Fundamentals of Investigatyion and Police Intelligence
Fundamentals of Investigatyion and Police Intelligence
It deals with the study of handling and disposition of criminal cases as well as jurisprudence
affecting law enforcement. The course focuses on a comparative study of military and police intelligence
functions and operations, types of police intelligence,
phases of intelligence cycle, modus operandi(MO) and order of battle regulations (OBR) system for the
identification of criminals and other threats to national security.
Course objectives
Upon completion of this course, the learners can:
1. Know the importance, purposes, nature and scope of criminology as a field of interest.
2. Define criminology, crime, criminal law, and other important concepts in understanding
criminology.
3. Trace the development criminology by discussing the theories of crime causation.
4. Recognize the contributions of the pioneers of criminology.
5. Explain the criminal formula of crime causation.
6. Understand the Philippine criminal law and to know about R.A. 6506 Identify the basic biological,
psychological, and sociological explanations
for criminal behavior and apply them to a variety of fact patterns
Specific Objectives
Investigation Defines
Tools of an Investigator in Gathering Facts
Standard Methods of Recording Investigative Data
Scientific Examination of Real Evidence
Procedure at the Crime Scene
Methods of Crime Scene Search
Strategies/ Activities
Teaching Strategy:
Active participation in classroom discussion. Doing research, outlining, one page report writing
and oral presentation of report
Quizzes
Recitation
Assignment
Brainstorming
Role Playing
Lecture via Zoom
References
Journals/Manuals
"Informer". Merriam-Webster Dictionary. Merriam-Webster. Retrieved 6 June 2016. 2: one that informs
against another; specifically: one who makes a practice especially for a financial reward of informing
against others for violations of penal laws
PNP Investigative Manual – Prepared by Directorate for Investigation, HPNP, Camp Crame
Basic Criminal Investigations – United States Department of Justice, International Criminal Investigative
Training Assistance Program
Office of Counterintelligence (DXC), Defense CI & HUMINT Center, Defense Intelligence Agency,
"Terms and Definitions of Interest for DoD Counterintelligence Professional," at GL-165 (May 2, 2011)
(full-text).
MINCOBC Hand Book – The Intelligence School, Intelligence and Security Group [, PA, Fort Andres
Bonifacio, Makati City, series of 2008
"University Catalog 2011/2012, Master Courses: pp.99, size: 17MB" (PDF). US National Intelligence
University. Archived from the original (PDF) on 23 January 2012. Retrieved 28 March 2012.
Executive Order 12333. (1981, December 4). United States Intelligence Activities, Section 3.4(a). EO
provisions found in 46 FR 59941, 3 CFR, 1981 Comp., p.1 Stratfor (2004)
Alfred Rolington. Strategic Intelligence for the 21st Century: The Mosaic Method. 2013.
Allen, Bill Van. Criminal investigation: in search of the truth. 2nd ed. 2011.
Austin, N. J. E., &Rankov, N. B.,Exploratio: Military and Political Intelligence in the Roman World from the
Second Punic War to the Battle of Adrianople. 1995.
Bryan, Dominic. 013/F0020001/art00005?crawler=true The Anthropology of Ritual: Monitoring and
Stewarding Demonstrations in Northern Ireland, Anthropology in Action, Volume 13, Numbers 1–2,
January 2006, pp.22–31(10)
Donnelly, RC. Judicial Control of Informants, Spies, Stool Pigeons, and Agent Provocateurs. Yale Law
Journal, 1951.
Florendo, A.Fundamentals of Criminal Investigation - Wiseman’s Books Trading, Inc, Quezon City, 2012
Garcia. Effective Techniques in Criminal Investigation, Wiseman’s Books Trading, Inc, Quezon City, 2016
Guevarra, Tatoy.Police Intelligence and Secret Service, Wiseman’s Books Trading, Inc, Quezon City,
2010.
Gunter, Whitney D., Hertig, Christopher A. CPO. An introduction to theory, practice and career
development for public and private investigators. CPP, CPOI August 2005.
Kille, Leighton Walter., &Maximino, Martin. The effect of CCTV on public safety: Research roundup.
Journalists Resource. Harvard Kennedy School's Shorenstein Center and the Carnegie-Knight Initiative.
Retrieved 2015-05-06.
Kim, UA. Government Corruption and the Right of Access to Courts. Michigan Law Review, 2004.
Levin, M. The Weakest Link: The Dire Consequences of a Weak Link in the Informant Handling and
Covert Operations Chain-of-Command. Law Enforcement Executive Forum, 2009.
Lyman, D., Michael. Criminal Investigation: The Art and the Science. 6th ed. Pearson, 2010.
Marx, GT. Thoughts on a neglected category of social movement participant: The agent provocateur and
the informant. American Journal of Sociology, 1974.
Marshall, J. CIA Assets and the Rise of the Guadalajara Connection. Crime, Law and Social Change,
1991.
