Fundamentals Of Criminal Investigation And Intelligence PDF

Summary

This document provides a comprehensive overview of criminal investigation principles, focusing on laws, constitutional rights, evidence, and procedures. It also explores the nature and types of investigations, including formal, inquest, and probe methods. The role of criminal investigators and different types of investigators are described, along with training and techniques used.

Full Transcript

**FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE** **COURSE DESCRIPTION:** This course covers the basic principles on relevant Laws, Constitutional Rights, New Rules on Evidence and Criminal Procedure in relation to Investigation. It includes the entire perspective of Intelligence operatio...

**FUNDAMENTALS OF CRIMINAL INVESTIGATION AND INTELLIGENCE** **COURSE DESCRIPTION:** This course covers the basic principles on relevant Laws, Constitutional Rights, New Rules on Evidence and Criminal Procedure in relation to Investigation. It includes the entire perspective of Intelligence operations and organization, and the different methods of gathering and collecting of Information. The different methods of Extracting Information, the different instruments to aid the investigation, Crime Scene processing, Arrest, Search and Seizure, Cyber Warrant, Wiretapping, the making of investigation reports, Case build up and the preparation of evidence for court presentation. **MAIN FIELDS OF CRIMINAL INVESTIGATION** 1. **Crime Prevention --** police operation tasks through program to pre-empt the commission of any infraction or violation of law. This is known as the **first defense of police work.** 2. **Crime Investigation -- second defense of police work**, when all pre-emptive programs of the organization fail, crime investigation as a function materializes to address the violation. **MEANING OF INVESTIGATION** Etymology of investigation shows that this term came from the Latin word *INVESTIGARE* meaning to track or look into for traces. Ultimately, it was derived from the word *VESTIGIUM*, which means footprint. In the simplest connotation, investigate means to take a look and see what happened. In a more detailed definition, investigate means to carry out a detailed examination or inquiry, usually in official manner, to discover something or somebody. **TYPES OF INVESTIGATION** 1. [FORMAL INVESTIGATION] -- This is official inquiry conducted by a government agency in an effort to uncover facts and determine the truth. Investigation of this sort is usually thought of as some form of inquiry concerning a criminal activity. In effect, formal investigation is usually done by the police to discover facts concerning a civil or criminal case. 2. [INQUEST] -- It is an attempt to get to the underlying cause of occurrences. Inquest is used to describe a form of judicial inquiry. It is frequently associated with investigations conducted by public prosecutors to determine if legal grounds exist in filing a criminal complaint against a person. In United States, investigation conducted by coroners (medico-legal examiners) to determine the cause of death when it is not readily apparent is a form of inquest. 3. [INQUISITION] -- This is a more historical term than a current usage. Strictly speaking, it simply refers to any penetrating investigation concerning a religious issue. It became a disgusting term as a result of its ruthless application inquiries to suppress suspected heretics in Europe during the 15^th^ century. 4. [PROBE] -- It is an extensive, searching inquiry conducted by the government. However, it is often associated with committees, usually in the form of legislative inquiries. Example is the investigation conducted by the Senate Blue Ribbon Committee. 5. [RESEARCH] -- This is most often employed to refer the careful, patient investigations done by scientists or scholars in their efforts to identify original sources of data or causes of problem. 6. [INVESTIGATIVE REPORTING] -- Relatively speaking, this is a recent practice pursued by the members of the press on their own initiative. It is designed to serve a dual purpose: a. to attract readers or viewers; and b. to get to the roots of a problem. **TYPES OF INVESTIGATORS:** 1. [FICTITIOUS INVESTIGATORS] -- Sherlock Holmes and his friend Dr. Watson are probably the best example of this class of investigators. They were created by Sir Arthur Conan Doyle, an English physician and novelist. Holmes became famous for his powers of scientific deduction. 2. [GOVERNMENT INVESTIGATORS] -- Examples of this category of investigators are the police investigators and BIR Inspectors. 3. [PRIVATE DETECTIVES] -- These are hired private people who conduct investigations either directly or indirectly, such as those employed by government and private attorneys to collect information or evidences. **NATURE OF CRIMINAL INVESTIGATION:** When a person performs an act that does not conform to accepted norms of society, questions will be asked. If this act is a crime, the process of asking questions is the simplest manifestation of criminal investigation. Criminal investigation is a branch of jurisprudence that uses scientific theories and principles, including time tested philosophical analysis, to uncover, collect and process facts then develop information that can lead the mind of any sensible person to see the truth. Applying practical and scientific knowledge to solve a crime is, however, sanctioned by rules and protocols. These rules are integrated in the criminal law. In effect, criminal investigation entails the enforcement of criminal law with the ultimate objective of promoting justice. In the contemporary point of view, the basic nature of criminal investigation involves the systematic process of: 1. identifying facts or information (investigative leads); 2. gathering, sorting then processing facts and information; 3. preserving evidences; 4. evaluation of evidences; and5. presenting evidences. **ROLE OF CRIMINAL INVESTIGATORS:** A criminal investigator is a fact-finder. He collects facts to accomplish a threefold aim -- to identify the guilty party, to apprehend the guilty party, and to provide evidences of his criminal guilt. He is a person deputized by law to conduct close analysis on criminal cases armed with the four tools of investigation: information, interview, interrogation, and instrumentation. Thus, he plays a vital role in the process of solving criminal cases for eventual administration of justice. A criminal investigator maybe employed by a public or private prosecutor, or he may be directly used by the court to find solution of criminal cases. 1. Establish that a crime was in fact committed under the law 2. Identify and apprehend the suspected offender 3. Recover stolen property 4. Assist the state in prosecuting the party charged with a crime In the performance of his duties, the investigator must seek to establish the six cardinal points of investigation, namely: 1. WHAT specific crime was committed? 2. WHO did the crime? 3. WHEN did it happen? 4. WHERE was the crime committed? 5. WHY was it committed? 6. HOW was the crime committed? **TRICHOTOMY OF CRIMINAL INVESTIGATION** 1. TRAINING Training, being a critical factor in developing good and competent investigator, is the key to freedom from bondage of ignorance. One cannot become a competent investigator if he is ignorant. Thus, ignorance is not tolerated in the field of criminal investigation. Highly competent criminal investigators are effective weapons against criminality. The source of competent investigators is well organized training. Note that training is a dynamic process -- it never ends. 2. TOOLS The significance of tools in criminal investigation far outweighs its literal meaning. Information is the key tool in criminal investigation. In fact, it is the most powerful weapon of investigators, more powerful than gun or money. As an investigate aid, it is the means by which queries can be answered. The significance of information can be understood by what Rudyard Kipling has said: 3. TECHNIQUE Today, the war against criminals is not won by the battle of arms but through the battle of techniques. Some people say that the courtroom battle is not won by clash of words and wealth but through legal battle of techniques. A criminal investigator with an obsolete technique is like a soldier who enters the combat zone without weapon. Technique is the essence of the many facets of tactical strategy in investigation. One secret of successful investigators is they maintain sympathetic image. They project charismatic personality and consequently, they are being looked upon as a friend and not a foe. Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1. Discuss the importance of understanding investigation in your course as future law enforcer. 2. Give at least 10 definition of terms you understand in this chapter. 3. As future investigator/prober what are the importance of training, tools and techniques in criminal investigation The following events are milestones in the development of criminal investigation in the worldwide setting. 1248, CHINA. A Chinese book HIS DUAN YU (The Washing Away of Wrongs) was written containing a description on how to distinguish drowning from strangulation. This was the first recorded application of medical knowledge to the solution of crime. 1720s, ENGLAND. JONATHAN WILD, a reformed criminal, became London's most effective criminal investigator. He became the most famous thief-catcher in 1720s. His methods popularized the idea of employing a thief to catch a thief. He introduced the idea of charging a fee for locating and returning stolen property to its rightful owners. 1750s, ENGLAND. HENRY FIELDING, an Englishman who wrote a novel entitled "Tom Jones", was appointed as magistrate (sheriff) for the areas of Westminster and Middlesex in London. While he was the magistrate, he performed a group of nonuniformed thief-catchers attached to the Bow Street Court whose function was to detect and watch criminals. 1753, ENGLAND. SIR JOHN FIELDING, the younger brother of Henry Fielding, took control of Bow Street Court. His investigators were then called Bow Street Runners and they were quite effective because of his personal guidance although he was blind. He introduced the practice of developing paid informants, printing wanted notices, employing criminal raids, and bearing firearms and hand cuffs. 1759, USA. The US CONGRESS created the office of the general and revenue cutter service. The first organized federal law enforcement and investigative effort made by the US government. 1800, LONDON, ENGLAND. PATRICK COLQUHOUN, a prominent London resident, 1811, PARIS, FRANCE. EUGENE 'Francois' VIDOCQ, a former convict who became a Paris investigator, founded BRIGADE DE LA SURETE (now known as Surete Nationale) which became the national detective agency of France. Vidocq popularized the principle of "set a thief to catch a thief". He also introduced the concept of "trade protection policy", which became the forerunner of our credit card system. For a fee, any owner of a shop or business establishment could obtain particulars concerning the financial insolvency of new customers. He created a squad of ex-convicts to aid the Paris police in investigating crimes. 1829, LONDON. SIR ROBERT PEEL founded the London Metropolitan Police called the SCOTLAND YARD. He reiterated the idea of creating a sizable police force in his recommendations, which lead to the passage of the Metropolitan Police Act. This act had a tremendous impact on the history of criminal justice in general and on the development of criminal investigation. He introduced the techniques of surveillance such as detectives concealing themselves, and secretly photographing and recording conversations. 