational cases, SOCO specialists from the PNP
Crime Lab Group should be requested.

The SOCO team is composed of:


1. SOCO team leader
2. Specialists /expert, firearms examiner / expert, forensic photographer, Measurer/
Sketcher)
3. Driver/ Evidence custodian

Crime Scene Response Procedures (Rule 18, PNP operational Procedure manual 2010)

Duties Of The First Responder (Fr)-Based On Section 1, Rule 18


1. Cordon the crime scene with whatever available materials likes ropes, straws, human
barricade, police line, wood and chain;
2. Evacuate injured persons to the nearest hospital
3. Prepare to take dying declaration’ of severely injured person, if any;
4. The Fr shall stay in the crime scene to assist the Investigator -On Case (Ioc) in the
maintenance of security. Crowd control, preservation of evidence and custody of
witness / suspects until such time the investigation is completed and temporarily turned
over to the local Chief of police (COP) for the continuance of CS security;
5. The FR shall attend to court duties to answer inquiries from any investigative body to
shed light and help the IOC in solving case;
6. Prevent entry/exit of persons within the cordoned area;
7. Make notes of names and possible witness or suspects, and
8. Brief the IOC on the situation upon arrival

Duties Of The Investidator-On-The-Case (Ioc)


1. Mandatory Briefing: Upon arrival at the CS, the IOC must be briefed by the FR. IOC
Then immediately calls for the assistance of the SOCO team.

2. Initiate Preiminary Survey


A. The IOC must:
1. Initiate a general assessment of the scene;
2. Take a cautious walk-thru the CS;
3. Take down extensive notes to document important factors; and
4. Established the evidence most likely to be encountered.
B. After letting the SOCO team established their COMMAND POST (CP), the IOC then confers
with the SOCO Team leader (TL) regarding the ff:
1. Defining the extent of the search area
2. Determining the personnel and equipment needed
C. The IOC gives time for the TL to develop a general theory of the crime out of the joint
Perimeter.
D. The IOC must then turn over the CS to the SOCO and assist the latter in security the CS perimeter
E. The IOC must not leave the place until such time that the SOCO, in writing and after
processing, release permanently or temporarily the custody of the CS back to him.
F. If the release is only temporary, the IOC must not allow access to anyone on the CS until
such time that SOCO finally releases permanent custody of the same.

3. Conduct Interview - While the CS is being processed, the IOC using the valuable info
given to him by the FR, must look for witnesses, immediately conduct interview, and note
down important facts for future reference.

4. Preparate Narrative Report - The IOC must use of systematic approach in making a Narrative report.
No item is insignificant to record if it catches one’s attention. The 3 basic methods of narrative
documentation of the CS are written, audio, video. The purpose of preparing a narrative report is to provide
a flowing description of the conditions at the CS.Represent the CS in a ‘general to specific format.

5. Soco-Team Detailed Search

6. Final Survey - The release of the CS should be done if the IOC is satisfied that all pieces
of evidence have been recovered. Thus, the IOC must evaluate the items recovered from
PREPARED BY : JAMES E. DALIS
the results of interrogation of the suspects and the interview of the witnesses. He must bear in mind that
upon the formal release of the CS to the proper authority, a warrant is already required for his re-entry to
the CS. This survey is a critical review of all aspects of the earlier search already performed.
Guidelines:
a. Discuss the search jointly with all personnel for completeness
b. Double check documentation to detect inadvertent errors.
c. Check to ensure all evidence is accounted for before departing scene.
d. Ensure all equipment used in the search is gathered
e. Make sure that possible hiding places of difficult access areas were not overlooked.
7. Release the Crime Scene - the release of CS shall be done if the IOC is satisfied that all pieces of
evidence have been recovered. Thus, he must evaluate the items recovered from the results of
interrogation of the suspect/s and the interview of the witnesses.
Guidelines:
a. Release is accomplished only after completion of the final survey.
b. Documentation of release should indicate the following:
 Time and date of release
 To whom released
 By whom released
c. Ensure that appropriate inventory has been provided as necessary, considering legal
requirement, to person whom scene is released.
d. Once the scene has been formally released, re-entry may require a warrant.
e. Only the person in charge has the authority to release the scene. This should be known and
adhered to by all personnel involved.

Soco Team Operations


1. Preparation and Approach
 Establish command post for communication, decision making, temporary quarter of the SOCO
Team members.
 Take custody of the Crime Scene.
 Team Leader conducts briefing before proceeding to the next step.

2. Secure and protect the crime scene


 Take control of the Crime Scene upon arrival.
 Determine up to what extent to what the Crime Scene has been protected.
 Ensure adequate Crime Scene security.
 Obtain Information
 Take extensive notes
 Keep out unauthorized personnel.

3. Initiate Preliminary Survey (Walk Through)


 Person in charge should maintain definite administrative and emotional control.
 Select appropriate narrative description technique
 Delineate extent of search area.
 Organize methods and procedures needed to recognize special problem areas.
 Identify and protect transient physical evidence.
 Make extensive notes.

4. Evalaute Physical Evidence Possibilities


 Based on what is known from the preliminary survey, determine what evidence is likely
to be present
 Concentrate on the most short-lived evidence and work to the least transient ones.
 Focus first on the easily accessible areas in open view and progress eventually to possible out
view of locations look for purposely hidden items.
 Consider whether the evidence appears to have been moved unintentionally.
 Evaluate whether or not the scene and evidence appear intentionally contrived.

5. Prepare Narrative Description


 Purpose is to provide a following description of the conditions of the CS.
 Represent CS in general to specific format.
 Consider what are present in the Crime Scene and is not observed or is out of place.
 Furniture moved first by FR or paramedics must be noted.
 Basic methods of narrative documentation are Written, Audio and Video.

6. Photograph the Crime Scene


PREPARED BY : JAMES E. DALIS
 Begin taking photos asap and plan before photographing.
 Document the photographic effort with a photographic log.
 The SLR camera is the best tool in documenting physical evidence and location, the video cam is
best tool in recording the activities of each team member.
 Insure that a series of overall, medium and close-up views of the scene is established.
 Ese recognized scale device for size determination when applicable.
 When a scale device is used, first take photograph without the inclusion of this device.
 Photograph evidence in place before its collection and packaging.
 Photograph areas adjacent to the crime scene point of entry, exits windows, attic, etc. Consider
feasibility of aerial photography.
 Photograph items, places, etc. to corroborate the statement of witnesses, victims and suspects.
 Take photograph from eye-level to present scene as it would be observed by normal view.
 Film relatively cheap compared to the rewards obtained. Do not hesitate to photograph something
which has no apparent significance at that time it may later prove to be a key element in
investigation.
 Prior to the lifting fingerprints, photographs should be taken 1:1, or use appropriate scale.
 Photographs must be supplemented by sketches.

7. Prepare Diagram/Sketch of the Scene


 Establishes records of items, conditions, and distance/size-relationship-diagrams supplement
photographs.
 Rough sketch is drawn at the Crime Scene and is a model for the finished sketch.
 Number designation on sketch can be coordinated with same number designation on evidence log.
 General progression of sketches.
 Lay out basic parameter.
 Lay out fixed object, furniture’s, etc.
 Record position of evidence
 Record appropriate measurements.
 Set keys and legends, compass orientation and others.

8. Conduct Detailed Search, Record and Collect Physical Evidence


 Accomplish search based on previous evaluation of evidence possibilities.
 Conduct search in general manner and work to specifics regarding evidence items.
 Use of specialized search pattern
 Photograph all items before collection and enter notations in photographic log.
 Mark evidence location on diagram/sketch.
 Complete evidence Log with appropriate notations in photographic log.
 Mark evidence locations in diagram/sketch.
 Do not handle evidence excessively after recovery.
 Seal all evidence containers at the CS.
 Do not guess on packaging requirements. Different evidence must be placed in separate
containers.
 Do not forget entrance and exit areas at the scene of potential evidence.
 Be sure to obtain appropriate known standards.

9. Conduct Final Survey


 Critical review of all aspects of the earlier search already performed.
 Discuss the search jointly with all personnel for completeness.
 Double check documentation to detect in averment errors.
 Check to ensure evidence is accounted for before departing scene.
 Ensure all equipment’s used in search is gathered.
 Make sure all possible hiding place is not overlooked.

10. Release the Crime Scene


 Release is only accomplished after the conduct of final survey.
 Ensure all appropriate inventory has been provided considering legal requirements to person
whom scene is released.
 Only the person in charge has the authority to release the scene.
 Consider the need to have certain specialist serve the scene before it is released.

Guide for investigators to look upon are evidence that establish the following.
1. Corpus delicti or the fact that a crime was committed.
2. Method of operation of the perpetrator
3. Identity of the guilty party
PREPARED BY : JAMES E. DALIS
Different Methods of Crime Scene Search
1. Zone search/Quadrant- One searcher is assigned to each subdivision, then each quadrant is cut into
another set of quadrants
2. Ever Widening Circle / Spiral Search - The searcher starts at the middle of the ring and
continues in an ever-widening circle until the whole are is searched. This is used when only
3. Straight Line Search / Lane search - Used outdoors for body dump searchers and after mass
Disasters. A large number of people will stand, shoulder to shoulder, and walk across the
area in a straight line.
4. Strip search - Used when only small number of people are available to cover a large
outdoor area. The searcher will walk straight and then turn at the right angles across the
area to be covered. Down, across up, across down, across up.
5. Grid search / Double strip Search - This cover a large area. The area is divided into a grid
and a search is made of each grid. A second search will then be made perpendicular to the
first search.
6. Wheel Search Method
 If the area to be searched is approximately circular or oval, the wheel method may be used. The
searchers gather at the center and proceed toward along a radii or spokes.
 The searchers gather at the center and proceed toward along a radii or spokes. The procedure
should be repeated several times depending on the size of the circle and the number of searchers.
 The Principal drawback of this method is that the distance between searchers increases as they
depart from the center.