Michael, K., Roussos, G., Huang, G.Q., Gadh, R., Chattopadhyay, A., Prabhu, S., & Chu, P. Planetary-
scale RFID services in an age of uberveillance. Proceedings of the IEEE, 98(9), 1663–1671.
Minsky, M., Kurzweil, R., Mann, S. The Society of Intelligent Veillance. Proceedings of the IEEE ISTAS
2013.
Schuler, DA., Rehbein, K., Cramer, RD., Pursuing strategic advantage through political means: A
multivariate approach. Academy of Management Journal, 2002
Morley, J. Kid Who Sold Crack to the President. Washington City Paper, 1989.
Palmiotto, J., Micheal. Criminal Investigation. 4th ed. CRC Press, 2013.
Salamanca, Police Intelligence and Secret Service, Wiseman’s Books Trading, Inc, Quezon City, 2017
Simandan, D. Iterative lagged asymmetric responses in strategic management and long-range planning.
Time & Society, OnlineFirst, https://doi.org/10.1177/0961463X17752652. 2018.
Vicente, J. Fundamentals of Criminal Investigation, 2nd Ed. Wiseman’s Books Trading, Inc, Quezon City,
2016
REFERENCES INTERNET
https://en.wikipedia.org/wiki/Police_intelligence
https://en.wikipedia.org/wiki/Wiltshire_Police
www.iadlest.org/Portals/0/Files/Documents/DDACTS...
https://fas.org/irp/offdocs/int022.html
https://fas.org/irp/doddir/army/fm3-19-50.pdf
https://www.cia.gov/kids-page/6-12th-grade/operation-history/history-of-american-intelligence.html#top
https://en.wikipedia.org/wiki/Military_intelligence
https://en.wikipedia.org/wiki/Strategic_intelligence
https://en.wikipedia.org/wiki/Counterintelligence
http://fusioncenter.golearnportal.org/rawmedia_repository/b4e1b56dcf572f53b00ee43a31b34223?/
document.pdf
https://www.thefreedictionary.com/combat+intelligence
https://murdercube.com/files/Combined%20Arms/FM30_5_1951.pdf
http://smallbusiness.chron.com/5-major-differences-between-tactical-strategic-intelligence-18117.html
https://search.yahoo.com/yhs/search?hspart=adk&hsimp=yhs-
adk_sbyhp&p=national+intelligence¶m2=abe84d0d-5a79-431d-a697-
2557cf5707ba¶m3=converter_6.1~PH~appfocus5¶m4=googledisplay~Chrome~national+intellig
ence~3C5571D082E239467E7C0636AC4CCFC8¶m1=20170227&type=
http://www.differencebetween.net/language/difference-between-overt-and-covert/
http://work.chron.com/duties-police-criminal-intelligence-investigator-21173.html
https://www.unodc.org/documents/justice-and-prison-reform/cjat_eng/
4_Police_Information_Intelligence_Systems.pdf
https://en.wikipedia.org/wiki/Double_agent
https://www.thefreedictionary.com/penetration+(intelligence)
http://www.redacted-film.com/intelligence-terminology.html
https://dictionary.cambridge.org/us/dictionary/english/agent-provocateur
https://en.wikipedia.org/wiki/Informant
https://en.wikipedia.org/wiki/Agent_provocateur
http://libguides.merrimack.edu/research_help/Sources
http://wikieducator.org/Lesson_2:_Use_of_Informers
https://en.wikipedia.org/wiki/Surveillance
http://work.chron.com/types-surveillance-criminal-investigations-9434.html
http://itlaw.wikia.com/wiki/Discreet_surveillance
https://dictionary.reverso.net/english-definition/discreet+surveillance
https://www.azleg.gov/ars/13/02921.htm
http://qa.answers.com/Q/What_is_the_importance_of_casing_in_police_intelligence
https://www.ifpo.org/wp-content/uploads/2013/08/intro.pdf
Information Sheet 1.1
Introduction
STAGING. When investigators approach a crime scene, they should look for behavioral "clues" left by the
offender. This is when investigators attempt to find answers to several critical questions. How did the
encounter between the offender and victim occur? Did the offender blitz (ambush) the victim, or did he
use verbal means (the con) to capture her? Did the offender use ligatures to control the victim? What was
the sequence of events? Was the victim sexually assaulted before or after death? When did the mutilation
take place-before or after death? Did the offender place any item at the crime scene or remove something
from the crime scene? As investigators analyze crime scenes, facts may arise that baffle them. These
details may contain peculiarities that serve no apparent purpose in the perpetration of the crime and
obscure the underlying motive of the crime. This confusion may be the result of a crime scene behavior
called staging. Staging occurs when someone purposely alters the crime scene prior to the arrival of the
police.
Reasons for Staging Principally, staging takes place for two reasons-to direct the investigation away
from the most logical suspect or to protect the victim or victim' s Mode. The victim would comply because
she had seen his propensity for violence by his earlier actions, such as throwing her on the floor or
holding a knife to her throat. In addition, Shelton would say to the victims, "Keep your eyes down," "Cover
your eyes," or "Don't look at me and I won't kill you
Investigation Defines- The collection of facts to accomplish a threefold aim: a) to identify the guilty party;
b) to locate the guilty party; and to provide evidence of his guilt.