1833, ENGLAND. Scotland Yard employed the first undercover officer. In USA, the first daytime paid police department was established in Philadelphia, USA. 1835, ENGLAND. HENRY GODDARD, one of Scotland Yard's original Bow Street Runners, first used bullet comparison to catch a murderer. His comparison was based on a visible flaw in the bullet that was traced back to a mold. 1835, USA. TEXAS RANGERS was organized as first law-enforcement agency with statewide investigative authority, the forerunner of the Federal Bureau of Investigation. 1839, THE BIRTH YEAR OF PHOTOGRAPHY ENGLAND. WILLIAM HENRY FOX TALBOT explained a photographic process he had invented to the Royal Society of London. JOHN HERSCHEL coined the term FRANCE. JEAN JACQUES MANDE DAGUERRE gave a public demonstration in Paris, France of his discovery known as DAGUERREOTYPE process that he developed in collaboration with JOSEPH NICEPHORE NIEPCE. 1851, BOSTON, MASSACHUSETTS, USA. Multi-suspect IDENTIFICATION LINE-UP was employed for the first time. 1852, USA. CHARLES DICKENS, through his story entitled BLEAK HOUSE, introduced the term detective to the English language. 1852, USA. ALLAN PINKERTON became America's most famous private investigator. He is considered as the founder of American criminal investigation system. He established the practice of handwriting examination in American courts and promoted a plan to centralize criminal identification records. 1856, USA. KATE WAYNE was hired as the first woman detective by the Pinkerton Agency. 1859, USA. Appellate courts recognized/accepted photographs as admissible evidences when they are relevant and properly verified. 1864, Odebrecht first advocated the use of photography for the identification of criminals and the documentation of evidence and crime scenes. 1865, USA. United States Secret Service was founded to investigate counterfeiting activity in America after the civil war. 1866, USA. INSPECTOR THOMAS BYRNES, a NEW YORK Chief of Detectives, introduced the MODUS OPERANDI FILE. 1882, FRANCE. ALPHONSE BERTILLON, a French Police Clerk, introduced the first systematic identification system based on Anthropometry. He was recognized as the FOUNDER OF CRIMINAL IDENTIFICATION. A year later, he successfully identified the first recidivist using the technique that he developed. 1887, ENGLAND. DR. ARTHUR CONAN DOYLE popularized Scientific Criminal Investigation by creating the fictional detective SHERLOCK HOLMES and his friend DR. WATSON. Holmes story was published in Beeton's Christmas Annual of London. 1892, ENGLAND. FRANCIS GALTON, an English scientist, published his study on classifying fingerprints. While other scientists were studying fingerprints in their biological nature, Galton recognized their uniqueness and potentiality in criminal investigation. 1891, GERMANY. DR. HANS GROSS, a native of Graz, Austria, published Criminal Investigation that contained the first comprehensive description of physical in solving crime. It was used as a handbook for examining Magistrates in Munich, Germany. Gross was the earliest advocate of criminal investigation as a science. Educated in law, he became interested in investigation while serving as an examining magistrate. He deserves credit for developing a scientific system of investigation. He authored the System der Kriminalistik, which was translated into English and published in 1906. Gross is also credited with coining the word CRIMINALISTICS. 1892, ENGLAND. SIR FRANCIS GALTON published Finger Prints, the first comprehensive book on the nature of fingerprints and their use in solving crime. 1892, ARGENTINA. JUAN VUCETIC, an Argentinean police researcher, developed the fingerprint classification system that was then widely used in Latin America after Vucetic implicated a mother in the murder of her own children using her body fingerprints. Argentina was the first country to replace anthropometry with fingerprints. 1901, LONDON. SIR EDWARD RICHARD HENRY was appointed chief of Scotland Yard and forced the adoption of fingerprint identification to replace anthropometry. 1901, USA. HENRY P. DEFORREST pioneered the first systematic use of fingerprints in US through the New York Civil Service Commission. 1903, USA. The New York State Prison began the first systematic use of fingerprints in US for criminal identification. 1915, USA. International Association for Criminal Identification later named as International Association of Identification was organized in Oakland, California. 1920, FRANCE. EDMOND LOCARD published L'Enquete Criminelle et les Methodes Scientifique. There is a passage in this book that may have given rise to the forensic precept that every contact leaves a trace. 1935, USA. The Bureau of Investigation under the Justice Department became the Federal Bureau of Investigation having J. Edgar Hoover as the first chief serving for 48 years. 1948, ABERDEEN, SCOTLAND. A new concept was introduced in the field of criminal investigation. This is known as TEAM POLICING. In team policing there was no patrol division or criminal investigation per se. In this system, a team of police officers is assigned to patrol and investigate all criminal matters within their area of jurisdiction of district. Team policing required that police officers that will respond to a call regarding a criminal case should investigate the case to its conclusion. 1953, USA. PAUL KIRK published Crime Investigation, one of the first comprehensive criminalistics and crime investigation textbook that encompassed theory in addition to practice. 1961, USA. Mapp vs. Ohio (376 vs. 584). In this criminal case, the Supreme Court ruled that illegally obtained evidence is inadmissible in state criminal prosecutions. This case established the DOCTRINE OF POISONOUS TREE. 1965, USA. The office of Law Enforcement Assistance forerunner of the Law Enforcement Assistance Administration was established to fund and coordinate administration, research and training in criminal justice. 1966, USA. MIRANDA vs. ARIZONA (384 US 436). In this appealed criminal case, the US Supreme Court established procedural guidelines for taking criminal confessions. 1977, USA. The FBI introduced the beginnings of Automated Fingerprint Identification System with the first computerized scans of fingerprints. 1986, ENGLAND. DNA typing was used to solve a crime for the first time ALEC JEFFREYS used DNA profiling to identify Colin Pitchfork as the murderer of two young girls in the English midlands. Significantly, in the course of the investigation, DNA was first used to exonerate an innocent suspect. 1987, USA. DNA profiling was introduced for the first time in a US criminal court. Based on RFLP analysis performed by life codes, Tommy Lee Andrews was convicted of a series of sexual assaults in Orlando, Florida. 1999, USA. The FBI upgraded its computerized fingerprint database and implemented the Integrated Automated Fingerprint Identification System, allowing paperless submission, storage and search capabilities directly to the national database maintained at the FBI. Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1. Give at least 20 personalities whose you think made great impact in the field of criminal investigation. 2. Do you think it is effective as means of investigation the "employing a thief to catch a thief" by Jonathan Wild and Eugine Vidocq? 3. What made Sir Robert Peel to be considered as the father of Modern Policing System **CHAPTER 3** **CRIMINAL INVESTIGATION**: CRIMINAL INVESTIGATION AS AN ART ================================ Criminal Investigation is an art that deals with the identification and location of criminal offenders and then proving their guilt through criminal proceeding. Some authors stressed that criminal investigation is more than an art rather than a science because it is not governed by rigid rules or principles. Most often than not, it is governed by intuition, felicity or inspiration, and to a minor extent, by chance. CRIMINAL INVESTIGATION AS A SCIENCE =================================== Criminal Investigation is a systematic method of inquiry that is more like a science than an art. Criminal investigators primarily apply scientific knowledge, principles, and methodologies in order to discover, identify, collect and process facts and evidences to promote justice. However, use of scientific method must be supplemented by the investigators' initiative and resourcefulness in finding solution of criminal cases. The sequence of investigation must follow a scientific operating framework that requires imagination, innovation, and creativeness on the part of the investigator. CRIMINAL INVESTIGATION AS A PROCESS =================================== Criminal investigation involves the systematic process of identifying, collecting, preserving, and evaluating data or raw facts to produce valuable information to prosecute a criminal offender that eventually leads to proper administration of justice. As a process, criminal investigation primarily deals with information and it should be founded on a systematic plan. 1. Criminal Investigation deals with Information ================================================ Generally speaking, what we think as evidence relating to a crime is information subject to use. [Information], however, obtaining or developing evidence is not as easy or as simple as what most people think. The [information] that is valuable in criminal investigation is actually composed of set of data or raw facts which were gathered and then processed to form more distinctive information that can be recognized by a sensible person as proof of a certain case, situation, or occurrence. 2. Criminal Investigation is based on a systematic plan ======================================================= A systematic plan facilitates a logical flow of investigation. Without any systematic plan, relevant and highly significant evidence maybe overlooked during preliminary investigation. Evidences that are identified maybe inefficiently gathered or improperly preserved and wrong conclusion maybe drawn as a consequence. Criminal investigation is an inquiry involving possible criminal activity, based on logic, objectivity, and legal sanctions. In the PNP Investigative Manual, criminal investigation refers to the process of collecting facts to accomplish the three-fold aim: 1. to identify the guilty party, including the victims, witnesses, and evidences 2. to trace and locate the guilty party 3. to provide evidence of the criminal guilt **CRIMINAL INVESTIGATOR DEFINED**: A criminal investigator is a person who is charged with the duty of carrying on the objective of criminal investigation. **FUNCTIONS OF CRIMINAL INVESTIGATORS** 1. Identification 2. Collection 3. Preservation 4. Evaluation/Processing 5. Presentation of evidences and the criminal case **GOLDEN RULES FOR CRIMINAL INVESTIGATORS** Upon arriving at the crime scene, the criminal investigator/s must observe these golden rules before or while processing the crime scene. These rules can be applied to any type of crime scene. 1. Identify and if possible, retain for questioning the person who first notified the police. 2. Determine the perpetrator by direct inquiry or through observation, if his identity is obvious. 3. Detain all persons present at the crime scene. 4. Summon assistance, if necessary. Assign specific duties to assistants, if any. 5. Immediately separate witnesses or suspects for purposes of securing independent statements. 6. Protect the area by giving appropriate orders and by physically isolating it. 7. Permit only authorized people to enter the crime scene boundary. 