Interview and Interrogation
Interview and Interrogation
Interview and Interrogation
PROPER
Interview is the simple questioning of a person believed to possess information, which are
relevant to the investigation of a crime or on criminal activities. In an interview, the
interviewee is willing and cooperative with person conducting the interview.
|
The questioning should be in agreement with facts and conditions at the crime scene. The
questioning will lead wayward for the interviewer who had not seen personally the crime
scene and he/she will not be in a position to distinguish half-truths, exaggerations of
falsehood from the answers of the person being interviewed (Sadili & Pena 1998).
QUALITIES OF A GOOD INTERVIEWER
1. Rapport. It refers to the good relation between the interviewer and the interviewee,
which is conducive to a fruitful result.
It is winning the confidence of a person
being interviewed in order that he will
tell all the information in his/her
possession. The interviewer must be in
a respectable civilian attire because ,
most often and the majority of people,
the police uniforms is barriers in
establishing good rapport. To many,
the uniform is intimidating.
|
6. Humility. He/she must be courteous, sympathetic and humble, ready to ask apologies
for the inconvenience of the interview. This is usually done at the end of the interview
that may give a good impression to the person being interviewed( Garcia,2004).
1. Fear of Resprisal. Witnesses who lack the courage to face the suspect, his associates
or relatives always entertain the fear or reprisal. This is natural, especially those who
have
no means to protect themselves, or no influential persons for them to rely on. This is
prevalent among the generally underprivileged sectors of our society. The
investigator must remove these fears from the mind of his/her witnesses either by
offering protection or by the explanation that unless the suspect is not put behind
bars, the fear will not disappear the investigator’s power of persuasion plays a vital
role.
2. Great Inconvenience. On the part of those of hands- to-mouth existence there is this
real inconvenience, which will deprive them the time to earn for their living especially
during the ordeal of testifying during the trial. To those unemployed the
inconvenience is greater thus the investigator must sincerely help them through
his/her contacts with the business community.
3. Hatred against the police. This hatred maybe due to previous bad experience with
rogue members of the police organization. The investigators must show the difference
between him/her and the rogue policeman by honest and sincere entertainment of
the complaint against the rogue cops. He/she must explain that these scalawags
represent only small percentage of a whole organization and the police leadership is
addressing the situation properly.
5. Avoidance of publicity. There are witnesses who are shy they shun publicity that will
bring discomfort to their ordinary or obscure way of living. The investigator must
hide these witnesses away from reporters.
6. Family Restriction. Some famous and respected families preserve their reputations
by instlling to their members the need of the approval of their elders on matters
|
affecting the families. The investigators must talk to the elders for the approval for a
members to testify.
PHASE OF INTERVIEW
1. Preparation. Investigator must review the facts at the crime scene and information
from other sources in order that he/she would be ready for the questioning. A
background data of the subject should be available so that he/she could adapt
himself/herself to the kind of approach to be employed.
4. Cognitive Interview. This is performed by allowing or already asking now the subject
to narrate his/her account without interuption, intervention or interference. It is only
after the completion of the uninterrupted narration that the investigator begins trhe
direct and cross-examinations.
RULES IN QUESTIONING
1. One question at a time. Multiple, complex and legalistic questions should be avoided.
One question at a time is desired.
|
2. Avoid implied answer. The nod of the head or any other body language as a response
to the questions should be avoided. The
answer must be oral, clear, explicit and
responsive to the questions.
5. Yes and no answer. Do not ask questions which could be answered by yes or no only.
It will curtail the comlete flow of information and will lead to inaccuracy
TYPES OF WITNESSES
|
confronting him/her about disclosures while in the state of drunkenness. The
written statement must be taken during his/her sobriety.
4. Talkative type. This is a witness who is prone to exaggerate, adding irrelevant or new
matters to their narration. The skillful investigators could prone the unnecessary
matters from the relevant ones.
5. Honest witness. This is the truthful and cooperative witness. Where the investigator
could rely upon, with little or no problem in handling them.
6. Deceitful witness. This is liar type of witness. Let him/ her lie and order later to repeat
several times the narration. He/she will be enmeshed in contradictions, if possible,
the lies must be tape recorded for the confrontation about the lies the contradiction.
Pressure him/her for possible cases of perjury or obstruction of justice and he/she
will tell the truth.
7. Timid witness. This is a shy witness. The approach must be friendly and reassuring
confidentiality of the information. It should be hidden from the devouring press by
interview or photo sessions.
8. Refusal to talk witness. This is the most difficult subject to deal with. Find out the
reasons of his/her personality such as: trauma, shock, fear, hatred, and others.
Remove these fetters of silence so that he/she start talking.
What is Interrogation?
Interrogation is the vigrous and confrontational questioning of a reluctant suspect
about his/her participation in the commission of crime. It is confrontational in the sense that
the investigator places the guilt on the accused. This process could also be applied to an
uncooperative or recalcitrant suspect/ witness.