Recording Procedure - the following are standard method of recording investigative data.
1. Taking Photographs
2. Sketching the Crime Scene
3. Taking down notes, writing what is seen or observed.
4. Developing and lifting latent prints found at the crime scene
5. Gathering of Physical Evidence
6. Plaster Casting
7. Tape Recording of Sounds
8. Video tape recording of objects
9. Obtaining written statements of subjects and witnesses

Sketching the Crime Scene


Sketch - is the simplest and the most effective way of showing actual measurements and of identifying
significant items of evidence and their location at the scene.

Pointers to Consider in Sketching/ Rules of Sketching.


1. Establish admissibility, the investigator must have had a personal observation of the data in question. In
other words, the sketch must be sponsored or verified.
2. Sketches are not substitute for notes or photos.
3. Write down and control all measurements. Do not rely on others to give them.
4. Measurement should be in harmony. (Feet or Meters)
5. Fill in details on your rough sketch.
6. Keep the rough sketch even when you have completed the final sketch. Draw the final sketch to scale.
7. Indicate/draw the North direction with an arrow.
8. Indicate the place in the sketch as well as the person who drew it. Use the the KEY capital letter of the
alphabet for listing down more or less normal parts or accessories of the place, and numbers for items of
evidence.
9. Indicate the position, location and relationship of objects.
10. Use standard symbols in the sketch.
11. Show which way doors swings, direction of the stairways with an arrow.
12. Do not draw things which are clearly irrelevant to the case.
13. Never rely on memory to make corrections at the station house.
14. The scale must be drawn on the sketch. If camera has been used, mark its position on the sketch.

General Kinds of Sketch.


A. Rough Sketch - made by the investigator at the crime scene. Scale and proportion are ignored, and
everything is approximated. It is to be used as a basis of a finished sketch.
B. Finished Sketch - made primarily for court room presentation. Scale and proportion are observed.

Specific Kinds of Sketch


1. Sketch of Locality
PREPARED BY : JAMES E. DALIS
 gives a picture of the scene, the crime and its environment such as neighboring buildings, roads
leading to the location or house, etc.
 In arson cases, the sketch of locality is of great value as an aid in determining whether the fire was
caused by nearby inflammable property.
2. Sketch of Grounds - Pictures of the crime scene with its nearest physical surroundings.
3. Sketch of Details - Describes immediate scene only.

Types of Sketch

a. Floor plan or bird’s eye view


b. Elevating drawing
c. Exploded view or cross projection
d. Perspective Drawing

Method of Systems of Locating Points on Sketch


1. Rectangular Coordinate Method - Two right angles are drawn from the items being measured to the
nearest permanent object.
2. Straight Line Method - Generally used to show the location of items against a wall such as a piece of
furniture.
3. Triangulation - Commonly used to determine distance outdoors, although it can easily be used indoors.
Measurements from each of two fixed objects as points of reference to the point or object you want to locate
so as to form an imaginary triangle. Sketch will show as many imaginary triangles where there are objects
plotted.

Elements of Sketching
1. Measurement - must be accurate.
2. Compass Direction - standard arrow to designate the direction of North. It must be indicated to facilitate
proper orientation
3. Essential Items - sketch must include important items of investigation.
4. Scale of Proportion - Actual scale must be stated in the sketch.
5. Legend - the explanation of any symbol used to identify objects must be stated.
6. Tile - includes case identification, identification of victim, scenes portrayed, location, date and hour when
it was made, and the name of the sketcher.

Crime Scene Photography


 this provides permanent records of the facts at the crime scene and is not a substitute for field notes,
accurate measurements and sketches of the scene. Photographing the crime scene should proceed from
general to specific shots.
Photographic Evidence - means sanctioned by the law of ascertaining in a judicial proceeding the truth
respecting a matter of fact with the aid of a photograph.

Purposes of Photography
1. Provides pictorial representation of the appearance and position of the objects at the scene.
2. Serves as evidence to support the testimony of the investigation as to what he found at the scene, their
location, nature and condition.

Requirements to be Observed by the Investigator to Ensure Admissibility of Photographs in Court


1. The objects presented should be material and relevant.
2. The photographs should not unduly incite prejudice or sympathy.
3. The photograph should be free from distortion.

Forms of Distortion
1. Incorrect point of view
 the photograph may obscure essential object and emphasize others.
2. Perspective
 Distortion of the picture may be due to the improper relationship of focal length of lenses, viewing
distance and tilting of the place or lens board.

Kinds of Photograph Taken at the Scene


1. Overall photos
a. Entire crime scene and surrounding areas, including walls, and points of entry and exit.
b. Photographs of physical evidence - should show the position and location relevant
To the scene
c. Photographs of the body should show the body’s position relatives to the scene.
PREPARED BY : JAMES E. DALIS
2. Mid-range photographs
a. Scales should be used when indicated.
b. Purpose is to focus attention on a specific object.
3. Close -up Range
A. Purpose is to show specific object up close.
B. Photos can show patterns on injuries
C. After the body is removed, close up photos should be taken of the are underneath.
4. Special Technique - ultra violet and infra-red, photomicrography, radiography, cinematography and

Essential Photographic Data


1. Date to identify the photograph with the offense.
2. Data to identify the photographer
3. Data to orient the camera position with the scene.
4. The date and hour when each photograph was taken
5. Data reflecting the light and weather condition when each photograph was taken.
6. Data reflecting the type and make of camera, film and details regarding the special equipment used.
7. Focal Length of the lens
8. Data regarding the developing, printing and any special laboratory techniques.
9. Data to reflect a complete chain of custody to the photographic film used.

Evidence Collection - inventory of physical evidences.

Physical Evidence - are articles and materials which are found in connection with the investigation and which
aid in establishing the identity of the perpetrators or the circumstances under which the crime was committed or
which, is general assist in the resolution of the case.

Kind of Physical Evidence


1. Corpus Delicti - objects or substances which are essential parts of the body of the crime.
2. Associative Evidence - evidence which links the suspect to the crime scene or offense such as
fingerprints, shoe impression and others
3. Tracing Evidence - articles which assist the investigator in locating the suspect.

Categories Of Crime Scene Documentation


Administrative Worksheet - is for documenting major events, times and movements relating to the
search efforts. It is also appropriate in recording initial and continuing management and administrative
steps which are taken to ensure that an organized search is accomplished.
Narrative Description - involves record of the crime scene’s general appearance as first observed.
However, extreme detail regarding evidence or actual collection of evidence is beyond scope of the
narrative description.
Evidence Recovery Log - consist of the record how physical evidence was recognized, collected, marked,
and packaged for administrative and ‘chain-of-custody’ purposes.
Latent-Print Lift Log - is the record of how fingerprints and other prints at the CS are discovered, collected
(lifted), marked and packaged.

Procedures Essential In The Identification Of Physical Evidence Later On


Marking - Put initial, date and time directly on individual items of physical evidence. Care must be
exercised to place the markings so as not to destroy any latent characteristics or reduce its intrinsic value.
When an item cannot be marked, place it in a suitable container.
Tagging of Evidence - Tagging serves to help the investigator identify evidence and facilitate processing
and handling by evidence custodian and laboratory technician. The property tag containing pertinent data
about the evidence is attached to the articles or containers
Preservation of Evidence - it is the responsibility of the investigator to ensure that every precaution is
exercised to preserve the physical evidence in the state in which it was recovered/obtained until it is
released to the evidence custodian.
Chain of Custody - pertains to the process by which the evidence is handled, transferred and accounted,
for between the time of discovery and the disposition of case.
Chain of Custody of Physical Evidences - The number of persons who handle evidence between the
time of commission of alleged offense and the ultimate disposition of the case should be kept to a minimum.
Each transfer of evidence should be receipted. The recipient of the evidence shall be accountable for it
during the time it is in his possession.
*Purpose
 Certain types of evidence, such as latent prints are so fragile in nature that a slight act of
carelessness in handling can destroy their value as clues and remove the possibility of obtaining
them from them any information which would further investigation.
PREPARED BY : JAMES E. DALIS
 It is necessary that the evidence should be in the same condition when presented in court.

Packaging Of Evidence - Correct packaging techniques are vital to maintaining the integrity of the evidence. If
the evidence is allowed to become contaminated, damaged, or evaporated through mishandling, it becomes
worthless. A primary rule of packaging evidence is that, whenever possible, the items should be sent to the
crime lab intact.

Three Important factors in the introduction of physical evidence during trial.


1. Article must be properly identified
2. Continuity or chain of custody must be proved
3. Competency must be proved

Modus Operandi File


 It is a Latin term for mode or method of operation.
 It is the summary habits, techniques and peculiarities of behavior.
 In here it includes the individual peculiarities, methods, techniques, tools used in containing the crime
and physical conditions at the crime scene.

Factors Influencing Modus Operandi


1. Opportunity, need, desire, and intent.
2. Knowledge - obtained by study, association with other criminals who prolong their techniques or by
experience.
3. Experience - criminals learn from past methods and avoid committing the same errors in their next
crime.
4. Conditions - barred windows may cause a criminal ro select other means of entry.

Modus Operandi Data are Obtained from the Following Information.


1. Time of the attack or date and time committed.
2. Property attacked or type of premises entered
3. Person attacked - type of victim
4. How attacked - point of entry
5. Means of attack
6. Object of attack
7. Trademark or peculiarity
8. What suspect said
9. Transportation

Oppurtunity - this is the physical possibility that the suspect could have committed the crime. It may be
deduced from the following.
1. The Suspect could have been in the vicinity of the crime.
2. Knowledge of the criminal objectives
3. Absence of alibi

AlibI - the plea of having been somewhere else at the time of a crime.

Chapter 6 : Arrest, Raid, Search And Seizures


Arrest - it is the taking of a person into custody in order that he may be bound to answer for the commission
of an offense. (Sec 1, Rule 113)

Legal Requirements in Conducting Arrest


a. It is made by an actual restraint of the person to be arrested or by his submission to the custody of the
person making the arrest.
b. No violence or unnecessary force shall be used in making an arrest, and the person to be arrested shall
not be subject to any greater restraint than is necessary for his detention. (Sec 2, Rule 113)

Duty of Arresting Officer - It shall be the duty of the officer executing the warrant without unnecessary delay to
arrest the accused and to deliver him to the nearest police station or jail.

