Fundamentals of Criminal Investigation
Fundamentals of Criminal Investigation
Fundamentals of Criminal Investigation
Investigation 1
Fundamentals of Criminal
Investigation with Police
Intelligence
1|Page
PART I: CRIMINAL INVESTIGATION
CRIMINAL
This refers to a person convicted of a crime by a final judgment.
INVESTIGATION
The term investigation comes from the Latin word “vestigare” which means: to track, trace or probe.
CRIMINAL INVESTIGATION
Criminal investigation seeks all facts associated with a crime to determine the truth: what happened and who is
responsible of a criminal incident.
Criminal investigation is also the collection and analysis of facts about persons, things and places, subject of a
crime to identify the guilty party, locate the whereabouts of the guilty party, and provide admissible evidences to establish
the guilt of parties involved in a crime
• CRIMINAL INVESTIGATION AS AN ART = It deals with the identity and location of the offender and then proving
his guilt through a criminal proceeding. It is an art because it is not governed by rigid rules but based on intuition
and to a minor extent, by chance.
• CRIMINAL INVESTIGATION AS A SCIENCE = A systematic method of inquiry that apply scientific knowledge,
principles, and methodologies in order to discover, identify, collect, and process facts and evidence to promote
justice.
A public safety officer who is tasked to conduct the investigation of all criminal cases as provided for and embodied
under the Revised Penal Code/Criminal Laws and Special Laws which are criminal in nature. A well trained, disciplined and
experienced professional in the field of criminal investigation duties and responsibilities.
The primary job of the investigator is to discover whether or not an offense has been committed under the law, after
determining what specific offense has been committed, he must discover how it was committed, by whom, where it was
committed, when, why and how it was committed (Cardinal points of Investigation 5W’s and 1H).
2|Page
QUALITIES OF COMPETENT / GOOD CRIMINAL INVESTIGATORS
1. Perseverance
• Refers to the steadfastness or persistence and resolution to bring the desired result in spite of obstacles connected
with criminal investigation.
2. Endurance
• This is the ability to last physically and mentally hence;
3. Incorruptible Honesty and Integrity
• In the practice of his art, there is the ever temptations of money, women and drinks where these are present in
every corner laying tricks of temptations.
4. The Intelligence and Wisdom of Solomon
• This is very important in order that the investigator could easily decipher falsehood from truth and separate the
grain from the chaff.
5. Acting Activity
• It is the ability to go down to the level of the minor, the prostitute or the slum dwellers, or the level of the other
professionals or the members of the elite.
6. Mastery of the Oral and Written Communication in order that he will not suffer setback in getting the accurate facts
especially in the preparation of reports and or transmittal of information.
7. The Keen Power of Observation and Description
• These are very important in crime scene investigation and in interview and interrogation.
8. Courage
• It is the moral fortitude to tell the truth no matter who will be hurt.
9. Legal Knowledge
Working Knowledge of Criminal Law, Evidence, Criminal Procedure, and Penal Special Laws.
10. The Power to “Read between the Lines”
• This is the ability of investigator to interpret the words or phrases encountered in the process of investigation in their
deeper meaning in order to arrive with concrete meaning of a certain statement.
11. Working Knowledge of Martial Arts and Firearms Proficiency
Because He will find himself in many occasions that he will be alone in confronting, arresting, bringing to
headquarters and interrogating the offenders.
• Training, as one of the foundations of investigation, is concededly a vital ingredient in the creation of a total
investigator. Experience alone does not make one a good investigator. The fusion of the best training and vast
experience is a formidable force that can threat even the most sophisticated technology and syndicated crimes.
• The National Forensic Science Training Institute (NFSTI) under the Philippine Public Safety College is the institution
that trains uniformed personnel of the Philippine National Police to become a certified investigator.
INFORMATION
It is the knowledge/data which an investigator acquired from other persons and records.
Information is the first vital key of successful investigation.
Classes of Information
• Regular Sources – records, files from government and non-government agencies, news items.
• Cultivated Sources – information gathered upon initiative of the investigator from informants and informers.
• Grapevine Sources – these are information coming from the underworld characters such as prisoners and ex-
convicts.
1, OVERT = The visible way of obtaining information like conducting interview, patrol, crime scene search, regular
performance of police activities and custodial interrogation.
2. COVERT = The secret way of obtaining information
3|Page
TYPES OF INFORMATION
1. SENSORY FORM= the outward manifestations of a criminal event that can be perceived by out five senses – eyes, ears,
nose, tongue and hands.
2. WRITTEN FORM = A criminal act may also provide information is a written form like receipts from the motel, food and
drinks in the pocket of the suspect.
3. PHYSICAL FORM = The information may actually be in a real form – meaning the failure to retrieve it or receive it at the
right time will be useless.
INTERVIEW VS INTERROGATION
• Interview means the asking of simple questions to a person who is fully cooperating with the investigator, and
willingly gives truthful answers to the investigators query
• Interrogation is described as the vigorous and controlled questioning of a person who is reluctant to divulge
information or seeks means to evade it
TYPES OF INTERVIEW
1. BACKGROUND INTERVIEW = This is focused only in obtaining data regarding the personal background of the subject,
the simplest type of interview used in criminal cases.
2. SUBJECTIVE INTERVIEW = An interview wherein the questions are phrased in a manner such that the subject’s
answers are based on his personal opinions or views. Questions are designed to deal with the subjective aspect of the
case.
3. OBJECTIVE INTERVIEW = The questions are designed to acquire the basic and specific data or facts regarding a
criminal case. It is the type of interview that complies with the six cardinal points of criminal investigation ( the 5 W’s and 1
H)
The interview of a witness can be format by its acronym ‘IRONIC’ which stands for Identity, Rapport, Opening Statement,
Narration, Inquiry, and Conclusion.
• Identity—prior to the commencement of an interview, the investigator should identify himself to the subject by name,
rank and agency. Except when there is no need to know the officer’s identity.
• Rapport—it is good to get the positive feeling of the subject towards the investigators; such friendly atmosphere is a
vital for both the subject and the investigator to have a better interaction.
• Opening Statement— The investigator must have to indicate why the subject is being interviewed.
• Narration—The witness should be allowed to tell all he knows with little interruptions from the investigator.
• Inquiry—after all information have been given by the subject, that is the time for the investigator to ask question to
clarify him about the case under investigation.
• Conclusions—After the interview, it is but proper to close the interview with outmost courtesy and thanking the
subject for his cooperation.
