Fundamentals of Criminal Investigation

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

Crime Detection and

Investigation 1
Fundamentals of Criminal
Investigation with Police
Intelligence

1|Page
PART I: CRIMINAL INVESTIGATION
CRIMINAL
This refers to a person convicted of a crime by a final judgment.

INVESTIGATION
The term investigation comes from the Latin word “vestigare” which means: to track, trace or probe.

CRIMINAL INVESTIGATION
Criminal investigation seeks all facts associated with a crime to determine the truth: what happened and who is
responsible of a criminal incident.

Criminal investigation is also the collection and analysis of facts about persons, things and places, subject of a
crime to identify the guilty party, locate the whereabouts of the guilty party, and provide admissible evidences to establish
the guilt of parties involved in a crime

It also refers to the collection of facts to accomplish the threefold aim:


a. to identify the guilty party;
b. to locate the guilty party; and
c. to provide evidence of his guilt

• CRIMINAL INVESTIGATION AS AN ART = It deals with the identity and location of the offender and then proving
his guilt through a criminal proceeding. It is an art because it is not governed by rigid rules but based on intuition
and to a minor extent, by chance.

• CRIMINAL INVESTIGATION AS A SCIENCE = A systematic method of inquiry that apply scientific knowledge,
principles, and methodologies in order to discover, identify, collect, and process facts and evidence to promote
justice.

• CRIMINAL INVESTIGATION AS A PROCESS = it involves systematic process of identifying, collecting, preserving,


and evaluating data or raw facts to produce valuable information for the purpose of bringing a criminal offender to
justice. As a process, it is based on systematic plan.

ACCORDING TO DR. HANS GROSS it is governed by:


95% -Perspiration
3% - Inspiration
2% - Luck

Who is Criminal Investigator?

A public safety officer who is tasked to conduct the investigation of all criminal cases as provided for and embodied
under the Revised Penal Code/Criminal Laws and Special Laws which are criminal in nature. A well trained, disciplined and
experienced professional in the field of criminal investigation duties and responsibilities.

Primary job of Criminal Investigator

The primary job of the investigator is to discover whether or not an offense has been committed under the law, after
determining what specific offense has been committed, he must discover how it was committed, by whom, where it was
committed, when, why and how it was committed (Cardinal points of Investigation 5W’s and 1H).

SIX CARDINAL POINTS OF INVESTIGATION

WHAT specific offense? Nature of crime


WHERE crime was committed? Place or location
WHEN it was committed? Time and date
WHO committed? Persons/s involved
WHY it was committed? Reason or motive of
Committing the crime
HOW it was committed? Manner, method or modus
Operandi

2|Page
QUALITIES OF COMPETENT / GOOD CRIMINAL INVESTIGATORS

1. Perseverance
• Refers to the steadfastness or persistence and resolution to bring the desired result in spite of obstacles connected
with criminal investigation.
2. Endurance
• This is the ability to last physically and mentally hence;
3. Incorruptible Honesty and Integrity
• In the practice of his art, there is the ever temptations of money, women and drinks where these are present in
every corner laying tricks of temptations.
4. The Intelligence and Wisdom of Solomon
• This is very important in order that the investigator could easily decipher falsehood from truth and separate the
grain from the chaff.
5. Acting Activity
• It is the ability to go down to the level of the minor, the prostitute or the slum dwellers, or the level of the other
professionals or the members of the elite.
6. Mastery of the Oral and Written Communication in order that he will not suffer setback in getting the accurate facts
especially in the preparation of reports and or transmittal of information.
7. The Keen Power of Observation and Description
• These are very important in crime scene investigation and in interview and interrogation.
8. Courage
• It is the moral fortitude to tell the truth no matter who will be hurt.
9. Legal Knowledge
 Working Knowledge of Criminal Law, Evidence, Criminal Procedure, and Penal Special Laws.
10. The Power to “Read between the Lines”
• This is the ability of investigator to interpret the words or phrases encountered in the process of investigation in their
deeper meaning in order to arrive with concrete meaning of a certain statement.
11. Working Knowledge of Martial Arts and Firearms Proficiency
 Because He will find himself in many occasions that he will be alone in confronting, arresting, bringing to
headquarters and interrogating the offenders.

TRAINING OF CRIMINAL INVESTIGATOR

• Training, as one of the foundations of investigation, is concededly a vital ingredient in the creation of a total
investigator. Experience alone does not make one a good investigator. The fusion of the best training and vast
experience is a formidable force that can threat even the most sophisticated technology and syndicated crimes.

• The National Forensic Science Training Institute (NFSTI) under the Philippine Public Safety College is the institution
that trains uniformed personnel of the Philippine National Police to become a certified investigator.

THREE TOOLS OF CRIMINAL INVESTIGATION


1. Information
2. Interview/interrogation
3. Instrumentation

INFORMATION
It is the knowledge/data which an investigator acquired from other persons and records.
Information is the first vital key of successful investigation.

Classes of Information

• Regular Sources – records, files from government and non-government agencies, news items.
• Cultivated Sources – information gathered upon initiative of the investigator from informants and informers.
• Grapevine Sources – these are information coming from the underworld characters such as prisoners and ex-
convicts.

METHODS OF OBTAINING INFORMATION

1, OVERT = The visible way of obtaining information like conducting interview, patrol, crime scene search, regular
performance of police activities and custodial interrogation.
2. COVERT = The secret way of obtaining information

3|Page
TYPES OF INFORMATION

1. SENSORY FORM= the outward manifestations of a criminal event that can be perceived by out five senses – eyes, ears,
nose, tongue and hands.
2. WRITTEN FORM = A criminal act may also provide information is a written form like receipts from the motel, food and
drinks in the pocket of the suspect.
3. PHYSICAL FORM = The information may actually be in a real form – meaning the failure to retrieve it or receive it at the
right time will be useless.

INTERVIEW VS INTERROGATION

• Interview means the asking of simple questions to a person who is fully cooperating with the investigator, and
willingly gives truthful answers to the investigators query
• Interrogation is described as the vigorous and controlled questioning of a person who is reluctant to divulge
information or seeks means to evade it

TYPES OF INTERVIEW

1. BACKGROUND INTERVIEW = This is focused only in obtaining data regarding the personal background of the subject,
the simplest type of interview used in criminal cases.
2. SUBJECTIVE INTERVIEW = An interview wherein the questions are phrased in a manner such that the subject’s
answers are based on his personal opinions or views. Questions are designed to deal with the subjective aspect of the
case.
3. OBJECTIVE INTERVIEW = The questions are designed to acquire the basic and specific data or facts regarding a
criminal case. It is the type of interview that complies with the six cardinal points of criminal investigation ( the 5 W’s and 1
H)

INTEVIEW FORMAT / I.R.O.N.I.C. FORMAT

The interview of a witness can be format by its acronym ‘IRONIC’ which stands for Identity, Rapport, Opening Statement,
Narration, Inquiry, and Conclusion.
• Identity—prior to the commencement of an interview, the investigator should identify himself to the subject by name,
rank and agency. Except when there is no need to know the officer’s identity.
• Rapport—it is good to get the positive feeling of the subject towards the investigators; such friendly atmosphere is a
vital for both the subject and the investigator to have a better interaction.
• Opening Statement— The investigator must have to indicate why the subject is being interviewed.
• Narration—The witness should be allowed to tell all he knows with little interruptions from the investigator.
• Inquiry—after all information have been given by the subject, that is the time for the investigator to ask question to
clarify him about the case under investigation.
• Conclusions—After the interview, it is but proper to close the interview with outmost courtesy and thanking the
subject for his cooperation.

STAGES OF INTERVIEW/INVESTIGATION

1. PRELIMINARY = The first or initial questioning usually conducted at the crime scene. It serves as the foundation of the
case
2. FOLLOW-UP /IN DEPTH= This is to obtain further information that was missed during the initial interview and to clarify
data that has been already gathered.
3. FINAL = This is the last step of questioning that may lead to the act of offering a witness to testify during court trial.
The investigating officer works closely with the prosecuting attorney.

RULES TO BE OBSERVED IN QUESTIONING

• One question at a time


• Avoiding implied answer
• Simplicity of the questions
• Saving faces
• Avoid close ended questions

PERSONALITIES OF INTERVIEWEES

a. Know-Nothing Type
b. Disinterested Type
c. Drunken Type Egoistic/Egocentric
d. Suspicious Type
4|Page
e. Talkative Type
f. Honest Witness
g. Deceitful Witness
h. Timid Witness
i. Boasting Witness
j. Refusal to Talk

INTERROGATION
Interrogation is a questioning of a person suspected of having committed an offense

What are the purposes of Interrogation?

• To obtain confession to the crime


• To induce the suspect to make admission
• To learn the facts of the crime
• To learn the identity of the accomplice
• To develop information which will lead to the recovery of the fruits of the crime
• To discover the details of other crimes participated by the suspect

INTERROGATION ENVIRONMENT

1. PRIVACY = This can be achieved by the presence of only one door of the investigation room, absence of windows or
view, sound proof and telephone without a bell.
2. SIMPLICITY = Distraction should be kept to its minimum. Too many objects may distract the attention of the subject. This
can be accomplished by a medium size investigation room, bare walls, no glaring lights, and minimum furniture.
3. SEATING ARRANGEMENTS = The investigator and subject must be seated without any intervening furniture, straight
back chair for the suspect, table with flat surface, the back of the suspect must be facing the door
4. THE TECHNICAL AIDS = installation of recording device and one-way mirror.