Execution of Warrant
a. The head of the office to whom the warrant of arrest has been delivered for execution shall cause the
execution of the warrant within ten days from receipt thereof.
b. Within ten days, failure of the officer to execute the warrant, shall make a return to the judge who issued
the warrant, in his failure to execute the same, shall state the reasons therefor (Sec.4, Rule 113)

PREPARED BY : JAMES E. DALIS


When Arrest Without a Warrant Lawful
1. A peace officer or private person may, without a warrant, arrest a person:
a. When in his presence, the person to be arrested has committed, is actually committing, or is
attempting to commit an offense.
b. When an offense has in fact been committed, and he has personal knowledge of facts indicating that
the person to be arrested has committed it.
c. When the person to be arrested is a prisoner who escaped from penal establishment or place where
he is serving final judgement or temporarily confined while his case is pending, or has escaped while
being transported from one confinement to another (Sec.5, Rule 113)
2. Arrest by bondsmen for purposes of surrendering the accused under Sec. 20, Rule 114.
3. In cases falling in No. a and b, the person arrested without a warrant shall be for with delivered to the
nearest police station or jail and shall be proceeded against in accordance with Rule 112, Sec. 7

Right of an officer to break into building or enclosure - An officer in order to make arrest either by virtue of a
warrant, or when authorized to make such arrest for an offense without a warrant, as provided in Sec. 11 may
break into any building or enclosure in which the person to be arrested is or is reasonably believed to be if he is
refused admittance thereto, after he has announced his authority and purpose.

Raid - A hostile or predatory incursion by rapidly moving police or military personnel to arrest criminals, or to
search for fruits of crime.

Bill of Rights (1987 Constitution, Sec 2, Art III) - (Homework, Explain)

Constitutional Protection
The Protection afforded to the people against unreasonable searches and seizures speaks three things.
 The citizen’s right to be secured in their person.
 The citizen’s right to be secured in their houses.
 The citizen’s right to be secured in their papers and effects.

What is meant by search? - It is an examination of a man’s house or other building or premises with a view to
the discovery of contraband or elicit or stolen property or some evidence of guilt to be used in the prosecution of
criminal action for some crime or offense.
What is a Search Warrant? - Is an order in writing issued in the name of the People of the Philippines signed
by a judge and directed to a peace officer commanding him to search for personal property described therein
and bring it before the court?
Probable Cause - the facts and circumstances antecedent to the issuance of a warrant sufficient in themselves
to induce a cautious man to rely upon them and act in pursuance thereof.

Requisites for Valid Search Warrant and Warrant of Arrest


 It must be issued upon probable cause
 Probable cause must be examined personally by the judge
 Such determination of existence of probable cause must be made after examination by the judge of the
complainant and the witnesses he produces

When search and seizure may be made without warrant


 When there is consent or waiver.
 The search is an incident to a lawful arrest.
 Contraband or forfeited goods being transported by ship, automobile or other vehicle where the officer
making it has reasonable cause for believing that the latter contains them in view of the difficulty of
securing a search warrant.
 The possession of articles prohibited by law is disclosed to plain view or open to eye and hand.
 Incident inspection, supervision and regulation of restaurants by health officers, or factories by labor
inspectors.
 Routinely searches usually made at the border or at port entry in the interest of national security and for
the proper enforcement of customs and immigration laws.

Chapter 7 - The Criminal Investigation At Trial


After gathering all the necessary pieces of evidence proving the guilt of the suspect does not end the job of a
criminal investigator. His jobs extend up to the finality of the case in the court.

Roles and Responsibilities


1. To present firsthand knowledge of facts to the prosecution and to the court by presenting the matters
investigated.

PREPARED BY : JAMES E. DALIS


2. To know the role of the other participants in the courtrooms such as the other witnesses, the accused,
the defense counsels, and the judge.

Steps in preparing for Trial


1. Review all notes and reports and other pertinent documents.
2. Review the admissibility of his evidence or ask advice in matters involving legality evaluation, and
admissibility of evidence.
3. Confer with the prosecution concerning his role during the trial.
4. Check whether all evidence necessary to be presented are available or ready for presentation
5. Know the court where trial will be held
6. Prepare visuals and charts or other exhibits necessary for effective court presentation.

Police Intelligence
 the product from the collection, evaluation, analysis, integration, and interpretation of all available
information which concerns one or more aspects of foreign nations or areas of operations and which is
immediately or potentially significant to planning

Nature Of Intelligence
 is responsible in procuring and obtaining political, economic, psychological, sociological, military and
other information which may bear upon, national interest and which had been collected by the different
government and agencies.
 is knowledge and powerful it can prevent war and cause one it can help in crime control (there is crime)
and crime prevention (no crime).
 The end product resulting from the collection, evaluation, analysis, integration and interpretation of all
available information.

Intelligence (Basic Concepts)


o As An Activity - The organized effort to collect information, to assess it little by little, and piece it together
until it forms larger and clear patterns.
o As A Product- The end product resulting from the collection, evaluation, analysis, integration, and
interpretation of all available information which may have immediate or potential significance to the
development and execution of plan, policies and programs of the user.
o As An Organization- An institution composes of persons who pursue of preparing plans or formulating
policies.

History Of Intelligence And Early Personalities


“NUMBER 13:17-32, Old Testament (Holy Bible) - Moses sent TWELVE (12) SCOUTS to the LAND OF
CANAAN where he detected directed them to spy the land, the people and their location and the nature of
their cities.”
Numbers 13: 3-15 - The Scripture also named the 12 intelligence agents whom the Lord directed Moses to
send into the land of Canaan.
Delilah - Was an impromptu intelligence agent of the Palestine. A biblical personality who was able to gain
information by using her beauty and charm. She was responsible for the fall of Samson a known Israelite
leader who terrorized the Philistines.
Rahab - Harlot of Jericho who sheltered and concealed agents of Israel.
Alexander The Great- A renowned Greek Conqueror had his share of advance information when rumors
of discontent circulated from among the ranks of his men. He was able to identify those disloyal ones by
ordering the communication letters opened and was successful in curtailing the decline of “esprit de corps”
and morale of his men.
Mata HarI - One of the best intelligence spies in History, yet she was one of the worst. She was born in
Leeward in Holland.
Sertorious - The possessor of the white fawn that tried to follow Polyaenus everywhere. The fawn was
used as an intelligence agent.
Cressus Of Rome(Marcos Lucinos) - Employed both slaved and freeman. The intelligence operatives of
Cressus, when not objectively looking for fires, were devoted in the main to gather evidence for Cressus to
be used in the Law of Courts.
Akbar - The “Great Mogul” and sagacious master of Hindustan who employed more than four thousand
agents for the sole purpose of bringing him the truth that his throne might rest upon it.
PREPARED BY : JAMES E. DALIS
Genghis Khan - He used intelligence to conquer China and invade Cathay.
Frederick The Great - The FATHER OF ORGANIZED ESPIONAGE. He established the rules for
obtaining and using every grade of spy intelligence.
4 Divisions of Agents
a. Common Spies - recruited among poor folk, glad to earn a small sum or to accommodate
a military officer;
b. Double Spies - the low informers and unreliable renegades of value chiefly in spreading
false information to the enemy;
c. Spies Of Consequences - courtier and noblemen, staff officers and kind red conspirators
always requiring a considerable bribe or bat
d. Persons who are forced to undertake espionage against their will.

Hannibal - His brilliant and futile raid in history gained him many victories and nearly led Rome to death. He
often dressed as a beggar and went into the streets of Rome.
Karl Schulmeister (Napoleon’S Eye) - He was credited for establishing counter intelligence conducted
against spies. He is a Master Of Deceit who used black mail to obtain vital information pertaining to the
personality and identify of the enemies of Napoleon during the 18th Century.

Sir Francis Walsingham Of England- Protector Of Queen Elizabeth I, who organized the secret police
and established a spy network to detect fleet movement of enemies of the British Empire particularly the
Portuguese. Regarded as the "FIRST GREAT SPYMASTER", a ruthless in the cause, he was responsible
for the assassination, murdering and execution of people who covertly betrayed the queen.
Sir Arthur Wellesly- Duke of Wellington, who DEFEATED NAPOLEON'S AT WATERLOO IN 1815.
Regarded as the "GREATEST MILITARY SPYMASTER AT ALL TIME". He live by the motto; "All the
business of war is to find out what you don’t know by what you do."
Alfred Redl - A HOMOSEXUAL DOUBLE SPY who while working as intelligence direct proof Austria and
Hungary, spied the Russians. His treason activities were discovered and compelled to commit suicide.
Sun Tzu- a Chinese philosopher, and considered as the “FATHER OF INTELLIGENCE”. - He also
authored a book entitled “PING FA” which means Art/Principles of War, the earliest textbook on the art of
general warfare.

He also known for His statement:

“IF YOU KNOW YOUR ENEMY AND YOURSELF, YOU NEED NOT FEAR THE RESULTS OF A HUNDRED
BATTLES. IF YOU KNOW YOURSELF BUT NOT THE ENEMY, FOR EVERY VICTORY YOU WILL
SUFFER DEFEAT. IF YOU NEITHER KNOW YOURSELF NOR THE ENEMY, YOU ARE A FOOL
WHO WILL MEET DEFEAT IN EVERY BATTLE”

4 Principles of Intelligence of Sun Tzu


1. Timeliness
2. Foresight
3. Flexibility
4. Security

Definition Of Terms:
Information - all evaluated materials of every description those derived from observation, reports,
rumors, imaginary and other sources from which intelligence is produced.
Military Intelligence - the product resulting to the collection, evaluation, analysis, integration and
interpretation of all available information, which concerns one or more aspects of foreign nation or
areas of operation and which is immediately or potentially significant to planning.
Police Intelligence - the product resulting to the collection, evaluation, analysis, integration, collation,
and interpretation of all available information which concerns one or more aspects of criminal activity
significant to police planning and operation. It is also defined also as the gathering of information
regarding the activities of criminals and other lawless elements for the purpose of affecting their arrest,
obtaining evidence of their plans to commit crime.
Counter Intelligence - all active and passive measure taken to ensue the safe guarding of information,
personage, and materials from espionage, sabotage and subversion by foreign nations or dissidents of
dissatisfied groups of individuals.
Police Counter Intelligence - is the detection, prevention and neutralization of any activity inimical to
the harmony and the best interest of the police organization. It is primarily intended to prevent,
neutralize, negate or destroy attempts to discredit the organization.