STAGES OF INTERVIEW/INVESTIGATION
1. PRELIMINARY = The first or initial questioning usually conducted at the crime scene. It serves as the foundation of the
case
2. FOLLOW-UP /IN DEPTH= This is to obtain further information that was missed during the initial interview and to clarify
data that has been already gathered.
3. FINAL = This is the last step of questioning that may lead to the act of offering a witness to testify during court trial.
The investigating officer works closely with the prosecuting attorney.
PERSONALITIES OF INTERVIEWEES
a. Know-Nothing Type
b. Disinterested Type
c. Drunken Type Egoistic/Egocentric
d. Suspicious Type
4|Page
e. Talkative Type
f. Honest Witness
g. Deceitful Witness
h. Timid Witness
i. Boasting Witness
j. Refusal to Talk
INTERROGATION
Interrogation is a questioning of a person suspected of having committed an offense
INTERROGATION ENVIRONMENT
1. PRIVACY = This can be achieved by the presence of only one door of the investigation room, absence of windows or
view, sound proof and telephone without a bell.
2. SIMPLICITY = Distraction should be kept to its minimum. Too many objects may distract the attention of the subject. This
can be accomplished by a medium size investigation room, bare walls, no glaring lights, and minimum furniture.
3. SEATING ARRANGEMENTS = The investigator and subject must be seated without any intervening furniture, straight
back chair for the suspect, table with flat surface, the back of the suspect must be facing the door
4. THE TECHNICAL AIDS = installation of recording device and one-way mirror.
1. VOLUNTARINESS = The statement of a person being interrogated must have been made voluntary and must not be the
product of threat, fear, fraud, coercion, or other improper tactics.
2. INTERROGATION WHILE IN CUSTODY = The warning of rights or giving the MIRANDA WARNING/DOCTRINE
MIRANDA RIGHTS
*Any confession obtained in violation of these rights shall be inadmissible in court as evidence
MIRANDA DOCTRINE – this case which entitled Miranda vs. Arizona, is a US Supreme Court Jurisprudence which laid
down the constitutional rights of the accused during custodial investigation. It was incorporated in our 1973 Constitution and
later in the 1987 Constitution of the Philippines.
MIRANDA DECISION
A kidnapping and rape investigation in Phoenix, Arizona, resulted in the arrest of Ernesto Miranda as the suspect.
Following a lineup identification by the victim, the suspect was interviewed for two hours-a relatively short period of time for
a major case of this nature. During this time period, Miranda confessed orally, then gave investigators a written confession
regarding the offense. The suspect was subsequently convicted, with the Arizona Supreme Court upholding the lower court
decision. The United States Supreme Court reversed this decision, stating that the suspect’s rights to counsel and his
protection against self-incrimination had been violated. As a result of this landmark decision, the so-called MIRANDA
WARNING has become mandatory. Suspects taken into custody or deprived of their freedom of action, who are to be
questioned by law enforcement officers.
5|Page
INTERROGATION TECHNIQUES
1. Emotional Appeal
Place the subject in the proper frame of mind. The investigator should provide emotional stimuli that will
prompt the subject to unburden himself by confiding.
Analyze the subject’s personality and decide what motivation would prompt him to tell the truth, then
provide those motives through appropriate emotional appeals.
2. Sympathetic appeal
The suspect may feel the need for sympathy or friendship. He is apparently in trouble. Gestures of
friendship may win his cooperation.
3. Kindness
The simplest technique is to assume that the suspect will confess if he is treated in a kind and friendly
manner.
4. Extenuation
The investigator indicates he does not consider his subject’s indiscretion a grave offense.
5. Shifting the blame
The interrogator makes clear his belief that the subject is obviously not the sort of person who usually gets
mixed up in a crime like this.
The interrogator could tell from the start that he was not dealing with a fellow who is a criminal by nature
and choice.
6. Mutt and Jeff
Two (2) agents are employed.
Mutt, the relentless investigator, who is not going to waste any time because he knows the subject is guilty.
Jeff, on the other hand, is obviously a kind-hearted man.
7. Bluff on a Split Pair
this is applicable when there are more than one suspect. The suspect are separated and one is informed
that other has talked.
8. Pretense of Physical Evidence
The investigator may pretend that certain physical evidence has found by laboratory experts against him.
9. Jolting
May be applied to calm and nervous subjects by constantly observing the suspects, the investigator
chooses a propitious moment to shout a pertinent question and appear as though he is beside himself with rage.
The subject may be unnerved to the extent of confessing:
INSTRUMENTATION
It is the application of instruments and methods of physical science to the detection of crimes. In cases where there
is no significant physical evidence to be found, then the use of instrumentation is relatively unimportant. (It is also known as
Criminalistics)
Development of Criminalistics
Before the 1900s criminal investigation relied almost exclusively upon the interaction of people. Detectives used
their skills as interviewers and persuaders to obtain information regarding innocence or guilt. This form of information
gathering, including the frequent use of the informant, was nearly the sole means of field criminal detection. Today the
emphasis is very different. Current methods involve, to a large extent, what is known as criminalistics. or the more generic
term forensic science. In its simplest form, criminalistics is the application of many fields of natural science in the detection
of crime. Chemistry, physic, biology and mathematics are frequently considered the backbone of forensic science.
In the process of instrumentation, the following equipment are being used, namely:
1. The first used was Anthropometry found by Alphonse Bertillon. He is a Frenchman who founded criminal identification by
body measurement. It was accepted and adopted by police departments in Europe and the United States for more than
twenty (20) years. But due to the West case, Anthropometry disappeared, which up to the time of his death in 1914,
Bertillon never accepted its uselessness.
6|Page
2. Dactyloscopy replaced Anthropometry. It was popularized by Sir Edward Richard Henry in Europe and through Juan
Vucetich who founded the fingerprint classification, it was found to be accurate. Its usefulness in criminal investigation
cannot be questioned because its infallibility because no two persons have the same fingerprints not even the ten
neighboring fingers of the same persons.
3. Forensic Serology was discovered by Karl Landsteiner in 1901 the agglutination of human blood. This discovery
demonstrated that blood possesses certain characteristics, which allowed the designation A, B, AB and 0.
4. Forensic Ballistics developed by Dr. Calvin H. Goddard, a U.S. Army Physician with a rank of Lieutenant Colonel. It is
used for determining whether or not the evidence bullet and test bullet came from a single gun through the use of bullet
comparison microscope.