LEGAL REQUIREMENTS OF INTERROGATION

1. VOLUNTARINESS = The statement of a person being interrogated must have been made voluntary and must not be the
product of threat, fear, fraud, coercion, or other improper tactics.
2. INTERROGATION WHILE IN CUSTODY = The warning of rights or giving the MIRANDA WARNING/DOCTRINE

MIRANDA RIGHTS

• Right to remain silent


• Right to counsel and if the suspect cannot afford the services of a private counsel, he must be provided with one
• No force, violence, threat or intimidation shall be used against him.

*Any confession obtained in violation of these rights shall be inadmissible in court as evidence

MIRANDA DOCTRINE – this case which entitled Miranda vs. Arizona, is a US Supreme Court Jurisprudence which laid
down the constitutional rights of the accused during custodial investigation. It was incorporated in our 1973 Constitution and
later in the 1987 Constitution of the Philippines.

MIRANDA DECISION
A kidnapping and rape investigation in Phoenix, Arizona, resulted in the arrest of Ernesto Miranda as the suspect.
Following a lineup identification by the victim, the suspect was interviewed for two hours-a relatively short period of time for
a major case of this nature. During this time period, Miranda confessed orally, then gave investigators a written confession
regarding the offense. The suspect was subsequently convicted, with the Arizona Supreme Court upholding the lower court
decision. The United States Supreme Court reversed this decision, stating that the suspect’s rights to counsel and his
protection against self-incrimination had been violated. As a result of this landmark decision, the so-called MIRANDA
WARNING has become mandatory. Suspects taken into custody or deprived of their freedom of action, who are to be
questioned by law enforcement officers.

1961, USA = MAPP vs. OHIO (376 vs. 584)


The Supreme Court ruled that illegally obtained evidence is inadmissible in state criminal prosecutions. This case
established the “Doctrine of Poisonous Tree.”

5|Page
INTERROGATION TECHNIQUES

1. Emotional Appeal
Place the subject in the proper frame of mind. The investigator should provide emotional stimuli that will
prompt the subject to unburden himself by confiding.
Analyze the subject’s personality and decide what motivation would prompt him to tell the truth, then
provide those motives through appropriate emotional appeals.
2. Sympathetic appeal
The suspect may feel the need for sympathy or friendship. He is apparently in trouble. Gestures of
friendship may win his cooperation.
3. Kindness
The simplest technique is to assume that the suspect will confess if he is treated in a kind and friendly
manner.
4. Extenuation
The investigator indicates he does not consider his subject’s indiscretion a grave offense.
5. Shifting the blame
The interrogator makes clear his belief that the subject is obviously not the sort of person who usually gets
mixed up in a crime like this.
The interrogator could tell from the start that he was not dealing with a fellow who is a criminal by nature
and choice.
6. Mutt and Jeff
Two (2) agents are employed.
Mutt, the relentless investigator, who is not going to waste any time because he knows the subject is guilty.
Jeff, on the other hand, is obviously a kind-hearted man.
7. Bluff on a Split Pair
this is applicable when there are more than one suspect. The suspect are separated and one is informed
that other has talked.
8. Pretense of Physical Evidence
The investigator may pretend that certain physical evidence has found by laboratory experts against him.
9. Jolting
May be applied to calm and nervous subjects by constantly observing the suspects, the investigator
chooses a propitious moment to shout a pertinent question and appear as though he is beside himself with rage.
The subject may be unnerved to the extent of confessing:

Philosophy of Interview and Interrogation:

The RIGHT officer


asking the RIGHT questions
in the RIGHT manner
at the RIGHT time and in the RIGHT place
will get the RIGHT answers.

INSTRUMENTATION

It is the application of instruments and methods of physical science to the detection of crimes. In cases where there
is no significant physical evidence to be found, then the use of instrumentation is relatively unimportant. (It is also known as
Criminalistics)

Development of Criminalistics

Before the 1900s criminal investigation relied almost exclusively upon the interaction of people. Detectives used
their skills as interviewers and persuaders to obtain information regarding innocence or guilt. This form of information
gathering, including the frequent use of the informant, was nearly the sole means of field criminal detection. Today the
emphasis is very different. Current methods involve, to a large extent, what is known as criminalistics. or the more generic
term forensic science. In its simplest form, criminalistics is the application of many fields of natural science in the detection
of crime. Chemistry, physic, biology and mathematics are frequently considered the backbone of forensic science.

In the process of instrumentation, the following equipment are being used, namely:

1. The first used was Anthropometry found by Alphonse Bertillon. He is a Frenchman who founded criminal identification by
body measurement. It was accepted and adopted by police departments in Europe and the United States for more than
twenty (20) years. But due to the West case, Anthropometry disappeared, which up to the time of his death in 1914,
Bertillon never accepted its uselessness.

6|Page
2. Dactyloscopy replaced Anthropometry. It was popularized by Sir Edward Richard Henry in Europe and through Juan
Vucetich who founded the fingerprint classification, it was found to be accurate. Its usefulness in criminal investigation
cannot be questioned because its infallibility because no two persons have the same fingerprints not even the ten
neighboring fingers of the same persons.

3. Forensic Serology was discovered by Karl Landsteiner in 1901 the agglutination of human blood. This discovery
demonstrated that blood possesses certain characteristics, which allowed the designation A, B, AB and 0.

4. Forensic Ballistics developed by Dr. Calvin H. Goddard, a U.S. Army Physician with a rank of Lieutenant Colonel. It is
used for determining whether or not the evidence bullet and test bullet came from a single gun through the use of bullet
comparison microscope.

5. Poroscopy founded by Edmond Locard, one of the foremost criminalists in the world. Poroscopy deals with the
identification of sweat pores, he proved that pores vary in number, size and position in each individual.

6. Polygraph (lie detector) was develop by John Larson although it was founded by Keller. It is effective in limiting the
suspects in number as in the hand of an expert and dependable machine its result is excellent.

7. In 1984, Alex Jeffrey’s, a British biologist and genetics expert, discovered the concept of DNA genetic fingerprinting.

The three fold aim of Criminal Investigation


• to identify the suspect;
• to locate the suspect; and
• to provide evidence of his guilt.

IDENTIFICATION OF CRIMINALS

METHODS OF IDENTIFYING CRIMINALS


1. By confession or admission of the criminal himself
2. Identification by accounts or testimonies of eyewitnesses
3. Identification by circumstantial evidence
4. Identification by associative evidence
5. Identification by the Method of Operation (Modus Operandi)

1. By confession or admission of the criminal himself

CONFESSION– is the direct acknowledgement of guilt arising from the commission of a crime.

Types of Confession

• Extra-Judicial Confession –made outside the court.


This kind of confession is inadmissible unless corroborated by proof of corpus delicti. The confession to be
admissible, it must be voluntary, in writing and made with the assistance of a counsel of his own choice with full
understanding of the consequence of such confession

TAKE NOTE; Corpus delicti - (latin word for the “body of the crime”) - used to describe the physical or material evidence that
a crime has been committed. ex. corpse of a murder victim.

• Judicial Confession– those made by the accused in open court. The plea of guilt may be during arraignment or in
any stage of the proceedings where the accused changes his plea of not guilty to guilty.

ADMISSION - An admission is a self-incriminatory statement by the subject falling short of an acknowledgement of guilt. It
implicates but does not incriminate. (indirect acknowledgement of guilt)

RULES TO BE OBSERVED IN TAKING CONFESSION OR ADMISSION

• Confession or admission must be taken preferably in writing and under oath


• It must be written in the language known and understood by the accused, if not it must be clearly translated
• It must be freely and voluntary given by the accused
• it must be taken in the presence of competent and independent counsel chosen by the accused

2. Identification by accounts or testimonies of eyewitnesses

The value of Identification by Eyewitnesses Depends on:


• The ability of the eyewitness to observe and remember the relative “distinctiveness” of the accused’ appearance.

7|Page
• The prevailing conditions of visibility and observations when the crime was committed.
• The lapse of time between the criminal event and the identification.

KINDS OF CRIMINALS IDENTIFIED BY WITNESSES

• Known fugitives—if the criminal is known, then police records and pictures are available. His relatives and friends
can offer a description. Further description may be obtained from local police files, background investigation and
from verbal descriptions of others.
• Unknown criminals—identified of unknown criminals by eyewitnesses must be approached with caution by the
investigator. The description and characteristics may be vague that identification is difficult.

Methods of Identification by witness

1. Verbal Description —the value of the description must depend on the capacity of the witness to describe the
criminal.

2. Photographic Files—(Rogue’s Gallery)—the witness may be taken to the headquarters to examine the
photographs in file. The modus operandi file may also be shown upon knowledge of the technique of the
commission of the crime

3. General Photograph —the investigator should show the witness the variety of facial types which do not
necessarily represent the criminal. The picture only represents different features of the face. The image of
various features such as the degree of baldness, length or shape of the nose, the shape of mouth ear, etc.

4. Artist’s Assistance —the identification may be made by the employment of an artist to depict a composite of the
features described by the eyewitness. The witness is shown a chart which contains representations of various
types of human features as noses, eyes, ears, etc., and is requested to select the individual features present in
the unknown criminal. From this selection, the artist draws a composite of the face which maybe a close
approximation to that of the criminals. Also called as CARTOGRAPHY.

What are the procedures of identification by eyewitness?

1. Physical/Police line-up – is a means of selecting a suspect from a group of innocent persons usually
composed of seven to ten persons. The purpose of line-up is to eliminate the power of suggestion.
Their appearance must be almost the same as to height, hair color, and clothing. The suspect must be
given the opportunity to select the position in the line-up.

2. Physical show-up – only one person is shown to the witness usually at the scene of the crime and made
immediately after the arrest of the suspect.

3. Identification by circumstantial evidence

CIRCUMSTANTIAL EVIDENCE - Circumstantial evidence is identification established indirectly by proving other facts or
circumstances from which either alone or in connection with other facts, the identity of this perpetrator can be inferred

When may circumstantial evidence be sufficient to produce conviction?