Detection - finding out or identifying the Destruction - destroy the enemies


enemy. effectiveness.
PREPARED BY : JAMES E. DALIS
Denial - prevention of the enemy from having peace, it is used to aid in formulation of an
access to our information. adequate national defense.
Deception - intended primarily for the hostile Counter Subversion - an action that
elements among us or those members of our counters those clandestine or covert designs
organization whose weaknesses are exploited to undermine military, economic,
to the enemy. psychological, morale or political strength of a
Tactical or Combat Intelligence - processed regime.
information and conclusion about the weather, Sabotage - action against, material, premises
enemy, and terrain required by a chief of or utilization to their production which
police or commander for the conduct of interferes with or absolutely the national
tactical operation. security to prepare for or carry on a war.
Espionage - refers to the collection of secret
Strategic Intelligence - study of the information that a government organization
capabilities, vulnerabilities, and probable does not want any outsides to know.
coursed of action of foreign nations. In time of

Basic Principles Of Intelligence Operations:


1. INTELLIGENCE AND OPERATION ARE INTERDEPENDENT - Intelligence provides
valuable inputs for effectiveness of police operation on the other hand operation likewise is
needed for continuity of intelligence activities. Operation and intelligence planners work hand
and hand to attain greater degree of success in their common effort
2. INTELLIGENCE IS CONTINUOUS - The basic principle of intelligence operations is that
intelligence activities follow a simple cycle, which is continuous at the same time that new
information is being collected in response to direction, other information is being processed and
intelligence is being used.
3. INTELLIGENCE MUST BE USEFUL - It must serve the commander’s need and requirements
so that effort will not be wasted. It should have an application and significance to the operation.
4. INTELLIGENCE MUST BE AVAILABLE ON TIME - Intelligence must be communicated to
the decision maker at the appropriate time to permit its most effective use. It must reach the user
in time to serve as basis for appropriate action. Intel data must be disseminated on time because
late arrival is as good as useless.
5. INTELLIGENCE OPERATIONS REQUIRES IMAGINATION AND FORESIGHT - The
success of objective is paramount importance. Intelligence personnel are reminded to refrain
from utilizing criminal elements in Intel operation. They must use their resourcefulness to obtain
more than what is normally.
6. INTELLIGENCE MUST BE FLEXIBLE - Intelligence Operations must be changeable
according to the present situation, condition and other factors, Intelligence Operations are based
on reason and sound judgment. Procedures which do not readily adapt to a given situation are
generally discarded.
7. INTELLIGENCE REQUIRES CONTINUOUS SECURITY MEASURES - Deny unauthorized
personal information about operation and intelligence product, its source and organization itself.
In the handling of classified materials there should be a working balance between secrecy and
operational convenience.
8. INTELLIGENCE MUST FIT THE NEED OF THE COMMANDER - different commander needs
information of different geographic areas. Some of their needs, however from overlapping areas,
intelligence plans, orders and requests are concerned with the definite areas, particularly the
area of influenced of the commander.
9. INTELLIGENCE REQUIRES CAREFUL AND THOROUGH PLANNING - intelligence
planning includes the anticipation of intelligence needs, the organization to fulfill the needs and
supervision of the organization. It is continuous and and must be adapted to charging conditions
by the developing and quickly exploiting new information sources, improving methods, and
increasing effectiveness and dissemination.

FOUR AXIOMS OF INTELLIGENCE


Axiom 1 - intelligence is a command responsibility.
Axiom 2 - intelligence is essential to all types of operations.
Axion 3 - intelligence of the government must be superior to that of the enemy.
Axiom 4 - intelligence is crucial to internal security.

FOUR “I” OF INTELLIGENCE

PREPARED BY : JAMES E. DALIS


1. Interest
2. Integrity
3. Ingenuity
4. Intelligence

Nature Of Intelligence Function

Police Intelligence - evaluated and interpreted Military Intelligence - it is evaluated and


information concerning organize crime and interpreted information concerning an actual
other major police problem. or possible enemy.

Categories Of Intelligence
National Intelligence
 the knowledge formed with the integration of intelligence developed by different
government agencies and considered in the essential formulation of national
intelligence policy and promotion of national security.
 integrated product of intelligence developed by ALL GOVERNMENT
DEPARTMENTS concerning the broad aspect of national policy and national
security.
National Policy – specific courses of action to achieve the national objectives.
National Security – this relate to the protection and preservation of military, economic and
a productive strength of a country including the security of the government and domestics
and foreign affairs against espionage, sabotage and subversion.

Department Of Intelligence (mission) – the intelligence required by department or agencies


of the government to execute its mission and discharge its responsibilities.
Military Intelligence – refers to the knowledge by the military institution essential in the
preparation and execution of military plans, policies and programs.
Police Intelligence - refers to the knowledge necessary in the preparation and execution of
police plans, policies and programs.

Types Of Police Intelligence


1. Strategic Intelligence
 intelligence information in which is primarily long range in nature with little or no
immediate practical value.
2. Counter-Intelligence
 it deals with the defending of the organization against its criminal enemies.
 preparation and execution of plans and programs to neutralize or prevent any activities
Undesirable To The Police Organization.
3. Line Intelligence (Tactical Intelligence)
 the type of intelligence in which is of an immediate nature and necessary for more
effective police planning and operation.
 it is the intelligence information which directly contributes to the accomplishment of
specific objectives and immediate in nature, necessary for more effective police
planning and operation.

Feilds Of Interest Of Police Intelligence (Fipi)

Functional Classification Of Police Intelligence


1. Criminal Intelligence - refers to the knowledge essential to the prevention of crimes and
the investigation, arrest, and prosecution of criminal offenders.
2. Internal Security Intelligence - refers to the knowledge essential to the maintenance of
peace and order.
3. Public Safety Intelligence - refers to the knowledge essential to ensure the protection of
lives and properties.

Feilds Of Military Intelligence


A. Strategic Intelligence - knowledge pertaining to capabilities and vulnerabilities of foreign
nations, for the formulation of an adequate national defense in peace and from the basis for
the projected military operation in the time of war.
Components Of Strategic Intelligence:

PREPARED BY : JAMES E. DALIS


Political Intelligence – deals with Domestic and Foreign affairs and relation of
overnment operations;
Basic Principles of the Government
Government Structures
Public Order and Safety
Subversion
Intelligence and Security Organization
Economic Intelligence – deals with the extent and utilization of Natural and Human
resources to the industrial potential of the Nations
Transportation And Telecommunication Intelligence - concerned with the
operations and facilities not only the Military but also the Civilians.
Sociological Intelligence – deals with the demographic and psychological aspects
of groups of people.
o Population and Manpower
o Characteristics of the People
o Public Opinion – attitudes of the majority of the people towards matters of
public policy.
o Education – based on literacy rate
Biographical Intelligence – deals with individual personalities who have actual
possession of power
Armed Forces Intelligence – deals with the armed forces of the Nation.
o Position of the Armed Forces – constitutional and legal basis of its creation
and actual role.
o Organization and structure and territorial disposition
o Military Manpower Recruitment
o Order of Battle- arrangement of military troops for battle.
Geographical Intelligence – deals with the natural as well as man made
features of the physical environment of man considered from the point in view of
military operations.
o Location – military and economic importance
o Size – measurement of which a nation can exchange space or time during
war.
o Shape
o Weather and Climate
Scientific Intelligence – deals with the progress of the research and
development as it affects the economic and military potential of a nation.

B. LINE INTELLIGENCE - required by the commander to provide for planning and


conducting tactical and administrative operation in a counter insurgency.

Factors To Consider In Line Intelligence:


People - living condition, sources of income, education of the people, government
livelihood projects.
Weather - visibility, cloudy, temperature, wind, precipitation.
Enemy - location, strength, disposition, tactical capabilities, enemy vulnerabilities.
Terrain - relief and drainage system, vegetation, surface materials, man made
features.

C. Counter - Intelligence- phase of intelligence covering the activity devoted in destroying


the effectiveness of hostile foreign activities and to the protection of information against
espionage, subversion, and sabotage.

Objectives:
a. Prevent enemy sabotage, espionage and Activities:
subversion. a. Protection of information against
b. Security of command. espionage.
c. Denies knowledge to the enemy b. Protects the personnel against subversion.
d. Aids the activities in achieving surprises. c. Protection of installation and materials
e. Detect possible treason, sedition within the against sabotage.
military and the police forces.

Types Of Counter Intelligence:

PREPARED BY : JAMES E. DALIS


a. Active Counter Measures - those measures which seeks active block to the enemy’s
effort to gain information or engaged in espionage, subversion, or sabotage.
b. Passive Counter Measures - Those measures which seek to conceal information from
the enemy.

Categories Of Counter-Intelligence Operation:


a. Military Security - encompasses the measures taken by a command to protect itself
against espionage, enemy operation, sabotage, subversion and surprise.
b. Port Frontier and Travel Security - The application of both police and civil security
measures for counter intelligence control at points of departure, international borders or
boundaries, and includes security control of seaports and frontiers.
c. Civil Security - encompasses active and passive counter intelligence measures affecting
civilians permanently or temporarily residing in an area under police or military jurisdiction.
d. Censorship - Control and examination of communications to prevent the transmission of
information that may fall into the hands of the enemy, and to collect and disseminate
information of intelligence value.
National - Total control and examination of the entire populace.
Police and Military - Control and examination of communications to and from
personnel under the jurisdiction of the police or the arm forces.
Civil - Control and examination of communications of the natives and civilian populace.
Field Press - Is the security review of news materials and other information.
Prisoner of War - Control and examination of communications to and from prisoners of
war and civilian internees.

e. Special Operation - Employment of active counter intelligence techniques and


procedures in the conduct of clandestine or covert operations against hostile and enemy
intelligence organizations and agencies. It covers counter terrorism, counter sabotage,
espionage and subversion.