In the performance of his duties, the investigator must seek to establish the six (6) cardinal points
of investigation, namely: what specific offence has been committed; how the offence was committed; who
committed it; where the offence was committed; when it was committed; and why it was committed.
a) Information- Data gathered by an investigator from other persons including the victim himself
and from:
1) Public records:
2) Private records; and
3) Modus operandi file
Phases of Investigation:
(a.)The main objective of a police investigator is to gather all facts in order to (a) identify the
criminal (through (i) confession ;(ii) eyewitness testimony ;
In proving the guilt of the accused in court, the fact of the existence of the crime must be
established; the defendant must be identified and associated with the crime scene; competent
and credible witnesses must be available and the physical evidence must be appropriately
identified. The proof of guilt will depend on the establishment of the essential elements of the
crime. The investigator must know by heart the elements of a specific crime.
Investigator’s Notebook
a) Purpose: Considering the mass of details and the number of cases which in some
instances an investigator is handling, it is very possible that he might forget some
details. Many of the details associated with the investigation, while not essential to
the report might become points of interest to the court a case is brought to trial.
Experienced investigators employ a handbook to record the relevant details of the
case. During trial, the court allows investigators to consult their notes to refresh their
memory.
b) Recording Notes: The data of the investigation should be recorded in a complete,
accurate and legible fashion so that in the event another investigator is required to
assume the responsibility for the investigation, he can make intelligent use of the
notebook.
Interview
Custodial Interrogation
It is the stage wherein police investigators begin to focus on the guilt of the suspect, and
the suspect is taken into custody or deprived of his/her freedom of action in any substantial
manner.
e) Determine and record names of those persons at the scene who may be
witnesses, and separate them. These persons should be removed from
the immediate area of the scene as soon as practicable.
f) Conduct preliminary questioning of witnesses, suspects and victim(s) to
determine in general the extent of the incident or crime.
g) Note the names of all persons officially present. Those present within the
immediate area of the scene should be only the minimum number
needed to assist the investigator. It may be necessary to request other
policemen or officials present to refrain from examining or disturbing
objects or aspects of the scene.
2. Recording
The investigator begins the process of recording pertinent facts and
details of the investigation the moment he arrives at the crime scene. (Of
course, he records the time when he was initially notified prior to his
arrival). He writes down the identification of persons involved and what
he initially sees. He also draws a basic sketch of the crime scene and
takes the initial photographs (if a photograph is available). This is to
ensure that an image of the crime scene is recorded before any
occurrence that disturbs the scene. As a rule, do not touch, alter or
remove anything at the crime scene until the evidence has been
processed through notes, sketches and photographs, with proper
measurements.
c) In larger outdoor areas, it is advisable to divide the area into strips about four (4) feet
wide. The policeman may first search the strip on his left as he faces the scene and
then adjoining strips.
e) After completing the search of the scene, the investigator examines the object or
person actually attacked by the offender. For example, a ripped safe, a desk drawer
that has been pried open or rooms from which items have been stolen, would be
processed after the remainder of the scene has been examined for traces of the
offender. In a homicide case, the position of the victim should be outlined with a chalk
or any other suitable material before the body is removed from the scene. If the victim
has been pronounced dead by a doctor or is obviously dead, it is usually advisable to
examine the body, the clothing and the area under the body after the remainder of
the scene has been searched. This is to enable the policeman/investigator to
evaluate all objects of special interest in the light of all other evidence found at the
scene.
Self Assessment 1.1
Use the separate paper for your answer. Analyze carefully the statements or questions before
answering by choosing the best or nearest answer by encircling the corresponding letter of your
choice
1. The collection of facts to accomplish a threefold aim: a) to identify the guilty party; b) to locate the guilty party; and to provide
evidence of his guilt.
a. investigation
b. interrogation
c. interview
d. intelligence
2. Scientific examination of real evidence; application of instrument and methods of the physical sciences in detecting crime
a. investigation
b. instrumentation
c. interview
d. intelligence
3. Skillful questioning of hostile witnesses and suspects
a. investigation
b. intelligence
c. interrogation
d. intelligent
4. Data gathered by an investigator from other persons including the victim himself
a. investigation
b. intelligence
c. interrogation
d. . Information
5. The main objective of a police investigator is to gather all facts in order to identify the criminal through
a. confession
b. eyewitness testimony
c. force
d. intimidation
e. a and b
6. It is the skillful questioning of a suspect or a hostile witness to divulge information concerning the crime
under investigation
a. custodial investigation
b. custodial interrogation
c. interview
d. investigation
7. It is the stage wherein police investigators begin to focus on the guilt of the suspect, and the suspect is
taken into custody or deprived of his/her freedom of action in any substantial manner.
a. custodial investigation
b. custodial interrogation
c. interview
d. investigation
8. If any doubt exists as to the value of an item, treat it as evidence until proven otherwise. This statement
is true?
a. No
b. it depends
c. yes
d. uncertain
a. Possibly yes
b. Probably no
c. it depends
d. No
e. Certainly
Let’s Test What You Have Learned
Instructions: Identify whether the following statements are true or false. Just write
T if the statement is true and correct the statement if it is false. Use the separate
paper for your answer
______1. If any doubt exists as to the value of an item, treat is as garbage until
proven otherwise
______2. If an injured person is on the scene, arrange for funeral services,
identification and removal
_______3. Treat as evidence all other items, such as hairs, fibers, and earth
particles, foreign to the area in which they are found.
