0% found this document useful (0 votes)
15 views40 pages

Fundamentals of Investigatyion and Police Intelligence

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views40 pages

Fundamentals of Investigatyion and Police Intelligence

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 40

OUTCOME BASED LEARNING MODULE

Name of Professor - DR. DANILO LAGO TANCANGCO


Subject - CDI 1
Description - Fundamentals of Investigation with Intelligence
Units - Three (3)
Duration - 54 hours
Course/Subject Description

It deals with the study of handling and disposition of criminal cases as well as jurisprudence
affecting law enforcement. The course focuses on a comparative study of military and police intelligence
functions and operations, types of police intelligence,
phases of intelligence cycle, modus operandi(MO) and order of battle regulations (OBR) system for the
identification of criminals and other threats to national security.

Course objectives
Upon completion of this course, the learners can:

1. Know the importance, purposes, nature and scope of criminology as a field of interest.
2. Define criminology, crime, criminal law, and other important concepts in understanding
criminology.
3. Trace the development criminology by discussing the theories of crime causation.
4. Recognize the contributions of the pioneers of criminology.
5. Explain the criminal formula of crime causation.
6. Understand the Philippine criminal law and to know about R.A. 6506 Identify the basic biological,
psychological, and sociological explanations
for criminal behavior and apply them to a variety of fact patterns

LEARNING OUTCOMES NUMBER 1


General Principles of Investigation

Specific Objectives

Upon completion of this course, the learners are able to:


1. Learn the importance of tools in investigation
2. Increase knowledge the different phases of investigation
3. Examine the concept of recording investigative data
Course Content

Investigation Defines
Tools of an Investigator in Gathering Facts
Standard Methods of Recording Investigative Data
Scientific Examination of Real Evidence
Procedure at the Crime Scene
Methods of Crime Scene Search

Strategies/ Activities
Teaching Strategy:

>Delivers and give lecture


>Present lessons logically
>Give sufficient examples
Discussion Strategy:
>Encourage the students for active classroom discussion
>Solicit ideas, opinions and feedbacks from students
Note taking strategy:
>requires students to write important issues/events taken during the lecture

OBE and Learning Materials


The students will make research regarding the tools in investigation and thru interview with the
police station investigators they will make reports on the different phases of investigation and
how do the police investigators do recording on investigative data.

Active participation in classroom discussion. Doing research, outlining, one page report writing
and oral presentation of report

Assessment of Learning Outcomes


The students gained knowledge regarding the tools in investigation and thru interview with the
police station investigators they knew the different phases of investigation and how the police do
investigators do recording on investigative data.

Quizzes
Recitation
Assignment
Brainstorming
Role Playing
Lecture via Zoom
References
Journals/Manuals

"Informer". Merriam-Webster Dictionary. Merriam-Webster. Retrieved 6 June 2016. 2: one that informs
against another; specifically: one who makes a practice especially for a financial reward of informing
against others for violations of penal laws

Lactantius. "On the Deaths of the Persecutors".


Intelligence Module/PSOBC-2005-01/PPSC-RTS5

PNP Investigative Manual – Prepared by Directorate for Investigation, HPNP, Camp Crame

Basic Criminal Investigations – United States Department of Justice, International Criminal Investigative
Training Assistance Program

Office of Counterintelligence (DXC), Defense CI & HUMINT Center, Defense Intelligence Agency,
"Terms and Definitions of Interest for DoD Counterintelligence Professional," at GL-165 (May 2, 2011)
(full-text).

MINCOBC Hand Book – The Intelligence School, Intelligence and Security Group [, PA, Fort Andres
Bonifacio, Makati City, series of 2008

"University Catalog 2011/2012, Master Courses: pp.99, size: 17MB" (PDF). US National Intelligence
University. Archived from the original (PDF) on 23 January 2012. Retrieved 28 March 2012.

Executive Order 12333. (1981, December 4). United States Intelligence Activities, Section 3.4(a). EO
provisions found in 46 FR 59941, 3 CFR, 1981 Comp., p.1 Stratfor (2004)

Alfred Rolington. Strategic Intelligence for the 21st Century: The Mosaic Method. 2013.

Allen, Bill Van. Criminal investigation: in search of the truth. 2nd ed. 2011.

Austin, N. J. E., &Rankov, N. B.,Exploratio: Military and Political Intelligence in the Roman World from the
Second Punic War to the Battle of Adrianople. 1995.
Bryan, Dominic. 013/F0020001/art00005?crawler=true The Anthropology of Ritual: Monitoring and
Stewarding Demonstrations in Northern Ireland, Anthropology in Action, Volume 13, Numbers 1–2,
January 2006, pp.22–31(10)

Clarke, R. Information technology and dataveillance. 1988.


Cohen, A., Glasman, H., Rosenbaum-Cohen, PR., Tesol Quarterly, J. Reading English for specialized
purposes: Discourse analysis and the use of student informants.

Donnelly, RC. Judicial Control of Informants, Spies, Stool Pigeons, and Agent Provocateurs. Yale Law
Journal, 1951.

Florendo, A.Fundamentals of Criminal Investigation - Wiseman’s Books Trading, Inc, Quezon City, 2012

Garcia. Effective Techniques in Criminal Investigation, Wiseman’s Books Trading, Inc, Quezon City, 2016

Guevarra, Tatoy.Police Intelligence and Secret Service, Wiseman’s Books Trading, Inc, Quezon City,
2010.

Gunter, Whitney D., Hertig, Christopher A. CPO. An introduction to theory, practice and career
development for public and private investigators. CPP, CPOI August 2005.

Herman, Michael. Intelligence Power in Peace and War ISBN 0-521-56636-3.