Interrogation is one of the most difficult but most interesting phases of criminal
invesrtigation and detection. It is a challenging battle of wit between the investigator and the
suspect. It is a mental combat where the weapon is intelligence and the use of the art. Victory
depends upon proper and effective use of the art. Witnesses or victims are interviewed, and
suspects are interrogated
GOALS OF INTERROGATION
|
2. To obtain an admission or confession of guilt from the suspect.
3. To gain all facts in order to determine the method of operation or modus operandi
and the circumstances of the crime in question.
4. To collect information that guides investigators to arrive at a logical conclusion.
Admission
KINDS OF CONFESSION
1. Extra judicial confession. It is a confession that is made by the suspect during custodial
investigation or those confessions that are made outside of the court. SEC. RULE 133,
rules of court stated that:
“extra judicial confession is not sufficient ground for conviction: an extra judicial
confession made by an accused, shall not be sufficient ground for conviction, unless
corroborated by evidence of corpus delicti- body of the crime”.
The reason for the above rule is to guard the accused against conviction based upon
false confession of guilt. It is possible that a person might have confessed his/her guilt
regarding an offense, which someone has committed and when asked of his/her victim
|
of the nature of the injuries inflicted by him/her, it does not coincide with the identity
or nature of the injuries, received by the victim.
2. Judicial Confession. This confession is made by the accused in open court, the plea of
guilt maybe made during arraignment or any stage of the proceedings where the
accused changes plea of not guilty to guilty. This is conclusive upon the court and may
be considered to be a mitigating circumstance to criminal liability.
A plea of guilty when formally entered on arraignment is sufficient to sustain conviction
of any offense, even a capital one, without further proof.
|
Technique of Interrogation
3. Friendliness. – a friendly approach coupled with a posture of sincerity may induce the
suspect to confess.
b. Weakest link. – Among the suspects, there must be a careful selection of who
among them is the weakest link where the interrogation will begin. By tricks and
bluffs, this weakest link will be told that his/her companions had already
confessed and that this weakest link had dealt the fatal blow or that he received
the lion share of the loot in order to intrigue him.
c. Drama. - The weakest link maybe used to fake pain and agony by ordering
him/her to shout, accompanied by banging a chair on the wall to make it appear
that a commotion is going on. The other suspects in separate rooms must hear the
drama before telling them that their partner had confessed.
d. Feigning contact with family members. – The suspect could be tricked that the
investigator had gone to the residence and the family members had supplied facts
against the suspect. The suspect’s family will be dragged into the investigation if
the suspect will not confess.
|
e. Line up. – the complainant, witness or victims requested to point positively to the
suspect in the police line-up. The witnesses’ victims or complainant are previously
coached about the identity of the suspect.
f. Reverse line up - the suspect is placed among other persons in a line up and he/she
is identified by several complainants and witnesses who will associate the suspect
in other several crimes. This will cause the suspect to become desperate and
confess. This will cause the suspect to become desperate and confess only to the
case under investigation, to avoid from being charged on false accusations (Garcia,
2004).
1. Jolting. – In the questioning process, the investigator selects the right moment
to shout a pertinent question in an apparent righteous outrage. The suspect’s
nerves will break to a confession.
2. Opportunity to lie – the suspects is given all the opportunities to lie. The
suspect is questioned about his/her personal life, family, friends and his/her
knowledge about the complainant and witnesses. Then the suspect is
questioned about his/ her activity prior, during and after the commission of
the crime. This is repeated many times, to include the investigator focusing
questions about the knowledge of the suspect of the crime. Suspect will be
enmeshed in contradictions, which is now capitalized by the investigator to
get the truth from the suspect. If possible, the interrogation must be Taped
recorded for purposes of emphasis during the confrontation of the
contradictions.
h. Mutt and Jeff or sweet and sour method. The first set of dangerous. When they had
finished the interrogation, the second investigators intervene by stopping the first
set of investigators. By being sympathetic and understanding, he/she begins his
interrogation. If the suspect still refuses to cooperate, then the process is repeated
until there is a confession (Mitchell 2002).
i. REMOVING THE ETHNIC OR CULTURAL BARRIER. If the suspect is an “Ifugao”
(person from Ifugao province), then preferably, an Ifugao investigator is
recommended to interrogate him, the same with other ethnic or cultural groups.
It is a Filipino way of life that people put or tribe. The interrogation must be in the
language or dialect of the suspect to get his confidence. This is removing the
dialect/ language barrier.
|
j. SEARCHING FOR THE SOFT SPOT. In every man’s heart, there is always that
softest spot. The heart may have been hardened to steel by poverty, destitution,
hopelessness, despair, apathy, indifference, injustice, hatred or other factors, yet
there is always that spot which knowledge of human behavior. That spots maybe
the youngest child, the wife, the mother, and the brother who acted as his father,
the grandparents or the best friend. Once discovered, there must be a face-to-face
meeting with that special person and that heart of steel will melt to pieces. This
technique is not only used during interrogation but also during crisis management
in hostage situations.