5. Poroscopy founded by Edmond Locard, one of the foremost criminalists in the world. Poroscopy deals with the
identification of sweat pores, he proved that pores vary in number, size and position in each individual.
6. Polygraph (lie detector) was develop by John Larson although it was founded by Keller. It is effective in limiting the
suspects in number as in the hand of an expert and dependable machine its result is excellent.
7. In 1984, Alex Jeffrey’s, a British biologist and genetics expert, discovered the concept of DNA genetic fingerprinting.
IDENTIFICATION OF CRIMINALS
CONFESSION– is the direct acknowledgement of guilt arising from the commission of a crime.
Types of Confession
TAKE NOTE; Corpus delicti - (latin word for the “body of the crime”) - used to describe the physical or material evidence that
a crime has been committed. ex. corpse of a murder victim.
• Judicial Confession– those made by the accused in open court. The plea of guilt may be during arraignment or in
any stage of the proceedings where the accused changes his plea of not guilty to guilty.
ADMISSION - An admission is a self-incriminatory statement by the subject falling short of an acknowledgement of guilt. It
implicates but does not incriminate. (indirect acknowledgement of guilt)
7|Page
• The prevailing conditions of visibility and observations when the crime was committed.
• The lapse of time between the criminal event and the identification.
• Known fugitives—if the criminal is known, then police records and pictures are available. His relatives and friends
can offer a description. Further description may be obtained from local police files, background investigation and
from verbal descriptions of others.
• Unknown criminals—identified of unknown criminals by eyewitnesses must be approached with caution by the
investigator. The description and characteristics may be vague that identification is difficult.
1. Verbal Description —the value of the description must depend on the capacity of the witness to describe the
criminal.
2. Photographic Files—(Rogue’s Gallery)—the witness may be taken to the headquarters to examine the
photographs in file. The modus operandi file may also be shown upon knowledge of the technique of the
commission of the crime
3. General Photograph —the investigator should show the witness the variety of facial types which do not
necessarily represent the criminal. The picture only represents different features of the face. The image of
various features such as the degree of baldness, length or shape of the nose, the shape of mouth ear, etc.
4. Artist’s Assistance —the identification may be made by the employment of an artist to depict a composite of the
features described by the eyewitness. The witness is shown a chart which contains representations of various
types of human features as noses, eyes, ears, etc., and is requested to select the individual features present in
the unknown criminal. From this selection, the artist draws a composite of the face which maybe a close
approximation to that of the criminals. Also called as CARTOGRAPHY.
1. Physical/Police line-up – is a means of selecting a suspect from a group of innocent persons usually
composed of seven to ten persons. The purpose of line-up is to eliminate the power of suggestion.
Their appearance must be almost the same as to height, hair color, and clothing. The suspect must be
given the opportunity to select the position in the line-up.
2. Physical show-up – only one person is shown to the witness usually at the scene of the crime and made
immediately after the arrest of the suspect.
CIRCUMSTANTIAL EVIDENCE - Circumstantial evidence is identification established indirectly by proving other facts or
circumstances from which either alone or in connection with other facts, the identity of this perpetrator can be inferred
• Motive—motivated by a desire for revenge or personal gain. Motive is hard to establish in crime committed by
mentally deranged persons.
• Opportunity—this is the physical possibility that the suspect could have committed the crime. It may be deduced
from the following:
1. The suspect could have been in the vicinity of the crime.
2. Knowledge of the criminal objectives.
3. Absence of alibi.
8|Page
ASSOCIATIVE EVIDENCE – these are the pieces of evidence that will link the suspect to the crime scene. The suspect
may leave some clues at the scene such as weapons, tools, garments or prints.
TRACING EVIDENCE – articles which assist the investigator in locating the criminal.
MODUS OPERANDI -Modus operandi means the method of operations. It enables the investigators to recognize a
pattern of criminal behavior, to predict, approximate the next target of the criminals and to assist complainants to
recognize the suspect by means of recorded information concerning the characteristics of criminal activities.
TAKE NOTE; MAJOR GENERAL LLEWELY ATCHERLY –devised the first modus operandi file
INFORMANT – is a person who gives information to the police relevant to a criminal case about the activities or
whereabouts the criminals or syndicates.
TYPES OF INFORMANTS
• Anonymous informant – do not wish to be identified.
• Rival elimination informant – to eliminate competition.
• False informant – reveals information of value.
• Frightened informant – motivated by anxiety.
• Self-aggrandizing – hangs about the fringes of the criminals.
• Mercenary informant – gives information for a price.
• Double crosser informant – to get more information from the police.
• Woman informant – female associate of the criminals. “most dangerous specie “
• Legitimate informant – operators of legitimate business establishments.
• Vanity
• Civic-mindedness
• Fear
• Repentance
• Avoidance of punishment
• Competition
• Revenge
• Jealousy
• Remuneration
It is the conduct of processes, more particularly, the recognition, handling, preservation and documentation of
physical evidence to include the identification and interview of witnesses and the arrest of suspect/s at the crime scene
What should then be the primary job of an Investigator before applying the golden rule?
The Investigator upon his arrival at the scene of the crime should consider the following two important steps before
he touches or moves any object.
• If the victim is still alive, the Investigator should try to gather or acquire information from the victim himself with
regard to the surrounding circumstances of the crime, while calling for assistance for an ambulance from the
nearest hospital. Then measure, sketch and photograph the crime scene immediately after the victim is
removed and brought to the hospital for medical attendance.
• If the victim is dead, the body should be removed only after the crime scene is measured, sketched and
photographed.
Do not touch or move anything in the crime scene unless it has been properly photograph, sketch and recorded.
MAC Rule- Do not Move, Alter, Change the crime scene
9|Page
DIFFERENCE BETWEEN CRIME SCENE AND CORPUS DELICTI
Crime scene - a venue or place where the alleged crime/incident/event has been committed.
Corpus delicti - (latin word for the “body of the crime”) - used to describe the physical or material evidence that a crime has
been committed. ex. corpse of a murder victim.
• Crime scene can be understood to include all areas in which the criminal, any possible victim and any eyewitness
move during the time the crime was committed.
• The boundaries must be established so that the entire crime scene can be effectively preserved.
• In some crimes, however, the crime scene may actually comprise several different sites.