Kille, Leighton Walter., &Maximino, Martin. The effect of CCTV on public safety: Research roundup.
Journalists Resource. Harvard Kennedy School's Shorenstein Center and the Carnegie-Knight Initiative.
Retrieved 2015-05-06.

Kim, UA. Government Corruption and the Right of Access to Courts. Michigan Law Review, 2004.

Levin, M. The Weakest Link: The Dire Consequences of a Weak Link in the Informant Handling and
Covert Operations Chain-of-Command. Law Enforcement Executive Forum, 2009.

Lyman, D., Michael. Criminal Investigation: The Art and the Science. 6th ed. Pearson, 2010.

Lyon, David. Surveillance Studies: An Overview. 2007.

Maccoby, Michael. Successful Leaders Employ Strategic Intelligence, Research Technology


Management, Volume 44. No. 3. May–June, 2001. pp . 58-60. The Productive Narcissist, Broadway
Books, 2003, chapter 4. "Strategic Intelligence, Conceptual Tools for Leading Change", Oxford University
Press, 2015. The Leaders We Need, And What Makes UFollow, Harvard Business School Press, 2007,
chapter 5.

Marx, GT. Thoughts on a neglected category of social movement participant: The agent provocateur and
the informant. American Journal of Sociology, 1974.

Marshall, J. CIA Assets and the Rise of the Guadalajara Connection. Crime, Law and Social Change,
1991.

Michael, K., Roussos, G., Huang, G.Q., Gadh, R., Chattopadhyay, A., Prabhu, S., & Chu, P. Planetary-
scale RFID services in an age of uberveillance. Proceedings of the IEEE, 98(9), 1663–1671.
Minsky, M., Kurzweil, R., Mann, S. The Society of Intelligent Veillance. Proceedings of the IEEE ISTAS
2013.
Schuler, DA., Rehbein, K., Cramer, RD., Pursuing strategic advantage through political means: A
multivariate approach. Academy of Management Journal, 2002

Morley, J. Kid Who Sold Crack to the President. Washington City Paper, 1989.

Palmiotto, J., Micheal. Criminal Investigation. 4th ed. CRC Press, 2013.
Salamanca, Police Intelligence and Secret Service, Wiseman’s Books Trading, Inc, Quezon City, 2017

Simandan, D. Iterative lagged asymmetric responses in strategic management and long-range planning.
Time & Society, OnlineFirst, https://doi.org/10.1177/0961463X17752652. 2018.

Vicente, J. Fundamentals of Criminal Investigation, 2nd Ed. Wiseman’s Books Trading, Inc, Quezon City,
2016

Vicente, J. Police Intelligence and Secret Service - Manual


Weiss, RP. Private detective agencies and labour discipline in the United States, 1855–1946. The
Historical Journal, 2009.

REFERENCES INTERNET

https://en.wikipedia.org/wiki/Police_intelligence

https://en.wikipedia.org/wiki/Wiltshire_Police

www.iadlest.org/Portals/0/Files/Documents/DDACTS...

https://fas.org/irp/offdocs/int022.html

https://fas.org/irp/doddir/army/fm3-19-50.pdf

https://www.cia.gov/kids-page/6-12th-grade/operation-history/history-of-american-intelligence.html#top

https://en.wikipedia.org/wiki/Military_intelligence

https://en.wikipedia.org/wiki/Strategic_intelligence

https://en.wikipedia.org/wiki/Counterintelligence

http://fusioncenter.golearnportal.org/rawmedia_repository/b4e1b56dcf572f53b00ee43a31b34223?/
document.pdf

https://www.thefreedictionary.com/combat+intelligence

https://murdercube.com/files/Combined%20Arms/FM30_5_1951.pdf

http://smallbusiness.chron.com/5-major-differences-between-tactical-strategic-intelligence-18117.html

https://search.yahoo.com/yhs/search?hspart=adk&hsimp=yhs-
adk_sbyhp&p=national+intelligence&param2=abe84d0d-5a79-431d-a697-
2557cf5707ba&param3=converter_6.1~PH~appfocus5&param4=googledisplay~Chrome~national+intellig
ence~3C5571D082E239467E7C0636AC4CCFC8&param1=20170227&type=

http://www.differencebetween.net/language/difference-between-overt-and-covert/

http://work.chron.com/duties-police-criminal-intelligence-investigator-21173.html

https://www.unodc.org/documents/justice-and-prison-reform/cjat_eng/
4_Police_Information_Intelligence_Systems.pdf

https://en.wikipedia.org/wiki/Double_agent

https://www.thefreedictionary.com/penetration+(intelligence)

http://www.redacted-film.com/intelligence-terminology.html

https://dictionary.cambridge.org/us/dictionary/english/agent-provocateur

https://en.wikipedia.org/wiki/Informant

https://en.wikipedia.org/wiki/Agent_provocateur

http://libguides.merrimack.edu/research_help/Sources

http://wikieducator.org/Lesson_2:_Use_of_Informers

https://en.wikipedia.org/wiki/Surveillance

http://work.chron.com/types-surveillance-criminal-investigations-9434.html

http://itlaw.wikia.com/wiki/Discreet_surveillance

https://dictionary.reverso.net/english-definition/discreet+surveillance

https://www.azleg.gov/ars/13/02921.htm

http://qa.answers.com/Q/What_is_the_importance_of_casing_in_police_intelligence

https://www.ifpo.org/wp-content/uploads/2013/08/intro.pdf
Information Sheet 1.1

Introduction

STAGING. When investigators approach a crime scene, they should look for behavioral "clues" left by the
offender. This is when investigators attempt to find answers to several critical questions. How did the
encounter between the offender and victim occur? Did the offender blitz (ambush) the victim, or did he
use verbal means (the con) to capture her? Did the offender use ligatures to control the victim? What was
the sequence of events? Was the victim sexually assaulted before or after death? When did the mutilation
take place-before or after death? Did the offender place any item at the crime scene or remove something
from the crime scene? As investigators analyze crime scenes, facts may arise that baffle them. These
details may contain peculiarities that serve no apparent purpose in the perpetration of the crime and
obscure the underlying motive of the crime. This confusion may be the result of a crime scene behavior
called staging. Staging occurs when someone purposely alters the crime scene prior to the arrival of the
police.