• When there is more than one circumstance.


• When the facts from which the inferences derived are proven.
• When the combination of all the circumstances is such as to produce a conviction beyond a reasonable doubt.

What must be inferred to prove identity by circumstantial evidence

• Motive—motivated by a desire for revenge or personal gain. Motive is hard to establish in crime committed by
mentally deranged persons.
• Opportunity—this is the physical possibility that the suspect could have committed the crime. It may be deduced
from the following:
1. The suspect could have been in the vicinity of the crime.
2. Knowledge of the criminal objectives.
3. Absence of alibi.

4. Identification by associative evidence

Physical evidence may be considered as:

8|Page
ASSOCIATIVE EVIDENCE – these are the pieces of evidence that will link the suspect to the crime scene. The suspect
may leave some clues at the scene such as weapons, tools, garments or prints.

TRACING EVIDENCE – articles which assist the investigator in locating the criminal.

5. Identification by the Method of Operation (Modus Operandi)

MODUS OPERANDI -Modus operandi means the method of operations. It enables the investigators to recognize a
pattern of criminal behavior, to predict, approximate the next target of the criminals and to assist complainants to
recognize the suspect by means of recorded information concerning the characteristics of criminal activities.

TAKE NOTE; MAJOR GENERAL LLEWELY ATCHERLY –devised the first modus operandi file

TRACING AND LOCATING THE CRIMINALS

INFORMANT – is a person who gives information to the police relevant to a criminal case about the activities or
whereabouts the criminals or syndicates.

TYPES OF INFORMANTS
• Anonymous informant – do not wish to be identified.
• Rival elimination informant – to eliminate competition.
• False informant – reveals information of value.
• Frightened informant – motivated by anxiety.
• Self-aggrandizing – hangs about the fringes of the criminals.
• Mercenary informant – gives information for a price.
• Double crosser informant – to get more information from the police.
• Woman informant – female associate of the criminals. “most dangerous specie “
• Legitimate informant – operators of legitimate business establishments.

What are the motives of informant in giving information?

• Vanity
• Civic-mindedness
• Fear
• Repentance
• Avoidance of punishment
• Competition
• Revenge
• Jealousy
• Remuneration

GATHERING OF EVIDENCE TO PROVE THE GUILT OF THE CRIMINAL

CRIME SCENE INVESTIGATION

It is the conduct of processes, more particularly, the recognition, handling, preservation and documentation of
physical evidence to include the identification and interview of witnesses and the arrest of suspect/s at the crime scene

What should then be the primary job of an Investigator before applying the golden rule?
The Investigator upon his arrival at the scene of the crime should consider the following two important steps before
he touches or moves any object.

• If the victim is still alive, the Investigator should try to gather or acquire information from the victim himself with
regard to the surrounding circumstances of the crime, while calling for assistance for an ambulance from the
nearest hospital. Then measure, sketch and photograph the crime scene immediately after the victim is
removed and brought to the hospital for medical attendance.

• If the victim is dead, the body should be removed only after the crime scene is measured, sketched and
photographed.

Golden Rule in Crime Scene Investigation

Do not touch or move anything in the crime scene unless it has been properly photograph, sketch and recorded.
MAC Rule- Do not Move, Alter, Change the crime scene

9|Page
DIFFERENCE BETWEEN CRIME SCENE AND CORPUS DELICTI

Crime scene - a venue or place where the alleged crime/incident/event has been committed.

Corpus delicti - (latin word for the “body of the crime”) - used to describe the physical or material evidence that a crime has
been committed. ex. corpse of a murder victim.

What Constitute a Crime Scene?

• Crime scene can be understood to include all areas in which the criminal, any possible victim and any eyewitness
move during the time the crime was committed.
• The boundaries must be established so that the entire crime scene can be effectively preserved.
• In some crimes, however, the crime scene may actually comprise several different sites.

PROTOCOLS IN INVESTIGATION

Protocol 1: Jurisdictional Investigation by the Territorial Unit Concerned

The Police Station, which has territorial jurisdiction of the area where the crime incident was committed,
shall immediately undertake the necessary investigation and processing of the crime scene, unless otherwise
directed by higher authorities for a certain case to be investigated by other units/agency.

Protocol 2: Official Police Blotter

a. A Police Blotter is an 18” x 12” logbook with hard-bound cover that contains the daily register of all crime incident reports,
official summary of arrests, and other significant events reported in a police station.

b. As a general rule, all crime incidents must be recorded in the official police blotter.

c. A separate Police Blotter, however, shall be maintained for offenses requiring confidentiality like violence against women
and children and those cases involving a child in conflict with the law to protect their privacy pursuant to R.A. 9262 (Anti-
Violence Against Women and Children Act of 2004) and R.A. 9344 (Juvenile Justice and Welfare Act of 2006).

Protocol 3: Investigation Team: Organization


a. All investigators in any police unit must be a graduate of prescribed investigation course with a rank of at least PO2 (pre-
requisite to assignment).
b. Composition:
1. Team Leader;
2. Investigator/recorder;
3. Photographer;
4. Evidence custodian; and
5. Composite Illustrator/Artist

Preparation of Case Investigation Plan (CIPLAN)

The conduct of police operation involving sensational cases, high profile and heinous crimes must be covered by
Case Investigation Plan.

Uniform of the Investigator


Prescribed uniform should be worn by investigators when conducting investigation so as to identify them as PNP
personnel.
SOCO Assistance
a. In cases where the crime scene needs special processing due to its significance or because of its sensational nature, the
Scene of the Crime Operation (SOCO) specialists of the Crime Laboratory shall be requested.
b. If the situation involves a clandestine drug laboratory, biological weapons, radiological or chemical threats, the
appropriate agency should be contacted prior to entering the scene.
CRIME SCENE SKETCHES
Sketches are useful in questioning of suspects and witnesses as well as in the writing of investigative reports.

10 | P a g e
• A sketch is prepared indicating the actual measurement of things with scale and proportion observed and oriented
to the North Pole. All necessary information are placed in the sketch.
• Sketches are excellent companions to photograph.
Where photograph provide exact details, sketches offer
accurate information about the placement of objects and
they show relationship and distances between things.
ELEMENTS OF SKETCH
1. Measurements
2. Compass Direction
3. Essential elements
4. Scale and Proportion
5. Legend
6. Title

SPECIFIC KINDS OF SKETCHES

1. SKETCH OF LOCALITY =This gives picture of the scene, the crime and its environs, including such items such
as neighboring buildings, roads leading to the location or house.
2. SKETCH OF GROUNDS = The sketch of grounds pictures the scene of the crime with its nearest physical
surroundings (e.g. house with a garden).

3. SKETCH OF DETAILS = The sketch of details describes immediate scene only. For instance, the room in
which the crime was committed and the details thereof. Cross projection method are details of the room
wherein walls and ceiling are pictures as if they are on the same place as the floor. This gives a clear
impression of the scene in cases where bloodstains or bullet holes are found in the walls or on the ceiling.

Types of Measurements

• Rectangular coordinates method – a sketching method that involves measuring the distance of an object from two
fixed lines at right angles to each other.
• Triangulation method – a sketching method that requires measuring the distance of an object along a straight line
from two widely separated fixed reference points.
• Baseline method– a sketching method that makes measurements along from a single reference line, called a
baseline, which can be established by using a length of string, chalk line, or some other convenient means.
• Cross projection method – a sketching method in which the ceiling appears to open up like a lid of a hinged box,
with the four walls opening outward. Measurements are then indicated from a point on the floor to the wall.
ROUGH SKETCH -Made by the prober at the crime scene.
Scale and proportion are ignored and everything is
approximated. It is to be used as basis of the finish sketch
FINISH SKETCH -Made primarily for court room
presentation. All elements of sketching must be present.
CRIME SCENE PHOTOGRAPHY
The main objective is to create a visual record of the
crime scene before any item is moved as possible physical
evidence.
Take photograph of the crime scene with or without
markers.

11 | P a g e
Methods of Crime Scene Search
1. STRIP SEARCH METHOD = In this method, the area is blocked out in the form of a rectangle. The three (3) searchers,
A,B, and C proceed slowly at the same pace along, paths parallel to one side of the rectangle. When a piece of evidence is
found, the finder announces his discovery and the search must stop until the evidence has been cared for . A photographer
is called, if necessary. The evidence is collected and tagged and the search proceeds at a given signal. At the end of the
rectangle, the searchers turn and proceed along new lanes.

2. THE DOUBLE STRIP OR GRID METHOD OF SEARCH = a modification of the strip search method. Here, the rectangle
is traversed first parallel to the base then parallel to the side.

12 | P a g e
3. SPIRAL SEARCH METHOD = In this method, the three searcher follow each other along the path of a spiral, beginning
on the outside and spiraling toward the center.

4. ZONE SEARCH METHOD = In this method, one searcher is assigned to each subdivision of a quadrant, then each
quadrant is cut into another set of quadrants.

2nd Zone
1st Zone/grid

search
4th Zone
3rd Zone

5.WHEEL SEARCH METHOD = In this method of search, the area is considered to be approximately circular. The
searcher, gathers at the center and proceed outward along radii or spokes. The procedure should be repeated several
times depending on the size of the circle and the number of searchers. One shortcoming of this method is the great
increase in the area to be observed as the searchers depart from the center.