________4.As a rule, do not touch, alter or remove anything at the crime scene
until the evidence has been processed through notes, sketches and photographs,
with proper measurements.
_______5.It may be necessary to allow other policemen or officials present to be
free from examining or disturbing objects or aspects of the scene.
Critical Thinking
KEY TO Correction
Multiple Choices
1.a
2.b
3.c
4.d
5.e
6.a
7.b
8.c
9.d
10.e
True or False
1. F
2. F
3.T
4.T
5.F
Specific Objectives
Strategies/ Activities
Teaching Strategy:
Quizzes
Recitation
Assignment
Brainstorming
Role Playing
Lecture via Zoom
Introduction
Criminals seek economic and political gain through illegal activities, to include trafficking in drugs,
weapons, people, and other contraband. Violence is often a primary tool, either through intimidation or
actual attacks to steal property, influence the population, and escape prosecution. While many criminals
operate independently, today’s technology facilitates criminal organizations with much less regard for
physical and political boundaries than at any other time in history. Drug cartels can move money and
gather information on their distribution network without any need to expose members to international
travel. Known associates or clever imitators can repeat a crime committed in one country, the same day
on another continent.
Police information and police intelligence can help investigators to develop patterns and criminal
associations in a facility. This can lead to identification and documentation of criminal behavior and
individual perpetrators. This information and police intelligence also enables the investigators to identify
criminal groups forming in the facility and to take steps to interdict these groups before serious breaches
of security occur. Information collected and police intelligence produced may also be valuable to
investigators conducting criminal investigations and focused on crimes within and outside the facility.
Police intelligence operations can link detainees in the facility to crimes, criminals, and activities outside
the facility. This enables investigators and police intelligence analysts to further develop their
understanding of the criminal environment, key players, and associations, thus allowing investigators to
focus their efforts more effectively. Commanders may also direct criminal investigations concerning
events in a facility. These events may include a variety of serious criminal infractions, to include attacks
on other detainees or police personnel, contraband smuggling, and escape attempts. Care must be taken
to recognize, preserve, collect, and process items with evidentiary value. Once collected, this evidence is
packaged and forwarded to a supporting forensic lab for further examination and analysis.
Line Intelligence
It is processed information which affects police cooperation and harmony with the community and other
government agencies. It must be current, concise, and factual, in order to avoid guess work in police
planning and operation. It is otherwise known as intelligence of immediate value.
It involves both a process and an immediate product. It can be said that line intelligence is the
end product of gathering and processing of information. That part of the product which is of an immediate
nature, and essential to more effective police planning and operations.
Strategic intelligence
Intelligence activity which is concerned principally with the defending of the police organization against
penetration by individual and various groups who are inimical to the best interest and general harmony. It
is concerned principally with the neutralizing and destroying attempts of individuals or groups that seek to
discredit law enforcement
All intelligence data that are not of an immediate value. The bulk of strategic intelligence is usually
descriptive in nature. The accumulation of physical descriptions of personalities, their telephone numbers,
and known associates are virtually classic examples of strategic intelligence
Counter Intelligence
Refers to information gathered and activities conducted to protect against espionage other intelligence
activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or
persons or international terrorist activities, sometimes including personnel, physical, document or
communications security programs.
Counterintelligence is that aspect of intelligence relating to all security control measures, both
active and passive, designed to insure the safeguarding of information, personnel, equipment, and
installations against the espionage, sabotage, or subversive activities of foreign powers and disaffected or
dissident groups or individuals which constitute a threat to the national security.
Combat Intelligence
That knowledge of the enemy, weather, and geographical features required by a
Commander in the planning and conduct of combat operations.
Combat intelligence is military intelligence required for use in a combat situation, whether based upon
information collected locally or provided by higher headquarters. Combat intelligence has two objectives-
(1) To reduce to a minimum all uncertainties regarding the enemy, weather, and terrain, and thus to assist
the commander in making a decision and the troops in executing their missions. (2) To assist the
commander in applying counterintelligence and security measures that will conceal from the enemy our
intentions and activities and will neutralize or destroy the effectiveness of enemy intelligence activities.
It is that knowledge of the enemy and the characteristics’ of operations used in the planning and conduct
of tactical operations. It provides the commander with information and conclusions concerning the areas
of operations, enemy capabilities and enemy vulnerability’s in order to determine their probable effect on
his courses of action. It is required by the commander in order to determine the best use of this available
firepower and manpower, maneuver forces, to accomplish his mission and to maintain the security of his
command.