Reasons for Staging Principally, staging takes place for two reasons-to direct the investigation away
from the most logical suspect or to protect the victim or victim' s Mode. The victim would comply because
she had seen his propensity for violence by his earlier actions, such as throwing her on the floor or
holding a knife to her throat. In addition, Shelton would say to the victims, "Keep your eyes down," "Cover
your eyes," or "Don't look at me and I won't kill you

Investigation Defines- The collection of facts to accomplish a threefold aim: a) to identify the guilty party;
b) to locate the guilty party; and to provide evidence of his guilt.

In the performance of his duties, the investigator must seek to establish the six (6) cardinal points
of investigation, namely: what specific offence has been committed; how the offence was committed; who
committed it; where the offence was committed; when it was committed; and why it was committed.

Tools of an Investigator in Gathering Facts:

a) Information- Data gathered by an investigator from other persons including the victim himself
and from:
1) Public records:
2) Private records; and
3) Modus operandi file

b) Interrogation- Skillful questioning of hostile witnesses and suspects.


c) Instrumentation- Scientific examination of real evidence; application of instrument and
methods of the physical sciences in detecting crime.

Phases of Investigation:

(a.)The main objective of a police investigator is to gather all facts in order to (a) identify the
criminal (through (i) confession ;(ii) eyewitness testimony ;

(iii) Circumstantial evidence.);

(b) Trace and locate the criminal; and

(c) Prove by evidence the guilt of the suspect/s.

In proving the guilt of the accused in court, the fact of the existence of the crime must be
established; the defendant must be identified and associated with the crime scene; competent
and credible witnesses must be available and the physical evidence must be appropriately
identified. The proof of guilt will depend on the establishment of the essential elements of the
crime. The investigator must know by heart the elements of a specific crime.

Scientific Examination of Real Evidence.

(a) The Crime Scene Search.


(i) Processing and Securing a Crime Scene. – Processing a crime scene
includes the application of diligent and careful methods by an
investigator/policeman to recognize, identify, preserve and collect facts
and items of evidentiary value that may assist in reconstructing that
which actually occurred. The crime scene is the area surrounding the
place where the crime occurred. The processing of the area at the scene
includes all direct traces of the crime. And this is determined by the type
of crime committed and the place where the act occurred.
(ii) Protecting the Crime Scene and the Evidence- Successful crime
processing depends upon the policeman’s or investigator’s skill in
recognizing and collecting facts and items of value as evidence, and upon his
ability to protect, preserve, and later, to present these in a logical manner.
This requires making careful and detailed notes and sketches; using correct
procedure in taking photographs of the scene; taking written statements and
transcribing verbal statements of witnesses, suspects and victims; and
careful identification, marking and preservation of collected physical objects
of evidentiary nature.

Investigator’s Notebook

a) Purpose: Considering the mass of details and the number of cases which in some
instances an investigator is handling, it is very possible that he might forget some
details. Many of the details associated with the investigation, while not essential to
the report might become points of interest to the court a case is brought to trial.
Experienced investigators employ a handbook to record the relevant details of the
case. During trial, the court allows investigators to consult their notes to refresh their
memory.
b) Recording Notes: The data of the investigation should be recorded in a complete,
accurate and legible fashion so that in the event another investigator is required to
assume the responsibility for the investigation, he can make intelligent use of the
notebook.

Interview

a) Includes so-called interrogations which are actually interviews.


b) Also includes eliciting information from witnesses and confidential informants.
c) Custodial Investigation
It is the skillful questioning of a suspect or a hostile witness to divulge information
concerning the crime under investigation.

Custodial Interrogation

It is the stage wherein police investigators begin to focus on the guilt of the suspect, and
the suspect is taken into custody or deprived of his/her freedom of action in any substantial
manner.

It must be remembered, however, that police investigators cannot learn proper


interrogation merely by reading books. The success of interrogation depends on its legality, topic,
physical insight and experience

PROCEDURE AT THE CRIME SCENE

1. Steps to be Followed Upon Arrival at any Crime Scene


a) Record the date, arrival time and weather condition.
b) If an injured person is on the scene, arrange for medical attention,
identification and removal. The scene should be disturbed only to the
extent necessary to have medical aid rendered to the injured or to have a
doctor examine a deceased victim. Each alteration should be accurately
recorded.
c) If the offender is at the scene, apprehend him.
d) If the scene is not fully protected, ensure its protection by using other
policemen or other responsible persons to keep witnesses, suspects,
and victim(s) from disturbing the scene,
a. Early action is taken to protect items of possible evidentiary
value that may be destroyed by rain, fire or other causes before
collection can be affected. For example, a raincoat or piece of
canvass may be used to cover compressions on the grounds
that are exposed to rain. Items that will melt should be shielded
from the sun or other heat sources. Objects such as food and
blood should be covered to protect them from contamination.

e) Determine and record names of those persons at the scene who may be
witnesses, and separate them. These persons should be removed from
the immediate area of the scene as soon as practicable.
f) Conduct preliminary questioning of witnesses, suspects and victim(s) to
determine in general the extent of the incident or crime.
g) Note the names of all persons officially present. Those present within the
immediate area of the scene should be only the minimum number
needed to assist the investigator. It may be necessary to request other
policemen or officials present to refrain from examining or disturbing
objects or aspects of the scene.