6. Point to point- searcher will stand in a straight line and move forward together.
What is meant by reconstruction of the crime?
After completion of the search, an effort must be made to determine from the appearance of the place and its objects what
actually occurred and what the circumstances of a crime were. This is known as reconstructing the crime.
Kinds of reconstruction
• Physical Reconstruction— The physical appearance of the crime scene is reconstructed from the description of
witnesses and the indication of the physical evidence.
• Mental Reconstruction—From the physical reconstruction, some conclusions can be made concerning the
consistency of the accounts of various witnesses. No assumption should be made concerning actions which are not
supported by evidences. The final theory developed by the investigator should provide a line of investigative action.
DEDUCTIVE REASONING -It forms a general conclusion prior to having a complete explanation based on the facts
INDUCTIVE REASONING- It forms a general conclusion after gathering evidence and after further investigation
Packaging = Physical evidence should be packed in order to prevent loss, tampering, breakage or deterioration.  
EVIDENCE/ITEM DESIRED CONTAINER
1. Paper Envelope
13 | P a g e
3. Firearm Box or board of exact size
4. Hair Wrap it first with filter paper before placing
it in an envelope
5. Dirt = same=
6. Cloth Box – Do not fold the area where there is
stain. Encircle the location of the stain
using a chalk for easy identification.
7. Seminal stain If moist, drop distilled water using a dropper
and use the same to collect it, then place it
in a test tube

8. Blood Use a sterilized eye dropper to collect the


blood and place it in a test tube and add
saline solution.
 
Use saline solution to prevent coagulation

TYPES OF EVIDENCE

1. TESTIMONIAL EVIDENCE = The most common form of evidence, and it is obtained through interview and interrogation
– events which witness see, smell, taste, and touch are described to the investigator through oral and written testimony.

2. DOCUMENTARY EVIDENCE = This includes writings, including official records. One which is supplied by written
instruments, or derived from symbols which ideas are represented on material substances, like letters, wills, deed or
contract.

3. PHYSICAL EVIDENCE = Evidence addressed to the senses of the court, as when objects are exhibited for the personal
observation of the judge. It is also called real evidence – any kind of object associated with the investigation, but it must be
a tangible item.

HISTORICAL BACKGROUND OF CRIMINAL INVESTIGATION

1720’S JONATHAN WILD


• He was the most famous thief catcher
• “Employing a thief to actch a thief.”
• He became the London's most effective criminal investigator.
• His methods made popular the logic of “employing a thief to catch a thief
• He conceived the idea of charging a fee for locating and returning stolen property to its rightful owners.

EUGENE “FRANCOIS” VIDOCQ

• Established a squad of ex convicts to aid Paris police in investigation.


• He worked under the theory of “Employing a thief to catch a thief.”
• Founder of LA SURETE, France's national detective organization.
*FATHER OF MODERN CRIMINOLOGY IN FRANCE.

1851, BOSTON, MASACHUSSETTS, USA


First introduced the multi-suspect identification line-up known as ”POLICE LINE-UP”

ALLAN PINKERTON

America’s foremost private detective. He became the first detective of the Chicago Police Department in 1849. He
then opened his private detective agency in the early 1850’s in partnership with Chicago attorney, EDWARD RUCKER.
Their business immediately became successful and formed the North-Western Police Agency. (PINKERTON'S AGENCY)

KATE WAYNE
First women detective in history criminal investigation that was hired by Pinkerton Agency.

ALPHONSE BERTILION

14 | P a g e
Introduced the first systematic identificatdion thru Anthropological measurement known as ANTHROPOMETRY
SYSTEM.
• Consider as the Founder of Criminal Investigation
• Father of Personal Identification

THOMAS BYRNES

• Chief of the detectives in New York City, was one of the famous investigators of the nineteenth century.
• He trained his detectives in recognizing individual criminal techniques. This method was later to be known as
“modus operandi” or method of operation and is considered an essential tool of investigation to this day.

PAUL LELAND KIRK


• A forensic chemist and scientist who pioneered the blood splatter analysis “blood stain pattern analysis”

DR. ALEC JOHN JEFFREYS

• Ivented the used of DNA fingerprinting or profiling .


• He used this to identify Colin Pitchfork as the murderer of 2 young girls in England.

DEOXYRIBONUCLEIC ACID

• DNA typing was first used to solve a crime in 1986 in ENGLAND.


• DNA profiling was first introduced in US criminal court
• First conviction using DNA was Tommy Lee Andrews.

FLAVIANO GUERRERO
• the only Filipino member of United States Federal Bureau of Investigation (FBI)

• 1833, ENGLAND: The Scotland Yard employed the first undercover officer while in
•  USA: First daytime paid police department was established in Philadelphia, USA.
• 1835, USA: TEXAS RANGERS was organized as the first law enforcement agency with state Invwide investigative
authority, the forerunner of the Federal Bureau of estigation
• 1852, USA: - CHARLES DICKENS - Through his story entitled BLEAK HOUSE, he introduced the term
DETECTIVE to the English language

PHILIPPINE SETTING

• 1985 – PEOPLE vs. GALIT (GR No. 51770; March 20,1985) - The right to a counsel maybe waived but the waiver,
to be valid, must be made with assistance of a counsel.

PART II: POLICE INTELLEGENCE

History of Intelligence

15 | P a g e
1. Holy Bible- where you can find the just recorded intelligence operations in history.
Moses-One of the first recorded formalized intelligence efforts, with format, can also be found in the Holy Bible
Numbers 13:17
The scripture also named the 12 intelligence agents when the Lord directed Moses to send into the Land of Canaan
and records that “all those men were heads of the children of Israel”.

a. Rahab- “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and concealed the agents of Israel, made a
covenant with the agent sand duped their pursuers. She was not only an impromptu confederate of immense
value to the Jewish leaders of that far-distant day, but also established a plot- pattern which is still of periodic
relief to motion- picture producers.

b. Delilah- She was an impromptu intelligence agent of the Philistines. She allowed Philistine spies to hide in her
house (Judges 16:9) and used her feminity to gain intelligence from a powerful enemy. A biblical personality
who was able to gain information by using her beauty and charm. She was responsible for the fall of Samson a
known Israelite leader who terrorized the Philistines

2. Sun Tzu- a Chinese- “Father of Intelligence” philosopher, in his book “PING FA” (Art/Principles of War) - the earliest
known textbook on the art of general warfare- once said; “If you know your enemy and know yourself, you need not fear the
result of a hundred battles. If you know yourself but not your enemy, for every victory, you will suffer defeat. If you know
neither yourself nor your enemy, you are fool who will meet defeat in every battle.”
Its lessons were applied by Mao- Tse-Tung during the long march and by the Japanese prior to Pearl Harbor.
Sun Tzu believed that to wage war economically while defending the state against other, it was necessary to
employ a permanent espionage service spying on neighbors and enemies.
Captured agents should be treated with benevolence, tempted with bribes, led away and comfortably housed. He
realized that if such mean could be turned, they would be in position to report on their previous master strengths and
weaknesses.
Condemned spies were less fortunate; Unknown to them they were fed completely false information by Sun Tzu’s
agents, sent into enemy territory and if necessary compromised. When they were captured and tortured, the information that
they were able to divulge was wholly incorrect, leading the enemy to miscalculate his response. When the enemy learned
of his mistake the spy was put to death, but by then it was often too late.

3. Alexander “The Great”- a “Renowned Greek Conqueror” Under the tutelage of Aristotle, Alexander the Great King of
Macedonia, became the first ruler to utilize intelligence as a weapon of government. He divided a simple but highly effective
system of covert ciphers.
He introduced a primitive form of “Cabinet Noir” (Internal Monitoring) when he instigated postal censorship into the
army and investigated letters and malcontents.

4. Sir Francis Walsingham of England- He was credited with creating the first viable secret service in England. He protected
Queen Elizabeth I from countless assassins. “Regarded as the “First Great Spymaster.”

5. Mata Hari (1876-1917) - Ironically, Mata Hari is one of the best known spies in history, yet she was one of the worst.
When World War I broke out, Mata Hari was in Berlin, where she had recently befriended the Chief of police, who
subsequently enlisted her into the ranks of the German Secret Service. She carried on her life as before dancing naked on
the stage and dispensing her services liberally to those who could afford her.

6. Frederick “the Great”


The “Father of Organized Military Espionage”.
 He divided his agents into for classes:
a. Common Spies- recruited among poor folk, glad to earn small sum or to accommodate a military
officer;
b. Double Spies- the low informers and unreliable renegades of value chiefly in spreading false
information to the enemy;
c. Spies of Consequence- courtiers and nobleman, staff officers and kindred conspirators, invariably
requiring a substantial bribe or bait;
d. Persons who are forced to undertake espionage against their will.
7. Hannibal- Known as one of the “Greatest Military Strategist. Hannibal’s invasion of Italy, the most brilliant raid in history,
gained him victories and nearly bleed Rome to death, but the mere slaughter of Romans and a great city’s despair
would not have sustained him for fifteen years if he had not also made powerful allies and developed an excellent
intelligence system. He usually roams around the city often disguise himself as a beggar to gather firsthand
information.

8. Karl Schulmeister, “Napoleon’s Eyes”- He was credited for establishing counter intelligence conducted against spies. He
was the master of deceit who used black mail to obtain vital information pertaining to the personality of the enemies of
Napoleon during the 18th Century

16 | P a g e
9. Wilhelm Stieber- He made two major contributions to the sequence of military intelligence, namely military censorship and
organized military propaganda.

10. Alfred Redl- One of the most brilliant intelligence agents, though he was a homosexual. He rose to become chief of the
Austro- Hungarian Secret Service, or in other terms, director of their military intelligence system. For more than half of his
time as director of intelligence, Redl was acting as an intelligence agent of Russia. “Homosexual Double Spy”

11. William “Wild Bill’’ Denovan- headed the Office of Strategic Service (OSS), the immediate forerunner of the Central
Intelligence Agency (CIA). A lawyer and millionaire Republican, Donovan enjoyed Roosevelt’s trust, friendship and most
crucial of all- direct access to the inner sanctums of the White House

12. Edward I - An English monarch who started utilizing state informants specially to determine seditious writing against the
crown and identify of his enemies. Rewards are given to wards for every useful information gathered.