PROTOCOLS IN INVESTIGATION
The Police Station, which has territorial jurisdiction of the area where the crime incident was committed,
shall immediately undertake the necessary investigation and processing of the crime scene, unless otherwise
directed by higher authorities for a certain case to be investigated by other units/agency.
a. A Police Blotter is an 18” x 12” logbook with hard-bound cover that contains the daily register of all crime incident reports,
official summary of arrests, and other significant events reported in a police station.
b. As a general rule, all crime incidents must be recorded in the official police blotter.
c. A separate Police Blotter, however, shall be maintained for offenses requiring confidentiality like violence against women
and children and those cases involving a child in conflict with the law to protect their privacy pursuant to R.A. 9262 (Anti-
Violence Against Women and Children Act of 2004) and R.A. 9344 (Juvenile Justice and Welfare Act of 2006).
The conduct of police operation involving sensational cases, high profile and heinous crimes must be covered by
Case Investigation Plan.
10 | P a g e
• A sketch is prepared indicating the actual measurement of things with scale and proportion observed and oriented
to the North Pole. All necessary information are placed in the sketch.
• Sketches are excellent companions to photograph.
Where photograph provide exact details, sketches offer
accurate information about the placement of objects and
they show relationship and distances between things.
ELEMENTS OF SKETCH
1. Measurements
2. Compass Direction
3. Essential elements
4. Scale and Proportion
5. Legend
6. Title
1. SKETCH OF LOCALITY =This gives picture of the scene, the crime and its environs, including such items such
as neighboring buildings, roads leading to the location or house.
2. SKETCH OF GROUNDS = The sketch of grounds pictures the scene of the crime with its nearest physical
surroundings (e.g. house with a garden).
3. SKETCH OF DETAILS = The sketch of details describes immediate scene only. For instance, the room in
which the crime was committed and the details thereof. Cross projection method are details of the room
wherein walls and ceiling are pictures as if they are on the same place as the floor. This gives a clear
impression of the scene in cases where bloodstains or bullet holes are found in the walls or on the ceiling.
Types of Measurements
• Rectangular coordinates method – a sketching method that involves measuring the distance of an object from two
fixed lines at right angles to each other.
• Triangulation method – a sketching method that requires measuring the distance of an object along a straight line
from two widely separated fixed reference points.
• Baseline method– a sketching method that makes measurements along from a single reference line, called a
baseline, which can be established by using a length of string, chalk line, or some other convenient means.
• Cross projection method – a sketching method in which the ceiling appears to open up like a lid of a hinged box,
with the four walls opening outward. Measurements are then indicated from a point on the floor to the wall.
ROUGH SKETCH -Made by the prober at the crime scene.
Scale and proportion are ignored and everything is
approximated. It is to be used as basis of the finish sketch
FINISH SKETCH -Made primarily for court room
presentation. All elements of sketching must be present.
CRIME SCENE PHOTOGRAPHY
The main objective is to create a visual record of the
crime scene before any item is moved as possible physical
evidence.
Take photograph of the crime scene with or without
markers.
11 | P a g e
Methods of Crime Scene Search
1. STRIP SEARCH METHOD = In this method, the area is blocked out in the form of a rectangle. The three (3) searchers,
A,B, and C proceed slowly at the same pace along, paths parallel to one side of the rectangle. When a piece of evidence is
found, the finder announces his discovery and the search must stop until the evidence has been cared for . A photographer
is called, if necessary. The evidence is collected and tagged and the search proceeds at a given signal. At the end of the
rectangle, the searchers turn and proceed along new lanes.
2. THE DOUBLE STRIP OR GRID METHOD OF SEARCH = a modification of the strip search method. Here, the rectangle
is traversed first parallel to the base then parallel to the side.
12 | P a g e
3. SPIRAL SEARCH METHOD = In this method, the three searcher follow each other along the path of a spiral, beginning
on the outside and spiraling toward the center.
4. ZONE SEARCH METHOD = In this method, one searcher is assigned to each subdivision of a quadrant, then each
quadrant is cut into another set of quadrants.
2nd Zone
1st Zone/grid
search
4th Zone
3rd Zone
5.WHEEL SEARCH METHOD = In this method of search, the area is considered to be approximately circular. The
searcher, gathers at the center and proceed outward along radii or spokes. The procedure should be repeated several
times depending on the size of the circle and the number of searchers. One shortcoming of this method is the great
increase in the area to be observed as the searchers depart from the center.
6. Point to point- searcher will stand in a straight line and move forward together.
What is meant by reconstruction of the crime?
After completion of the search, an effort must be made to determine from the appearance of the place and its objects what
actually occurred and what the circumstances of a crime were. This is known as reconstructing the crime.
Kinds of reconstruction
• Physical Reconstruction— The physical appearance of the crime scene is reconstructed from the description of
witnesses and the indication of the physical evidence.
• Mental Reconstruction—From the physical reconstruction, some conclusions can be made concerning the
consistency of the accounts of various witnesses. No assumption should be made concerning actions which are not
supported by evidences. The final theory developed by the investigator should provide a line of investigative action.
DEDUCTIVE REASONING -It forms a general conclusion prior to having a complete explanation based on the facts
INDUCTIVE REASONING- It forms a general conclusion after gathering evidence and after further investigation
Packaging = Physical evidence should be packed in order to prevent loss, tampering, breakage or deterioration.
EVIDENCE/ITEM DESIRED CONTAINER
1. Paper Envelope
13 | P a g e
3. Firearm Box or board of exact size
4. Hair Wrap it first with filter paper before placing
it in an envelope
5. Dirt = same=
6. Cloth Box – Do not fold the area where there is
stain. Encircle the location of the stain
using a chalk for easy identification.
7. Seminal stain If moist, drop distilled water using a dropper
and use the same to collect it, then place it
in a test tube
TYPES OF EVIDENCE
1. TESTIMONIAL EVIDENCE = The most common form of evidence, and it is obtained through interview and interrogation
– events which witness see, smell, taste, and touch are described to the investigator through oral and written testimony.
2. DOCUMENTARY EVIDENCE = This includes writings, including official records. One which is supplied by written
instruments, or derived from symbols which ideas are represented on material substances, like letters, wills, deed or
contract.
3. PHYSICAL EVIDENCE = Evidence addressed to the senses of the court, as when objects are exhibited for the personal
observation of the judge. It is also called real evidence – any kind of object associated with the investigation, but it must be
a tangible item.
ALLAN PINKERTON
America’s foremost private detective. He became the first detective of the Chicago Police Department in 1849. He
then opened his private detective agency in the early 1850’s in partnership with Chicago attorney, EDWARD RUCKER.
Their business immediately became successful and formed the North-Western Police Agency. (PINKERTON'S AGENCY)
KATE WAYNE
First women detective in history criminal investigation that was hired by Pinkerton Agency.