2. Recording
The investigator begins the process of recording pertinent facts and
details of the investigation the moment he arrives at the crime scene. (Of
course, he records the time when he was initially notified prior to his
arrival). He writes down the identification of persons involved and what
he initially sees. He also draws a basic sketch of the crime scene and
takes the initial photographs (if a photograph is available). This is to
ensure that an image of the crime scene is recorded before any
occurrence that disturbs the scene. As a rule, do not touch, alter or
remove anything at the crime scene until the evidence has been
processed through notes, sketches and photographs, with proper
measurements.

3. Searching for Evidence


a. Each time a scene is different, according to the
physical nature of the scene and the crime or
offense involved Consequently, the scene is
processed in accordance with the prevailing physical
characteristics of the scene and with the need to
developed essential evidentiary facts peculiar to the
offense. A general survey of the scene is always
made, however, to note the location of obvious
traces of action, the probable entry and exit points
used by the offender(s) and the size and shape of
the area involved.
b. In rooms, buildings, and small outdoor areas, a
systematic search of evidence is initiated. (In the
interest of uniformity, it is recommended that the
clockwise movement be used.) The investigator
examines each item encountered on the floor, walls,
and ceiling to locate anything that may be of
evidentiary value.

(i) Give particular attention to fragile evidence that


may be destroyed or contaminated if it is not
collected when discovered
(ii) If any doubt exist as to the value of an item, treat
is as evidence until proven otherwise
(iii) Ensure that the item or fingerprints that may be
presented is closely examined and that action is
taken to develop the prints.
(iv) Carefully protect any impression of evidentiary
value in surfaces conductive to making casts or
molds. If possible, photograph the impression and
make a cast or molds.
(v) Note stains, spots, and treat them as evidence
(vi) Note any peculiar odor emitting form the scene.
(vii) Treat as evidence all other items, such as hairs,
fibers, and earth particles, foreign to the area in
which they are found – for example, matter found
under the victim’s fingernails.
(viii) Proceed systematically and uninterruptedly to the
conclusion of the proceeding of the scene. The
search for the evidence is initially completed
when, after a thorough examination of the scene,
the rough sketch, necessary photograph and
investigative notes have been completed and the
investigator has returned to the point from which
the search begun. Further search may be
necessary after the evidence and the statements
obtained have been evaluated.

c) In larger outdoor areas, it is advisable to divide the area into strips about four (4) feet
wide. The policeman may first search the strip on his left as he faces the scene and
then adjoining strips.

d) It may be advisable to make a search beyond the area considered to be the


immediate scene of the incident or crime. For example, evidence may indicate that a
weapon or tool used in the crime was discarded or hidden by the offender
somewhere within a square-mile area near the scene.

e) After completing the search of the scene, the investigator examines the object or
person actually attacked by the offender. For example, a ripped safe, a desk drawer
that has been pried open or rooms from which items have been stolen, would be
processed after the remainder of the scene has been examined for traces of the
offender. In a homicide case, the position of the victim should be outlined with a chalk
or any other suitable material before the body is removed from the scene. If the victim
has been pronounced dead by a doctor or is obviously dead, it is usually advisable to
examine the body, the clothing and the area under the body after the remainder of
the scene has been searched. This is to enable the policeman/investigator to
evaluate all objects of special interest in the light of all other evidence found at the
scene.
Self Assessment 1.1

Post-Test - Multiple Choices

Use the separate paper for your answer. Analyze carefully the statements or questions before
answering by choosing the best or nearest answer by encircling the corresponding letter of your
choice
1. The collection of facts to accomplish a threefold aim: a) to identify the guilty party; b) to locate the guilty party; and to provide
evidence of his guilt.

a. investigation
b. interrogation
c. interview
d. intelligence
2. Scientific examination of real evidence; application of instrument and methods of the physical sciences in detecting crime

a. investigation
b. instrumentation
c. interview
d. intelligence
3. Skillful questioning of hostile witnesses and suspects

a. investigation
b. intelligence
c. interrogation
d. intelligent
4. Data gathered by an investigator from other persons including the victim himself

a. investigation
b. intelligence
c. interrogation
d. . Information
5. The main objective of a police investigator is to gather all facts in order to identify the criminal through

a. confession
b. eyewitness testimony
c. force
d. intimidation
e. a and b
6. It is the skillful questioning of a suspect or a hostile witness to divulge information concerning the crime
under investigation
a. custodial investigation
b. custodial interrogation
c. interview
d. investigation

7. It is the stage wherein police investigators begin to focus on the guilt of the suspect, and the suspect is
taken into custody or deprived of his/her freedom of action in any substantial manner.

a. custodial investigation
b. custodial interrogation
c. interview
d. investigation
8. If any doubt exists as to the value of an item, treat it as evidence until proven otherwise. This statement
is true?
a. No
b. it depends
c. yes
d. uncertain

9. If the offender is at the scene, apprehend him. This statement is false?


a. Possibly yes
b. Probably no
c. yes
d. No
10. The success of interrogation depends on its legality, topic, physical insight and experience. This
statement is true?

a. Possibly yes
b. Probably no
c. it depends
d. No
e. Certainly
 Let’s Test What You Have Learned
 Instructions: Identify whether the following statements are true or false. Just write
T if the statement is true and correct the statement if it is false. Use the separate
paper for your answer
______1. If any doubt exists as to the value of an item, treat is as garbage until
proven otherwise
______2. If an injured person is on the scene, arrange for funeral services,
identification and removal
_______3. Treat as evidence all other items, such as hairs, fibers, and earth
particles, foreign to the area in which they are found.
________4.As a rule, do not touch, alter or remove anything at the crime scene
until the evidence has been processed through notes, sketches and photographs,
with proper measurements.
_______5.It may be necessary to allow other policemen or officials present to be
free from examining or disturbing objects or aspects of the scene.