Some Intelligence Units

1. Federal Bureau of Investigation


First established in 1908 as an investigative arm of the U.S. Department of Justice and became what is known as
the F.B.I. under its first director John Edgar Hoover in 1924. On September 6, 1939 by a presidential directive, it came to its
responsibility the task of a domestic intelligence.

2. CIA - Central Intelligence Agency


Military intelligence agency of United States of America and engaged in many undercover activities throughout the
world. A predecessor of the Office of Strategic Services (OSS), which was formed in 1942 and renamed CIA in 1947. It was
the Central Intelligence group established during the time of President Truman.

3. KGB- Komitet Gusodarstevenoy Bezopasnosti-


Intelligence Agency of Russia. Literally means The Committee for State Security established in 1917 and became
known as KGB in 1954.
4. MOSSAD- (Mossad Merkazi Le- Modiin U- Letafridim M-eyudim)-“Central Institute for Intelligence and Security”-
Israel

5. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known by its wartime designation,
“MI6”, equivalent to US’s CIA, in charge with gathering information overseas and with other strategic services
ranging from foreign espionage to covert political intervention.

6. SDECE- (Secret de Documentation Exterieure et Contre- Espionage)- France

7. SAD- (Social Affairs Department)- China

Note:
The counterpart of these intelligence organizations in the Philippines is the National Intelligence
Coordinating Agency (NICA) which is under the Office of the National Security Adviser

Col. Rudolph Abel - (Russian) - was probably the highest ranking and most successful spy whoever infiltrated the United
States.

Mathew Cevetic- a famous undercover assignment of FBI infiltrated the communist party.

Definition of Intelligence:
Intelligence. A product created through the process of planning, directing, collecting, collating, and analyzing data,
for dissemination as usable information that typically assesses events, locations of adversaries, to allow the
appropriate deployment of resources to reach a desired outcome.

In the Military parlance, it is the product resulting from the collection, evaluation, analysis, integration, and
interpretation of all available information which concerns one or more aspect of foreign nations or are areas of
operations and which is immediately or potentially significant to planning.

In the Police parlance, it is the end-product resulting from the collection, evaluation, analysis, integration, collation
and interpretation of all available information which concerns one or more aspects of criminal activity significant to
police planning operation.

17 | P a g e
OBJECTIVE OF INTELLIGENCE
 The fundamental objective is to ensure rational and timely decision-making.

FUNCTIONS OF INTELLIGENCE IN GENERAL

Today all countries have their intelligence services so with all their various government agencies. They may be
different in their organization, efficiency and method but they all have the basic functions:
1. The collection or procurement of information
2. The evaluation of the information which then become intelligence.
3. The dissemination of intelligence to those who need it.

Principles of Intelligence

a. The Principle of Objectivity/Objectiveness


Intelligence must be based on the decision-makers own plans and intentions as much as on consideration of the
intelligence targets. In intelligence, only well guided will succeed.
b. The Principle of Interdependence (Mutually dependent)
Operation and intelligence planners work hand and hand to attain a greater degree of success in their common
effort. This goes also to logistics, personnel, plans/programs, training and budget.
c. Principles of Continuity
It simply means that information, events, and reports must be continuous and intelligence activities follow a simple
continuous intelligence cycle. Intelligence coverage must be continuing so that the shape of what happened today could be
studied in the light of what happened before, which in turn would enable to predict the shape of things to come.
d. Principle of Communication
Intelligence adequate to their needs must be communicated to all the decisions makers in a manner that they will
understand and inform that will permit its most effective use. Intelligence is useless if it remains in the minds, or in the files
of its collectors or its producers.
e. Principle of Selection
Intelligence should be essential and pertinent to the purpose at hand.
f. Principle of Timeliness
Intelligence must be communicated or must be available on time to the decision maker to permit its most effective
use.
g. Principle of Usefulness (Use)
Intelligence must be adequate for the purpose for which it will be utilized.

h. Principle of Flexibility
Intelligence must have the ability to change or be changed according to circumstances. Hench, alternatives must be
drawn.

i.Principle of Security
Security is achieved by measures which the intelligence takes to protect and preserve the integrity of its
organization personnel, method, sources, information and results of its activities.
j. Principle of imagination and foresight
The operator and the agent must be given the leeway to use his resourcefulness to obtain more than what is normally
required.
Concept and Classification of Intelligence
1. Intelligence as a process- is an activity which treats, processed information as a basis for departmental policy and
decision- making.
2. Intelligence as an organization- It is an institution composed of persons who pursue a social kind of knowledge for the
purpose of planning the collection of information, processing and dissemination of intelligence relating to the area of
interests.
Intelligence Community- is the conglomeration of all intelligence units and agencies in a country composed of civilian,
military and quasi-military organization
FACTORS IN CREATING INTELLIGENCE UNIT
1. Size of the community
2. Extent of organized crime in the community
3. Probable frequency and seriousness of the activity of civil disturbances
4. Breaches of Integrity on the part of any member of the force or unit

Three Broad Categories of Intelligence


1. National Intelligence- Integrated products of intelligence developed by all government department concerning national
policy and national security. It is the total product of intelligence division by all agencies to coordinate the activities of
governmental policies.
2. Department Intelligence- It is a type intelligence required by an agency or department of the government in order to
execute its mission and responsibilities.
18 | P a g e
3. Military Intelligence- Is a type of intelligence used in the preparation and execution of military/ police plans, programs
and policies.

Military and Police Intelligence


Police Intelligence- Are evaluated and interpreted information concerning organized crime and other major police problems.
It is an end product resulting from collection, integration, collation and interpretation of available information which concerns
one or more aspects of criminal activity significant to police planning and operations.
CARDINAL PRINCIPLE IN POLICE INTELLIGENCE

The cardinal principle in Police intelligence at all levels is the proper, economical and most productive use of personnel and
equipment employed and/or utilized in planning the collection of information and dissemination of intelligence
Types of Police Intelligence
1. Strategic Intelligence- Intelligence information which is primarily long- range in nature with little or no immediate
practical value.
2. Counter Intelligence- It deals with defending of the organization against it criminal enemies (Defensive Effort)
3. Line Intelligence(combat)- The type of intelligence which is of an immediate nature and necessary for more effective
planning and operations.(Offensive Effort)
4. Undercover work - It is an investigative process in which disguises and pretext, cover and deception is utilized
Forms of Police Intelligence
1. Overt- When the information or documents are procured openly without regard as to whether the subject of investigation
becomes knowledgeable of the purpose or purposes for which it is being gathered.
2. Covert- When the information is obtained without the knowledge of the person against whom the information or
documents may be used.
3. Semi Overt/ Covert- When the information is obtained from open sources but the person against whom the said
information will be used do not have any knowledge about it.

Military Intelligence- It is an evaluated and interpreted information concerning an actual or possible enemy or treat
operations including Weather and Terrain, together with the conclusions withdrawn there from.
Types of Military Intelligence
1. Strategic Intelligence- is a type of intelligence which pertains to the capabilities, vulnerabilities, and probable course of
action of foreign nations.

Components of Strategic Intelligence


a. Political Intelligence- deals with the domestic and foreign relationships of government operation.
b. Economic Intelligence- deals with the extent and utilization of natural and human resources to the industrial
potential nation.
c. Transportation and Communication Intelligence- concerned with operation and facilities not only the military but
also the civilians.
d. Sociological Intelligence- deals with the demographic and psychological aspect of groups of people.
e. Biographical Intelligence- deals with the individual personalities having actual possession of power. (Scientist)
f. Armed force Intelligence- deals with the Armed Forces of the nation.
g. Geographical Intelligence- deals with the natural as well as man-made features of physical environment of man
considered from the point of view of military operation.
h. Scientific Intelligence- deals with the progress of research and development as it affects the economic and military
potential of a nation.

2. Combat Intelligence- is a type of intelligence that pertains to the knowledge of People, Weather, Enemy and Terrain
(PWET) used in planning and conducting tactical and administrative operation in a counter insurgency. It provides the
commander with information and conclusions concerning the area of operations, enemy capabilities and vulnerabilities
in order to determine their probable effect on his course of action. Combat intelligence is required by the commander in
order to determine the best use of his available firepower and maneuver forces, to accomplish his mission, and to
maintain the security of his command.

What is the intelligence information to be determined?


a. People (living conditions, sources of income, education of the people, livelihood, extent of enemy influence)
b. Weather (Visibility, Cloudy, temperature, rain, wind)
c. Enemy (location, strength, tactical capability, enemy vulnerability)
d. Terrain (relief and drainage system, obstacle, critical terrain features, observation and fields of fire)

OTHER FORMS OF INTELLIGENCE


1. Order of Battle Intelligence
 This concerns the manner in which military forces are organized and disposed.
2. Counter intelligence
 Covers the activity devoted and destroying the effectiveness of hostile foreign activities to the
protection of information against espionage, and sabotage.
19 | P a g e
 It is also known as negative intelligence because it is an activity dedicated to the concealment and
protection of one’s own information from adversaries’ intelligence operation.

FUNCTIONAL CLASSIFICATION OF POLICE INTELLIGENCE


1. Criminal Intelligence (CRIMINT) - production of intelligence essential to the prevention of crime and the
investigation, arrest and prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT) - knowledge essential to the maintenance of peace and order.
3. Public Safety Intelligence (PUSINT) - knowledge essential to ensuring the protection of lives and properties.