8. Do not touch or move any object found at the crime scene. **BASIC DOCTRINES IN CRIMINAL JURISPRUDENCE** GOLDEN RULE **'Do not touch, move, and alter any piece of evidence unless it is properly photographed, measured and labeled & Sketched"** 1. DOCTRINE OF FRUIT OF THE POISONOUS TREE The doctrine of poisonous tree was established in a US Supreme Court decided case sometime in 1961. This doctrine upholds that illegally obtained evidence is inadmissible in state criminal prosecutions. This criminal law principle is, however, rooted in an earlier case decided by the US Supreme Court in 1914. In the case of Weeks vs. United States, the Supreme Court established that products of illegal search, seizure and arrest are excluded as admissible court evidence. This doctrine is otherwise called Exclusionary Evidence Rule. 2. MIRANDA DOCTRINE Miranda doctrine is a rule or principle in criminal jurisprudence that requires mandatory pre-interrogation warnings concerning self-incrimination and the right to legal counsel of the suspect. Miranda doctrine mandates that prior to any questioning, the police must make known to the suspect that: a. [He has the right to remain silent] -- that anything he says can and will be used against him in the court of laws; b. [He has the right to hire and consult with an attorney, and to have his counsel present during questioning] -- and if he cannot afford to hire an attorney, one will be appointed to represent him before any questioning, if he wishes one; and c. He cannot waive these MIRANDA RIGHTS except in writing and in the presence of a counsel. **RIGHTS OF PERSON UNDER CRIMINAL INVESTIGATION:** From the provisions of Article III, Section 12, 14 and 17 of the 1987 Philippine Constitution, these are the primary constitutional rights a person under custodial investigation: 1. The right to remain silent 2. The right to counsel 3. The right to be informed of his rights 4. The right against use of torture, force, violence, threat, intimidation, or any other means which vitiate the free will 5. The right against secret, solitary, incommunicado, or other similar forms of detention 6. The right to due process of law 7. The right against self-incrimination **CARDINAL PRINCIPLES OF CRIMINAL INVESTIGATION** The primary job of an investigator is to discover facts then establish if a crime has been committed. After which, he must identify the guilty party or parties involved then obtain evidences for successful apprehension and prosecution of the criminal case. While performing his duties, the investigator should be able to ascertain the six cardinal points of investigation, which are as follows: 1. WHAT specific offense has been committed -- name and designation of crime 2. HOW was the offense committed -- modus operandi 3. WHO committed it -- suspects 4. WHERE was the offense committed -- crime scene 5. WHEN was it committed -- date and time 6. WHY was it committed -- motive and intent **SIGNIFICANCE OF THE FIVE W's AND 1H** 1. Assist the investigator in making brief statements of facts in the logbook or police blotter, and in reports. 2. Aid the investigator in searching the crime scene or other sources of information and evidences. 3. Guide the investigator in formulating questions in interviewing complaint, witnesses, and other interested parties or in interrogating a suspect. 4. Facilitate the preparation of the modus operandi report. 5. Assist the investigator in furnishing brief and concise investigation reports. **CLASSICAL SYSTEMS OF GATHERING INFORMATION** 1. FRENCH SYSTEM -- This involves the practice of obtaining the information that reliesheavily in buying information. Hence, it advocates the extensive use of informers. 2. ENGLISH SYSTEM -- This is the practice of gathering information that has littleregard/consideration on paid information. It is the system that relies more on the information provided voluntarily or willingly by patriots or civic minded informants. **SCIENTIFIC INVESTIGATION METHOD** 1. STATE THE PROBLEM 2. FORM HYPOTHESIS (Develop a rational theory of the crime) 3. OBSERVE AND EXPERIMENT 4. INTERPRET DATA 5. DRAW CONCLUSIONS **PROTOCOLS IN INVESTIGATION** **Protocol 1: Jurisdictional Investigation by the Territorial Unit Concerned** The Police Station, which has territorial jurisdiction of the area where the crime incident was committed, shall immediately undertake the necessary investigation and processing of the crime scene, unless otherwise directed by higher authorities for a certain case to be investigated by another units/agency. **Protocol 2: Official Police Blotter** a. A Police Blotter is an 18" x 12" logbook with hard-bound cover that contains the daily registerof all crime incident reports, official summary of arrests, and other significant events reported in a police station. b. As a general rule, all crime incidents must be recorded in the official police blotter. c. A separate Police Blotter, however, shall be maintained for offenses requiring confidentialitylike violence against women and children and those cases involving a child in conflict with the law to protect their privacy pursuant to R.A. 9262 (Anti-Violence Against Women and Children Act of 2004) and R.A. 9344 (Juvenile Justice and Welfare Act of 2006). d. The duty police officer shall record the nature of the incident in the police blotter containingthe five "W" s (who, what, where, when and why) and one "H" (how) of the information and inform his superior officer or the duty officer regarding the occurrence of such incident. e. In answering the above 5 W's and 1 H and the Case Disposition, all such material details about the incident, including the nature of the action or offense; the Date, Time, and Place of Occurrence; the names of the suspect/s, the victim/s, the witness/es, if any; facts of the case; significant circumstances that aggravate or mitigate the event or the crime should be entered along with the identity of the officer to whom the case is assigned (Officer-on-case); and, the status of the case. **Protocol 3: Investigation Team: Organization and Equipment** a. All investigators in any police unit must be a graduate of prescribed investigation course witha rank of at least PO2 (pre-requisite to assignment). b. Composition: 1. Team Leader; 2. Investigator/recorder; 3. Photographer; 4. Evidence custodian; and 5. Composite Illustrator/Artist c. Equipment of the investigator: 6. Police line; 7. Video camera; 8. Voice recorder; 9. Camera; 10. Measuring device; 11. Gloves; 12. Flashlight; 13. Fingerprint kit; 14. Evidence bag; 15. Evidence tag; 16. Evidence bottles/vials; and 17. Investigator's tickler (contains the following) a. Investigator's checklist b. Anatomical diagram form c. Evidence checklist d. Turn-over receipt **Protocol 4: Duties of the First Responder** a. Proceed to the crime scene to validate the information received; b. Record the exact time of arrival and all pertinent data regarding the incident in his issuedpocket notebook and notify the TOC; c. Cordon off the area and secure the crime scene with a police line or whatever availablematerial like ropes, straws or human as barricade to preserve its integrity; d. Check whether the situation still poses imminent danger and call for back up if necessary; e. Identify possible witnesses and conduct preliminary interview and ensure their availability forthe incoming investigator-on-case; f. Arrest the suspect/s if around or in instances wherein the suspect/s is fleeing, make appropriatenotification for dragnet operations; g. Prepare to take the "Dying Declaration" of severely injured persons with the following requisites: 1. That death is imminent and the declarant is conscious of that fact; 2. That the declaration refers to the cause and surrounding circumstances of such death; 3. That the declaration relates to facts which the victim iscompetent to testify to; and 4. That the declaration is offered in a case wherein the declarant's death is the subject ofthe inquiry. (Section 37, Rule 130 of the Rules of Court). h. Evacuate the wounded to the nearest hospital using emergency services; i. Account for the killed, wounded and arrested persons for proper disposition; j. Conduct initial investigation; and k. Brief the investigator-on-case upon arrival and turn over the crime scene. l. Conduct inventory on the evidence taken at the crime scene; Inventory receipt should beproperly signed by the first responder, SOCO and the investigator. **Protocol 5: Duties and responsibilities of the Investigating Team** a. Take full control of the crime scene to include the conduct of crime scene search; taking ofphotographs; making sketches; lifting of fingerprints; markings of physical evidence; (Chain of custody) the transmittal of evidence to crime laboratory; interview of witnesses; gathering and evaluation of evidence; follow-up of the case and the documentation and filing of appropriate charges in court. b. Establish a command post in the immediate vicinity of the crime scene; c. Designate a holding area in the immediate vicinity of the crime scene (for the media, VIP'sand other personalities present); d. Conduct case conference with the first responder, SOCO, other law enforcers and rescuepersonnel; e. Note any secondary crime scene (if situation requires); and f. Release the crime scene after investigation.**Protocol 6: Investigation of Suspects** a. Procedures when arrest is made 1. Secure the person arrested (handcuff at the back); 2. Inform the arrested person on the cause of his arrest and his rights as provided for inthe Constitution; 3. Conduct thorough search for weapons and other illegal materials against the suspect/s; 4. Use reasonable force in making arrest; 5. Confiscated evidence shall be properly documented and marked; 6. Bring the arrested person to the Police Station for investigation. b. Booking procedures of the Arrested Person/Suspect 7. The arrested suspect shall be fingerprinted, photographed and subjected to medicalexamination to include liquor and drug tests. 8. Conduct record check. **Protocol 7: Taking of Sworn Statements of Suspects** The execution of a suspect's "WAIVER" as stipulated in Art 125 of the RPC shall always be done in the presence of his chosen counsel or any independent counsel. **Protocol 8: Taking of Sworn Statement/s of the Witnesses** a. Sworn Statement or Affidavit of complainant/s and witness/es must be taken immediately bythe investigator-on-case. b. Affidavit of Arrest of arresting officers must be taken immediately not later than 24 hours. c. In Inquest cases, the investigator-on-case and the arrestingofficer/s shall observe Art. 125 of the RPC. **Protocol 9: Preparation of Reports and Filing of Charges** The Investigator-On-Case shall submit the following: a. Spot Report within 24 hrs. to HHQ; b. Progress Report; c. After Operation Report; d. Final Report after the case is filed before the prosecutor's office/court; and e. Accomplishment Report. **Protocol 10: Procedure in the Release of Crime Scene** a. Ensure that appropriate inventory has been made; b. Release is accomplished only after completion of the final survey and proper documentationof evidence, witness/es, victim/s and suspect/s; and c. If the crime scene is within a private property, the same must be released to the lawful ownerwitnessed by any barangay official. In case of government facility, it should be released to the administrator. **Protocol 11: Follow-up of Case** The investigator shall conduct police operation to identify and apprehend suspect/s based on the results of the initial investigation conducted. **Protocol 12: Preparation of Case Investigation Plan (CIPLAN)** The conduct of police operation involving sensational cases, high profile and heinous crimes must be covered by Case Investigation Plan. **Protocol 13: Attendance to Court Duties** The investigator-on-case and arresting officers shall endeavor to ensure their attendance during court hearings while COPs/Heads of Units shall supervise and ensure the attendance of witness/es. **Protocol 14: Uniform of the