5. RATIONALIZATION. It is the use of reasons, which is acceptable to the subject that led
to the commission of the crime. Thus, it may be said that sometimes, killing is a
necessity rather than by purpose or design. Robbery is maybe a necessity to feed a
starving family. The application of this technique depends upon the nature of the
crime.
6. PROJECTION. It is the process of putting the blame to other persons, not alone to the
suspect. The murderer may blame the mastermind for corrupting him/her with big
sums of money or the mastermind blaming the greediness of the victim or the
husband blaming the wife for her infidelity. Or that is a necessary evil as the victim is
planning to kill the suspect.
7. MINIMIZATION. It is the act of minimization the culpability of the suspect. The
investigator convinces the suspect that a confession will reduce the offense and the
penalty. Thus the investigator could study if it there is a way to downgrade murder to
homicide or the introduction of mitigating circumstances with the result of the
penalty being within the range of probation. (GARCIA, 2004).
APPARENT SIGNS OF DECEPTION the following unusual situation posed by the subject
during the interrogation must be observed by the investigator:
1. Excessive sweating. The profuse sweating indicates, tension, anxiety, shock or fear.
Extreme nervousness is also the cause of sweating.
2. Change of facial color. Anger is indicated if the face is blushing. It is also the result of
extreme nervousness or embarrassment. It is necessary as a sign of deception or guilt.
A pale face is a reliable indicator of guilt or deception.
3. Dry mouth. This is a sign of great tension and is a reliable symptom of deception.
Swallowing, constant movement of the Adam’s apple and sweating of the lips are
indications of dryness of the mouth.
|
4. Excessive Breathing. An effort to control breathing during the critical questioning is
an indication of deception. Gasping of breath is the ultimate result of the control in
breathing.
5. Increase of pulse beat. When observed at the side of the neck, the investigator has to
discover the increase of pulse beat which is indicative of deception.
6. Avoidance of direct eye contact. This may indicate guilt or deception. Misty or teary
eyes indicate remorse or repentance (Dalilis & Pagnas, 2003).
|
Lesson 1
LESSON PROPER
INTRODUCTION TO POLICE INTELLIGENCE
AND SECRET SE RVICE
“if you know your enemy and you know yourself, you
need not fear the results of hundreds of battles. If you
know yourself but not the enemy, for every victory you
will suffer defeat. If you know neither yourself nor the
enemy, you are fool who will suffer defeat in every
battle”.
“What is called for knowledge cannot be elicited from spirits, or from gods, or from analogy
to the past events nor from calculations. He wrote “it must be obtained from men who know
the enemy situation.”
Moses sent the 12 agents and said unto them, get you u this way southward,
and go up into the mountain; and see the land, what it is; and the people the
dwelt therein, whenever they be strong or weak, few or many, and; what the
land dwell in, whether in tenths or strongholds; and what the lands is
|
whether it be fat or lean, whether there be wood therein, or not. And be ye
good courage and bring the fruit of the land.”
RAHAB
The harlot of Jericho (Joshua 2:1-21) which sheltered
and concealed the agents and duped their pursuers. She
was not only impromptu confederate of immense value
for the Jewish leader of that jar distant day, but also
established a plot-pattern which is still of periodic relief
to motion picture producers.
DELILAH
She was an impromptu intelligence agent of the
Philistines. She allowed philistine spies to hide in her house (judges
16:9) apart from her tonsorial specialty, she seduced Samson of Israel
to reveal the secret of his strength and used herself to gain intelligence
from powerful enemy. She achieved t he largest effective force of her
employer’s adversaries and contriving the stroke which put that force
out of action.
|
2. Akbar
The “great mogul and sagacious master” of Hindustan who employed
more than four thousand agents for the sole purpose of bringing him the
truth that his throne might rest upon him.
3. GENGHIS KHAN
He used intelligence to conquer china invade Cathay. He instructed
his generals to send spies and used prisoners as sources of
information. Genghis was regarded as leader of the so called “Mongol
conque rors” and used effective propaganda by spreading rumors of
Mongol terror. They collected information on weaknesses and
rivalries of Europe and usually disguised as merchants.
4. HANNNIBAL
The Carthaginia general considered as one of the brilliant military
strategist. He developed an effective intelligence system for 15 years
in Rome. He roamed around the city often disguising as a beggar to
gather fist hand information. Hannibal’s invasion of Italy, his brilliant
and victorious raid in history, gained him many success and nearly
bled Rome to death.
|
✓ Persons who were forced to undertake espionage against their will.
6. SERTORIUS, QUINTOS
He was a Roman General and possessor of white fawn that
tried to follow Polyneus everywhere. The fawn was used as
intelligence agent. His intelligence agent, his intelligence
personnel to appear definitely in military organization.