INFORMATION AND ITS SOURCES


Information – All raw data or evaluated materials of every description derived from observation, communication, reports,
rumors, imagination and other sources from which intelligence is produced.
Intelligence Information – All evaluated information of every description including those derived from observation, reports,
rumors, imagery, and other source from which intelligence is produced.
Source – Where the information is obtained.
GENERAL CLASSIFICATION OF SOURCES OF INFORMATION
1. OPEN SOURCES
 The information may be obtained from news files, libraries, magazines, books, or non- classified files in
certain public or private offices. 99% of the information collected is coming from open sources. This can
be from: Enemy activity; POW; Civilians; Captured Documents; Map; Weather forecast; Studies;
researches; reports; etc.; Agencies; Informants and informers.
2. CLOSE SOURCES
 They can be located inside a building, safe or vaults. 1% of all information is from close sources. This can
be from: Surveillance; Casing; Elicitation; Surreptitious entry; Employment of technical means (bugging
and tapping); Tactical interrogation; Observation and description.

Bugging- it is the placement of a hidden microphone to the target to collect to telephone conversation.
Wiretapping- a method of collecting information through interception of telephone conversation.

Persons as source of Information:


1. Information Net – Controlled group of people who worked through the direction of the agent handler. The informant’s
principal or cutouts supply the agent handler directly or indirectly with intelligence information.
2. Informant – refers to a person who gives information to the police voluntarily or involuntarily without any consideration.
3. Informer – Those who gives information to the police for price or reward.

PHASES OF THE INTELLIGENCE CYCLE

PHASE 1 – DIRECTING COLLECTION EFFORT


 In this phase, the Intel Staff Officer or Unit commander determines the required or important information
relevant to mission. Then these requirements will be distributed to the different collection agencies by
direction or by request.
A. Determination of requirements:
a. Enemy capabilities including time, place, strength or other details.
b. Enemy vulnerabilities including the nature, extent permanence or other details.
c. Enemy order of battle
d. Terrain including natural and artificial obstacle and weather
e. Information desired by higher, lower or adjacent headquarters.
B. Determination of the essential elements of information (EEI)
EEI
 An item of intelligence or information of the characteristics of the area of operations and the enemy, which the
commander feels needed before he can reasonably arrive at a decision.
 These are evaluation based on the existing situation, current domestic and foreign situations, national objectives,
etc. In here, there is no set formula but judgment and experience are necessary.
3. Establishment of priorities (P.I.R’s)
 This is necessary to decide which items of information are more important – a system of priority is needed; critical
importance and lesser importance; EEI – highest priority intelligence requirements essential to planning.

PHASE 2 – COLLECTING THEINFORMATION


 In this phase, the collecting agency determines what specific information is to be collected, by whom and from
whom. After the collecting activity is carried out, the collected information is then submitted for processing.

Criteria or Collecting Agencies/Units:


a. Capability
b. Balance/Suitability
c. Multiplicity

20 | P a g e
Two basic Collection Strategies:
a. Resource integration – one agent
b. Agent Mixed Redundancy – 3 or more agents assessing for the same assignment
Collecting Agencies:
a. Government agencies/offices – variety of information
b. intelligence units/agencies
c. organizations
Who is Task to Collect Information?
a. Intelligence officers/agents – regular members
b. Civilian agents – informers and informants
Methods of Collection
a. overt – open
b. covert – secret
COLLECTION PLANNING
 The continuous process which ultimately coordinate and integrate the efforts of all collecting Agencies/Units.

PHASE 3 – PROCESSING THE COLLECTED INFORMATION


A. Recording
 The reduction of information into writing or some other form of geographical representation and the arranging of this
information into groups of related items.
B. Evaluation
 The determination of the pertinence of the information to the Operation reliability of the source or of the agency the
accuracy of the information; or examination of raw information to determine intelligence value.

Evaluation to Determine:
a. Pertinence (usefulness) - Does it hold some value to current operation? Is it needed?
b. Reliability (dependable) -Judging the source of information
c. Credibility (truth of information)
 Is it possible for the reported fact or event to have taken place? Is the report is consistent within
itself? Is the report is confirmed or corroborated by information from different sources or agencies? If
the report does not agree with information from other sources, which one is more likely to be true?

EVALUATION GUIDE

RELIABILITY OF ACCURACY OF SOURCES OF INFORMATION


IFORMATION INFORMATION
A– Completely 1–Confirmed by T– Direct observation by the commander and chief of a
reliable other sources unit
B– Usually 2– Probably true U– Reports by penetration agent or resident agent
reliable V–Report by PNP/AFP troops involved in encounter
C– Fairly reliable 3–Possibly true W– Interrogation of captured enemy agent/foreigner
D– Not usually 4–Doubtfully true X–Observation of government and civilian employee or
reliable 5 –Improbable official
E–Unreliable 6–Truth cannot be Y– Observation by a member of the populace
F--Reliability cannot judged Z - Documentary
be judged

(CUFNUR) (CProPDIT)

C. Interpretation
 It is establishing the meaning and significance of information. It involves the following:

1. Analysis - The determination of significance of information relative to the information and intelligence already known and
drawing deductions about probable meaning of the evaluated information. It is done by shifting and isolating those
elements that have significance in light of the mission or national objective.
2. Integration - It is combination of the elements stated in assessment with other known information or intelligence to form
a logical feature or hypothesis for enemy activities or the information of the operational area and characteristics of the
omission of the command.
3. Deduction - The formulation of conclusions from the theory developed, tested and considered valid; determination of
effort and meaning of the information.

PHASE 4 – DISSEMINATION AND USE


 Final phase of the cycle. Processed information is disseminated to the agency, unit or command to effect or
implement the mission. Dissemination is through:
21 | P a g e
Criteria of Dissemination:
1. Timeliness - must reach the users in time to be of value
2. Propriety - The message must be clear, concise and complete, as well as in the proper form for the receiver to
readily understand its contents. It must be disseminated to the correct user, presented in a form that leads itself to
immediate use and distributed by the most effective means appropriate to the both time and security requirements.

INTELLIGENCE OPERATION
 It is the result of intelligence planning. Planning is always ahead of operation although an operation can be made
without a plan. It is usually due to sudden and inevitable situations but definitely, this is poor intelligence
management.
Infiltration - the insertion of action agent inside the target organization
Penetration- recruitment of action agent inside the target organization

OVERT OR OPEN METHOD (Overt Intelligence)


 The information of documents is produced openly without regards as to whether the subject of the investigation
becomes knowledgeable of the purpose for which it is being gathered.

COVERT METHOD (Covert Intelligence)


 The information is obtained without the knowledge of the person against whom the information or documents may
be used, or if the methods of procurement are done in an open manner.

OVERT METHODS OF GATHERING INFORMATION


1. Interview 4. Research
2. Interrogation 5. Investigation
3. Instrumentation 6. Debriefing

PROCUREMENT AS USED IN INTELLIGENCE PARLANCE


 Is the aggressive effort to acquire certain specific information that may not be readily available. To this end, a
number of means may be used as:
1. Classical Intelligence - utilizes human being to gather information
2. Modern/Technical Intelligence - Employs machine and human such as satellites, electronic gadgets to gather
information.

ESSENCE OF PROCUREMENT
 The essence of procurement is ACCESS, someone or some device had to get close enough to a thing, a place or a
person to observe or discover the desired facts without arousing the attention of those who protect them. The
information must then be delivered to the people who want it. It must move quickly or it may get stale, and it must
not get lost or disintegrated in route.

PROCURING AGENTS
1. Agent in Place - One who has been recruited by an intelligence service within a highly sensitive target and
who is just beginning his career or have been long outsider or insider.
2. Double Agent - An enemy agent, has been captured, turned around and sent back where he came from as an
agent of his captor.
3. Expendable Agent - An agent through whom false information is leaked to the enemy
4. Penetration Agent - An agent who infiltrates and reaches the enemy to get information and would manage to
get back alive.
5. Agent of Influence - An agent who uses influence to gain information.
6. Agent Provocation - Provoking agent

METHODS OF COVERT OPERATION


Elicitation
 It is a system or plan whereby information of intelligence value is obtained through the process of direct
communication where one or more of the parties to the communication is /are unaware of the specific purpose of
the conversation.
Two devices in the conduct of Elicitation:
1. Approach- the process of setting people to start talking.
2. Probe- the process to keep the person talking incessantly.

Types of Approach:
1. Flattery- people are susceptible to praise
Variants:

22 | P a g e
a. Teacher- Pupil approach- the subject is treated as an authority. We request him/her to enlighten us and we
solicit his viewpoint and opinions. The collector builds the theme that he is an ignorant student who wants to
learn from the all knowing teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal having some specialized quality and you
flatter him/ her by showing enough concern for his/ her welfare to pay special attention to his enjoyment. The
collector attempts to build on professional brotherhood and understanding of what the source of information is
going through and sharing the source’s frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and assistance are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration of he source of information and express
curiosity on how one could achieve such greatness.

2. Provocative approach-discover a wide range of conversational gambits.


Variants:
a. Teaser Bait Approach- the collector will direct the conversation and to a certain topic and throw out a
provocative statement that may be incorrect, which will in effect force the source to correct the collector.
b. Man from Missouri Approach- The collector will disbelieve what the source is saying to a point where the source
is force or prove the accuracy of his words through additional information. The elicitor adopts unbelievable
attitudes above anything. He questions all statements and oppositions.
c. Joe Blow Approach (Know it all) –The collector will become arrogant and project a message that he/she knows
it all. Eventually, the source of information starts to show the intelligence collector, how much he doesn’t know
by divulging additional information, generally prefaced by “Well if you know everything, did you know……?
d. National Pride Approach- nature propensity of all people to defend their country and its policies. The collector
will tie the required information to national pride in an attempt to get the source to confirm, deny or elaborate on
information.
e. Partial- Disagreement approach- seek to produce talking by the word “I’m sure if I fully agree”.