Investigator** Prescribed uniform should be worn by investigators when conducting investigation so as to identify them as PNP personnel. **COMMON INVESTIGATION OVERSIGHTS** a. **Incomplete Case Folder** -- lack of material documentation of the case under investigation. Recommended Remedies -- include the police reports in chronological order such as police blotter, spot, progress and final investigation report. Also, append the scene of crime operation reports, forensic reports and photographs. Further, if possible, attach the profile of victim/s and suspect/s, as well as the status of the party involved and the case. b. **No template for the conduct of investigation** -- police personnel are not knowledgeable about crime scene preservation and basic investigation. Recommended Remedies -- every police personnel should mandatorily undergo investigation training giving priority to those in the field units. c. **Inadequacy of coordination** -- the SOCO, investigators, prosecutors and other concerned agencies work separately and independently in the conduct of their investigation. Recommended Remedies - case conferences should be encouraged at the start of the investigation. The conferences should be attended by the SOCO, investigators, prosecutors, IBP lawyers and other concerned agencies in order to ensure the coordinated actions in the preparation of an airtight case folder. d. **Failure to prosecute** -- pertains to absence of police investigator during trial to act as prosecutor's witness due to retirement and transfer of concerned investigator. Recommended Remedies -- proper turn-over of case folders handled by investigators who shall retire or be transferred, as requisite before the issuance of office clearance. e. **Chain of Custody** -- non-observance of proper documentation in the turn-over of evidence from one officer to another or one office to another. Recommended Remedies -- documentation on the turn--over of evidence with actual receipt should be observed and non-observance should be the basis for administrative sanctions. f. **Less appreciation of electronic evidence** -- police investigators take for granted the electronic devices such as cellphones, computers and other electronic devices can be processed to give investigative leads. Recommended Remedies -- proper training on the preservation and processing of electronic devices should be prioritized for all investigators in the field. **3 Aims of Criminal Investigation** a. The criminal is identified. b. He is traced and located. c. The facts proving his guilt are gathered for court presentation. **What are the four (4) ways in identifying criminals?** b. by eyewitness testimony c. by circumstantial evidence d. by associative evidence **Name the three (3) phases in criminal investigation.** 1. [Preliminary investigation] -- also known as initial investigation, **focused at the locus criminis (crime scene)** 2. [Follow-up investigation] -- continuing or in-depth investigation, to **trace and locate the suspects and eventually the guilty party.** 3. [Concluding investigation] -- final investigation, **evaluation of collected evidences of the suspects guilt for presentation to the court.** **Stages of Criminal Investigation** **1. Preliminary Investigation**- A stage of criminal investigation that is mostly focused at the locus criminis (crime scene) **Mandatory Action of the First Responding Officer at the Crime Scene** 1. Protect the crime scene 2. Ascertain if a crime has in fact been committed 3. Apprehend the perpetrators if they are still present at the crime scene 4. Obtain facts regarding the incident 5. Inform headquarters about the crime 6. Establish the crime committed 7. Identify and interview witnesses and or victims 8. Take field notes 9. Document the crime scene 10. Conduct crime scene search **Searches for the Perpetrator** 1. [Hot Search]- actual search of the crime scene upon arrival 2. [Warm Search]- search at the general vicinity of the crime scene 3. [Cold Search]- investigative search **Crime-scene search methods** 1. **Strip** -- In this method, the area is blocked out in the form of a rectangle and searched through parallel lanes in back and forth movement. 2. **Double strip/grid**- A modification of the strip search where the rectangle is traversed first parallel to the baseline then parallel to the side. 3. **Spiral**-Conducted by following a circular motion proceeding at the center of the crime scene. 4. **Sector/zone/quadrant**-The area is divided into sub areas where the persons conducting the search would be assigned individually. 5. **Wheel**- The searcher gathers from the center moving towards the outward along spokes. 6. **Point-to-point**- Conducted when the searcher proceeds only to the location of items that are obvious evidence. **Documentation process** 1. **Administrative worksheet**- documentation of major events, times and movements relating to the search efforts 2. **Narrative description**- documentation of the general appearance of the crime scene as first observed 3. **Photographic log**- documentation of the process of scene photography 4. **Diagram/sketch**- documentation of physical evidence locations as well as measurements 5. **Evidence recovery log**- documentation of the recognition, collection, marking and packaging of physical evidences **2. Follow-up Investigation**- the main objective is to trace and locate the suspects and eventually the guilty party. - follow-up investigative leads - reconstruct the crime scene -focus the investigation - analyze and determine the significance of the collected information and evidences **3. Final Investigation**- Serves as the stage of evaluation of collected evidences of the suspects guilt for presentation to the court. -furnish the records of the case -review the suspect's arrest to ascertain its legality -review suspect's statement in the form of admission or confession -review the manner in which evidences were secured or obtained -review and compile field notes, criminal investigative reports and other documentation that may be used during the trial Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1. Give at least 20 definition of terms or doctrines related to criminal investigation 2. In your own understanding is criminal investigation an art or a science? Explain your answer in just one paragraph. 3. Discuss the golden rule in criminal investigation. 4. What are the 6 cardinal questions in criminal investigation? 5. Discuss briefly the protocols in investigation. 6. What are the common problems encountered in criminal investigation? 7. Is the aims of investigation and phases of investigation related to each other? Explain**CHAPTER 4** **3 TOOLS OF CRIMINAL INVESTIGATION** 1. Information (Chapter 4) 2. Interview and Interrogation (Chapter 12) 3. Instrumentation (Chapter 13) **INFORMATION** Criminal investigation primarily deals with information. Anything generally thought of as evidence relating to a crime is actually in the form of information. Information, however, is not obtained as simple as what most people think. Information that is valuable to the investigators is composed of sets of data or raw facts that were collected and them put together to form a significant idea of something. Collected data must be filtered then processed to produce an information that can be recognized by any sensible people as proof that criminal act or incident took place and that the accused is the one who did it. [INFORMATION] -- is the general term referring to the knowledge acquired by criminal investigators from various sources, which could be in the form of persons, places or things. **SIGNIFICANCE OF INFORMATION** 1. Information provide answers for the 5W's and 1H 2. Information is vital in planning the operations of investigators **TECHNIQUES OF GATHERING INFORMATION** Skillful gathering and systematic development of information can be done in the following manner. 1. By observing tact or diplomacy in performing investigative tasks and duties. Tactinvolves the skill of knowing how to use diplomatic words thus avoiding offensive language for the purpose of winning goodwill and confidence of other people. 2. Being friendly and diplomatic with other peace officers or law enforcers. 3. By not totally relying on memory -- making the habit of jotting down notes of everycircumstance or incident encountered during the investigation proceedings. 4. By keeping records or maintaining a file of potential criminals, suspected criminals,actual offenders, and informers or informants. 5. By being meticulous -- learning not to overlook or disregard chance memoranda orhaphazard. 6. By becoming acquainted with many kinds of people from all walks of life. **TRACES OF INFORMATION** Traces of information refer to any written or documented statements of persons who possess relevant knowledge concerning a crime. It covers any object of recorded data that can be used by investigators in their inquiry concerning a criminal incident. Thus, traces of information include any form of documented data such as directory file, audio/video tapes, and written testimonies that may aid in solving criminal cases. Common traces of information are: 1. criminal complaint 2. information document subscribed by the prosecutor 3. depositions 4. news articles Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1\. Identify 1 sensational case in our country today and obtain at least 20 information from different possible sources. Cut or photograph the obtained information, mount these in a coupon bond or save it in a folder (if soft copy). **INTELLIGENCE** **Sun Tzu**, who once said: "If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory, you will suffer a defeat. If you know neither yourself nor the enemy, you are a fool who will meet defeat in every battle." Whose book Ping Fa (**The Art of War**), written about 400 BC, is said to be widely read by contemporary Chinese Communist strategists. Sun Tzu refers in his book to five kinds of secret agents, corresponding to modern concepts of: (1) agents in place, (2) double agents, (3) deception agents, (4) expendable agents, and (5) penetration agents.\" Sun Tzu stressed the importance of good intelligence organization, and he also wrote of counterintelligence and psychological warfare. **HISTORY OF INTELLIGENCE** **REHAB --**the harlot of Jericho (Joshua 2:1-21) who sheltered and concealed the agents of Israel, she made a covenant with the agents and duped their pursuers. **DELILAH --**An impromptu intelligence agent of the Philistines. She allowed Philistine spies to hide in her house (Judges 16:9) and used her sex to gain intelligence from a power enemy. **OTHER GREATMEN WHO USED INTELLIGENCE IN HISTORY:** 1. **ALEXANDER THE GREAT (Marching in Asia)** Investigated all the letters and the detection of the Malcontents whether the legitimate cause was exposed. (hints and rumors of disaffection growing among his allies and mercenaries) 2. **CAMORA AND MAFIA** Originated in the Neapolitan prisons where, upon the protection of keeping a lamp alight before a prison shire, a tax was levied upon all newcomers. The extortion of the Camorra was not long confined to inmates of jails. 3. **CRESSUS OF ROME (Marcos Lucinos)** Employed both slave and freemen (fire brigade). The intelligence operatives of Cressus, when not objectively looking for fires, were devoted in the main to gathering evidence for Cressus to be used in the Law Courts. 4. **AKBAR** The "Great Mogul" and sagacious master of Hindustan who employed more than four thousand agents for the sole purpose of bringing him the truth that his throne might rest upon it. 5. **GENGHIS KHAN** 6. **FREDERICK THE GREAT** The father of organized military espionage. He established rules for obtaining and using every grade of spy or intelligence. 