Military Intelligence
It is a military discipline that uses information collection and analysis approaches to provide guidance and
direction to assist commanders in their decisions. This aim is achieved by providing an assessment of
data from a range of sources, directed towards the commanders' mission requirements or responding to
questions as part of the operational or campaign planning. To provide an analysis, the commander's
information requirements are first identified, which are then incorporated into intelligence collection,
analysis, and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the
civilian population in an area of combat operations, and other broader areas of interest. Intelligence
activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war,
and during a war itself.
.Tactical intelligence
The word "intelligence" in law enforcement brings to mind top-secret, covert operations. In reality,
"intelligence" is just another word for "information." Police agents who gather intelligence to study and
solve crimes use what's called "tactical intelligence." Their targets range from organized crime, bank
robberies, kidnapping, extortion and corruption, to civil rights violations and copyright infringements.
Tactical intelligence is focused on support to operations at the tactical level and would be attached to the
battle group. At the tactical level, briefings are delivered to patrols on current threats and collection
priorities. These patrols are then debriefed to elicit information for analysis and communication through
the reporting chain
Police Intelligence
It is the product resulting from their collections, evaluation, analysis, integration, and interpretations
of all available information concerning one or more aspects’ of criminal activity and which is immediately
or potentially significant to police planning.
Police criminal intelligence investigators differ from intelligence analysts by gathering information
and evidence to prove someone broke the law. Their work begins after an alleged crime occurs and
continues until a case is solved or temporarily closed. Intelligence analysts don't prove a crime occurred.
They gather information around the clock and provide government agencies, law enforcement
organizations, the military and other officials with the findings. Crime-solving isn't their mission, but the
information they collect can be used to prevent crime or accuse or prosecute officially
National Intelligence
Integrated departmental intelligence that covers the broad aspects of national policy and national security, i
s ofconcern to more than one department or agency, and transcends the exclusive competence of a
Single department or agency
MISSION
Other Intelligence Requirements – those items of information regarding the enemy and his
environment which need to be collected and processed in order to meet the intelligence
requirements of the commander.
E.Determine the collection agencies together with the time and place the information are to
be reported/supervising the execution of orders and requests.
a. Open sources/overt sources – those that are obtained without resorting to special effort or
clandestine operation.
1. newspapers
2. magazines
3. radio intercept
4. public and private library
5. public and private establishment
6. general public
7. and others which is similar in nature
b. Non-open sources/covert sources – those that are not obtained openly as described
above.
1. Surveillance
2. Casing
3. Undercover operations
4. Deep Penetration
5. Photography(use of telephoto lenses or night vision cameras)
6. Surreptitious Entry
7. Use of Sound Equipment (bugging or wire tapping)
8. Use of Radar or Sonar, use of satellites
9. Use of informers or informants
10. Crypt analysis
11. Censorship
12. Document exploitation or Exploitation of captured material
Reliability of Source:
A – Completely reliable D – Not usually reliable
Accuracy of Information:
Sources of Information:
Z - Documentary
C. Interpretation Analysis –
Analysis is the process by which collected information is evaluated and integrated with
existing information to produce intelligence that describes the current—and attempts to predict
the future—impact of the threat, terrain and weather, and civil considerations on operations. The
intelligence staff analyzes intelligence and information about threat capabilities, friendly
vulnerabilities, and area of operations to determine how they will impact operations. During
police intelligence analysis, police information and raw data become police intelligence. Analysis
is based on critical examinations of all available and relevant information to determine
capabilities and trends and to develop predictive analysis for the police and criminal
environments and specific criminal threats. Determination of the significance of the information
relative to the information and the intelligence already known and drawing deductions about the
probable meaning of the evaluated information.
Integrate, evaluate, analyze, and prepare the processed information for inclusion in the
finished product. This step transforms raw data into applicable products, separating
“information” from “intelligence.” The analysis and production step also requires highly trained
and specialized personnel (in this case, analysts) to give meaning to the processed information
and to prioritize it against known requirements. Synthesizing the processed information into a
finished, actionable intelligence product enables the information to be useful to the customer.
The final result of this process should be information that will prevent terrorist attacks or other
criminal activities.
The analysis of police information may begin with a technical examination of a piece of
evidence. Physical characteristics of persons, equipment, written documents, weapons,
chemicals, and explosives may not be observable without special training and equipment.
Analyses may also include careful examinations of the associations between people, items
(evidence), locations, and events
3. Deduction – designed to answer the question “what does this information means in
relation to the enemy situation, weather and area of operation.
Police information and police intelligence products are produced to inform commanders,
PMs, investigators, and other LE personnel of exceptional information and actionable police
intelligence. Dissemination of this information and police intelligence is also conducted through
command and staff and functional channels, including interagency host nation agencies and
organizations (within legal and policy constraints). This enables appropriate coordination,
synchronization, and fusion of police information and intelligence.