Types of Counter -Intelligence Measures


a. Denial Measures - preventing the -personnel security
enemy from getting some necessary -documentary security
information from your organization. -passwords and countersigns
-secrecy discipline -reconnaissance
-document security c. Deception Measures
-camouflage and concealment -ruse
-police or military censorship -dodge
-counter reconnaissance -dummy position
b. Detection Measures -fabrication of information

Counter Intelligence Measures to Protect Information


Security - it is the protection of classified information, materials and equipment from
disclosure to unauthorized person and the protection of defense installations and equipment
from damages or destruction by sabotage.

Security Measures:
a. Active Measures - to actively block the enemy effort to gain information.
b. Passive Control Measures - to conceal information from the enemy.
c. Deception Measures - to deceive the enemy.

Security Concepts:
1. Weakest link is the personnel
2. Training is important to make security personnel conscious and realize the value of
security
3. Training is necessary for the practice of “need to know principle”.

Security Responsibilities
Command Responsibility - training the individual on the importance of security.
Individual Responsibility - is to know security measures
Supervisor’s Responsibility - to motivate each individual in security procedures.

Security Survey And Inspection

PREPARED BY : JAMES E. DALIS


Survey - determine the unforeseen defect of a unit and make recommendations for its
correction and improvement.
Inspection - determine if the recommendation or the survey was made, to determine the
degree of compliance with the established security policies and procedures.

Counter Intelligence Security Measures


A. Physical Security - a system of barrier placed between the potential intruder and the
material to be protected.
Physical Security Features:
1. Natural Barriers
2. Structural Barriers
3. Human Barriers
4. Animal Barriers
5. Energy Barriers

B. Personnel Security - includes all security measures designed to prevent unsuitable


individuals of doubtful loyalty to the Philippine Government from gaining access to classified
matters of security facilities and to prevent the appointment, employment or retention as
employees of such individuals.

Types Of Security Clearance


1. Interim - is a temporary clearance given to an individual while PBI is still on going.
2. Final Clearance - is given to an individual whose PBI is completed.

Three Classification Of Sensitive Positions


1. Non-Critical Sensitive Position - position that provides access to secret materials and that
involving command information program.
2. Critical Sensitive Position - position having access to top secret materials, and those
involving investigative duties.
3. Ultra Sensitive Position - includes those having a broad and detailed access to top secret
materials and position involving in major decisions.

Personnel Security Investigation


 it is an inquiry to the background of an individual particularly with respect to his
character, loyalty, integrity and discretion.

4 Types of Personnel Security Investigation


a. Local Agency Check - A check of appropriate Police records covering all locations where
subject has resided, been employed, or attended school for six months or more..
b. National Agency Check - A check of appropriate criminal history records covering all
locations where; references developed during the investigation.
c. Partial Background Investigation - is the process of looking up and compiling
employment history, criminal records, commercial records, and financial records of
an individual or an organization.
d. Complete Background Investigation

Security Investigation and Clearance of Personnel


Definitions of Terms:
Character - a trait or sum traits which serves as an index to the essential of distinctive
nature of a person.
Derogatory Information - information which reflects unfavorable on the character,
integrity, or reliability of an individual.
Discretion - ability or tendency to act or choose with prudence the habit of wise
judgement.
Loyalty - faithful and true allegiance to the Philippine government and its constitution.
Moral - principle or standard of conduct of an individual, his ethical judgement in human
relation and respect to superior.
Moral Turpitude - acts contrary to justice, honesty or modesty or good moral of a person.
National Security - condition under which the nation can pursue its national objective
without interference.

PREPARED BY : JAMES E. DALIS


Security Risk - any person whose character, activities or circumstances in life might
place him in a position where willingly or unwillingly would compromise the security of
classified matters.

C. Operation Security - measures taken in conducting operations or activities in a secure


and efficient manner.
Two Types Of Operational Security
1. Compromise
2. Human Elements
Operational Security Methods:
1. Compartmentation
2. Cover
3. Communication
4. Cut-out Devices

D. Communication Security - the protection resulting to all measures designed to deny


unauthorized persons access to information of value which might be derived from the
possession and study of telecommunications; or to mislead unauthorized person in their
interpretation of the result of such a study.

Definition of Terms:
Communication Intelligence - information collected thru a successful interception of the
enemies messages or communication system by means of crypto-analysis.
Cryptography - science of encoding information in the form of codes and ciphers
- art of writing in or deciphering writings
-methods of rendering pain text intelligible and recovering intelligence
text into plain text.
Cryptology - art of secret writing.
Cryptograph - to convert the plain text pf messages into cryptogram.
Decryptograph - to reconvert cryptogram into its equivalent plain text.
Cryptogram - encrypted message, written in unintelligible text of language which implies
or convey hidden message.
Cryptographer - Person who writes in or deciphers secret writing.
Codes - is a system in which group of symbols representing a unit on a plain text with
varying length; set of signals representing letters or numerals used in sending
messages or system of sending secret writings in which letters and figures are arbitrarily
given certain meaning.
Ciphers - is a system in which individual letters of a message are represented by other
letters rather than by complete words, phrases, or sentences.
Encipher - conversion of plain text to ciphers.
Decipher - reconvert to cipher into plain text message.
Encode - convert to plain text message to coded form.
Decode - reconvert coded form into plain text messages.

E. Document Security - handling and use of classified information and documents.


Document - any recorded information regardless of its physical form or characteristics
and include but not the following:
1. Written matters whether handwritten, printed or typed.
2. All painted, drawn or engraved matter;
3. All sound and voice recording;
4. All printed photographs, and exposed or printed films;
5. All reproduction of the foregoing for whatever purpose.

Four Classification Of Documents


1. Top Secret (Green Color Code) - Information and material which, the unauthorized
disclosure of it would cause exceptionally grave damage to the nation politically,
economically, and militarily.
2. Secret (Red Color Code) - unauthorized disclosure of this information will endangers the
national security and causes serious injury to the interest and prestige of the nation or of the
government activity or of great advantage to foreign nation.
3. Confidential(Blue Color Code) - unauthorized disclosure of this information would be
prejudicial to the interest and prestige of the national or government activity; or would cause

PREPARED BY : JAMES E. DALIS


administrative embarrassment of unwanted injury to and or would be advantage to foreign
nation.
4. Restricted (White, Transparent Or No Color Code) - Information which requires special
protection than those to be determined to be confidential, secret and top secret, yet prior to
release, it requires clearance from the record’s custodian.

Handling Classified Security Information


1. Classify - refers to the assigning of information in any form or material one of the four
security classification categories after determination has been made that the information
requires the security protection as provided for in the regulation.
2. Classified Matter - any information and material in any form or any nature, the
safeguarding of which, is necessary in the interest of national security and which is classified
for such purpose by the responsible classifying authority.
3. Compromise - takes place through loss of security which results from unauthorized
person obtaining knowledge of classified matters.
4. Compartmentation - refers to the grant of access to classified matters only to properly
cleared persons.
5. “Need to Know” - dissemination of classified matters be limited strictly to those persons
whose official military or government duties requires knowledge or possession thereof.
6. Damage to National Security - refers to the prejudice, embarrassment or injury to the
Republic of the Philippines from any act or omission.
7. Declassify - the act of removing the security classification.
8. Reclassify or Regrading - refers to the act of changing the assigned classification of
classified matters.
9. Upgrading - refers to the act of assigning the matter a higher classification that that
previously assigned to it.

Factors In Creating Intelligence Unit


1. Size of the community
2. Extent of organized crime in the community
3. Probable frequency and seriousness of the activity of civil disturbance
4. Breaches on integrity on the part of any member of the unit.

INTELLIGENCE CYCLE

MISSION

Information
 raw data or unevaluated material of every description derived from observation,
communication, report, rumors, imagination and other sources from which intelligence is
produced.
 any knowledge, data, news, opinion, or the like transmitted from a person to another.
Intelligence Information - any information gathered or receive which is intelligence interest.
Information Net - a control group of person to worked though the direction of the agent handler.
The informants principal or cut-outs supply the agent handler directly or indirectly of intelligence
information.
End Product - result after evaluation, analysis, interpretation and integration of raw materials.

PREPARED BY : JAMES E. DALIS


Activity - the product of the knowledge after collection, processing, dissemination and use.
Organization - refers to the intelligence personnel or the intelligence unit.

A. DIRECTION AND COLLECTION EFFORTS - In this phase, the Intelligence Staff Officer
or unit Commander determines the required or important information relevant to mission.
1. Determination of requirement
2. Determination of the essential elements of information.
3. Establishments of priorities.

Considerations in Directing and Collection Efforts


1. Mission
2. Area of operation
3. Sources of information available and the capabilities and limitation of available
agencies.
4. Steps in planning and executing the collection effort.
5. Tactics, organization and characteristics of the enemy to include Intel and
surveillance capabilities.
6. Characteristics of the legal populace including loyalties, religions and local
customs.

B. COLLECTING THE INFORMATION - In this phase, the collecting agency determines


what specific information is to be collected by whom and from whom. After the collecting
activity is carried out, the collected information is then submitted for processing.

Collection Planning - the continuous process which ultimately coordinate and integrate
the efforts of all collecting agencies.

Steps In Compromising Collection Plan


a. Planning The Collection Effort.
b. Determination of the intelligence priorities.
c. Selection of Collecting Activities.
d. Supervision of the collection activities.

Classifications Of Sources Of Information


Open Sources – 99% of the information collected are coming from open sources or
obtained from Overt Operation.
Close Sources – Only 1% of information are obtained from Covert Operation
Close/Covert Method/clandestine operation.
Two Basic Collection Strategies
1. Resource Integration
2. Agent mixed redundancy
Trade Crafts Or Instruments Used In The Collection
1. Photography
2. Surveillance
3. Elicitation
4. Interview or interrogation
5. Personnel Security Investigation
6. Sound Equipment

Who Are Tasked To Collect Information Link Diagram


1. Intelligence Officer/Agents 1. Personality
2. Civilian Agents 2. Organization
3. Assets 3. Resource/Equipment
4. Concerned Citizen 4. Activity

Criteria Of Collecting Agencies/Units


1. Capability
2. Balance/Suitability
3. Multiplicity
a. Supervise collection efforts
b. Use tools or technique in collection

PREPARED BY : JAMES E. DALIS


c. Ensure timely collection

Types Of Agent Used In Collecting Of Information


oAgent Of Influence- Agent who uses authority to gain information
oAgent In Place - Agent who has been recruited within a highly sensitive target
oPenetration Agent - Agent who have reached to the enemy, gather information and
able to get back without being caught.
oExpendable Agent - Agent who leaks false information to the enemy.
oDouble Agent - An enemy agent, who has been taken into custody, turned around and
sent back where he came from as an agent of his captors.