7. **HANIBAL** Hanibal's invasion of Italy, his brilliant and futile raid in history, gained him many victories and nearly bled Rome to death. 8. **KARL SCHULMEISTER** Napoleon's military secret service and Napoleon's eyes. He acted as the spy sent by Napoleon to study the characters of the Generals; his royal foes selected to defeat him. 9. **WASHINGTON** Conspirators under oath abound in the history of every nation (American was independent). 10. **WALSHINGHAM OF ENGLAND** He protected Queen Elizabeth I from countless assassins. Walshingham's beat agents were English students residing in Italy. 11. **WILHELEM STIEBER** His contributions to the science of Military Censorship and organized Military Propaganda. He worked as a census taker and developed in informal format in the gathering of data. 12. **ALFRED REDL** One of the most brilliant intelligence agents, though he was homosexual. Chief of the Austro-Hungarian secret service and at the same time agent of the Russia (convicted of treasonhe committed suicide) 13. **THE NINJA** The Ninja (the name derived from the word "ninjitsu" the art of making oneself invisible) served the shoguns of 12 century Japan. They were drawn from the physical and social cream of samurai youth and reputed to be able to walk on water, to obtain intelligence while invisible and to appear and disappear at will. 14. **DANIEL DEFOE (1660-1731)** Daniel Defoe was one of the great authors of the late 17^th^ and early 18^th^ centuries. He was also one of the British monarchy's finest agents. Although best known as the author of *Robinson Crusoe* and *Moll Flanders,* Defoe also worked in 'the honorable, through secret services' of Queen Anne. Outwardly rebellious, a revolutionary pamphleteer, pilloried and twice imprisoned for seditious libel, his background was hardly suited to the world of royal espionage. 15. **BELLE BOYD (1844-1901)** Belle Boyd was described by her biographer Joseph Hergesheimer, as 'the most famous woman concerned with official secret activities in the Civil War. An impartial press referred to her as 'the Siren of the Shenandoah', the 'The rebel Joan of Arc' and the 'Secesh Cleopatra'. She regarded her fame more circumspectly. 'From the force of circumstances, she wrote, 'and not through any desire of my own, I became a celebrity.' 16. **LORD BADEN POWELL (1857-1941)** Through better known as founder of the Boy Scout movement, Baden Powell was also known also an active spy. His penchant for dressing up, love of charades and often embarrassing eccentricity ideally suited him to the world of 19^th^ century espionage. 17. **CARBONARI** The Carbonari never weighted them seriously with a governing program. They never got around to agreeing upon what particular form of government they would set up when and if they succeeded in overthrowing the existing authority. 17. **NAPOLEON BONAPARTE** Once said "One spy in the right place is worth 20,000 men in the field." His personal staff included two bureaus of interest. The bureau of intelligence staffed by two officers and unknown numbers of spies, whose function was to consolidate all incoming information regarding the enemy troops for presentation to the Emperor and to obtain such special information. Second the topographic bureau which maintained a large situation map covering the latest information regarding both enemy and friendly forces. 18. **QUINTUS SERTORIUS** The Roman Commander in Spain, according to Polyaenus, the possessor of a white fawn that he had trained to follow him everywhere. "...even to the steps of the tribunal." This little fawn was taught to approach at a given signal, and Sertorius himself gave the signal, when about to pronounce his decision in judicial cases. The fawn appeared to convey information to the Roman general; and Sertorius allowed it to become widely known that he derived both secrets and guidance from the fawn. His intelligence agents mean-while, were everywhere active and all that they learned was credited to the supernatural powers of the animal. 19. **WILLIAM JOHANN CARL EDUARD STIEBER** Intelligence agent for Bismark, who later labeled him the "King of sleuth-hounds." He recruited highly trained intelligence agents. **Definitions of Terms** 1. **Counterintelligence** -- the aspect of police intelligence relating to all security measures, both offensive (active) and defensive (passive), designed to ensure the safeguarding of information, personnel, material and installation against espionage, sabotage, and subversion be foreign nations and dissident group of individuals that constitute threat to national security. (in PNP, it deals with the intelligence defense against the enemies of the organizations). 2. **Espionage** -- is the collection of secret information that a government or an organization does not want any outsider to know. 3. **Sabotage** -- action against materials, premises or utilities or their production which may inure, interfere with or obstruct the national security or ability of a nation to prepare for or carry on a war. 4. **Subversion** -- a clandestine or covert action designed to undetermined the police, military, economic, psychological, morale, or political strength of a regime. **Introduction to Intelligence** **1. Definition of Intelligence** - Processed information - The product resulting from the collection, evaluation, analysis, integration and interpretation of all available information concerning specific area of interest. **Police intelligence** - an evaluated and interpreted information concerning organized crime and other major police problems. **Military intelligence** - is an evaluated and interpreted information concerning actual or possible enemy or theaters operations including weather and terrain, together with the conclusions drawn there from. It compromises the broad fields of strategic intelligence and combat intelligence. **Three Broad categories of intelligence** a. NATIONAL INTELLIGENCE ======================== b. DEPARTMENT INTELLIGENCE ========================== c. MILITARY INTELLIGENCE ======================== \- Intelligence used in the preparation and execution of military, police plans, policies and programs. **Three Major Categories or Types of Police Intelligence** 1. [STRATEGIC INTELLIGENCE] -- intelligence information which is primarily long-range in nature with little or no immediate practical value. 2. [COUNTER -- INTELLIGENCE] -- it deals with defending of the organization against its criminal enemies. (Defensive) 3. [LINE INTELLIGENCE] -- the type of intelligence which is of an immediate nature and necessary for more effective police planning and operations. (Offensive) **Concept and Classification of Police Intelligence** 1. [INTELLIGENCE AS A PROCESS] -- is an activity, which treats, processed information as a basis for departmental policy and decision-making. 2. [INTELLIGENCE AS AN ORGANIZATION] -- it is an institution composed of persons who pursue a special kind of knowledge for the purpose of planning the collection of information, processing and dissemination of intelligence relating to the area of interest. **Life of Police Intelligence** **Information** - Raw data or unevaluated material of every description derived from observation, communication, reports, rumors, imagination, and other sources from which intelligence is produced. - Any knowledge, data, news, opinions, or the like transmitted from a person to another. **Information and Intelligence** 1. Information itself may be true or false, accurate or inaccurate, confirmed or unconfirmed, where as 2. Intelligence are information run through a process to come up with a conclusion, hypothesis, an estimate, or prediction that are significant to the development of plans, policies, and operations. **Intelligence Information** **Types of Military intelligence** 1. **Strategic intelligence** -- knowledge pertaining to capabilities and vulnerabilities of a foreign nation which is required by the national planners for the formulation of an adequate national defense in peace and form the basis for the projected military operation in the time of war. a. [P] olitical intelligence -- deals with the domestic and foreign relationships of government operation. b. [E] conomic intelligence -- deals with the extent and utilization natural and human resources to the industrial potential of nation. c. [T] ransportation and communication intelligence -- concerned with operation and facilities not only the military but also the civilians. d. [S] ociological intelligence -- deals with the demographic and psychological aspect of groups of people. b. Characteristics of the people c. Education e. [B] iographical intelligence -- deals with the individual personalities having actual possession of power. f. [A] rmed force intelligence -- deals with the armed forces of the nation. g. [G] eographical intelligence -- deals with the natural as well as man-made features of physical environment of man considered from the point of view of military operation. h. [S] cientific intelligence -- deals with the progress of the research and development as it affects the economic and military potential of a nation. 2. **Combat intelligence (tactical/line)** - required by the commander to provide for planning and conduct of tactical operation. - Knowledge of the people, weather, enemy and terrain (PWET) used in planning and conducting tactical and administrative operation in a counter insurgency. **Intelligence information to be determined (PWET)** A. **People** - Living condition - Source of income - Education of the people - Government livelihood projects - Extent of enemy influence of the people B. **Weather** - Visibility - Cloudy - Temperature - Precipitation - Wind C. **Enemy** - Their location - Their strength - Disposition - Tactical capability - Enemy vulnerability D. **Terrain** - Relief and drainage system vegetation - Surface materials - Man-made features **Five military aspects of terrain;** 1. cover and concealment 2. obstacles 3. critical key terrain features 4. observation and fields of fire 5. avenues of approach **3. Counter Intelligence** -- It is intelligence activity, which concerns principally with the defending the organization against penetration of individual or various groups who are inimical to the best interest and general harmony. - They are actions taken to deny information to the enemy or denies access of information to the enemies. - Counter intelligence is 'Security Consciousness" in the handling of classified and sensitive documents and added to this are the active physical means. **Counter Intelligence** - phase of intelligence covering the activity denoted and destroying the effectiveness of hostile foreign activities and to the protection of information against espionage, subversion, and sabotage. **Objectives of Counter Intelligence** 1. Prevent enemy sabotage, espionage and subversion. 2. Security of the command 3. Denies knowledge to the enemy 4. Aids the activities in achieving surprises. 5. Detect possible disaffection, treason, sedition, within the military or police forces. **Two (2) general types of Counter Intelligence** a. Passive Measures -- those measures which seek to conceals information from the enemy. b. Active Measures -- those measures which seek active block to the enemy's effort to gaininformation or engage in espionage, subversion or sabotage. **Five (5) Importance of Counter Intelligence** 1. Denies information to the enemy. 2. Reduces the risk of the commander. 3. Aids in achieving surprises. 4. Increases the security of the command. 5. Decrease the ability of the enemy to create information about our forces. **Five (5) Categories of Counter-Intelligence Operation** 1. **Military Security** -- encompasses the measures taken by a command to protect itself against espionage, subversion or surprise. 