 Critical Thinking

o Why do criminology students conduct a study about the importance of crime


scene investigation in understanding criminal behavior? Cite instances that will
show the benefits of this study.

Self check 1.1

KEY TO Correction
Multiple Choices

1.a

2.b

3.c

4.d

5.e

6.a

7.b

8.c

9.d

10.e

True or False

1. F

2. F

3.T

4.T

5.F

LEARNING OUTCOME NUMBER 2


POLICE INTELLIGENCE
Contents

Major Categories of Intelligence


Intelligence Cycle and Management
Sources of Information
Description of Persons and Tracing the Fugitive
Development and Control of Informants

Specific Objectives

Upon completion of this course, the learners are able to:


1. Explore and apply the knowledge on the use of different equipment and techniques for Intelligence
Operations
2. Describe and apply the Basic Concepts and Principles of Police Intelligence
3 Demonstrate competence and broad understanding of Police Intelligence and its role in law
enforcement administration

Strategies/ Activities
Teaching Strategy:

>Delivers and give lecture


>Present lessons logically
>Give sufficient examples
Discussion Strategy:
>Encourage the students for active classroom discussion
>solicit ideas, opinions and feedbacks from students
Note taking strategy:
>requires students to write important issues/events taken during the lecture

OBE and Learning Materials


The students will make research regarding the nature and concepts of police intelligence thru
interview with the police station investigators they will make reports on the different phases of
intelligence and how do the police investigators used police intelligence in case build ofup.
Active participation in classroom discussion doing research, outlining, one page report writing
and oral presentation of report

Assessment of Learning Outcomes


The students gained knowledge regarding the nature and concepts of police intelligence and thru
interview with the police investigators they will know the different phases of police intelligence
and how the police used police intelligence in case build up.

Quizzes
Recitation
Assignment
Brainstorming
Role Playing
Lecture via Zoom

Introduction
Criminals seek economic and political gain through illegal activities, to include trafficking in drugs,
weapons, people, and other contraband. Violence is often a primary tool, either through intimidation or
actual attacks to steal property, influence the population, and escape prosecution. While many criminals
operate independently, today’s technology facilitates criminal organizations with much less regard for
physical and political boundaries than at any other time in history. Drug cartels can move money and
gather information on their distribution network without any need to expose members to international
travel. Known associates or clever imitators can repeat a crime committed in one country, the same day
on another continent.

Police information and police intelligence can help investigators to develop patterns and criminal
associations in a facility. This can lead to identification and documentation of criminal behavior and
individual perpetrators. This information and police intelligence also enables the investigators to identify
criminal groups forming in the facility and to take steps to interdict these groups before serious breaches
of security occur. Information collected and police intelligence produced may also be valuable to
investigators conducting criminal investigations and focused on crimes within and outside the facility.
Police intelligence operations can link detainees in the facility to crimes, criminals, and activities outside
the facility. This enables investigators and police intelligence analysts to further develop their
understanding of the criminal environment, key players, and associations, thus allowing investigators to
focus their efforts more effectively. Commanders may also direct criminal investigations concerning
events in a facility. These events may include a variety of serious criminal infractions, to include attacks
on other detainees or police personnel, contraband smuggling, and escape attempts. Care must be taken
to recognize, preserve, collect, and process items with evidentiary value. Once collected, this evidence is
packaged and forwarded to a supporting forensic lab for further examination and analysis.

Major Categories of Intelligence

Line Intelligence
It is processed information which affects police cooperation and harmony with the community and other
government agencies. It must be current, concise, and factual, in order to avoid guess work in police
planning and operation. It is otherwise known as intelligence of immediate value.

It involves both a process and an immediate product. It can be said that line intelligence is the
end product of gathering and processing of information. That part of the product which is of an immediate
nature, and essential to more effective police planning and operations.

Strategic intelligence

Intelligence activity which is concerned principally with the defending of the police organization against
penetration by individual and various groups who are inimical to the best interest and general harmony. It
is concerned principally with the neutralizing and destroying attempts of individuals or groups that seek to
discredit law enforcement

All intelligence data that are not of an immediate value. The bulk of strategic intelligence is usually
descriptive in nature. The accumulation of physical descriptions of personalities, their telephone numbers,
and known associates are virtually classic examples of strategic intelligence

Counter Intelligence
Refers to information gathered and activities conducted to protect against espionage other intelligence
activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or
persons or international terrorist activities, sometimes including personnel, physical, document or
communications security programs.
Counterintelligence is that aspect of intelligence relating to all security control measures, both
active and passive, designed to insure the safeguarding of information, personnel, equipment, and
installations against the espionage, sabotage, or subversive activities of foreign powers and disaffected or
dissident groups or individuals which constitute a threat to the national security.

Combat Intelligence
That knowledge of the enemy, weather, and geographical features required by a
Commander in the planning and conduct of combat operations.
Combat intelligence is military intelligence required for use in a combat situation, whether based upon
information collected locally or provided by higher headquarters. Combat intelligence has two objectives-
(1) To reduce to a minimum all uncertainties regarding the enemy, weather, and terrain, and thus to assist
the commander in making a decision and the troops in executing their missions. (2) To assist the
commander in applying counterintelligence and security measures that will conceal from the enemy our
intentions and activities and will neutralize or destroy the effectiveness of enemy intelligence activities.