Factors In Choosing Collection Agents


o Capability – agents placement or access to other target
o Multiplicity – more agents
o Balance – number of agents needed in operation

Processing The Collected Information


Recording – is the reduction of information into writing or some other form of graphical
representation and the arranging of this information into groups related items.
Evaluation – is the determination of the pertinence of the information to the operation,
reliability of the source of or agency and the accuracy of the information.
Evaluation To Determine:
o Pertinence – does it holds some value to current operation, is it needed
immediately
o Reliability – judging the source of information or agency
o Credibility – truth of information
Judging Credibility
o It is possible for the reported fact or event to have taken place.
o Is the report consistent within itself?
o Is the report confirmed or corroborated by information from different sources or
agencies.
o If the report does not agree with information from other sources which one is
more likely to be true

Informants And Informer


Informants - Any person who hand over information to the agents which is relevant to
the subject. The informant may openly give the information clandestinely and choose to
remain anonymous.
Informer - An individual who give information for a price or a reward.

Types Of Informants
Criminal Informant - one who gives information to the police pertaining to the
underworld about organized crimes with understanding that his identity will be protected
and for a certain consideration.
Confidential Informant - provides the investigator with confidential information
concerning a past or projected crime and and does not want to be known as the source
of the information.
Voluntary Informant - one who knowingly and voluntarily gives information.
Special Informant - on who give information concerning specialized cases only and is
regarded special treatment by the operatives.
Accidental Informant - a person who casually imparts information to an officer with no
intention of providing subsequent information.
Rival-elimination informant - his purpose of proving information is to eliminate rivel or
competition.
Anonymous Informant - Unidentified or unknown informants
False Informant - reveals information of no consequences, value or stuff connected
within thin air.
Frightened Informant - weakest link in criminal chain, motivated by anxiety.
Self-aggrandizing Informant - moves around the center of criminals delight in
surprising the police about bits of information.
Mercenary Informant - Information for sale needed something for exchange of
information.

PREPARED BY : JAMES E. DALIS


Double Crosser Informant - He wants to get more information from the police more
than he gives.
Women Informant- Most dangerous informant
Legitimate Informant - operators of business desire to give information for legitimate
reasons.
Recruited Informant
Different Categories of Recruited Informant
1. Spontaneous Informant or Automatic Informant
2. Ordinarily run of the will informant.
3. Special Employee

Motives Of Informants
o Vanity – conceited act/character of the criminal resulting to self - betrayal or tantamount
to guilt, gaining favorable attention and importance by the police.
o Civic-Mindedness – sense of duty and obligation to assist the police.
o Fear – A person under an illusion of oppression by enemies or of other impending
danger.
o Repentance – One who has a change of heart and wishes to report a crime that is
preying on his conscience.
o Gratitude Or Gain – An expression of appreciation to obtain a privilege or an interest in
the welfare of his family during his detention.
o Revenge – To settle a grudge due to settle a previous injury

Four Phases In Informant Recruitment Factors to consider in informant


(SIAT) recruitment
1. SELECTION 1. Access to top criminal organization
2. INVESTIGATION 2. Sex
3. APPROACH 3. Health
4. TESTING 4. Built
5. Ability
6. Age
7. Education
8. Personality

Methods Of Collecting Infromation


Covert method - Collecting from open sources by means of research or that information
which are public knowledge.
Overt method - discreet manner or secret action pf gathering information.

Purpose of covert and overt intelligence


a. Check condition of the community relating to crime.
b. Determine through counter intelligence the applied matters pertaining to personnel and
documents
c. Determine the follow-up leads and help in the solution of individual criminal cases.
d. Identify criminal elements and other law breakers as well as associates.
e. Assist in the arrest of wanted criminals.
f. Check on the quality and effectiveness of the operation of police forces.
g. Check on the security conditions of police forces, funds, equipments and materials.
h. Help in crime control and prevention
i. Serve as a tool of management for planning and organizational improvement purposes.

Overt Or Open Methods Of Gathering Information


1. Interview - casual questioning of the person who is not under the control of the
interviewer, also considered as method of obtaining information from the subject who is
aware that he is giving information although he maybe ignorant of the true purpose.
2. Interrogation - skillful questioning of the subject or person who is not cooperating. The
subject is aware of the questioners interest and is under control.
3. Instrumentation - application of instruments and methods of physical sciences to detect
or determine the participation of the subjects.
4. Research - investigation to get facts through the files or other agencies or company
records.

PREPARED BY : JAMES E. DALIS


5. Investigation - collection of facts or knowledge from other sources, either from regular
sources, public spirited citizens, informants or informers.
6. Debriefing - subject is cooperative or under some degree of control and is aware of the
intelligence interest.

Kinds Of Covert Operation


Elicitation - technique of acquiring information or intelligence of operational value
through conversation from a person who is not aware of the specific purpose of the
conversation.
Nature Of Elicitation
a. Subject is not aware of the reason.
b. Elicitor have little or no control over the subject.
c. Elicited information usually consists of isolated fragmented information.
Purpose:
a. Acquire information which is unavailable through other channel.
b. Obtain information which although unclassified is not public known.
c. Provide operational information and background data on potential source of
information.

Devices in the Conduct of Elicitation


A. Approach- process of setting people to start talking.
Types of Approach
1. Flattery - people are susceptible to praise.
a. Teacher- Pupil approach
b. Soul approach
c. Good Samaritan approach
d. Idol approach
2. Provocative Approach
a. Teaser Bait Approach
b. Man from Missouri Approach
c. Joe Blow Approach
d. National Pride Approach
e. Partial Disagreement Approach

B. Probe - process to keep person talking incessantly.


Types of Probe:
1. Competition Probe
2. Clarity Probe
3. High Pressure Probe
4. Hypothetical Probe

Observation And Description


Observation - is the complete and accurate awareness by an individual of his surroundings
and encompasses the use of all major senses to register and recognized its operational on
intelligence significance.
Description - the factual reporting of what is observed or it is the actual and factual reporting
of one’s observation of the reported sensory experience recounted by another.
Psychologist estimate that approximately:
a. 85% of our knowledge is gathered through sight.
b. 13% from hearing.
c. 2% from the other three senses.

3 Psychological Processes for Accurate Observation


a. Attention - consists of the psychological process involve in becoming aware of a fact.
Types of Attention
1. Voluntary - reliable but not nearly dependable as habitual.
2. Involuntary - no control and it requires no effort.
3. Habitual - distinguished by little effort with a maximum of control.
b. Perception - consists of psychological process involve in understanding this fact of
awareness.
Factors involve in Perception

PREPARED BY : JAMES E. DALIS


1. Mental Capacity - enough intelligence to understand the meaning of a fact
before he can perceive it.
2. Educational background
3. Empirical Background
4. Occupational Background
c. Report
Used in two senses:
1. Psychological process involved in identifying by name in one’s own mind some
facts that has been perceived/identified;
2. Narrate of what you perceived or identified.
Factors Governing Report:
1. Vocabulary - words which and individual finds to express himself;
2. Time Log - accurate reporting depends entirely on timeliness. Delay in
reporting results in unconscious omission of detail.
3. Recurrence of Similar incidents. - for reference.

Memory - it has a bearing in the evaluation of information. This refers to a complex group of
mental functions and states of awareness that are concerned with the storing of experience and
its reappearance in consciousness of its utilization in subsequent activity.
Types of Memory: Functioning of Memory: How recollection may be
a. Sensory a. Storing information Brought About:
b. Intellectual b. Recollection a. Recall
b. Recognition

Casing (Reconnaissance Or Recce) - surveillance of a place, building or area to determine its


suitability for intelligence use or its vulnerability to intelligence operation.
Sketching - consist of putting ideas in an accurate pictorial form. It is a means of describing an
object or an area to satisfy a particular need.
Methods of sketching:
a. On the spot - applied when security conditions on the place of observation allows the
observer to sketch or draw the object on the area at anytime.
b. Memory Method - applied when security conditions on the area is in such a way that
the observer can only pass by or linger for a very short time of period.
c. Semi-memory Method - applied in area where security condition is very strict but does
not prevent the observer in making noted of what was observed.
Cover
 It refers to the changing, forging or falsifying agent’s real personality including but not limited
to things, location, job, and others that will be used in undercover assignment
 is any device utilized by an individual, organization or group to ensure that no one who do
not have the right will not be able to be aware of the real purpose or intent of the mission.
Photography - process of producing image on a sensitized material by variant form or radiant
energy.
Order Of Battle - summary recording of ones specific criminal activities with entries covering
matters with intelligence and tactical interest, enumeration of personalities involve in the
organization’s movement and activities.
Provocation - action taken in order to incite reaction from a known adversary or to observe
reactions of adversaries.
Steps in Conducting Provocation:
1. Inform the adversary.
2. Motivate to react.
3. Ask about your intent.
Purpose of Provocation
1. Reveal true status of an assumed adversary.
2. Make a known adversary takes self damaging action.

Portraite Parle - a means of using descriptive terms in relation to the personal features of
individual and it can be briefly describe as a word description or spoken pictures.
Clandestine Operation - secret action undertaken by an intelligence or counter intelligence
agent in behalf of an organization, the government and other friendly sources.
Factors Necessary to Clandestine Operation:
a. Desire to do something.
b. Fact that it can be done.

PREPARED BY : JAMES E. DALIS


c. No other means of obtaining timely and accurate information requirements.
Two Goals of Clandestine Operation
a. Collect information about hostile opposition activities.
b. Penetrate the organization in order to determine its operational adversary director, its
plans and its objective against the sponsor.