2. **Port frontier and travel security** 3. **Civil security** 4. **Censorship** 5. **Special Operation** 1. **Security** -- is the protection of classifies information's material's and equipment's from disclosure to unauthorized person's and the protectors of the defense installations and equipment from damages or destruction by sabotage. 2. **Security Survey and inspection (SSI)** 3. **Social investigation (SI)** **Four "I's of Intelligence** 1. Interest -- a feeling of attraction 2. Integrity -- honestly, completeness 3. Ingenuity -- original truth, in accordance of law 4. Intelligence -- capacity to know what is right or what is wrong. **Six Basic Principles of Intelligence** 1. Be useful 2. Be timely -- intelligence must be communicated to the decision maker at theappropriate time to permit its most effective use. 3. Be flexible -- intelligence must permit variation of the action the starting and finishingtime of work. 4. Fit the needs of the commander 5. Be thoroughly and carefully planned (foresight) -- intelligence must take intoconsideration of the future. 6. Require constant security measures -- security is achieved by measures whichintelligence takes to protect and preserve the integrity of its organization, personnel method sources, information and results of its activities. **Military principles which are also applicable for Police intelligence activity;** 1. **Principle of Objectivity --** intelligence must be based on the decision maker own plans and intentions as much as on consideration of the intelligence target itself. 2. **Principle of Interdependence --** intelligence is artificially subdivided into component element to ensure complete coverage, eliminate duplication and to reduce the overall task coverage, or manageable size. Nevertheless, each subdivision remains as essential part of a unity; contribute proportionally to the end results; possesses a precise interrelationship; and interacts with each other so as to achieve a balanced and harmonious whole. 3. **Principle of Continuity** -- intelligence coverage must be continuous so that the shape of what happened today could be studied in the light of what happened before, which turn would enable to predict the shape of things to come. 4. **Principles of Communication** -- intelligence adequate to their needs must be communicated to all the decisions makers in a manner that they will understand and in the form that will permit its most effective use. 5. **Principle of Selection** -- intelligence should be essential and pertinent to the purpose at hand. **7 Basic principles of counterintelligence operations** 1. conformity to mission 2. avoidance of publicity 3. objectivity 4. conformation 5. offense 6. flexibility 7. coordination Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1. Discuss the meaning of the statement of Sun Tzu "If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory, you will suffer a defeat. If you know neither yourself nor the enemy, you are a fool who will meet defeat in every battle." (**The Art of War**). 2. Give at least 10 personalities who became prominent in the field of police and military intelligence. 3. Using your bible, a. in the book of Numbers, what are the names of 12 spies who went in Canaan b. distinguish the character of Rehab and Delilah. 4. Distinguish the three major categories or types of police intelligence. 5. What are the meaning of PETSBAGS in strategic intelligence? 6. Discuss the PWET of intelligence in combat intelligence.7. Distinguish "intelligence from "counter intelligence" **INTELLIGENCE CYCLE** It is the continuous process which ultimately coordinates and integrates all efforts of the collecting agencies or units. a. **Planning and Directing effort** In the phase, the Intel Staff Officer or unit commander determines the required or important information relevant to mission. Then these requirements will be distributed to the different collecting agencies by direction or by request. It involves task organizing MI assets; identifying personnel, logistics, and communications requirements; identifying, prioritizing, and validating intelligence requirements; developing a collection plan and synchronization matrix; issuing SORs for collection and production; and monitoring the availability of collection information. b. **Collection of Information** In this phase, the collecting agency determines agency what specific information is to be collected, by whom and from whom. It is reacquiring information and providing this information to the processing and production elements, it includes the maneuver and positioning of intelligence assents to locations favorable to satisfying collection objectives. After the collecting activity is carried out the collected information is then submitted for processing. c. **Processing the Collected Information** The collected information is transformed into intelligence. Processing collected information involves four stages; 1. **Recording** -- it is the reduction of information into writing or some other form of geographical representation and the arranging of this information into groups of related items. 2. **Evaluation** -- the determination of the pertinence of the information to the operation reliability of the source of or agency and the accuracy of the information. 3. **Analysis** -- the determination of significance of information relative to the information and intelligence already known and drawing deductions about probable meaning of the evaluated information. 4. **Integration** -- it is the combination of the elements stated in assessment which other known information or intelligence to form a logical feature of hypothesis for enemy activities or information of the operational area and characteristics of the mission of the command. d. **Dissemination and use** Final phase of the cycle. Processed information is disseminated to the agency, unit or command to effect or implement the mission. It is the timely conveyance of o0f intelligence to users in a usable form. The diversity of forms and means requires interoperability among common control, communications and intelligence system.\\ **How to disseminate intelligence** a. **[Spot Reports]** -- one-time reports used by echelons to transmit intelligence or information of immediate value. The most expeditions mean of transmission consistent with requisite security. It should answer the question who, what, where, when, and how. b. **[Intelligence Summary]** -- contains a brief summary of information of intelligence interest covering a period of time designated by the COP. It is an aid in assessing the current situation and updates other intelligence reports. c. **[Analysis of the area of operation]**. A detailed comprehensive study with emphasis on weather and terrain data designed to enable the COP to determine the effects of the area of operation on the opposing forces. It may include information about the people in the area, their economy, sociology, religion, and psychology. d. **[Intelligence estimate]**. Is a logical and orderly examination of the intelligence factors affecting the accomplishment of the mission. It provides the commander with an analysis of the area of operations, enemy capacities that can influence his mission. It provides the commander with a basis for planning operations and for disseminating intelligence to his staff. **Reporting** It is an activity of passing information to another. Information passed consists of significant facts from which reliable conclusions maybe drawn, decision made and when advisable, action taken. A fact is anything which has been proven to exist or to have happened after careful observation or investigation. **Recording** - is the reduction of information to writing or some other form graphical representation and the arranging if information into groups of related items. **Journal** - is a permanent chronological record of reports and messages that have been received and transmitted, of important events that have occurred, and of actions taken in response, covering a stated period, usually 24 hours. **Situation map** - is a temporary graphic display of the current dispositions and major activities of the enemy. Information of friendly forces on this map is usually limited to boundaries; locations, locations of command post of higher, lower, adjacent units; reconnaissance units. The purpose of the intelligence situation map is to contribute to sound tactical decisions. **Intelligence workbook** - is a systematic arrangement by subject heading which aids in the sorting, evaluation, and interpretation of information and in the preparation of intelligence reports. It is not a permanent record and it is not distributed to an out-side agency. The workbook is kept current and obsolete entries are deleted. A. **Journal file**. The journal file contains copy of each message or document noted in the journal. It supports the journal and is also a permanent and official record. B. **Information or reference file**. All information of possible future value is cross indexed in this file. Much information is collected which has no immediate interest but which may be of future value. C. **Order of battle file**. Order of battle is the identification, strength command structure, and disposition of the personnel, and equipment of any military force. A. Completely reliable 1- confirmed by other sources B. Usually reliable 2- probably true C. Fairly reliable 3- possibly true D. Not usually reliable 4- doubtfully true E. Unreliable 5- improbable F. Reliability cannot be judged 6- truth cannot be judged An evaluation such as **A-1** would indicate a **complete reliable** source and information that was **confirmed** **by other sources**. **Source of information** T. -- direct observation by the commander and chief of a unit U. -- report by penetration agent or resident agent V. -- report by PNP/AFP W. -- interrogation of captured enemy agent/foreigner X. -- observation of government and civilian Y. -- observation by a member of populace Z. -- documentary Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1. Explain the intelligence cycle. 