ALPHONSE BERTILION
14 | P a g e
Introduced the first systematic identificatdion thru Anthropological measurement known as ANTHROPOMETRY
SYSTEM.
• Consider as the Founder of Criminal Investigation
• Father of Personal Identification
THOMAS BYRNES
• Chief of the detectives in New York City, was one of the famous investigators of the nineteenth century.
• He trained his detectives in recognizing individual criminal techniques. This method was later to be known as
“modus operandi” or method of operation and is considered an essential tool of investigation to this day.
DEOXYRIBONUCLEIC ACID
FLAVIANO GUERRERO
• the only Filipino member of United States Federal Bureau of Investigation (FBI)
• 1833, ENGLAND: The Scotland Yard employed the first undercover officer while in
• USA: First daytime paid police department was established in Philadelphia, USA.
• 1835, USA: TEXAS RANGERS was organized as the first law enforcement agency with state Invwide investigative
authority, the forerunner of the Federal Bureau of estigation
• 1852, USA: - CHARLES DICKENS - Through his story entitled BLEAK HOUSE, he introduced the term
DETECTIVE to the English language
PHILIPPINE SETTING
• 1985 – PEOPLE vs. GALIT (GR No. 51770; March 20,1985) - The right to a counsel maybe waived but the waiver,
to be valid, must be made with assistance of a counsel.
History of Intelligence
15 | P a g e
1. Holy Bible- where you can find the just recorded intelligence operations in history.
Moses-One of the first recorded formalized intelligence efforts, with format, can also be found in the Holy Bible
Numbers 13:17
The scripture also named the 12 intelligence agents when the Lord directed Moses to send into the Land of Canaan
and records that “all those men were heads of the children of Israel”.
a. Rahab- “The Harlot of Jericho” (Joshua 2: 1-21) who sheltered and concealed the agents of Israel, made a
covenant with the agent sand duped their pursuers. She was not only an impromptu confederate of immense
value to the Jewish leaders of that far-distant day, but also established a plot- pattern which is still of periodic
relief to motion- picture producers.
b. Delilah- She was an impromptu intelligence agent of the Philistines. She allowed Philistine spies to hide in her
house (Judges 16:9) and used her feminity to gain intelligence from a powerful enemy. A biblical personality
who was able to gain information by using her beauty and charm. She was responsible for the fall of Samson a
known Israelite leader who terrorized the Philistines
2. Sun Tzu- a Chinese- “Father of Intelligence” philosopher, in his book “PING FA” (Art/Principles of War) - the earliest
known textbook on the art of general warfare- once said; “If you know your enemy and know yourself, you need not fear the
result of a hundred battles. If you know yourself but not your enemy, for every victory, you will suffer defeat. If you know
neither yourself nor your enemy, you are fool who will meet defeat in every battle.”
Its lessons were applied by Mao- Tse-Tung during the long march and by the Japanese prior to Pearl Harbor.
Sun Tzu believed that to wage war economically while defending the state against other, it was necessary to
employ a permanent espionage service spying on neighbors and enemies.
Captured agents should be treated with benevolence, tempted with bribes, led away and comfortably housed. He
realized that if such mean could be turned, they would be in position to report on their previous master strengths and
weaknesses.
Condemned spies were less fortunate; Unknown to them they were fed completely false information by Sun Tzu’s
agents, sent into enemy territory and if necessary compromised. When they were captured and tortured, the information that
they were able to divulge was wholly incorrect, leading the enemy to miscalculate his response. When the enemy learned
of his mistake the spy was put to death, but by then it was often too late.
3. Alexander “The Great”- a “Renowned Greek Conqueror” Under the tutelage of Aristotle, Alexander the Great King of
Macedonia, became the first ruler to utilize intelligence as a weapon of government. He divided a simple but highly effective
system of covert ciphers.
He introduced a primitive form of “Cabinet Noir” (Internal Monitoring) when he instigated postal censorship into the
army and investigated letters and malcontents.
4. Sir Francis Walsingham of England- He was credited with creating the first viable secret service in England. He protected
Queen Elizabeth I from countless assassins. “Regarded as the “First Great Spymaster.”
5. Mata Hari (1876-1917) - Ironically, Mata Hari is one of the best known spies in history, yet she was one of the worst.
When World War I broke out, Mata Hari was in Berlin, where she had recently befriended the Chief of police, who
subsequently enlisted her into the ranks of the German Secret Service. She carried on her life as before dancing naked on
the stage and dispensing her services liberally to those who could afford her.
8. Karl Schulmeister, “Napoleon’s Eyes”- He was credited for establishing counter intelligence conducted against spies. He
was the master of deceit who used black mail to obtain vital information pertaining to the personality of the enemies of
Napoleon during the 18th Century
16 | P a g e
9. Wilhelm Stieber- He made two major contributions to the sequence of military intelligence, namely military censorship and
organized military propaganda.
10. Alfred Redl- One of the most brilliant intelligence agents, though he was a homosexual. He rose to become chief of the
Austro- Hungarian Secret Service, or in other terms, director of their military intelligence system. For more than half of his
time as director of intelligence, Redl was acting as an intelligence agent of Russia. “Homosexual Double Spy”
11. William “Wild Bill’’ Denovan- headed the Office of Strategic Service (OSS), the immediate forerunner of the Central
Intelligence Agency (CIA). A lawyer and millionaire Republican, Donovan enjoyed Roosevelt’s trust, friendship and most
crucial of all- direct access to the inner sanctums of the White House
12. Edward I - An English monarch who started utilizing state informants specially to determine seditious writing against the
crown and identify of his enemies. Rewards are given to wards for every useful information gathered.
5. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known by its wartime designation,
“MI6”, equivalent to US’s CIA, in charge with gathering information overseas and with other strategic services
ranging from foreign espionage to covert political intervention.
Note:
The counterpart of these intelligence organizations in the Philippines is the National Intelligence
Coordinating Agency (NICA) which is under the Office of the National Security Adviser
Col. Rudolph Abel - (Russian) - was probably the highest ranking and most successful spy whoever infiltrated the United
States.
Mathew Cevetic- a famous undercover assignment of FBI infiltrated the communist party.
Definition of Intelligence:
Intelligence. A product created through the process of planning, directing, collecting, collating, and analyzing data,
for dissemination as usable information that typically assesses events, locations of adversaries, to allow the
appropriate deployment of resources to reach a desired outcome.