8. NAPOLEON BONAPARTE
He was great leader who believes in the principles that “One
spy in the right place is worth 20,000 men in field.” He also
organized two bureaus of interest:
a. Bureau of Intelligence
Consolidated all incoming information regarding the
enemy for presentation to the emperor and to obtain
information as desired.
b. Topographic Bureau
Maintained a large map which covers the latest information regarding both
enemy and friendly forces.
|
9. KARL SCHULMEISTER
He was Napoleon’s military secret service and Napoleon’s
eyes. He began his career in offensive espionage. Under a cover
role, he was able to infiltrate the Austrian General Staff and
studied the characters of the Generals. His Royal foes selected
to defeat him.
|
Under Queen Elizabeth, he organized the first National
I ntelligence Service. He employed spies on the staff of
the Admiral in Command of the Spanish Army and able
to obtain information regarding Spanish Army as to their
ships, equipment, forces and stores. He protected Queen
Elizabeth I from countless assassins.
12. RICHELIEU
He introduced the “network of covert collectors”
who transmitted prompt and accurate
information to Paris regarding the activities of
the rebels and dissidents of the kingdom.
|
king that for the ruler to succeed, the ruler should strike at enemies weak
points by means of spies.
19. EDWARD I
In 1725, he organized a systematic police
system known as “watch and ward” and royal
proclamation; the profession “state informer”
was created in 1734 enjoining all informers to
exposed criminal activities and compensated.
|
1. 1900- Europe powers developed modern staff system and place intelligence on
the same level with personnel, operations and logistics. Intelligence then
functioned in time of peace and war. Intelligence during this period,
concentrated on information about the armed forces of the enemy and their
capabilities.
2. AIRCRAFT- was introduced as a tool of conducting aerial reconnaissance.
3. WIRELESS TELEGRAPH - was used wherein codes and cliphers were applied.
4. ARMY INTELLIGENCE- rapidly expanded during this period.
5. “AGENT PROVACATEUR”- was employed by the Russians for the purpose of
internal and political repression. Spying was always the specialty of the
Russians.
6. GERMAN INTELLIGENCE- gained a high reputation for offensive effectiveness
throughout Europe but declined at the outset of war.
7. BRITISH INTELLIGENCE- succeeded greatly by means of censorship and its code
room combined with skillful use of covert agents.
8. UNITED STATES- expanded their naval intelligence wherein domestic counter
intelligence became a principal activity.
|
Its achievement was delay in the use of german v bomb. The operation was conducted with
the OSS and through the penetration and technical intelligence; they discovered
peeenemunde, the V2 guided missile research project of nazi germany.
4. UNITED STATE INTELLIGENCE
In 1941, the US office of strategic service (OSS) forerunner of today’s central intelligence
agency (CIA) was established to analyze military, political and economic information as it
affected the security of tgeh country. US JOINT CHIEF OF STAFFES – was organized to act in
support of the army and the navy in the collection and analysis of strategic information and
to be responsible for the planning and operation of special services.
5. CHINESE INTELLIGENCE
In 1932, TAI LI was organized, the china’s secret police to conduct espionage and
counterespionage against Japanese spies and Chinese communist.
6. SOVIET INTELLIGENCE
AMTORG was organized for the purpose of purchasing all kinds of materials for soviet union.
SMERSH OR “ DEATH TO SPIES” Smersh was organized during the was counterintelligence
concerned with diaffection among soiet troops and anticommunism in any form. There were
five divisions: administration, operation, investigation, prosecution and personnel.
|
6. AMPHIBIOUS WARFARE
U.S. -greatest contribution was its development where coordination of many types of
intelligence activities was required to provide adequate knowledge upin which is the basis
of the successful opiration of a complex military transported over water with the objective
of establishing itself on an enemy-held shore agianst opposition.
7. U.S.SUCCESS in WWII was that their personnel were drawn from the civilian populace,
businesss and professional men and woman.
|
3. ISRAEL INTELLIGENCE SYSTEM
a. MOSSAD - in charge of the national intelligence. The number one intelligence
agency in the whole world.
b. AMAN – concerned with military intelligence.
c. SHINBET- concerned with internal security.
d. IIC – Israel intelligence agency- report to the prime minister.
4. FRENCH INTELLIGENCE
a. SDECE DE DOCUMENTATION EXTERIEUREET DER CONTRE ESPIONAGE – foreign
intelligence and counterintelligence service. This is under the prime minister.
5. GERMAN INTELLIGENCE
RED GESTAPO- the security service organized by the East Germany to combat the covert
activities of the west Germany group when it was still divided by berlin walls.
E. GREAT BETRAYALS
|
1. JUDITH COPLON- she was a
political analyst of the department of
justice who was accused of taking
unlawful possession of government
documents and spying for a foreign power.
She was a well-known communist activist.
|
LESSON 2
lesson
proper
It is the capacity for understanding and for other forms of adaptive intellect of
behavior, the mind in operation.