It is that knowledge of the enemy and the characteristics’ of operations used in the planning and conduct
of tactical operations. It provides the commander with information and conclusions concerning the areas
of operations, enemy capabilities and enemy vulnerability’s in order to determine their probable effect on
his courses of action. It is required by the commander in order to determine the best use of this available
firepower and manpower, maneuver forces, to accomplish his mission and to maintain the security of his
command.

Military Intelligence
It is a military discipline that uses information collection and analysis approaches to provide guidance and
direction to assist commanders in their decisions. This aim is achieved by providing an assessment of
data from a range of sources, directed towards the commanders' mission requirements or responding to
questions as part of the operational or campaign planning. To provide an analysis, the commander's
information requirements are first identified, which are then incorporated into intelligence collection,
analysis, and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the
civilian population in an area of combat operations, and other broader areas of interest. Intelligence
activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war,
and during a war itself.
.Tactical intelligence
The word "intelligence" in law enforcement brings to mind top-secret, covert operations. In reality,
"intelligence" is just another word for "information." Police agents who gather intelligence to study and
solve crimes use what's called "tactical intelligence." Their targets range from organized crime, bank
robberies, kidnapping, extortion and corruption, to civil rights violations and copyright infringements.

Tactical intelligence is focused on support to operations at the tactical level and would be attached to the
battle group. At the tactical level, briefings are delivered to patrols on current threats and collection
priorities. These patrols are then debriefed to elicit information for analysis and communication through
the reporting chain

Police Intelligence
It is the product resulting from their collections, evaluation, analysis, integration, and interpretations
of all available information concerning one or more aspects’ of criminal activity and which is immediately
or potentially significant to police planning.
Police criminal intelligence investigators differ from intelligence analysts by gathering information
and evidence to prove someone broke the law. Their work begins after an alleged crime occurs and
continues until a case is solved or temporarily closed. Intelligence analysts don't prove a crime occurred.
They gather information around the clock and provide government agencies, law enforcement
organizations, the military and other officials with the findings. Crime-solving isn't their mission, but the
information they collect can be used to prevent crime or accuse or prosecute officially

National Intelligence

Integrated departmental intelligence that covers the broad aspects of national policy and national security, i
s ofconcern to more than one department or agency, and transcends the exclusive competence of a
Single department or agency

INTELLIGENCE CYCLE AND MANAGEMENT


Intelligence Cycle – cyclical steps followed from intelligence planning to the dissemination of
processed information. It is a repetitive process used to produce intelligence from information.

Four (4) Phases of Intelligence Cycle

MISSION

1. Planning and Direction( the collection effort)


Establish the consumer’s intelligence requirements and plan intelligence activities
accordingly. The planning and direction step sets the stage for the Intelligence Cycle. It is the
springboard from which all Intelligence Cycle activities are launched and is the foundation for the
entire process. This portion of the process includes determining the information need, deciding
how to collect that information, and setting up a timetable for collecting the information. Generally,
in such cases, the consumer has a requirement for a specific product. That product may be a full
report, a graphic image, or raw information that is collected, processed, and disseminated, but
skips the analysis and production step.
Steps:
A. Determination of Intelligence Requirements

Classification of Intelligence Requirements:

1) Priority Intelligence Requirements (PIRs) or Essential Elements of


Information (EEIs)
2) Other Intelligence Requirements (OIRs)

Priority Intelligence Requirements – those intelligence requirements for which a commander


has an anticipated and stated priority in his task of planning and decision-making. It is the
highest Intelligence requirements and are the basis for intelligence operations and are
personally approved by the commander.

Other Intelligence Requirements – those items of information regarding the enemy and his
environment which need to be collected and processed in order to meet the intelligence
requirements of the commander.

Specific Order Requests (SORs) – product of requirement analysis that is required of


collection units or agencies in the form of orders or requests.

B. Determination of intelligence priorities


C. Determination of Intelligence indicators/determination of those enemy activities
or characteristics of the area of operations which could indicate the answers to
the intelligence requirements and to determine the specific items of information.

Indicators – generalized theoretical action that an enemy might be expected to take in


preparation for aggressive action that are things or events that transpired in the past or
things or events that are presently occurring.

D.Determination of intelligence specific orders or requirements/selection of collection


agencies to be employed, and issuance of necessary orders and requests for information.

E.Determine the collection agencies together with the time and place the information are to
be reported/supervising the execution of orders and requests.

2. Collection of information – systematic exploitation of sources of information by collection


agencies and the delivery of the information obtained to the proper intelligence unit or agency.Many of the
most important facts are well known or may be gathered from public sources. This form of information
collection is known as open source intelligence. For example, the population, ethnic make-up and main
industries of a region are extremely important to military commanders, and this information is usually
public. It is however imperative that the collector of information understands that what is collected is
"information", and does not become intelligence until after an analyst has evaluated and verified this
information. Collection of read materials, composition of units or elements, disposition of strength,
training, tactics, personalities (leaders) of these units and elements contribute to the overall intelligence
value after careful analysis.

Police Information Collection Activities

a. Routing patrols f. Investigations


b. Surveillance g. Search and seizures
c. Criminal investigation h. Checkpoints
d. Use of outsiders like informers and informants i. Cordon and search
e. Interrogations j. Interview and elicitation

Sources of Information – any person, object or record used by an investigator in conducting


investigation.
- Persons, things, or actions from which information about the enemy, weather or terrain is
derived.

Types of sources of information

a. Open sources/overt sources – those that are obtained without resorting to special effort or
clandestine operation.
1. newspapers
2. magazines
3. radio intercept
4. public and private library
5. public and private establishment
6. general public
7. and others which is similar in nature
b. Non-open sources/covert sources – those that are not obtained openly as described
above.
1. Surveillance
2. Casing
3. Undercover operations
4. Deep Penetration
5. Photography(use of telephoto lenses or night vision cameras)
6. Surreptitious Entry
7. Use of Sound Equipment (bugging or wire tapping)
8. Use of Radar or Sonar, use of satellites
9. Use of informers or informants
10. Crypt analysis
11. Censorship
12. Document exploitation or Exploitation of captured material

Steps involved in the processing of information


A. Recording – reduction of information to writing or some other form of graphical
representation and the arranging of information into groups of related items.