In the Military parlance, it is the product resulting from the collection, evaluation, analysis, integration, and
interpretation of all available information which concerns one or more aspect of foreign nations or are areas of
operations and which is immediately or potentially significant to planning.
In the Police parlance, it is the end-product resulting from the collection, evaluation, analysis, integration, collation
and interpretation of all available information which concerns one or more aspects of criminal activity significant to
police planning operation.
17 | P a g e
OBJECTIVE OF INTELLIGENCE
The fundamental objective is to ensure rational and timely decision-making.
Today all countries have their intelligence services so with all their various government agencies. They may be
different in their organization, efficiency and method but they all have the basic functions:
1. The collection or procurement of information
2. The evaluation of the information which then become intelligence.
3. The dissemination of intelligence to those who need it.
Principles of Intelligence
h. Principle of Flexibility
Intelligence must have the ability to change or be changed according to circumstances. Hench, alternatives must be
drawn.
i.Principle of Security
Security is achieved by measures which the intelligence takes to protect and preserve the integrity of its
organization personnel, method, sources, information and results of its activities.
j. Principle of imagination and foresight
The operator and the agent must be given the leeway to use his resourcefulness to obtain more than what is normally
required.
Concept and Classification of Intelligence
1. Intelligence as a process- is an activity which treats, processed information as a basis for departmental policy and
decision- making.
2. Intelligence as an organization- It is an institution composed of persons who pursue a social kind of knowledge for the
purpose of planning the collection of information, processing and dissemination of intelligence relating to the area of
interests.
Intelligence Community- is the conglomeration of all intelligence units and agencies in a country composed of civilian,
military and quasi-military organization
FACTORS IN CREATING INTELLIGENCE UNIT
1. Size of the community
2. Extent of organized crime in the community
3. Probable frequency and seriousness of the activity of civil disturbances
4. Breaches of Integrity on the part of any member of the force or unit
The cardinal principle in Police intelligence at all levels is the proper, economical and most productive use of personnel and
equipment employed and/or utilized in planning the collection of information and dissemination of intelligence
Types of Police Intelligence
1. Strategic Intelligence- Intelligence information which is primarily long- range in nature with little or no immediate
practical value.
2. Counter Intelligence- It deals with defending of the organization against it criminal enemies (Defensive Effort)
3. Line Intelligence(combat)- The type of intelligence which is of an immediate nature and necessary for more effective
planning and operations.(Offensive Effort)
4. Undercover work - It is an investigative process in which disguises and pretext, cover and deception is utilized
Forms of Police Intelligence
1. Overt- When the information or documents are procured openly without regard as to whether the subject of investigation
becomes knowledgeable of the purpose or purposes for which it is being gathered.
2. Covert- When the information is obtained without the knowledge of the person against whom the information or
documents may be used.
3. Semi Overt/ Covert- When the information is obtained from open sources but the person against whom the said
information will be used do not have any knowledge about it.
Military Intelligence- It is an evaluated and interpreted information concerning an actual or possible enemy or treat
operations including Weather and Terrain, together with the conclusions withdrawn there from.
Types of Military Intelligence
1. Strategic Intelligence- is a type of intelligence which pertains to the capabilities, vulnerabilities, and probable course of
action of foreign nations.
2. Combat Intelligence- is a type of intelligence that pertains to the knowledge of People, Weather, Enemy and Terrain
(PWET) used in planning and conducting tactical and administrative operation in a counter insurgency. It provides the
commander with information and conclusions concerning the area of operations, enemy capabilities and vulnerabilities
in order to determine their probable effect on his course of action. Combat intelligence is required by the commander in
order to determine the best use of his available firepower and maneuver forces, to accomplish his mission, and to
maintain the security of his command.
Bugging- it is the placement of a hidden microphone to the target to collect to telephone conversation.
Wiretapping- a method of collecting information through interception of telephone conversation.
20 | P a g e
Two basic Collection Strategies:
a. Resource integration – one agent
b. Agent Mixed Redundancy – 3 or more agents assessing for the same assignment
Collecting Agencies:
a. Government agencies/offices – variety of information
b. intelligence units/agencies
c. organizations
Who is Task to Collect Information?
a. Intelligence officers/agents – regular members
b. Civilian agents – informers and informants
Methods of Collection
a. overt – open
b. covert – secret
COLLECTION PLANNING
The continuous process which ultimately coordinate and integrate the efforts of all collecting Agencies/Units.
Evaluation to Determine:
a. Pertinence (usefulness) - Does it hold some value to current operation? Is it needed?
b. Reliability (dependable) -Judging the source of information
c. Credibility (truth of information)
Is it possible for the reported fact or event to have taken place? Is the report is consistent within
itself? Is the report is confirmed or corroborated by information from different sources or agencies? If
the report does not agree with information from other sources, which one is more likely to be true?
EVALUATION GUIDE
(CUFNUR) (CProPDIT)
C. Interpretation
It is establishing the meaning and significance of information. It involves the following:
1. Analysis - The determination of significance of information relative to the information and intelligence already known and
drawing deductions about probable meaning of the evaluated information. It is done by shifting and isolating those
elements that have significance in light of the mission or national objective.
2. Integration - It is combination of the elements stated in assessment with other known information or intelligence to form
a logical feature or hypothesis for enemy activities or the information of the operational area and characteristics of the
omission of the command.
3. Deduction - The formulation of conclusions from the theory developed, tested and considered valid; determination of
effort and meaning of the information.
INTELLIGENCE OPERATION
It is the result of intelligence planning. Planning is always ahead of operation although an operation can be made
without a plan. It is usually due to sudden and inevitable situations but definitely, this is poor intelligence
management.
Infiltration - the insertion of action agent inside the target organization
Penetration- recruitment of action agent inside the target organization
ESSENCE OF PROCUREMENT
The essence of procurement is ACCESS, someone or some device had to get close enough to a thing, a place or a
person to observe or discover the desired facts without arousing the attention of those who protect them. The
information must then be delivered to the people who want it. It must move quickly or it may get stale, and it must
not get lost or disintegrated in route.
PROCURING AGENTS
1. Agent in Place - One who has been recruited by an intelligence service within a highly sensitive target and
who is just beginning his career or have been long outsider or insider.
2. Double Agent - An enemy agent, has been captured, turned around and sent back where he came from as an
agent of his captor.
3. Expendable Agent - An agent through whom false information is leaked to the enemy
4. Penetration Agent - An agent who infiltrates and reaches the enemy to get information and would manage to
get back alive.