Types of Probe:
1. Competition Probe- this is effective when used in connection with the teacher- pupil approach.
2. Clarity Probe- used to elicit additional information in an area which the response is clear.
3. High Pressure Probe- it serves to pin down a subject in a specific area or it maybe used to point out contradictions in
what the subject has said.
4. Hypothetical Probe- present a hypothetical situation and to get the subject to react to the hypothetical situation.

Casing
 Literally means putting a thing, or place in a case. As used in intelligence operation – the continuous monitoring of a
place or area at a given period of time.
 In intelligence operation, it is reconnaissance or surveillance of a building, place or area to determine its suitability
for intelligence use or its vulnerability in operations.
Information desired in Casing
1. Area Condition and Habits
a. Detailed sketch and photograph of the area.
b. Customs, habits, language and dress in order to be able to blend with the community.
c. Transportation facilities, the fare, station, in order not to ask questions.
d. Knowledge of establishments determine what are desirable, if are free from raids anytime to avoid compromise.
e. You must know what kind of people residing in the neighborhood so that agent will know what appropriate actions
he takes.
f. Restrictions
g. Description of the subject
2. Active Opposition (capabilities, People they employ, intentions, fear, vulnerabilities)
3. Escape and Evasions- In case of compromise, the agent must get out entirely from the target.
Stages of Casing:
1. Area familiarization
2. Actual inspection of the area
3. Re-casing

Methods of Casing
1. Personal reconnaissance - The most effective method and will produce the most information since you know just
what you are looking for.
2. Map reconnaissance - May not be sufficient but it can produce a certain amount of usable information.
3. Research - Much information can be obtained or acquired through research.
4. Prior information - Aside from your unit, other units may have file report that they may provide you with relevant
information.
5. Hearsay- Information usually gain by the person operating in the area and performing casing job.

Surveillance

23 | P a g e
It is a process or act of keeping person, premises or vehicles under observation in order to acquire detailed
information concerning the activities, identities and contact of the subject. It is concerned primarily with persons. It involves
many varied techniques and skills including preparation, foot surveillance, automobile surveillance, stationary of fixed
surveillance, and reconnaissance. Also, tailing, shadowing, trailing or keeping the subject under observation.

An objective of Surveillance is to disclose or divulge the existence of illegal criminal activities and to reveal the identities of
those engaged in such activities.

TERMS USED:
4. Pre-surveillance Conference - A conference held among the team members, police intelligence unit before a
surveillance is conducted.
5. Stake out - The observation of places or areas from a fixed-out point.
6. Tailing or Shadowing - It is the observation of a person’s movement.
7. Undercover Man - A person trained to observe and penetrate certain organization suspected of illegal activities and the
later reports the observation and information so that proper operational action can be made.
8. Liaison Program - This is the assignment of trained intelligence personnel to other agencies I obtain information of
police intelligence value.
9. Safe House - It is place, building, enclosed mobile, or an apartment, where police undercover men meet his action
agent for debriefing or reporting purposes.
10. Drop - It is a convenient, secure, and unsuspecting place where a police, undercover man, informer, or informant by a
pre-arrangement leaves a note, a small package, an envelope to item for the action agent, supervisor or another agent.
11. Convoy - An accomplice or associate of the subject.
12. Decoy - Any person almost similar to the subject used to avoid or elude surveillance.
13. Contact - Any person or subject picks or deals with while he is under surveillance.
14. Made (burn out) -When subject under surveillance becomes aware that he is under observation and identifies the
observer
15. Lost - When the surveillants do not know the where about of their subject or the subject had eluded the surveillants.
16. Rabbit (hare) - Term referring to the subject of shadowing and tailing.
17. Test for tailing - The common trick of the subject (rabbit) when he becomes conscious that he is being tailed. The rabbit
usually boards a public conveyance then jumping off the vehicle then he looks about quickly to determine if any another
person jumps off also.
18. Finger man- an individual who can positively point the subject.
19. Put the finger on- to identify the subject by pointing him out in person or in photograph.
20. Put to bed- when the subject under surveillance returns to quarter and apparently retire for the night.

Classification of Surveillance according to intensity


1. Discreet- one in which every effort is made to ensure that the subject is unaware that he is under
observation/surveillance.
2. Close Surveillance- one in which maintaining constant observation of the subject is the objective regardless of whether
or not he becomes aware of the surveillant.
3. Loose- one in which may be applied frequently or infrequently with the period of observation varied of each occasion.

Classification according to method


1. Fixed or Stationary method (Stake out/ Plant) Observation of place usually a bookie stall, gambling joint, or a residence
where illegal activities are committed (fixed point position).
2. Moving Surveillance - Surveillants follow the subject from place to place to maintain continuous watch/ observation of
his/ her activities.
3. Technical and Audio- visual surveillance Uses communication and electronic hardware’s, gadgets, systems and
equipments. Ex: taps and bugs

Kinds of Surveillance
a. Stake Out or Surveillance of Places
b. Tailing or shadowing
c. Undercover investigation or “Roping”

A.Surveillance of Places
Two types of place surveillance
1. Using a room in a nearby house or business establishment and remaining undercover.
2. Remaining outdoors and posing as a person who would normally conduct his business in such an area, ex. A
laborer, carpenter, street vendor, etc.
Equipment used in the surveillance of a place: Ex: camera w/telephoto lens etc.

B. Shadowing or Tailing
 It is the act of the following a person

24 | P a g e
Methods of Shadowing /Tailing by foot
1. One-man shadow
2. Two- man shadow
3. Three-man shadow or ABC method

Particular Tactics and Techniques of Shadowing:

1. Turning Corner- If the subject turns a corner, the surveillant should not hurry. If the subject is lost, the nature of the
neighborhood will determine the subsequent procedure. In most cases, it is preferable to lose the suspect than to alert him
to the tail.
2. Entering a Building- If the building is a store, the surveillant should wait until the subject comes out. In buildings having a
number of exits, it is necessary to follow him inside. If the subject enters an elevator, the surveillant should board the same
elevator. The surveillant may tell the elevator boy that his destination is the same floor as the subject, or he may proceed to
the top floor, if there are more than one surveillant, one should alight at the subject’s floor and should proceed in a different
direction then the latter can return to the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and on the same side. If he misses the
bus, he should hire a taxi and board the bus at a point ahead.
4. Taking a taxi- When the subject takes a cab, the surveillant records the time, place and name of the taxi’s company and
license. He should endeavor to follow in another taxi. If this results in failure, he should trace the taxi by means of recorded
information and ascertain the destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant should endeavor to get in line behind
him with one person intervening. If he hears the destination requested by the subject he may buy a similar ticket. In the
event that he is unable to hear the destination, he should merely request for a timetable.
6. In a restaurant - The surveillant should allow a few minutes to elapse before following the subject into a restaurant. He
should then take an obscure sect and arrange to finish his meal at the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he registered, the surveillant can take the
adjoining room.
8. In a telephone booth- The surveillant should either go into the next booth or stand near enough to hear. He should note
the telephone book use and the page at which it was left open.
9. In the Theater- The surveillant should sit behind the subject and take not of the various exits which are available.

Observation and Descriptions (Odex)


OBSERVATION
 The complete and accurate awareness by an individual of his surroundings and encompasses the use of all major
senses to register and recognize its operational or intelligence significance.
DESCRIPTION
 The factual reporting of what is observes. Or, it is the actual and factual reporting of one's observation or the
reported sensory experience recounted by another.

Psychologists estimate that approximately:


1. 85% of your knowledge is gathered through sight.
2. 13% of your hearing.
3. 2% through the three senses.

Clandestine Operation
 Clandestine operation is a secret action undertaken by an intelligence/counter - intelligence organization in
behalf of the Government or other friendly forces.

Classification of Clandestine Agent

1. PRINCIPAL AGENT is a managerial agent and in most cases the leader of the agent network..
2. ACTION AGENT- is the doer of the clandestine task and further classified according to the task that he was
assigned.
a. Espionage - (counter intelligence/intelligence agent) is the primary and most important human collector
b. Propagandist - this agent undertakes action to mold the attitudes, opinions and actions of an individual group
or actions of an individual, group or nation.
c. Saboteur - an agent who undertake positive actions against unfriendly power resulting them in the loss of
used temporary or permanent of an article, material, or facility.
d. Guerilla - a member of paramilitary group organized to grass the enemy.
e. Strongman - is an agent available to provide special protection during the dangerous phases of clandestine
operation.
f. Provocateur - an agent who induces an opponent to act to his own detriment by desecrating himself or
revealing his true purpose or identity.
g. Cover Action Agent - a fully recruited agent who is in a senior position usually within the government who can
exert influence from foreign government upon direction of the sponsor.

25 | P a g e
2. SUPPORT AGENT - an agent who engages in activities which support the clandestine operation. This agent performs
all types of auxiliary services at the direction of the case or project officer.

Cover and Undercover/Roping

Undercover/ Roping Operation- an intelligence/ investigation technique in which the investigator conceals his true identity
and adopts an assumed role to accomplish an intelligence/ investigation mission.
COVER - Any device by person, organization to insure that one who does not have the right to know must be aware of the
real purpose of the mission. Or it is a means by which an individual group or organization conceals the true nature of its acts
and or existence from the observer.

COVER STORY - A biographical data through fictional, which will portray the personality of the agent he assumed: any
scenario to cover up the operation.