2. State the accuracy, reliability and source of information a. A1 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ b. B1 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ c. C2 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ d. A3 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ e. B4 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ f. D3 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ g. F6 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ h. B6 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ i. D2 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ j. A5 =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ k. A2T =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ l. B4Z =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ m. A4X=\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ n. C5Y =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ o. B2W =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ p. D5U =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ q. F4V=\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ r. B3Z=\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ s. D1X=\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ t. A3Y =\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ **METHODS OF COLLECTION OF INFORMATION FOR THE PRODUCTION OF INTELLIGENCE** **METHODS OF COLLECTION** A. Overt or open method B. Covert Method **Overt or open methods of gathering information's** Interview Interrogation Instrumentation Research Investigation Debriefing **SURVEILLANCE** **Surveillance defined** French, Surveiller "to watch over." Veiller "to keep watch." Latin, vigilare "vigilant." Continual observation of a person or group, especially one suspected of doing illegal. A secret observation of persons, places and vehicles for the purpose of obtaining information concerning the identities and activities of the subject. **Types of Surveillance** 1. **Moving (tail/shadow)** conduced when the person, activity, object at watch moves from one place to another; and 2. **Fixed (stake out)** when the subject is not expected to move from area, however, surveillant may move from one vantage to another. **Kinds of surveillance** A. Surveillance of Places B. Tailing or shadowing C. Undercover investigation or roping **Surveillance of places** Crimes that require surveillance are gambling, abortion, prostitution, illegal sale of drugs or alcohol, dishonesty among employees or infidelity in a divorce. A careful survey of the surrounding area should be made. The character of the neighborhood, the residents and the transients should be noted. The observation point should be selected. **Shadowing or tailing** **Purpose:** a. To detect evidences of criminal activities. b. To establish the associations of a suspect. c. To find a wanted person. d. To protect a witness. e. To discover the association, amusements and habits of a responsibility. f. To check the loyalty of employees in an establishment where the theft has occurred. **Don'ts in shadowing** a. Don't meet the eye of the subject. b. Don't adopt a slink, sleuthing, and creeping peeking 'hacksaw' manner. c. Don't war storybook disguises. d. Don't carry briefcases, notebooks, papers, or other noticeable objects. e. Don't greet fellow officers or allow them to greet you. f. Don't make notations or entries ostensive. **Automobile Surveillance** **Disguising the car** The following must be observed in disguising the car. a. **License plate** -- a popular type of black color car should be used and care must be taken that the license plates are not identified. This can be remedied by the following; use of security plates use of "colorum car" "drive-it-yourself" rented cars borrowing cars from friends. b. **Appearance** -- various devices may be used to change the appearance of a car. Placing and removing sticker, wind shield, shifting head lights from dim to bright, re-arranging the number of occupants. **Methods of shadowing by foot** 1. **[One Man shadow]** -- this is the most common because it involves the use of the least number of men. In this type of surveillance, the shadower will follow the subject and make notes authentically of that entire subject does. He will record all contracts, description of all persons encountered, places visited, time spent in various places, routes taken, etc. 2. **[Two-man shadow]** -- this is more advantageous because it permits immediate change and are less likely to be recognized. One shadower will follow the subject and the other may either be abreast, or on the opposite side of the street, or following the shadower. 3. **[Three-man shadower / or ABC Method of shadowing]** -- A, B, and C, A is closest to subject (S), he follows S at a distance which depends on the pedestrian traffic. B follows A, at about the same distance from A as A is from S, or, if vehicular traffic is moderate, maybe approximately opposite him on the other side of the street, B and C take turns in occupying the A position, thus preventing A becoming a familiar and noticeable figure to S. **Tactics and Techniques of Shadowing** General; The subject should be kept unaware of the shadowing operation. The investigator should be inconspicuous. He should not be detected looking directly at the subject. He should shift from left to right never remaining for long directly behind the subject. Both side of the street should be used. If the subject is aware of the tailing he should request for his immediate removal. a. **[Turning]** -- if the subject turns a corner, the surveillant should not hurry. If the subject is lost, the nature of the neighborhood will determine the subsequent procedure. In most cases, it is preferable to lose the suspect than to alert him to the tail. b. **[Entering a building]** -- if the building is a store, the surveillant should wait until the subject comes out. In buildings having a number of exits, it is necessary to follow him inside. If the subject enters an elevator the surveillant should board the same elevator. The surveillant may tell the elevator boy that his destination is the same floor, if there are more than one surveillant one should alight at the subject's floor and should proceed in a different direction then the latter can return to the first floor and wait for the subject. c. **[Taking a bus]** -- the surveillant should board the same bus; sit behind the subject and on the same side. If he misses the bus, he should hire a taxi and board the bus at a pint ahead. d. **[Taking a taxi]** -- when the subject takes a cab, the surveillant records the time, place and name of the taxi's company and license. He should endeavor to follow in another taxi. If this results in failure, he should trace the taxi by means of recorded information and ascertain the destination from the taxi driver. e. **[Taking a train]** -- if the subject shows his intention of buying a ticket, the surveillant should endeavor to get in line behind him with one-person intervening. If he hears the destination requested by the subject, he may buy a similar ticket. In the event that he is unable to hear the destination, he should merely request for a timetable. f. **[In a restaurant]** -- the surveillant should allow a few minutes to elapse before following the subject into a restaurant. He should then take an obscure seat and arrange to finish his meal at the same time as the subject. g. **[In a hotel]** -- an inquiry can be made concerning the room of the subject. If he registered, the surveillant can take the adjoining room. h. **[in a telephone booth]** -- the surveillant should either go into the next booth or stand near enough to hear. He should not the telephone book use the page at which it was left open. i. **[In the theater]** -- the surveillant should sit behind the subject and take not of the various exits which are available. **Special methods of surveillance** a. **[wiretapping]** -- the telephone lines is tapped somewhere along the line, either in the street line or in the telephone company. The tapped lines are run into a recorder, which is monitored by the investigator. b. **[concealed microphone]** -- the microphone may be concealed in the room or maybe disguised as a common object such as desk ornament. The wires are run out to a nearby room where the conservation is recorded. c. **[Tape recorder]** -- a pocket size tape recorder maybe concealed when recording the conversation. d. **[Television]** -- closed circuit system may be used so that the activities of the subject maybe observed by the surveillant at a distance. **Types of Surveillance** A. **According to Intensity and Sensitivity** B. **According to Methods** [Stationary] -- this is observation of place, usually a bookie stall, a gambling joint, a residence where illegal activities are going on (fixed position) [Moving] -- surveillant follow the subject from place to place to maintain continuous watch of his activities. [Technical] -- this is a surveillance by the use of communications and electronic hardware, gadget, systems and equipment. **Difference between Surveillance and reconnaissance** a. [Surveillance] is continuous while Reconnaissance is intermittent (mission or operation) b. [Reconnaissance] has specific objectives while Surveillance has general objectives. Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1\. Write your movie review with these movies using the following format: Movies: (Choose only 1 movie subject of your review) [Catch Me If You Can] Spy The Good Liar CIA Target ============================ [Bridges of Spies FORMAT:] I. TITLE II. MAIN CHARACTER/S III. SETTING IV. SUMMARYV. REACTION (At least 3 paragraphs in relation to surveillance). 2\. Give and discuss at least 10 tactics of shadowing. **INFORMANT** Informant is one who voluntarily or willingly provides information to the criminal investigators and even offers to be a witness. There are times, however, when the informant gives information secretly or surreptitiously and requests anonymity. **INFORMER** Informer is informant by profession, usually a recruited or paid asset of the investigator. Informer is distinct form informant as the former gather's information of criminal interest while the later provides information of non-criminal nature. The informer uses information as means of livelihood since it is his job to collect criminal facts then reveals or discloses them to law enforcement authorities in consideration of something. If he provides information, he always expects something in return. **GENERAL TYPES OF INFORMANTS** 1. **[Anonymous informants]** -- include those anonymous telephone callers or letter writer who gives information about suspects or fugitives or justice. When talking to these informants, do not reveal facts you already know. Instead, try to impress them or tell them that you know more than he knows. 2. **[Rival-elimination informant]** -- is usually anonymous as his purpose in providing information is to remove rivals. 3. **[False informant]** -- reveals information usually of no consequence or stuffs concocted of thin air. He may do so out of desire to appear to be on the side of the law and for the purpose of neutralizing any suspicion of the police towards him. 4. **[Frightened informant]** -- is compelled by fear. He is afraid that when his confederate commits crimes, he may be placed in a dangerous situation. He is usually motivated by anxiety for his own welfare. 5. **[Self-aggrandizing informant]** -- is a person who hangouts in the fringe of the underworld and delights in surprising the police with choice of bits of information. From time to time, the information he provides maybe of value to the police. 6. **[Woman informant]** -- is usually a female associate of criminals. She gives information because her criminal lover has jilted her. Her motives are either revenge or jealousy. She may be able to give information but the investigator must be careful because the female specie is deadlier than the male. 7. **[Legitimate informant]** -- includes operators of licensed premises who do not want their place of business to become the hangout of dangerous criminals. 8. **[Incident informant or automatic informant]** 9. **[Confidential informant]** **TYPES OF INFORMERS** 1. Recruited informer 2. Dual or multiple informer 3. Paid asset 4. Double crosser 5. Intelligence broker Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1. Distinguish informer from informant. 2. How can you protect and maintain the loyalty of your informer? 