It is the power of meeting any situation, especially a novel situation, successfully by
proper behavior adjustments; the ability to apprehend the interrelationships of
presented facts in such a way as to guide actions towards goal.
It refers to knowledge of an event, circumstances, etc., received or imparted; the
gathering or distribution of information; or the staff of persons engaged in obtaining
such information.
Counter intelligence
It is an activity aimed at protecting an agency's intelligence program against an
opposition's intelligence service. It likewise refers to information gathered and
|
activities conducted to counter espionage, sabotage, assassinations or other
intelligence activities conducted for or on behalf of foreign powers, organizations or
persons, international terrorist activities, sometimes including personnel, physical,
document, or communications security programs.
Covers the activity devoted in destroying the effectiveness of hostile foreign activities
to the protection of information against espionage, and sabotage.
It is also known as negative intelligence because it is an activity dedicated to the
concealment and protection of one’s own information from adversaries’ intelligence
operation.
Negative Intelligence is a generic term which incorporates three different things.
These are as follows.
Security Intelligence
Means that the total sum of efforts to counsel the national policies, diplomatic decisions,
military data, and any other information od secret nature affecting the security of the nation
from unauthorized persons. Its effort is to deny information to unauthorized persons by
restricting to those who are explicitly authorized to possess it.
Counter Intelligence
Is the organized effort to protect specific data that might be of value to the opponents own
intelligence organization.
Counter – Espionage
In counter-espionage, negative intelligence becomes a dynamic and active effort. Its
purpose is to investigate actual or theoretical violation of espionage laws, to enforce those
laws and to apprehend any violators. It is a job to catch spies. It is basically a police function.
According to Sir Bassil Thomson – former chief of Scotland Yard Criminal Investigation
Division:
“A Basic requirement of the secret agent is to disguise himself and his mission. Much
of his training and basic skill is dedicated to concealment. He is supposed to supply
with a fool proof cover story and good documents. He must be a man of exception
ability or else he would not be chosen for this intricate job. The trapping of the dark
intruder is a formidable talk.”
The aim of Counter-Espionage is to locate the enemy, to identify the enemy and to
neutralize the enemy.
Categories of Counterintelligence
✓ Collective counterintelligence is gaining information about an opponent's
intelligence collection capabilities whose aim is at an entity.
✓ Defensive counterintelligence is thwarting efforts by hostile intelligence services to
penetrate the service.
|
✓ Offensive counterintelligence is having identified an opponent's efforts against the
system, trying to manipulate these attacks by either "turning" the opponent's agents
into double agents or feeding them false information to report.
Five Importance of Effective Counterintelligence
(CI) Denies information to the enemy.
Reduces the risk of command.
Aids in achieving surprises.
Increases the security of the command.
Decreases the enemy ability to create information about our forces.
What is CI Operation?
CI Operation is also called CI Investigation. It is an activity that constitutes the value
of the CI work load, worldwide and includes specific investigation of individual and
incidence which for the most part are conducted in an overt but discreet manner.
Counter-intelligence Investigation
It is an activity which constitutes the value of work load and includes specific
investigation of individual and incidence which for the most part are conducted in
an overt and but discrete manner.
Police Intelligence
It is defined as the end product resulting from the collection, evaluation, analysis,
integration and interpretation of all available information regarding the
activities of criminal and other law violators for the purpose of affecting their
arrest, obtaining evidence, and forestalling their plans to commit crime.
Intelligence as herein referred to means Police Intelligence as distinguished from
Military Intelligence. The deviation is more on the approach rather than
|
principle. The fundamental intelligence cycle is still the same, be that used in
Police or Military Intelligence.
Functional Classifications
Criminal Intelligence (CRIMINT)
It refers to the production of intelligence essential prevention of crimes,
investigation, arrest and prosecution criminal offenders.
Internal Security Intelligence (INSINT)
It refers to the knowledge essential to the maintenance of peace and order.
Public Safety Intelligence (PUSINT)
It refers to the knowledge essential to ensure the protection of lives and properties.
Information
Generally, information are raw data or unevaluated material of every
description derived from observation, communication, reports, rumors,
imagination, and other sources from which intelligence is produced; Any
knowledge, data news, opinions, or the like transmitted from a person to the
|
another; and/or any communicated knowledge by personal study, investigation,
research, analysis and observation.
Intelligence Information
It refers to any information gathered or received which is of intelligence interest.
|
Intelligence Cycle
It is the continuous process which ultimately coordinates and integrates all efforts of the
collecting agencies or units. The intelligence cycle is the process through which intelligence
is obtained, produced, and made available to users.
DIRECTING
DISSEMINATION COLLECTING
MISSION
& USE
PROCESSING
|
◊ Operational – Additional intelligence required in planning and carrying
out effectively the decision or policy announced. Decisions and policy
requires implementation.