5. Agent of Influence - An agent who uses influence to gain information.
6. Agent Provocation - Provoking agent
Types of Approach:
1. Flattery- people are susceptible to praise
Variants:
22 | P a g e
a. Teacher- Pupil approach- the subject is treated as an authority. We request him/her to enlighten us and we
solicit his viewpoint and opinions. The collector builds the theme that he is an ignorant student who wants to
learn from the all knowing teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal having some specialized quality and you
flatter him/ her by showing enough concern for his/ her welfare to pay special attention to his enjoyment. The
collector attempts to build on professional brotherhood and understanding of what the source of information is
going through and sharing the source’s frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and assistance are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration of he source of information and express
curiosity on how one could achieve such greatness.
Types of Probe:
1. Competition Probe- this is effective when used in connection with the teacher- pupil approach.
2. Clarity Probe- used to elicit additional information in an area which the response is clear.
3. High Pressure Probe- it serves to pin down a subject in a specific area or it maybe used to point out contradictions in
what the subject has said.
4. Hypothetical Probe- present a hypothetical situation and to get the subject to react to the hypothetical situation.
Casing
Literally means putting a thing, or place in a case. As used in intelligence operation – the continuous monitoring of a
place or area at a given period of time.
In intelligence operation, it is reconnaissance or surveillance of a building, place or area to determine its suitability
for intelligence use or its vulnerability in operations.
Information desired in Casing
1. Area Condition and Habits
a. Detailed sketch and photograph of the area.
b. Customs, habits, language and dress in order to be able to blend with the community.
c. Transportation facilities, the fare, station, in order not to ask questions.
d. Knowledge of establishments determine what are desirable, if are free from raids anytime to avoid compromise.
e. You must know what kind of people residing in the neighborhood so that agent will know what appropriate actions
he takes.
f. Restrictions
g. Description of the subject
2. Active Opposition (capabilities, People they employ, intentions, fear, vulnerabilities)
3. Escape and Evasions- In case of compromise, the agent must get out entirely from the target.
Stages of Casing:
1. Area familiarization
2. Actual inspection of the area
3. Re-casing
Methods of Casing
1. Personal reconnaissance - The most effective method and will produce the most information since you know just
what you are looking for.
2. Map reconnaissance - May not be sufficient but it can produce a certain amount of usable information.
3. Research - Much information can be obtained or acquired through research.
4. Prior information - Aside from your unit, other units may have file report that they may provide you with relevant
information.
5. Hearsay- Information usually gain by the person operating in the area and performing casing job.
Surveillance
23 | P a g e
It is a process or act of keeping person, premises or vehicles under observation in order to acquire detailed
information concerning the activities, identities and contact of the subject. It is concerned primarily with persons. It involves
many varied techniques and skills including preparation, foot surveillance, automobile surveillance, stationary of fixed
surveillance, and reconnaissance. Also, tailing, shadowing, trailing or keeping the subject under observation.
An objective of Surveillance is to disclose or divulge the existence of illegal criminal activities and to reveal the identities of
those engaged in such activities.
TERMS USED:
4. Pre-surveillance Conference - A conference held among the team members, police intelligence unit before a
surveillance is conducted.
5. Stake out - The observation of places or areas from a fixed-out point.
6. Tailing or Shadowing - It is the observation of a person’s movement.
7. Undercover Man - A person trained to observe and penetrate certain organization suspected of illegal activities and the
later reports the observation and information so that proper operational action can be made.
8. Liaison Program - This is the assignment of trained intelligence personnel to other agencies I obtain information of
police intelligence value.
9. Safe House - It is place, building, enclosed mobile, or an apartment, where police undercover men meet his action
agent for debriefing or reporting purposes.
10. Drop - It is a convenient, secure, and unsuspecting place where a police, undercover man, informer, or informant by a
pre-arrangement leaves a note, a small package, an envelope to item for the action agent, supervisor or another agent.
11. Convoy - An accomplice or associate of the subject.
12. Decoy - Any person almost similar to the subject used to avoid or elude surveillance.
13. Contact - Any person or subject picks or deals with while he is under surveillance.
14. Made (burn out) -When subject under surveillance becomes aware that he is under observation and identifies the
observer
15. Lost - When the surveillants do not know the where about of their subject or the subject had eluded the surveillants.
16. Rabbit (hare) - Term referring to the subject of shadowing and tailing.
17. Test for tailing - The common trick of the subject (rabbit) when he becomes conscious that he is being tailed. The rabbit
usually boards a public conveyance then jumping off the vehicle then he looks about quickly to determine if any another
person jumps off also.
18. Finger man- an individual who can positively point the subject.
19. Put the finger on- to identify the subject by pointing him out in person or in photograph.
20. Put to bed- when the subject under surveillance returns to quarter and apparently retire for the night.
Kinds of Surveillance
a. Stake Out or Surveillance of Places
b. Tailing or shadowing
c. Undercover investigation or “Roping”
A.Surveillance of Places
Two types of place surveillance
1. Using a room in a nearby house or business establishment and remaining undercover.
2. Remaining outdoors and posing as a person who would normally conduct his business in such an area, ex. A
laborer, carpenter, street vendor, etc.
Equipment used in the surveillance of a place: Ex: camera w/telephoto lens etc.
B. Shadowing or Tailing
It is the act of the following a person
24 | P a g e
Methods of Shadowing /Tailing by foot
1. One-man shadow
2. Two- man shadow
3. Three-man shadow or ABC method
1. Turning Corner- If the subject turns a corner, the surveillant should not hurry. If the subject is lost, the nature of the
neighborhood will determine the subsequent procedure. In most cases, it is preferable to lose the suspect than to alert him
to the tail.
2. Entering a Building- If the building is a store, the surveillant should wait until the subject comes out. In buildings having a
number of exits, it is necessary to follow him inside. If the subject enters an elevator, the surveillant should board the same
elevator. The surveillant may tell the elevator boy that his destination is the same floor as the subject, or he may proceed to
the top floor, if there are more than one surveillant, one should alight at the subject’s floor and should proceed in a different
direction then the latter can return to the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and on the same side. If he misses the
bus, he should hire a taxi and board the bus at a point ahead.
4. Taking a taxi- When the subject takes a cab, the surveillant records the time, place and name of the taxi’s company and
license. He should endeavor to follow in another taxi. If this results in failure, he should trace the taxi by means of recorded
information and ascertain the destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant should endeavor to get in line behind
him with one person intervening. If he hears the destination requested by the subject he may buy a similar ticket. In the
event that he is unable to hear the destination, he should merely request for a timetable.