COVER SUPPORT - An agent assigned in target areas with the primary mission of supporting the cover story.

Essential Types of Cover


1. Natural cover - using actual or true background
2. Artificial - using biographical data adopted for the purpose
3. Cover within a Cover -Justification of existence.
4. Multiple cover - Any cover you wish.
ORGANIZATIONAL COVER
 Any abound consisting of biographical data which when adopted by an individual will assume the personality
he wants to adopt.
Objectives of Organizational Cover
1. To camouflage and protect operational personnel and their activities.
2. To protect installation in which clandestine activities are based.
UNDERCOVER ASSIGNMENT
 It is an investigation technique in which an agent conceals his official identity to obtain information from that
organization.
Types of Undercover Assignment:
a. Dwelling Assignment-to reside in or near the dwelling of target to maintain constant contact with the home life of the
subject.
b. Work Assignment- getting employed where the investigator can observe the activities of the subject at his place of
work.
c. Social Assignment- frequent places of entertainment and amusement habitually being visited by the target.
d. Personal Contact Assignment- the investigator is required to develop the friendship and trust of the target.
e. Multiple Assignment – the investigator is tasked to cover two or more of the above specific assignments
simultaneously; it can produce extensive information with minimum expenses but more prone to compromise.
f. Rope job - striking up friendship with the subject.

Factors to consider in the Selection of Action (Undercover) Agents:


1. Placement- Location of prospective agent with respect to the target
2. Access - The capability or ability of the perspective agent to obtain the desired information for the intelligence
organization or to perform the intelligence collection mission in the area.
A. Primary Access - It is the access of the desired information.
B. Secondary Access - The access to the desired information through principal source where the letter has the
direct access.
C. Outside Access - The agent employed outside the target and merely monitors information from a third person
who is monitoring information in the area.

Golden Rules of an Undercover agent:


1. Don’t drink while working as under cover. Drink is a great tongue looser. But, it is well to get the subject.
2. Don’t court women. Usually the less contact the agent has with women, the greater is the chance of success.
The investigator cannot afford to incur the enmity or jealousy of a subject who might think that the investigator
is “making time” with his girl friend.
3. Don’t take woman on an undercover assignment. The subject may become interested in the woman. If this
happens, the subject attention is diverted from those things in which the investigator’s interests lie. The woman
maybe placed in an embarrassing or impossible situation form which extrication may disclose the identity of the
undercover investigator.
4. Don’t claim to be a “big shot”. It is too easy to identify a big shot. It will cause more inquiries to be made in the
place. It is better to assume a character of average status or less.

26 | P a g e
5. Don’t fail to provide persons in the place who can vouch for the investigator
6. Don’t spend too much money. Expenditure maybe in keeping with the part, if not, suspicion is aroused. Many
agents have given themselves away by spending more money than the amount justified.

CONTROL
 Authority to direct agent to carry out task or the requirements in behalf of the clandestine organization in
acceptable manner and security.
Two Categories of Control
1. POSITIVE CONTROL - Characterized by professionalism and rapport
a. Agent motivation
b. Psychological control
2. NEGATIVE CONTROL - characterized by blackmail and threat
a. Disciplinary action - Includes verbal reprimand for poor performance or insecure action withholding certain
materials, rewards reduction of agent salary or extreme situation and threat of terminating personal
relationship.
b. Escrow account - Control of an agent by putting his salary in a bank to be withdrawn only after fulfillment of
the condition.
c. Blackmail

COUNTER INTELLIGENCE

COUNTER INTELLIGENCE DEFINED


 Aspect of intelligence which in peace or in war is concerned with the detection prevention and neutralization or
espionage, sabotaged subversion or other inimical foreign intelligence activities, by planning and developing
suitable countermeasures to what such hostile activities.
 Covers the activity denotes and destroying the effectiveness of. Hostile foreign activities and to the protection of
information against espionage, subversion, and sabotage

Counter intelligence – is also known as negative intelligence

THREE ACTIVITY OF COUNTER INTELLIGENCE:


1. Protection of information against espionage.
2. Protection of personnel against subversion.
3. Protection of installation and materials against sabotage.

Espionage- is the act or practice of spying. The use of spy by a government in order to discover the military or political
secret of other nations.
Sabotage- destruction of property or obstruction of public service to undermine a government, police, or military effort.
Subversion- is an act that seeks to overthrow a constituted government it is also an act or instance of subverting.

GENERAL TYPES OF CI
1. Passive Measures (offensive)- Those measures which seek to conceal information from the enemy.
2. Active Measures (defensive)- Those measure which seeks active block to the enemies’ effort to gain information
or engage in espionage, subversion or sabotage.
3. Deception Measures - To deceive the enemy.

COUNTER-INTELLIGENCE INVESTIGATION
 It is an activity which constitutes the value of work load and includes specific investigation of individual and
incidence which for the most part are conducted in an overt but discrete manner.

SECURITY SURVEY VS SECURITY INSPECTION

1. SECURITY SURVEY
 A counterintelligence service conducted in order to assist the chiefs of office in determining the security
measures required to protect key installations from possible sabotage, espionage, subversion and
unauthorized disclosure of or access to- classified defense information or materials.
2. SECURITY INSPECTION
 A counterintelligence service conducted in order to determine degree of compliance with established
security policies and procedures.
DEFINITION OF TERMS
1. Security
 It is the protection of classified information, materials and equipment from disclosure to unauthorized
person.

2. Document Security

27 | P a g e
 The placements of security classification, handling and use of classified information.
3. Classified Information
 This includes all information concerning document cryptographic devices, development project and
materials following on the categories of Top Secret Confidential or Restricted.
4. Classified Matter
 Any information in materials in any form or any nature, the safeguarding of which is necessary in their
interest of Natural Security and which is classified of such purpose by the responsible classification
authority.
5. Classify
 This refers to the assigning of information or material, one of the four security categories after
determination been made that the information requires the security protection as provided.
6. Declassify
 The act of removing the security classification from classified information or matter.
7. Reclassifying or Regarding
 Refers to the act of changing the assigned classification of the classified information or matter.
8. Upgrading
 Refers to the act of assigning the information or matter to the higher classification than that previously
assigned to it.
9. Certification of Destruction
 It is a certification by a witnessing officer that the classified matters described therein has been disposed
of in his presence in approved destruction methods.
10. Compartmenting (compartmentation)
 Refers to the grant of access to classified matter only properly cleared person when such classified
information is required in the performance of their official’s duties.
11. Need to Know
 It is the dissemination of classified information or matter to be limited strictly to those person whose duties
requires knowledge or possession thereof; it is the principle whereby access to classified mater may only
be given to those persons to whom it is necessary for the fulfillment of their duties.
12. Security Clearance
 It is the certification by a responsible authority that the person described is cleared for access to classified
matter in the appropriate level.
13. Unauthorized
 Refers to person not authorized to have access on classified matters.
14. Compromise
 Takes place through the loss of security, which results from unauthorized persons, obtained knowledge of
classified matters.
15. Damage to National Security
 Refers to the prejudice, embarrassment or jury to the country resulting from act or omission.

FOUR CLASSIFIED MATTERS

1. Top Secret (Green Color code)


Any information and materials, the authorized disclosure of it would cause exceptionally grave damage to the nation,
politically, economically or militarily.

Authority to Classify Top Secret Matters:


a. Secretary of National Defense
b. Chief of Staff and its equivalent to the PNP.
c. Major services commanders.
d. Area and Unified Commands of the PA, PNP, and its equivalent to the PAF and PN.
2. Secret (Red Color Code)
Any information and materials, the unauthorized disclosure of which endanger National Security, causes serious injury
to the interest and prestige of the nation or of any government activity or of great advantage to foreign nation.
Authority of Classify Secret Materials:
a. Commanders of Infantry Battalion
b. Person enumerated under Top Secret
c. Special and Personnel staff of GHQ
d. General and Special staff of Major Service areas and unit commanders
e. Superintendent of the PMA and PNPA
f. Commanders of post, depots, station of separate units
g. Chief of Military mission or group
h. Armed Forces Attaches
i. Commandants of service Schools
3. Confidential (Blue Color Code)

28 | P a g e
Any information and material the unauthorized disclosure of which would be prejudicial to the interests and prestige to
the national or governmental activity or would cause administrative embarrassment or unwanted injury to and or would
be of advantage to foreign nations.

4. Restricted (White or No Color Code)


Any information and material which requires special protection other than those determined to be confidential, secret,
and top secret. Yet prior to release require clearance with the records custodian.

FUNDAMENTAL OF CRYPTOGRAPHY, ENCODING AND DECODING


DEFINITION OF TERMS:
1. Cryptography - Study/science of encoding information in the form of codes and ciphers; the act in writing in cipher
or secret character or the particular used.
2. Codes - A system on which arbitrary group of symbols represented by other letter rather than by a complete words,
phrases or sentences.
3. Cipher - A system in which individual letters of a message are represented by other letter than by a complete
words, phases or sentences; the secret manner of writing the key to its code.
4. Cryptogram - Encrypted text/message complete with heading of message written in unintelligence text or language
which implies/convey-hidden meaning.
5. Decoding - To retranslate a message into ordinary language from cipher or code.
6. Document - Any recorded information regardless of its physical form or Characteristic and includes but not limited to
the following:
a. Written matters whether handwritten, printed or type
b. All painted, drawn, or engraved matter.
c. All sound and voice recording.
d. All printed photographs, exposed or printed film, skill or moving
e. All reproduction if the foregoing.
7. Encoding - To convert a message to a code.
8. Translation - The transformation/conversion of one language to another. There are three types: Full — everything is
translated or forwarded; Extract - only portion of it is translated; and summary - translate only main part.

29 | P a g e

You might also like