Deliver the finished product to the consumer that requested it and to others as applicable.
The consumer that requested the information receives the finished product, usually via
electronic transmission in a timely and credible manner. Dissemination of the information
typically is accomplished through such means as websites, email, Web 2.0 collaboration tools,
and hardcopy distribution. The final, finished product is referred to as “finished intelligence.”
After the product is disseminated, further gaps in the intelligence may be identified, and the
Intelligence Cycle begins all over again.
Considerations:
a. Timeliness
b. Propriety
Methods of Dissemination
a. Personal Contact –conferences, briefings, person to person exchanges
b. Messages – couriers, secured electrical means
c. Intelligence Documents
Nature of Intelligence Operation:
Police intelligence operations are directed towards the gathering of information relative to
vices, organized crime, syndicates, subversions and insurgency, terrorist organizations, integrity of
the members of the police force, or any person or conditions which may promote disturbance of the
peace and order of the community. In this connection, intelligence operations employ either overt of
covert operations in order to achieve the above-cited objectives:
1. Overt Operations – this type of operations is done if the information or documents are
procured openly without regard as to whether the subject of investigation becomes
knowledgeable of the purpose for which is being gathered. Gathering of information
openly is usually done through open sources, like public or private records, newspaper or
the media interview or interrogations, research, or any other open means.
2. Covert Operations –
This type of operations is done when the gathering of information or document is secret
or without the knowledge of the person or organization to whom such information or
document are to be used.
Covert surveillance is a particularly intrusive method for collecting information. The use of
covert surveillance measures involves a careful balancing of a suspect’s right to privacy
against the need to investigate serious criminality.
Provisions on covert surveillance should fully take into account the rights of the suspect.
There have been various decisions of international human rights bodies and courts on the
permissibility of covert surveillance and the parameters of these measures. Reference
should be made to these. An extensive discussion is contained in the commentary to
Article 116 of the Model Code of Criminal Procedure (MCCP)(DRAFT, 30 May 2006). In
those societies where the authorities exercise forceful control over the populations, the
use of these techniques may be indiscriminate. Other systems will require a number of
strict safeguards against abuse including the requirement that the offence be serious, that
the use of the technique be vital to the case and that essential evidence cannot be
secured by less intrusive means. Judicial or independent oversight is common and is
required under international human rights law.
The following are covert types of police intelligence operations:
1. Surveillance
2. Casing
3. Undercover operations
4. Deep Penetration
5. Photography (use of telephoto lenses or night vision cameras)
6. Surreptitious Entry
7. Use of Sound Equipment (bugging or wire tapping)
8. Use of Radar or Sonar, use of satellites
9. Use of informers or informants
10. Crypt analysis
11. Censorship
12. Document exploitation or Exploitation of captured material
13. Interception of telecommunications?
14. Interception of email traffic?
15. Interception of post/mail?
16. Use of listening devices?
17. Use of tracking devices?
18. Use of surveillance teams?
19. Use of photographic surveillance?
20. The use of fake personal and company identities?
21. Covert search of letters, packages, containers and parcels;
22. Simulated purchase of an item;
23. Simulation of a corruption offence;
24. Controlled delivery.
25. Covert real-time monitoring of financial transactions;
26. Disclosure of financial data. This measure is carried out through obtaining
information from a bank or another financial institution on deposits, accounts or
transactions
27. Use of tracking and positioning devices.
Procurement as used in intelligence parlance is the aggressive effort to acquire certain specific
information which may not be readily available. To this end, a number of means may be used, these are:
1. The classical intelligence such as and which utilizes human being to gather information.
2. The modern or technical intelligence which employs machine such as satellites, electronic
gadgets to gather information.
SOURCES OF INFORMATION
1. Persons
2. Places
3. Things
4. Information defined –
TYPES OF INFORMANTS The following is a list of type informants discussed in Swanson, Neil and
Territo (2000).
1. Mercenary informants
They provide information to the police for financial reward. A lot of investigators attach great important on
this type of informants. However very few investigators actually engage the services of such informants.
This limitation is due to lack of funds. . Mercenary Informants – Sales information. He/she could be one of
the members of syndicate charged if stolen property is found in their possession
2. The rival informant
They provide information to establish control over the activity in question, using the police to achieve
legally what he or she cannot do alone. . From time to time, individuals who themselves are engaged in
illegal activities may serve as informants as a means of eliminating their competitor.
3. The anonymous informant
These types of informants are unknown. They are very difficult to deal with because their motivations are
not identifiable since they are not known. Police departments receive anonymous information either by
telephone or in writing. Anonymous information should not be disregarded but should be pursued, so long
as it may be fruitful.
4. Legitimate informants:
These are law-abiding citizens who just deem it as a sign of good citizenship to give information about
crimes that they posses to the police. Such persons are not easily motivated by anything like any ordinary
informants except trust worthiness and confidentiality on the part of the police. Investigators will have to
very tactful in dealing with such informants because a hasty conclusion can drag you in to political traps.