6. In a restaurant - The surveillant should allow a few minutes to elapse before following the subject into a restaurant. He
should then take an obscure sect and arrange to finish his meal at the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he registered, the surveillant can take the
adjoining room.
8. In a telephone booth- The surveillant should either go into the next booth or stand near enough to hear. He should note
the telephone book use and the page at which it was left open.
9. In the Theater- The surveillant should sit behind the subject and take not of the various exits which are available.
Clandestine Operation
Clandestine operation is a secret action undertaken by an intelligence/counter - intelligence organization in
behalf of the Government or other friendly forces.
1. PRINCIPAL AGENT is a managerial agent and in most cases the leader of the agent network..
2. ACTION AGENT- is the doer of the clandestine task and further classified according to the task that he was
assigned.
a. Espionage - (counter intelligence/intelligence agent) is the primary and most important human collector
b. Propagandist - this agent undertakes action to mold the attitudes, opinions and actions of an individual group
or actions of an individual, group or nation.
c. Saboteur - an agent who undertake positive actions against unfriendly power resulting them in the loss of
used temporary or permanent of an article, material, or facility.
d. Guerilla - a member of paramilitary group organized to grass the enemy.
e. Strongman - is an agent available to provide special protection during the dangerous phases of clandestine
operation.
f. Provocateur - an agent who induces an opponent to act to his own detriment by desecrating himself or
revealing his true purpose or identity.
g. Cover Action Agent - a fully recruited agent who is in a senior position usually within the government who can
exert influence from foreign government upon direction of the sponsor.
25 | P a g e
2. SUPPORT AGENT - an agent who engages in activities which support the clandestine operation. This agent performs
all types of auxiliary services at the direction of the case or project officer.
Undercover/ Roping Operation- an intelligence/ investigation technique in which the investigator conceals his true identity
and adopts an assumed role to accomplish an intelligence/ investigation mission.
COVER - Any device by person, organization to insure that one who does not have the right to know must be aware of the
real purpose of the mission. Or it is a means by which an individual group or organization conceals the true nature of its acts
and or existence from the observer.
COVER STORY - A biographical data through fictional, which will portray the personality of the agent he assumed: any
scenario to cover up the operation.
COVER SUPPORT - An agent assigned in target areas with the primary mission of supporting the cover story.
26 | P a g e
5. Don’t fail to provide persons in the place who can vouch for the investigator
6. Don’t spend too much money. Expenditure maybe in keeping with the part, if not, suspicion is aroused. Many
agents have given themselves away by spending more money than the amount justified.
CONTROL
Authority to direct agent to carry out task or the requirements in behalf of the clandestine organization in
acceptable manner and security.
Two Categories of Control
1. POSITIVE CONTROL - Characterized by professionalism and rapport
a. Agent motivation
b. Psychological control
2. NEGATIVE CONTROL - characterized by blackmail and threat
a. Disciplinary action - Includes verbal reprimand for poor performance or insecure action withholding certain
materials, rewards reduction of agent salary or extreme situation and threat of terminating personal
relationship.
b. Escrow account - Control of an agent by putting his salary in a bank to be withdrawn only after fulfillment of
the condition.
c. Blackmail
COUNTER INTELLIGENCE
Espionage- is the act or practice of spying. The use of spy by a government in order to discover the military or political
secret of other nations.
Sabotage- destruction of property or obstruction of public service to undermine a government, police, or military effort.
Subversion- is an act that seeks to overthrow a constituted government it is also an act or instance of subverting.
GENERAL TYPES OF CI
1. Passive Measures (offensive)- Those measures which seek to conceal information from the enemy.
2. Active Measures (defensive)- Those measure which seeks active block to the enemies’ effort to gain information
or engage in espionage, subversion or sabotage.
3. Deception Measures - To deceive the enemy.
COUNTER-INTELLIGENCE INVESTIGATION
It is an activity which constitutes the value of work load and includes specific investigation of individual and
incidence which for the most part are conducted in an overt but discrete manner.
1. SECURITY SURVEY
A counterintelligence service conducted in order to assist the chiefs of office in determining the security
measures required to protect key installations from possible sabotage, espionage, subversion and
unauthorized disclosure of or access to- classified defense information or materials.
2. SECURITY INSPECTION
A counterintelligence service conducted in order to determine degree of compliance with established
security policies and procedures.
DEFINITION OF TERMS
1. Security
It is the protection of classified information, materials and equipment from disclosure to unauthorized
person.
2. Document Security
27 | P a g e
The placements of security classification, handling and use of classified information.
3. Classified Information
This includes all information concerning document cryptographic devices, development project and
materials following on the categories of Top Secret Confidential or Restricted.
4. Classified Matter
Any information in materials in any form or any nature, the safeguarding of which is necessary in their
interest of Natural Security and which is classified of such purpose by the responsible classification
authority.
5. Classify
This refers to the assigning of information or material, one of the four security categories after
determination been made that the information requires the security protection as provided.
6. Declassify
The act of removing the security classification from classified information or matter.
7. Reclassifying or Regarding
Refers to the act of changing the assigned classification of the classified information or matter.
8. Upgrading
Refers to the act of assigning the information or matter to the higher classification than that previously
assigned to it.
9. Certification of Destruction
It is a certification by a witnessing officer that the classified matters described therein has been disposed
of in his presence in approved destruction methods.
10. Compartmenting (compartmentation)
Refers to the grant of access to classified matter only properly cleared person when such classified
information is required in the performance of their official’s duties.
11. Need to Know
It is the dissemination of classified information or matter to be limited strictly to those person whose duties
requires knowledge or possession thereof; it is the principle whereby access to classified mater may only
be given to those persons to whom it is necessary for the fulfillment of their duties.
12. Security Clearance
It is the certification by a responsible authority that the person described is cleared for access to classified
matter in the appropriate level.
13. Unauthorized
Refers to person not authorized to have access on classified matters.
14. Compromise
Takes place through the loss of security, which results from unauthorized persons, obtained knowledge of
classified matters.
15. Damage to National Security
Refers to the prejudice, embarrassment or jury to the country resulting from act or omission.
28 | P a g e
Any information and material the unauthorized disclosure of which would be prejudicial to the interests and prestige to
the national or governmental activity or would cause administrative embarrassment or unwanted injury to and or would
be of advantage to foreign nations.
29 | P a g e