Means of recording information

a. Intelligence Journal – chronological log of significant intelligence activities covering a stated


period usually 24 hours.
b. Intelligence Workbook – aids in sorting, evaluation and interpreting of information
in the preparation of intelligence reports.
c. Enemy Situation Map – a graphic representation of the current enemy situation.
d. Order of Battle Records/Watch Lists
e. Coordinate Register
f. Identification Files – files in the intelligence unit of personalities in crimes,
location of illegal or suspected illegal activities, vehicle registry used by hoodlums,
criminals, dissidents, union racketeers, list of and data on dubious organizations,
telephone numbers of suspects, criminal and other suspicious police characters.

Types of identification files are:


(1) Persons;
(2) Numbers;
(3) Non-persons

B. Evaluation – determination of the pertinence, reliability and accuracy of the information.


Continually acquire feedback during the Intelligence Cycle and evaluate that feedback to refine
each individual step and the cycle as a whole. Constant evaluation and feedback from consumers are
extremely important to enabling those involved in the Intelligence Cycle to adjust and refine their activities
and analysis to better meet consumers’ changing and evolving information needs. This step helps assess
current and new information found, recognize weak areas and potential threats, and eliminate those
identified weakness
Determination of the pertinence or significance of the information relative to the
operation, reliability of the sources or agency, and accuracy of the information.
Pertinence – determination of the area of operation and who needs it, if so by whom and when.
Reliability – determination of the sources of information by which it was collected and evaluated.
Accuracy – probable truth of the information.

Reliability of Source:
A – Completely reliable D – Not usually reliable

B - Usually reliable E – Unreliable

C- Fairly reliable F – Reliability cannot be judge

Accuracy of Information:

1 – Confirmed by other sources 4 – Doubtfully true

2 – Probably true 5 – Improbable

3 – Possibly true 6 – Truth cannot be judged

Sources of Information:

T – Direct observation by the commander of a unit

U – Report by a penetration agent or resident agent

V – Report by an AFP trooper or PNP personnel in encounter or operation

W – Interrogation of a captured enemy agent or foreigner


X – Observation by a government or civilian employee or official

Y - Observation by a member of a populace

Z - Documentary

C. Interpretation Analysis –

Analysis is the process by which collected information is evaluated and integrated with
existing information to produce intelligence that describes the current—and attempts to predict
the future—impact of the threat, terrain and weather, and civil considerations on operations. The
intelligence staff analyzes intelligence and information about threat capabilities, friendly
vulnerabilities, and area of operations to determine how they will impact operations. During
police intelligence analysis, police information and raw data become police intelligence. Analysis
is based on critical examinations of all available and relevant information to determine
capabilities and trends and to develop predictive analysis for the police and criminal
environments and specific criminal threats. Determination of the significance of the information
relative to the information and the intelligence already known and drawing deductions about the
probable meaning of the evaluated information.

Integrate, evaluate, analyze, and prepare the processed information for inclusion in the
finished product. This step transforms raw data into applicable products, separating
“information” from “intelligence.” The analysis and production step also requires highly trained
and specialized personnel (in this case, analysts) to give meaning to the processed information
and to prioritize it against known requirements. Synthesizing the processed information into a
finished, actionable intelligence product enables the information to be useful to the customer.
The final result of this process should be information that will prevent terrorist attacks or other
criminal activities.

Thorough, timely analyses of police information collected in response to Intelligence


Report and investigative leads are fused throughout the operations process. Analysis should
allow the developed police intelligence to answer Intelligence Report or provide actionable
police intelligence that drives operations and Law Enforcement investigations. These operations
and LE investigations are then more likely to be successful and support the intent and
requirements of the commander or investigator. The analysis of police information may begin
with a technical examination of a piece of evidence. Physical characteristics of persons,
equipment, written documents, weapons, chemicals, and explosives may not be observable
without special training and equipment. Analyses may also include careful examinations of the
associations between people, items (evidence), locations, and events.

The analysis of police information may begin with a technical examination of a piece of
evidence. Physical characteristics of persons, equipment, written documents, weapons,
chemicals, and explosives may not be observable without special training and equipment.
Analyses may also include careful examinations of the associations between people, items
(evidence), locations, and events

Activities involved in the Interpretation of Information


1.Assessment – sifting and sorting of evaluated information to isolate insignificant
elements with respect to the mission and operation of the unit.

2 Integration – combination of elements isolated in analysis with other known information


to form a logical picture on hypothesis of enemy activities or influence of operational area
characteristics on the mission of the unit.

3. Deduction – designed to answer the question “what does this information means in
relation to the enemy situation, weather and area of operation.

4. Dissemination and use of information

Police information and police intelligence products are produced to inform commanders,
PMs, investigators, and other LE personnel of exceptional information and actionable police
intelligence. Dissemination of this information and police intelligence is also conducted through
command and staff and functional channels, including interagency host nation agencies and
organizations (within legal and policy constraints). This enables appropriate coordination,
synchronization, and fusion of police information and intelligence.
Deliver the finished product to the consumer that requested it and to others as applicable.
The consumer that requested the information receives the finished product, usually via
electronic transmission in a timely and credible manner. Dissemination of the information
typically is accomplished through such means as websites, email, Web 2.0 collaboration tools,
and hardcopy distribution. The final, finished product is referred to as “finished intelligence.”
After the product is disseminated, further gaps in the intelligence may be identified, and the
Intelligence Cycle begins all over again.