Legitimate Informants – gives information for a legitimate reason/s
5. The self-aggrandizing informants
They crave for recognition and feeling importance by giving information to the police. They have many
contacts in criminal circles and when investigators identify this motivation, they should give ample praise
each time information is supplied. Otherwise such informants may not continue the relationship. An
informant that is conceited, overconfident, and arrogant.
6.The false informant
These are the type of informants who intentionally provides misleading information mostly but not always,
to direct police attention away from an illegal and ongoing offence by himself or herself, friends, or
relatives.
a. 7. Fearful informants
They are worried that they will be endangered by the criminal activities of an associate. Fearing for their
own well-being, they supply information.
8. The plea-bargaining informant
They seek reduced charges or a lenient sentence. An individual arrested for a crime may know of criminal
activities by others and, in exchange for telling the police. Swap shops and pawnshops, however properly
operated, occasionally are places where stolen property is recovered. Shop operators may share
information about criminal activities with the police to build credit and reduce the likelihood that they will
be formally
A.DESCRIPTION OF PERSONS
Wanted Persons
A. SURVEILLANCE
In the investigation of a certain case, a point is reached when the investigator sometimes finds it difficult
to secure leads through questioning of the complainant and witnesses. In such a situation, the
investigator has to go to the field to locate the criminal or, if he is known to study his habits, movements
and possible accomplices in the commission of the crime.
Surveillance Technologies
Subject – the person, place, or object being watched or under surveillance
Surveillant– the person or group of persons working as a team who does the surveillance or who
maintain watch or perform the observation.
Convoy – an associate of the subject who follows the subject in an attempt to detect surveillance.
Contact – any person with whom the subject speaks, to whom he pass articles, or from whom he
receives articles
.
Made – the surveillant being recognized as the surveillant by the subject or convoy.
Lost – the subject is lost when the surveillant do not know his whereabouts. The subject is lost when the
subject eluded him.
Put the finger on – go identify a subject by pointing him out either in person or in photograph.
Put to bed – when the subject under surveillance has returned to his quarter and apparently retired for
the night.
Shadow and tail – to follow an individual whenever he goes, on foot or by vehicle overtly and
covertly
Decoy – a person of object used by the subject in an attempt to elude surveillance.
Types of Surveillance
A. According to Sensitivity/intensity
1. Discreet - careful to avoid social embarrassment or distress, esp. by keeping
confidences secret; tactful surveillance maintained on a "loose" basis, the prevention
of detection being paramount, even to the loss of the subject being tailed. Generally, the
guiding rule is to discontinue surveillance rather than risk actions which make the subject
aware of the surveillance.
2. Close -. Continuous observation of the subject is maintained at all times, even if the
subject appears to become suspicious or openly accosts the surveillant and accuses him
of watching or following him
3. Loose - Observation of the subject or object is not continuous. The surveillance maybe
discontinued if the subject becomes suspicious or when the services of another
surveillant are required
4. Harassment –
a. Anonymously or otherwise contacts, communicates or causes a communication with
another person by verbal, electronic, mechanical, telegraphic, telephonic or written
means in a manner that harasses.
b. Continues to follow another person in or about a public place for no legitimate
purpose after being asked to desist.
c. Repeatedly commits an act or acts that harass another person.
e. On more than one occasion makes a false report to a law enforcement, credit or social
service agency.
f. Interferes with the delivery of any public or regulated utility to a person.
B. According to method
1. Fixed or stationary - Maybe referred as a stakeout.
Is conducted when a person, object, or activity being watched is not expected to move
from one area. The surveillant may however, move from one vantage point to another in
the immediate area
2. Moving –Maybe referred to as a tail or shadow.
A moving surveillance is conducted when a person, object or activity being watched
move from one place to another. The surveillant may however, move from one vantage
point to another in the immediate area.
3. Technical -Electronic monitoring, or wiretapping, refers to the surveillance of email, fax,
and Internet and telephone communications. This activity requires a court order to
proceed, based on a U.S. government affidavit showing that a crime has been, is being
or will be committed. However, if a person risks severe injury or death, the government
can ask to start monitoring communications right away, the U.S. Department of Justice
states. Similar exceptions are made for organized crime or national security cases. Once
an order is granted, police agencies can identify criminal conspirators to deter or punish
the offenders involved. Other examples of electronic monitoring include drones, license
plate readers, computer forensics and subpoena of data stored in the cloud. New
technologies can push the limits of privacy. For instance, stingray tracking devices allow
law enforcement to determine the location of a suspect's cell phone, as well as the
identity of random individuals close by.
c. Three-Man or ABC Surveillance. The most effective technique of foot surveillance is the
“ABC” technique. It employs three surveillance, and is intended to keep two sides of the subject
covered. “A” follows the subject. “B” follows “A” and concentrates on keeping “A” in sight rather
than the subject. “B” also watches for convoys. The normal position for “B” is behind “A”. “C”
normally operates across the street from slightly to the rear of the subject.
d. Leapfrog Surveillance. Two or more surveillants are used to conduct the leapfrog technique
of surveillance. This is a variation of the “AB” and “ABC” methods. It is simple to execute and
greatly reduces the chances of the subject reorganizing surveillant. Surveillant “A” follows “B”.