◊ Collateral – Higher or adjacent echelons of the government or military
establishment may require information.
|
b. Balance
Within time limits imposed by other considerations, the collection
workload must be balanced from among the collecting agencies.
Balance is a minor consideration when compared with the important
other factors.
c. Multiplicity
Evaluation of information required that it must be compared with the
information received from other sources and agencies. Subject to the
consideration of suitability and capability more than agency is used to
obtain each item of required information. d. Suitability
The collection task assigned to a unit must be compatible with its
primary mission. Only the agencies best suited to furnish the
information are used.
3. Collecting Agencies:
a. Government agencies/offices – variety of information
b. Intelligence units or Intelligence agencies
c. Organizations
5. Methods of Collection
a. Overt – open
b. Covert – secret
|
f. Personnel Security Investigation
g. Sound Equipment – tapping and bugging
h. Use of an artist
i. Surreptitious entry
j. Communication
7. Collecting Planning
Collection planning refers to the continuous process which ultimately coordinates and
integrates the efforts of all collecting Agencies/Units.
1. Recording –is the reduction of information into writing or some other form of
graphical representation and the arranging of this information into groups of
related items.
2. Evaluation – is the determination of the pertinence of the to the operation
reliability source or of the agency the accuracy of the information; or
examination of raw information to determine intelligence value.
|
✓ Is it needed immediately? ✓ Who need it?
b. Reliability (dependable)
✓ Judging the of information.
✓ The source of information and the agency from which it
was collected or both evaluated for reliability. The
principal basis for judging the source or an agency is
previous experience. Other criteria include knowledge,
training, experience and past performance of troop
units or the collector of information.
c. Accuracy (truth of information)
Accuracy refers to the probable truth of the information. Judgement of accuracy is based on
the answers of the following questions;
✓ Is it possible for the reported fact or event to have taken
place? ✓ Is the report is consistent within itself?
✓ Is the report confirmed or corroborated by information
from different sources or agencies?
✓ Does the report agree or disagree in any way with other
available information?
✓ Does the report agree with information from other sources,
or agencies and which on is more likely to be true?
EVALUATION GUIDE
|
3. Interpretation
Interpretation is the process of establishing the meaning and significance of information. It
involves the following:
Dissemination is through:
Methods of dissemination:
|
1. Fragmentary orders from top to bottom of the command;
2. Memorandum, circulars, special orders etc;
3. Operations order, oral or written;
4. Conference – staff members;
5. Other report and intelligence documents;
6. Personal contact – It can be done by the use of telephone, personal visits, and debriefings;
7. Messages – This can be made by use of radio, utilization of messengers or couriers, or
by rapid means of signal communication.
Criteria of Dissemination:
1. Timeliness
Timeliness states that the information must be disseminated on time.
2. Propriety
The message must be clear, concise and complete, as well as in the proper form for the
receiver to readily understand its contents. It must be disseminated to the correct user,
presented in a form that leads itself to immediate use and distributed by the most effective
means appropriate to both time and security requirements.
Users of Intelligence:
1. National leaders and military commanders
Formulation and implementation of national policies.
2. Advisors and staff
Preparations of plans and estimates.
3. Friendly nations and other branches of armed forces.
4. Processor
Basis for evaluation and interpretation
|
Area of operation is the detailed comprehensive study with emphasis on people,
weather, enemy and terrain (PWET).
4. Intelligence estimates
This the logical and orderly examination of the intelligence factors affecting the
accomplishment of the mission. It provides the commander with an analysis of the
area of operations, enemy capacities that can influence his mission. It provides the
commander with the basis for planning operations and for disseminating
intelligence to his staff.
LESSON 3
LESSON
PROPER
Surveillance
Defined as the discreet observation of persons, places and vehicles for the purpose
of obtaining information concerning the identities or activities of criminals. A
surveillant is the person who conducts the surveillance or performs the
observations while a subject is the person, place or vehicle being observed by the
surveillant.
|
1. Fixed Surveillance. This is usually performed when surveillance is directed to a
particular building or premise. The surveillant is immovable in place while observing
his/her subject.
2. Moving Surveillance. It is performed by foot or by the use of any transportation
vehicle in order to observe the subject.
The term shadowing or tailing refers to the act of the surveillant of following his/her
subject to detect criminal activities, to establish the association of subject, to find a wanted
person and many other purposes. Roping is a kind of undercover work wherein surveillant
assumes different roles and identity in order to obtain information.
Purpose of Surveillance
1. To get information on criminal activities as bases for future raid.
2. To discover the identities of persons frequenting the place.
3. To prevent the commission of crime.
4. To establish legal grounds for the application of a search warrant.
5. To arrest the criminal in flagrante delicto or caught in the act.
2. Two-Man Shadow
This is easier for the surveillants to fully cover the subjects. The method allows the
exchange of the positions of the shadowers in order to avoid discovery. One
shadower will follow behind the subject and the other may either be abreast or on
opposite side of the street or following the first shadower.
|
1. When the subject becomes suspicious of any of the operatives, said operative could
quickly drop out of the shadowing.