Elements Of Clandestine Operation


Sponsor - directs the organization conducting the clandestine activity.
Target Or Rabbit - Person, place or things against which the clandestine activity is to be
conducted.
Agent - It refers to a person who conducts the clandestine Operations to include Principal
Agents, Action Agents, and Support Agents.
A. Principal Agent - Leader or management Agent in clandestine operation usually
undertaken by the case officer.
B. Action Agent - The who one who conducts the clandestine Operation that
includes:
a.Espionage Agent - Agent who clandestinely procure or collect information.
Types of Espionage Agents
 Access Agent
 Penetration Agent
 Legal Traveler
b. Propagandist - Agents who meld the attitudes, opinions, and actions of an
individual group or nation.
c.Saboteur- Agents who undertakes positive actions against an unfriendly
power, resulting in the loss of use temporarily or permanently of an article or others.
d. Guerilla - Agent who is a member of paramilitary group organized to harass
the enemy in a hot war situation.
e. Strong Arm - Agent who is made to provide special protection during
dangerous phase of clandestine operations.
f. Provocateur- Agent who induces an opponent to act to his own detriment by
discrediting himself or by revealing his true
g.Cover Action Agent - fully recruited agent who is in a senior position usually
within the government and is unable to exert influence from foreign government
upon the direction of the sponsor.
C. Support Agent - Agent who is engaged in activities which supports the clandestine
operations and or the action agent in his operations that includes the following:
Surveillant- Agent who observes persons and places of operations of interest.
Investigator- Agent who undertake to procure information or things of clandestine
operation.
Procurer Of Funds - Agent who obtain money when needed for operational use.
Safe House Keeper - Agents who manages and maintains a safe house for
clandestine operations like meetings, safe heavens, training, briefing, and
debriefing.
Communication Agent - Agent who is detailed as securing of clandestine
communications.
Manager Of Storage Area - An agent who the storage, distribution or
transportation of operational supplies.

Basic Agent Management


a. Agent handler must be in charge of the operation.
b. Act insures the agent adherence.
c. Good rapport must be established between the agent handler and the agent.
d. Agent handler must constantly reinforce the agent motivation.

Control - authority to direct agent to carry out task or the requirement in behalf of the clandestine
organization in acceptable manner.
Two Categories Of Control
1. Positive Control - characterized by professionalism and rapport.
a. Agent motivation
b. Psychological control

2. Negative Cpntrol -black mail and threat.

PREPARED BY : JAMES E. DALIS


a. Disciplinary Action- includes verbal reprimand for poor performance or insecure
actions with holding certain materials, reward, reduction of agents salary or extreme
situation that threat of terminating personal relationship.
b. Escrow Account - control of an agent by putting his salary in a bank to be
withdrawn only after fulfillment of the conditions.

Factors to Consider in the Selection of Action Agents


A. Placement - location of prospective agent with respect to the target.
B. Access - the capability or the ability of the prospective agent to obtain the desired
information for intelligence organization or to perform the intelligence collection mission in
the area.
a. Primary Access - it has the direct access to the desired information.
b. Secondary Access - access to the desired information through principal source where
the latter has the direct access.
c. Outside Access - agent is employed outside the target and merely monitors
information from a third person who is monitoring information in the area.

General Rule that a handler of Civilian agent or Informant must follow:


“NEVER, NEVER LOVE YOUR AGENT”

Tactical Interrogation - It is a process or method of obtaining information from a captured


enemy who is reluctant to divulge information.

Definition Of Terms:
Interrogation - Systematic questioning to elicit Screening - Initial examination of an
information in the minimum of time. interrogee to determine the extent of his
Interrogator - Person who does the knowledge of person, places, things or events
questioning. in which we are interested.
Interrogee - Any person who is subjected to Formal Interrogation - the systematic to
the interrogation process in any of its forms exploit to an appropriate depth that the area of
and phases. interrogges knowledge which has been
Suspect - person believed to be associated identified in the screening process.
with prohibited activity. Debriefing - interrogation of a friendly
Source - person who for any question submits interrogee who has information at the
information of intelligence interest usually on direction of or under the control of the friendly
a voluntary basis. intelligence service.
Witness - person who has direct knowledge of Interview - Similar to a debriefing although it is
facts concerning an event of activity. less formal and the interrogee is not
Provocateur - individual from the enemy necessarily under the control employment of
forces who is deliberately introduced in our the respective service.
custody with a specific mission of causing Interrogation Report - oral or written
some unfavorable action or reaction on our statement of information by the questioning of
part. an interrogee.

Forms of Interrogation: Types of Interrogation: Phases Of Interrogation


A. Direct A. Screening a. Planning an Preparation.
B. Indirect B. Formal Interrogation b. Approach
C. Debriefing c. Questioning
D. Interview d. Termination
E. Interrogation of Lay e. Recording
Personnel f. Reporting
F. Technician Interrogation

Interrogation Techniques
1. Open Technique
2. Common Interest
3. Record File
4. Exasperation

PREPARED BY : JAMES E. DALIS


5. Opposite Personality Technique
6. Egotist Technique
7. Silent Technique
8. Question Barrage Technique

C. PROCESSING THE COLLECTED INFORMATION -defined as the step in the Intelligence Cycle
whereby information becomes intelligence. Processing collected information involves 4 stages, to with:
1. Recording - it is the reproduction of information through writing or some other form of
geographical representation and the arranging of this information into groups o related items.
Aids in Recording:
a. Intelligence Journal
b. Intelligence files
c. Situational Map
d. Intelligence workbook

2. Interpretation - determines the significance of information and probable meaning of the


evaluated information.
3. Evaluation - determination of the pertinence of the information to the operation reliability of the
source of or agency and the accuracy of the information.

Evaluation to Determine:
A. Pertinence
a. It deals with the enemy or its area of operation.
b. If it is needed immediately
c. If it is of present or future potential value.
B. Reliability - dependable, the agency that controls the source is responsible for
determining the reliability .
C. Credibility/Accuracy - refers to probable truth of information.
4. Analysis - the determination of significance of information, relative to the information, and
intelligence already known and drawing deduction about probable meaning of the evaluated
information.
3 Steps in Analysis
1. Assessment - is the shifting and sorting of evaluated information with the respect to the
mission.
2. Deduction - concerns in finding out the meaning of information as to the area of operation
or enemy.
3. Integration - it is the combination of the elements stated in assessment with other known
information of intelligence to form a logical feature or hypothesis for enemy activities or
information of the operational area and characteristics of the mission of the command.

D. DISSEMINATION AND USE - this is the final phase of the cycle wherein the processed information
or intelligence will be disseminated by means of report, annexes, briefings, estimates and other forms to
the selected agency, unit or command to effect or implement the mission.

RELIABILITY OF ACCURACY OF SOURCE OF THE INFORMATION


INFORMATION INFORMATION

CODE: CUFNUR CODE: CPPDIT


A. Completely Reliable 1. Confirmed By Other Sources S. Intercepted
T. Direct Observation by a commander
or Unit
B. Usually Reliable 2. Probably True U. Report by a penetration or resident
agent
C. Fairly Reliable 3. Possibly True V. Report by an AFP trooper or PNP
personnel in operation
D. Not Usually Reliable 4. Doubtfully True W. Interrogation of a captured enemy
or agent
E. Unreliable 5. Improbable true X. Observation by a government or

PREPARED BY : JAMES E. DALIS


civilian employee or official
F. Reliability Cannot Be 6. Truth Cannot Be Judged Y. Observation by a member of
Judged populace
Z. Document
ary

Types Of Media Employed In The Dissemination Of Intelligence:


1. Informal means - intelligence may be disseminated by means and it usually assumes the form of
personal consultation.
2. Oral presentation - usually in the form of a briefing, a lecture or a group conference or it may be
personal presentation to higher authority.
3. Memoranda - usually and informal memorandum to the researcher’s superior or to other
interested agencies.
4. Assigned/ Required projects or reports - these are usually a requirement for intelligence by the
consumer.
5. Periodic Publications - these media dissemination are printed and intended for wide publication.
They contain data and discussions on relatively wide fields of intelligence and are designed
medium.
6. Graphic Presentation - maps, graphs, charts and photographs.
7. Cables - spot intelligence is sometimes transmitted to representative overseas by cable in order
to aide them in their own report or in whatever mission they are performing.
8. Films - the use of short motion picture films for the dissemination of intelligence.

Surveillance And Casing


Casing - It is the careful inspection of a place to determine its suitability for a particular operational
purpose.
Purpose:
1. It aids in the planning and operation by providing needed information.
2. It assists the agent to instill confidence in his agent during briefing phase be being able to
speak knowingly about the area of operation.
3. Considered a security measures because it offers some degree of protection for those
operating in an area unfamiliar to the intelligence personnel.

General Principle:
1. Know the best route to get there.
2. Know how to conduct yourself without attracting attention.
3. Know what security hazard are in the area and how can be avoided or minimized.
4. Know the best route to extricate from the area of casing.

Types/Forms Of Casing
1. Surveillance - to gather general information over a wide area and it takes a longer time frame.
2. Reconnaissance - gather specific or detailed information at a particular time and place.
Methods Of Casing
a. Personal Reconnaissance
b. Map Reconnaissance
c. Research
d. Prior Information
e. Hearsay
Information Desired In Casing
1. Area condition and habit.
2. Active opposition
3. Disposal plan
4. Escape and Evasion
Fundamental Principles of Casing
1. Gain contact as soon as possible and maintain continuously.
2. Maneuver freely and conformity with operations.
3. Fight only when necessary.
4. Report all items of information.
5. Developed the situation.
Steps/guide in the conduct of casing.
1. Preparation of general location map.
2. Sketch of the adjoining establishment and prominent features.

PREPARED BY : JAMES E. DALIS


3. Specific sketch plan of floor plan of main target and its description.
4. Detailed features of inner portion of target and its description.
5. Photographs of casing target.