Both surveillants operate on the same side of the street as the subject. After a variable time or
distance has elapsed by prearrangement of signals, “A” falls back and allows “B” to assume the
position “A” and “A” becomes “B”.
Casing – is reconnaissance or surveillance of a building, place or area to determine its suitability for
intelligence use or its vulnerability in an intelligence operation.
It aids in the planning of an operation by providing needed information. It assists the agent
handler to install confidence in his agent during briefing phase by being able to speak knowingly about the
area of operation. Casing is also considered a security measure because it offers some degree of
protection for those operating in an area unfamiliar to them.
Objectives of Casing
METHODS OF CASING
a) Constant need
(i) No matter what our scientific development might be, there will always come that time
when we will need informants.
3. Appeal to prospect’s ego – Men on the beat (patrolmen/ investigators) have a good opportunity of
developing informants. Being kind and friendly to children, for instance, may gain him the children’s father
as an informant.
4. Development of “friendship” helps because the informant respects the officer to the possible informant
himself or his relatives.
5. Involvement in illegal activity – The illegal activity serves as pressure on the possible informant. The
attitude toward him, though, should be “put up or get out”
7. Revenge motive.
4. Use of Informants
a) Maximum benefit- The confidential informant should be used for the
maximum benefit of the entire organization, not of only one (1) officer/ investigator.
b) A designated executive should aware of the identity of the informant. – At least two (2) individuals in
the law enforcement agency should know the identity of a confidential informant. This gives him the
feeling that he is really cooperating with the police. It is also possible that something might happen to you
which would mean the loss of the informant to the entire police force. Besides the officer who developed
the informant, it is suggested that the other be a rank-officer to give the informant a feeling of importance.
c) Consider a program within your respective commands for the development of informants.
(ii) Keep records as to the accomplishments of each of the informants. This should tell
you who among the informants should be discarded.
(i) Keep records as to fugitives apprehended, loot recovered and cases given to you.
(ii) Maintain a tickler system to review your informants’ contribution to your command.
Self Assessment 2.1
Use the separate paper for your answer. Analyze carefully the statements or questions before
answering by choosing the best or nearest answer by encircling the corresponding letter of your
choice
1. Is reconnaissance of a building, place or area to determine its suitability for intelligence use or its
vulnerability in an intelligence operation
a. Casing
b. Intelligence
c. surveillance
d. military intelligence
2. Development of _____ helps because the informant respects the officer to the possible informant
himself or his relatives
a. Informant
b. friendship
c. informer
d. perpetrator
3. One investigator is used to conduct the surveillance. It is best employed in a fixed surveillance
a. Casing
b. Intelligence
c. One-man surveillance
d. military intelligence
4. Is the monitoring of behavior, activities, or other changing information for the purpose of influencing,
managing, directing, or protecting people
a. Casing
b. Intelligence
c. One-man surveillance
d. Surveillance
5. Mercenary informants They provide information to the police for financial reward
a.Informant
b. friendship
c. informer
d. perpetrator
e. Mercenary informants
6. This type of operations is done when the gathering of information or document is secret or without the
knowledge of the person or organization to whom such information or document are to be used.
a. covert Operation
b. combat operation
c. tactical operation
d. counter intelligence
7. This type of operations is done if the information or documents are procured openly without regard as
to the whether the subject of investigation becomes knowledgeable of the purpose for which is being
gathered
a. covert Operation
b. overt operation
c. tactical operation
d. counter intelligence
8. Determination of the pertinence, reliability and accuracy of the information
a. Recording
b.Analysis
c.Evaluation
d.Distribution
9. Designed to answer the question “what does this information means in relation to the enemy
situation, weather and area of operation.
a. Recording
b. Analysis
c. Evaluation
d. deduction
10. Is conducted when a person, object or activity being watched move from one place to another
a. Casing
b. Intelligence
c. One-man surveillance
d. Surveillance
e. moving surveillance
_____1. Develop an informant to the point that he really respects you. – Do not
call your informants a “stool pigeon” or a “stoolie” when talking to him
_____2. Confidential informant is an individual who supplies information on a
confidential basis with the understanding that his identity will not be made
known.
_____3. Anonymous information should be disregarded and should not be pursued, so
long as it may be fruitful.
_____4. Being unkind and cruel to children, for instance, may gain him the children’s
father as an informant.
____5. Police information and police intelligence can help investigators to develop
patterns and civil associations in a facility
Critical Thinking
o Why do criminology students, conducted a study about the
importance of Police Intelligence in understanding criminal
behavior? Cite instances that will show the benefits of his studies.
1.a 1. T
2.b 2. T
3.c 3. F
4.d 4. F
5.e 5.F
6.a
7.b
8.c
9.d
10.e