2. Entering a Building – If the building has no back exit, the surveillant should wait until
the subjects comes out. It is necessary to follow the subject inside the building if there
is an exit at the back of the building. In case the subject boards an elevatot, the
surveillant should also board the elevator. The surveillant should tell the elevator
boy the same floor as that of the subject or he/she may proceed to the top floor. If
there are more than one shadower, one should alight on the floor of the subject. The
other may proceed to other directions such as the first floor where they could wait
for the subject.
3. Riding a Bus – The surveillant should board the same bus. Sit behind or at the side of
the subject. If the shadower misses the bus, he/she should board a taxi and broad the
bus at a place ahead.
4. Riding a Taxi – If subjects rides on a taxi, the shadower should take another taxi and
note the plate number and the company name of the subject’s taxi. If he/she fails to
tail the taxi, he/she should get information from the taxi company through the driver
of the taxi for the disclosure of the subject’s destination.
5. Riding a Train – The shadower must fall in line towards the ticket booth, behind the
subject so that he/she could overhear the destination or he/she could merely request
for a timetable or a ticket for the last destination.
6. Inside a Restaurant – Shadower should allow the subject to select a table before
entering the restaurant. The shadower must select the obscure table and estimates
to finish his/her meal at the same time as that of the subject.
7. In a Hotel – The room of the subject could be inquired from the hotel registry. Once
pinpointed, the shadower must take and adjacent or opposite room. If there are no
available on this arrangement, the nearest vacant room should be the choice.
|
8. In a theater – The shadower should be seated behind the subject. If the subject gets
out, he/she should follow in different exit point.
10. Inside a small private or Public Office – The shadower must wait outside, pretending
to be a customer of nearby establishments.
11. Telephone Booth – The shadower may take the next booth or stand near the subject
to hear the conversation. The telephone book used and the page number at which it
was left open should be noted.
2. Use of Convoy – The subject employs other partners to detect if he/she is being tailed.
The convoy which may employ the ABC method would be very easy to detect
shadowers. If the subject uses this, the shadower must be behind the convoy and
follow them instead.
|
2. Counter-Intelligence
Counter intelligence operation is a means to identify the double-crossers. The
undercover agent could validate the truthfulness of the information given by informants.
4. Loyalty Check
This applies to private or government employees who are security risk personnel,
especially those involved in intelligence work.
|
2. Social Assignment – these are places of amusements, such as bars, nightclubs and
other places of entertainment where a subject frequently goes. Criminals throw a
major part of their loot to these places and the undercover agent must know the
hostesses who are girl friends of the criminals. He/she must know to drink socially
without getting drunk.
4. Residential Assignment – This concerns the neighborhood of the suspect where the
undercover agent fits himself/herself as new resident, without generating suspicion.
The purposes are to befriend to those who could give information and possibly get
closer to the subject.
5. The fictitious Personality – The preparation should include the fictitious background
of the undercover agent. He/she must discard all papers and identification cards, etc.
A new set background information should be issued to him. The agent must memorize
all the details of his/her fictitious background.
1. By informers – The informers must be given the picture the criminal together with
his/her last known address and acquaintances or his/ her possible hang outs. If no
picture is available, the full descriptions of the criminal must be given to the
informer. If the criminal has no acquaintances in the Metropolitan area, the
|
likelihood is that he/she will flee to his/her hometown or province where he/she
has the relatives to guide him/her.
4. By Tailing – The surveillant may tail the wife, relatives and friends of the criminal
who will deliver provisions to the hiding place.
5. Using Children of the Same Age – The children of the criminal maybe used as sources
of information as to whereabouts of the subject.
6. Courting the Girlfriend of the Criminal – This can be done by showering them with
gifts and expressing passionate love. Money and love have proven in the past as a
major consideration of betrayal. Most of the girlfriend of the criminals are hostesses,
prostitutes or dancers.
7. Harassing the Associates and friends of the Criminal – These people will give the
desired information in exchange for peace, or by befriending or helping them to get
out of the mess of minor violations of law.
8. Arrested Criminals Known to the Subject – These persons must be interrogated with
the false information that the one responsible for their arrest is the information
coming from the criminals being sought. The underworld character should be
intrigued about this technique so that they would betray each other. There is always
a power struggle among the criminal syndicates for their continued existence.
9. In fresh cases, the bloodhound dogs or K-9 are used to track down the suspect in
squatter’s areas, open field or wooded terrain. This is most effective if piece of article
belonging to the criminal, left at the crime scene is sniffed by the dog as a sample of
the odor of the criminal.