Surveillance – is the covert, discreet observation of people and places for the purpose of obtaining
information concerning the identities or activities of subjects.
Objectives of Surveillance
oTo identify persons involved in certain activities
oTo secure basis for securing search warrant
oProvide background information for undercover assignment.
oLocate addresses, or places frequented by subject as well as his associates.
oTo provide protection.
oTo obtain detailed information about the nature, scope of subjects activities
oTo check on source of information
oTo develop leads to vital information
oTo confirm or deny allegations

Terms To Remember In Surveillance


Surveillant – is the plainclothes investigator assigned to make the observation?
Subject/Rabbit – is who or what is observed. It can be a person, place, property, and vehicle,
group of people, organization or object.
Pre-Surveillance Conference (Breifing) - conference held among the team members, the police
intelligence unit before a surveillance is conducted.
Stake Out Or Plant - observation of a place or areas from a fixed point.
Tailing Or Shadowing - observation of a person’s movement.
Undercover Man - person trained to observe and penetrate certain organization suspected of
illegal activities and later reports the observation and information so that proper operational action
can be made.
Area Target Study – refers to area of operation of surveillance activities
Log – chronological records of activities that took place in the establishment under surveillance.
Safe House - Refers to a place where agents meet each other for purposes of debriefing and
reporting.
Liaison Program - assignment of trained intelligence to other agencies in order to obtain
information of police intelligence value.
Live Drop- Refers to a place where agents or informants leave their messages to the other Agents.
Finger Man - individual who can possibly point the subject.
Put The Finger On - identify the subject by pointing him out in person or on a photograph.
Put To Bed - the subject under surveillance returns to quarter and apparently retire for the night.
Decoy- A person or object used by the subject in attempt to elude surveillance.
Convoy - An associate of the subject who follows him to detect surveillance.
Contact - Any person whom the subjects picks or deals with while he is under observation and
identifies the observer
Made – when subject under surveillance becomes aware that he is under observation and identifies
the observer also known as “ BURNT OUT”
Lost – when the surveillant does not know the whereabouts of his subject or the subject had eluded
the surveillance.

Classification of Surveillance According to Intensity and Sensitivity:


A. Discreet
B. Close
C. Loose

Classification of Surveillance according to methods:


Stationary Surveillance – also referred to as fixed and stakeout surveillance – is used when
you know or suspect that a person is at or will come to a known location when you suspect that
stolen goods are to be dropped or when informants have told you that a crime is going to be
committed.
Factors to consider in Fix Surveillance:
1. Determine base operation.
2. Maintain a thorough, cautious reconnaissance of the area.
3. Obtain necessary equipment.
4. Assignment of specific duties to each member of the team.

PREPARED BY : JAMES E. DALIS


5. Prepare alternative course of action
6. Provide relief teams.
7. Arrange communication signals
8. Arrange for inconspicuous arrival and departure of equipment as well as personnel of the
base of the operation.

Moving Surveillance Or Shadowing Or Tailing – simply the act of following a person.


Technical Surveillance – by the use of communications and electronics gadgets, system and
equipment.
a. Bugging - The use of an equipment or tool to listen and record discreetly conversations of other
people.
b. Wire Tapping - A method of collecting information thru interception of telephone conversation.

Forms Of Surveillance
o Loose Tail – employed where a general impression of the subject’s habits and associates is
required.
o Rough Shadowing – employed without special precautions, the subject maybe aware of the
surveillance; employed also when the subject is a material witness and must be protected
from harm or other undesirable influences.
o Close Tail – extreme precautions are taken against losing the subject is employed where
constant surveillance is necessary.

Requirement For Surveillance


A. Area and target Study
B. Surveillance Plan
C. Selection of Personnel
a. Inconspicuous physical character
b. Ability to remain unnoticed
c. Resourcefulness
d. Patience and physical stamina
e. Keen sensory perception and retentive memory
f. Driving ability
g. Area Knowledge
h. Security Consciousness

Dont’s in Surveillance
1. Window shopping
2. Use of convoys
3. Stopping immediately in blind corners
4. Getting out immediately
5. Retracing
6. Entering mobile housing

Kinds Of Surveillance
Surveillance Of Place (Stake-Out)
Two types of Stake out
1. Using a room in a nearby house or business establishment and remaining undercover.
2. Remaining outdoor and posing a person who would normally conduct his business in such
area.
Equipment Used in Surveillance of a Place
1. Picture camera with telephoto lens.
2. Binoculars.
3. Tape recording apparatus
4. Wiretapping and bugging devices.
5. Other recording instruments.

Shadowing Or Tailing:
a. One man shadow - this is most common because it involves the use of the number of men but it
is extremely difficult and should be avoided. The shadower will follow subject and make notes
authentically of all that the subject does.

PREPARED BY : JAMES E. DALIS


b. Two man shadow - It permits immediate change and the shadowers are less likely to be
recognized.
c. Three man shadow or ABC method - use of three officers reduces further the risk of losing the
subject and affords greater security against risk.

Other Surveillance Methods:


Leap Frog Method - used in attempting to locate the hide out of a suspect from a vantage point
without moving after the subject.
Open Shadow - method of surveillance that is used to good avantage in affecting the subject
psychologically.

Don’T In Shadowing:
a. Do not make abrupt or unnatural movements.
b. Do not make disguise that will attract attention.
c. Never stare at the subject.
d. Do not attempt to appear innocent when accosted by the subject.
e. Do not wear storybook disguise such as false whisker, artificial noses, simulated deformities and
the like.
f. Beware of bulging concealed weapon.
g. Maintain distance
h. Plan ahead
i. Be aware on changes of action.
j. Do not make notations or entries ostensibly.

Risk Constantly incurred by the shadower:


a. The risk of being recognized as a shadower by the subject.
b. Risk of being lost or eluded by the subject.
c. Test for tailing
d. The convoy

Automobile Surveillance:
1. Vehicle used must be non-descript, preferably rented vehicles since they can be change.
2. License plate must be anonymous.
3. Preferably three men should be in the vehicle, driver, person who watch the convoy, and lastly
the note taker.

Disguising The Car:


1. License plate - popular type of black color car should be used and care must be taken that the
license plates are not identified. This can be remedied by the following:
a. Use of security plates
b. Use of “colorum cars”
c. Borrowing cars from friends.
2. Appearance - various devices may be used to change the appearance of the car; placing and
removing stickers, windshield adornments, shifting headlight from dim to bright, re-arranging the
seats of occupants, changing the occupant’s clothes, changing or removing hats, changing the
number of occupants.

Cover And Undercover Operations


Cover - It refers to the changing, forging or falsifying agent’s real personality including but not
limited to things, location, job, and others that will be used in undercover assignment.
Cover Story – A biographical data through fictional that will portray the personality of the agent he
assumed, a scenario to cover the operation.
Cover Support – An agent assigned in target areas with the primary mission of supporting the
cover story.

Types Of Cover
oArtificial- altering the background that will correspond to the operation
oMultiple- Includes different cover
oNatural- Actual or True Background.
oMultiple cover

Hazzards To Cover

PREPARED BY : JAMES E. DALIS


1. Static or dormant opposition
2. Friendly or Unhostile active opposition.
3. Unfriendly or hostile opposition.

Precautions or Guidelines in Case Compromise


1. Mutual point of interest
2. Justification of presents
3. Previous and permanent address.
4. Efficiency of role.
5. Freedom from movement
6. Means of communication
7. Social and financial status
8. Optional alternate plan
9. Safe departure.

Organizational Cover - any account consisting of biographical data which when adopted by an
individual will assume that personality he wants to adopt.
Objectives of organizational cover
1. Camouflage and protect operational personnel and their activities.
2. To protect the installation on which clandestine activities are based.
Guidelines when Organizational Cover in Compromise
1. Make physical move or relocation.
2. Start new facility for the old operation and let it grow.
3. Use of new personnel.
4. Let old personnel remain in the building.
5. Build entirely new cover.
6. When files are relocated, use circuitous routes to avoid.
7. Be patient.

Undercover Operations- also referred to as “ROPING” Undercover is disguising one's own identity
or using an assumed identity for the purposes of gaining the trust of an individual or organization to learn
secret information or to gain the trust of targeted individuals in order to gain information or evidence.

Hazards Of Undercover Operations


o Reintegration Back Into Normal Duty - Agents work their own hours, they are removed from
direct supervisory monitoring and they can ignore the dress and etiquette rules. So the resettling
back into the normal police role requires the coming off of old habits, language and dress. After
working such free lifestyles, agents may have discipline problems or exhibit neurotic responses.
o Maintenance Of Identity - Living a double life in a new environment presents many problems.
Undercover work is one of the most stressful jobs an agent can undertake. The largest cause of
stress identified is the separation of an agent from friends, family and their normal environment.
This simple isolation can lead to depression and anxiety.

Uses And Types Of Undercover Assignment


o Residential Assignment - It is related to the neighbourhood of the subject, where the agent will
live as a new resident without making any suspicion. His mission is to make friends within its
neighbourhood and gather information regarding the subject and possibly getting closer to the
subject
o Social Assignment - The agent will gain access to the subject by going to the different hang out
places of the subject and gather information like knowing how to drink socially without getting
drunk.
o Work Assignment - The agent will be employed where the subject work to acquire information.
The agent must know his work and focus his Subn set and habit to his work assignment or
getting employed where the investigator can observe the activities of the subject at his place of
work.
o Subversive Organization - This is the most dangerous of all the undercover assignment; the
agent will join the organization of the subject itself he must know the ideologies of the group and
the actions while inside should conform to the organization to avoid any suspicion.
o Personal Contact Assignment – the investigator required to develop the friendship and trust of
the subject.

PREPARED BY : JAMES E. DALIS


o Multiple Assignment – The investigator is tasked to cover two (2) or more of the above specific
assignments simultaneously, it can produce extensive information with minimum expenses but
more prone to compromise.

Types According To Time Frame:


1. Long Range - operation can provide reliable, accurate and continuing access to information
which would not be otherwise attainable.
2. Short Range - the duration of short undercover activity may vary considerably from one time
interview to series of separate but related actions over an extended period of time.

Selection of Undercover Worker


1. Background - a good undercover man must be able to fit in the environment of his
assignment. He must be able to suit his speech and line of thinking to that of his associates.
2. Temperament - a calm, affable, enduring personality are required.
3. Intellect - the undercover agent must above all be intelligent. He should have a clear view of
the objectives of the mission and over all strategy that must be employed In its accomplishment.

Special Qualifications of Undercover Agent


1. Knowledge of the language.
2. Area background regarding events.
3. Knowledge about the custom and habits.
4. Physical appearance.

PREPARED BY : JAMES E. DALIS

You might also like