3. As handler of informers, not all of them can be trusted, how can you protect yourself from the betrayal of double crosser or false informers? **Undercover Assignments** Undercover assignment or "roping" is a form of investigation in which the investigator assumes a different and unofficial identity in order to obtain information. It is a form of investigation in which the investigator assumes a different and unofficial identity in order to obtain information. It is a work that requires the assumption by police agent of an identity in keeping with the situation to be explored. The agent must drop his real identity and adopt another. He must talk with them, listen to them, observe all they do, and when necessary, live with them. **1. Objectives of Undercover Work** a. Obtaining evidence b. Obtaining information c. Checking informant d. Fixed surveillance e. Checking loyalty f. Subversive organization organizations g. Security check h. Preliminary to search or raid **2. Preparation of assignment** a. Study of the subject b. Knowledge of the area c. Subversive organization d. **[Cover story]** A fictitious background and history including the names, addresses, and descriptions of the assumed places of education, employment, associates, neighborhoods, trades, and travels. **e. [Physical details]** Personal possessions should be obtained for the undercover investigator which are appropriate to the character assumed to include: clothes pocketbook, a watch, a ring, a suitcase, stubs of tickets, photographs and amount of money. The investigator must not possess any articles, which will suggest his true identity. f**. [Testing]** The investigator should memorize all details in connection with his assumed role and the fictitious portions of his biography. Tested by prolonged questioning and surprise inquiries. **g. [Disclosure of Identity]** The investigator should be instructed not to disclose his identity or he should remain undercover if arrested by the civil authorities. A plan or an act should also be laid out against the contingency of accidental disclosure of identity. 3. **Types of Undercover according to time frame** **Long-range** -- operations can provide reliable, accurate and continuing access to information, which would not be otherwise attainable. **Short-range** -- the duration of short undercover activity may vary considerably, form one-time interview to a series of separate, but related actions over an extended period of time. 4. **Golden rule in undercover agent** a. Don't drink while working as undercover b. Don't court women c. Don't take woman on an undercover assignment d. Don't claim to be a "big shot" e. Don't fail to provide persons in the place who can vouch for the investigator **[Terms to Ponder]** **Pre -- surveillance --** a conference held among the team members, the police intelligence unit before surveillance is conducted. **Surveillant --** the observation of places or areas from a fixed point. **Tailing or shadowing** -- It is the observation of a person's movement. **Undercover man --** A person trained to observe and penetrate certain organization suspected of illegal activities and later reports the observation and information so that proper operational action can be made. **Liaison Program --** This is the assignment of trained intelligence personnel to other agencies in order to obtain information of police intelligence value. (agencies like the press, credit agencies, labor unions, tel. companies, etc. **Safe house --** It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his action agent for debriefing or reporting purposes. **Drop --** It is a convenient, secure, and unsuspecting place where a police, undercover man, informer, or informant by a pre-arrangement leaves a note, a small package, an envelope to item for the action agent, supervisor or another agent. **Convoy --** An accomplice or associate of the subjects. **Decoy --** Any person or subject, almost similar to the subject used to avoid or elude surveillance. **Contact --** Any person whom the subject picks or deals with, while he is under surveillance. **Made --** When the subject under surveillance becomes aware that he is under observation and identifies the observer. **Lost --** When the surveillants do not know the whereabouts of their subject or the subject had eluded the surveillance. **Cover support --** an agent assigned in target areas with the primary mission of supporting the cover story. **5. Sketching** Consist of putting ideas in an accurate pictorial form. Is a means of describing an object or area to satisfy a particular need. **1.** **Methods of Sketching** **[On -- the -- Spot]** - applied when security conditions on the place of observation allows the observer to sketch or draw the objects on the area at any time. **[Memory Method]** -- applied when security conditions on the area is in such a way that the observer can only pass by or linger for a very short period of time **[Semi -- memory Method]** - applied in an area where security conditions is very strict but does not prevent the observer in making notes of what was observed. **6. Cover and Undercover** **Cover --** any device utilized by person, organization to ensure that one who do not have the right to know must not be aware of the real purpose of the mission. **-** It is a means by which an individual group or organization conceal the true nature of its acts and or existence from the observer. **Cover story --** a biographical data through fictional that will portray the personality of the agent he assumes; any scenario to cover up the operation. **Cover support -** an agent assigned in target areas with the primary mission of supporting the cover story. **Four types of cover** a. Natural cover -- using actual or true background. b. Artificial cover -- using fabricated biographical data adopted for the purpose. c. Cover within a cover -- justification of existence uses of secondary cover in case ofcompromise, which necessitates the admission, and confession of a lesser crime. d. Multiple cover -- any cover you wish **Hazard to cover** a. Static dormant opposition (ordinary citizen) b. Unhostile active opposition (police security, agencies) c. Hostile active opposition (enemy intelligence, operatives) **Precautions in case of compromise** Move out immediately Start up new facility for operation and develop it Build entirely new cover Use circuitous routes and provide careful counter surveillance measures Be specifically careful of former contacts with non-intelligence personnel. Be patient, slowly and careful **Objectives of organizational cover** \- To camouflage and protect operational personnel and their activities. - To protect the installation on which clandestine activities are based. **Three types of organizational cover** 1. **[Cell cover]** -- intended for small operating groups, wherein the member of the groups is not working together. 2. **[Group cover]** -- provides security for three (3) or more individuals appearing to be working together. 3. **[Cover Family]** -- combination and/or compartmental of individual cell group cover **Photography --** it is the process of producing image on sensitized material by variant form a radiant energy. **Order of Battle (ORBAT) --** it is the summary recording of one's specific criminal activities with entries covering matters with intelligence and tactical interest, enumeration of personalities involved in the organization's movement activities. **Provocation --** the action taken in order to incite reaction for a known adversary or to observed adversary. 1. reveal the true status of a n assumed adversary. 2. make a known adversary take self-damaging action. Name \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Yr&Sec \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score **Instruction.** Answer the following questions. You can used additional paper/s if needed. 1\. Write your movie review with these movies using the following format: Movies: (Choose only 1 movie subject of your review) Ang Titser Kong Pogi The Spy: Undercover Operation Tinker Tayler Soldier Spy Spy ================================================================================ [The Bourne Ultimatum The Man from U.N.C.L.E FORMAT:] I. TITLE II. MAIN CHARACTER/S III. SETTING IV. SUMMARYV. REACTION (At least 3 paragraphs in relation to surveillance). 2. Give at least 15 definition of terms you encountered in this chapter. 3. What will the intelligence agency do in case the undercover agent is compromised or burnout? 4. What is the importance of cover story and cover support for successful undercover operation? From French Reconnaitre, to recognize; Latin Recognoscere. A military term denoting or examination of an enemy position or movements, or of a tract of ground. Reconnaissance naturally vary indefinitely according to the purpose for which they are undertaken. -visual inspection of an installation or an area. - is a reconnaissance or surveillance of a building, place or area to determine its suitability for intelligence use or its vulnerability in an intelligence operation. **Purpose;** - it aids in the planning and operation and operation by providing needed information. - it assists the agent handler to instill confidence in his agent during briefing phase by being able- - to speak knowingly about the area of operation. - it is also considered as a security measure because it offers some degree of protection for thoseoperating in an area unfamiliar to the intelligence personnel. **General Principle;** - know the best route to get there - know how to conduct yourself without attracting attention - know what security hazards are in the area and how can be avoided or minimized.- know the best route to extricate from the area of casing. **Topographical Reconnaissance** Is practically a survey of a tract of country or route, comprising both a map and a report as to its advantages and disadvantages? All reconnoitering work of this is done by officers with small patrols, escorts or assistances. **Strategical Reconnaissance** Is performed by contact squadrons, which send forward officers and patrols to find enemy. **Tactical Reconnaissance** Falls to the lot of troops of all arms, whether in contact with the enemy or for selfprotection. **Reconnaissance in Force** A reconnaissance by a large force of all arms with the idea of provoking an enemy into showing his hands, if necessary, by fighting. **Method of Casing** a\. Personal reconnaissance c\. Research e\. Hearsay ----------------------------- ----------------------- ------------- d\. Prior information **Be accurate. Use exact descriptive terms.** a. **[Sketches]** -- are particularly valuable. Show the scale your sketch. Mark the target area plainly. Tie your sketches into the text of the report. b. **[Photography]** -- pictures are of great value. A picture of every entrance exit is an important asset. But do not endanger your security within the target area. c. **[Commercial pictures]** -- remember that commercial pictures and post cards are often out of date. Try to draw in the changes. Indicate which direction is north and point out unmistakable landmarks. d. **[Detail]** -- thy to report in such accurate detail that the failure of any mission based on your report cannot be due to ignorance on the part of your agent. **Categories of Desired Information in Casing** 1. **Active opposition**---all organs of every security system whose task is to prevent intelligence activity in a given area. This includes not only the enemy but also the efforts of neutral or allied countries to discover and observe our intelligence activities and learn its objectives. Remember that a country which either neutral or ally today may anytime in the future; become the ally of the opposition. Active Opposition Include the Following: A. **Professional service** includes counter espionage organizations, any security agency which is organized specifically to intelligence activity in a certain area. In casing an area, we should try to find out their modus operandi in order to plan out the activities. While their action is not quite positive, they still remain a threat since they are trained to report unusual action to the area security force. B. **Civil service** the police, fire department, postal department, and any government agencies local. These agencies set a definite regulation of their own, and any violation thereof may result to confrontation, arrest and possible compromising situation. C. **Public itself** --this includes local informers, sympathizers, party members and the like. All who are willing to report information of unusual activity of careless and rough casing team or personnel. 2. **Area condition and habits**---description of the locality as to whether the

Use Quizgecko on...
Browser
Browser