10. In very recent cases, find out the ethnic origin of the criminal. If he/she is from
Baguio City, there is a great possibility that they will go home to his/her place. In the
past, there were successes in arresting the criminal at the pier or at the domestic
airport within 3 days stick out.
|
11. Disguises – Beware of disguises employed by the criminal. Many suspects had
eluded police cordon or dragnet by pretending to be abnormal persons greased with
the dark oil and acting the mannerisms of the abnormal. Some suspects also attired
themselves with wigs and feminine dresses. In company with some women, they had
easily passed the police cordon.
12. Corrupting the known associates of the criminal through money – In the
underworld, money talks louder than other things.
The informant
The solution of a crime sometimes depends on the information furnished by the informants
and informers. Informers and informants are generally synonymous for they provide
information to the police authorities. The world informant is a general term that refers to
any person who gives information to the police authorities relative to a crime.
Who is an Informant?
An informant is any person who furnishes the police information relevant to a criminal case
about the activities of criminals or syndicates. This is done without any monetary
consideration. The informant may openly give information or may serve as a witness
voluntarily.
Types of Informant
Anonymous Informant
He/she maybe an anonymous phone caller, letter writer or text sender. The duty of the
investigator is to receive the information, not to reveal any other information to the caller
about facts already known.
Confidential Informant
This is a person who provides the police with confidential information concerning a
previous crime or a projected and planned crime. He/she does not want to be identified as
the source of information. Under the law, these informants are protected and their identity
could not be revealed by the police even under the order of the court unless on exceptional
case where there is a claim of the defense that the informant framed up the accused.
Rival-Elimination Informant
This kind of informant mostly maintains to be anonymous. His/her purpose is to
eliminate the rival person or gang due to competition or their motives such as revenge, etc.
|
False Informant
This informant usually reveals information of no consequence, value or stuff connected
with thin air. His/her purpose is to appear to be on the side of the law and for throwing out
the suspicion form himself/herself or from gang or associates.
Frightened Informant
He/she is prodded by fear or self-interest in giving information to the police. He/she
maybe one of the lesser gang member who runs to the police when his/her gang mates are
about to be involved in dangerous situations or when the gang he/she belongs is hot on the
police trail. Motivated by anxiety and selfpreservation of his/her well-being he/she
furnishes the information to protect himself and as a means of sustaining self-importance.
This type is the weakest link in the composition of the criminal chain.
Self-Aggrandizing Informant
This kind of informant moves around the centers of criminals, group or syndicates and
delights in surprising the police about bits of information. His/her information may be of
value by way of authentication in intelligence operation.
Mercenary Informant
The has information for sale. He/she may have been victimized in double-cross or little
share in the loot or given a dirty deal and seeks revenge as he/she will profit in the
disclosure.
Double-Crosser Informant
He/she uses his/her seeming desire to divulge information as an excuse to talk to the
police in order to get more information from them more than what is given. To counter this
kind of informant, the police applies the deception method by giving false information that
will lead to his/her capture.
Women Informant
She maybe the female associate of the criminals, who was roughed up, marginalized in
the deal or being eased out from the group. Care must be given to this kind of informant
because women, given the skills and expertise, are more dangerous than me. They often give
free romance that will result in blackmailing the investigator or will result to an extended
family for support. Women are said to be most effective among informers because they could
easily penetrate the ranks of criminals with less suspicion. Besides, they could mingle with
the crowd easily and could obtain information more than their male counterparts, especially
if their beauty attracts attention. They have easier access to women associates of male
criminals. However, care should be employed as they could easily doubtscross the police
once they fall in love with criminals.
|
Motives of Informants
The following are reasons why informant give information:
1. Vanity – The motive is for self-aggrandizement by gaining favorable attention and
importance by police.
2. Civic Mindedness – Informants provide information because they are imbued with
the sense of duty and obligation to assist the police in their task.
3. Fear – It is engendered illusion of oppression from enemies or from impending
dangers.
4. Repentance – Those lesser criminals such as accomplices or accessories will have a
change in heart to unburden their conscience.
What is informer?
An informer is person who provides information to the police on a regular basis. They are
either paid regularly or in a case-to-case basis, or none all. They are cultivated and
established by the police on a more or less permanent character as long they are loyal and
useful to the police organization.
Selection of Informers
There is no hard and fixed rule in the selection of informants. The informers must be
indoctrinated that they are not immune from arrest and prosecution if they commit crimes.
They should not bring shame and dishonor to the police service. When they will commit
crimes, they should be punished like the rest. All the sectors of the society must be covered
and their composition included but not limited to taxi drivers, jeepney and bus drivers,
vendors, conductors, waiters, dancers, ex-convicts, shady or businessmen, prostitutes, the
elite in the society and others. They should be planted as moles or stole pigeons practically
in all the corners of the social order.
|
1. English System
This system involves gathering information that has a little consideration on
paid informants. This system relies more on the information provided
voluntarily or willingly by patriots or civic-minded informants.
2. French System
This involves the practice of obtaining information that relies heavily on
buying information; this advocates the extensive use of informers.