Considerations:

a. Timeliness
b. Propriety
Methods of Dissemination
a. Personal Contact –conferences, briefings, person to person exchanges
b. Messages – couriers, secured electrical means
c. Intelligence Documents
Nature of Intelligence Operation:
Police intelligence operations are directed towards the gathering of information relative to
vices, organized crime, syndicates, subversions and insurgency, terrorist organizations, integrity of
the members of the police force, or any person or conditions which may promote disturbance of the
peace and order of the community. In this connection, intelligence operations employ either overt of
covert operations in order to achieve the above-cited objectives:
1. Overt Operations – this type of operations is done if the information or documents are
procured openly without regard as to whether the subject of investigation becomes
knowledgeable of the purpose for which is being gathered. Gathering of information
openly is usually done through open sources, like public or private records, newspaper or
the media interview or interrogations, research, or any other open means.
2. Covert Operations –
This type of operations is done when the gathering of information or document is secret
or without the knowledge of the person or organization to whom such information or
document are to be used.
Covert surveillance is a particularly intrusive method for collecting information. The use of
covert surveillance measures involves a careful balancing of a suspect’s right to privacy
against the need to investigate serious criminality.
Provisions on covert surveillance should fully take into account the rights of the suspect.
There have been various decisions of international human rights bodies and courts on the
permissibility of covert surveillance and the parameters of these measures. Reference
should be made to these. An extensive discussion is contained in the commentary to
Article 116 of the Model Code of Criminal Procedure (MCCP)(DRAFT, 30 May 2006). In
those societies where the authorities exercise forceful control over the populations, the
use of these techniques may be indiscriminate. Other systems will require a number of
strict safeguards against abuse including the requirement that the offence be serious, that
the use of the technique be vital to the case and that essential evidence cannot be
secured by less intrusive means. Judicial or independent oversight is common and is
required under international human rights law.
The following are covert types of police intelligence operations:
1. Surveillance
2. Casing
3. Undercover operations
4. Deep Penetration
5. Photography (use of telephoto lenses or night vision cameras)
6. Surreptitious Entry
7. Use of Sound Equipment (bugging or wire tapping)
8. Use of Radar or Sonar, use of satellites
9. Use of informers or informants
10. Crypt analysis
11. Censorship
12. Document exploitation or Exploitation of captured material
13. Interception of telecommunications?
14. Interception of email traffic?
15. Interception of post/mail?
16. Use of listening devices?
17. Use of tracking devices?
18. Use of surveillance teams?
19. Use of photographic surveillance?
20. The use of fake personal and company identities?
21. Covert search of letters, packages, containers and parcels;
22. Simulated purchase of an item;
23. Simulation of a corruption offence;
24. Controlled delivery.
25. Covert real-time monitoring of financial transactions;
26. Disclosure of financial data. This measure is carried out through obtaining
information from a bank or another financial institution on deposits, accounts or
transactions
27. Use of tracking and positioning devices.

Procurement as used in intelligence parlance is the aggressive effort to acquire certain specific
information which may not be readily available. To this end, a number of means may be used, these are:

1. The classical intelligence such as and which utilizes human being to gather information.
2. The modern or technical intelligence which employs machine such as satellites, electronic
gadgets to gather information.

SOURCES OF INFORMATION

1. Persons
2. Places
3. Things
4. Information defined –

Information is a communicated knowledge by others obtained by personal study, investigation,


research, analysis and observation. The use of modern gadgets is intelligence and other things and
materials which posses or contains a desired information or knowledge. Intelligence – the end product
resulting from the processing of information, or the art of obtaining, evaluating, and dispensing vital
information for future action.

TYPES OF INFORMANTS The following is a list of type informants discussed in Swanson, Neil and
Territo (2000).
1. Mercenary informants
They provide information to the police for financial reward. A lot of investigators attach great important on
this type of informants. However very few investigators actually engage the services of such informants.
This limitation is due to lack of funds. . Mercenary Informants – Sales information. He/she could be one of
the members of syndicate charged if stolen property is found in their possession
2. The rival informant
They provide information to establish control over the activity in question, using the police to achieve
legally what he or she cannot do alone. . From time to time, individuals who themselves are engaged in
illegal activities may serve as informants as a means of eliminating their competitor.
3. The anonymous informant
These types of informants are unknown. They are very difficult to deal with because their motivations are
not identifiable since they are not known. Police departments receive anonymous information either by
telephone or in writing. Anonymous information should not be disregarded but should be pursued, so long
as it may be fruitful.
4. Legitimate informants:
These are law-abiding citizens who just deem it as a sign of good citizenship to give information about
crimes that they posses to the police. Such persons are not easily motivated by anything like any ordinary
informants except trust worthiness and confidentiality on the part of the police. Investigators will have to
very tactful in dealing with such informants because a hasty conclusion can drag you in to political traps.
Legitimate Informants – gives information for a legitimate reason/s
5. The self-aggrandizing informants
They crave for recognition and feeling importance by giving information to the police. They have many
contacts in criminal circles and when investigators identify this motivation, they should give ample praise
each time information is supplied. Otherwise such informants may not continue the relationship. An
informant that is conceited, overconfident, and arrogant.
6.The false informant
These are the type of informants who intentionally provides misleading information mostly but not always,
to direct police attention away from an illegal and ongoing offence by himself or herself, friends, or
relatives.
a. 7. Fearful informants
They are worried that they will be endangered by the criminal activities of an associate. Fearing for their
own well-being, they supply information.
8. The plea-bargaining informant
They seek reduced charges or a lenient sentence. An individual arrested for a crime may know of criminal
activities by others and, in exchange for telling the police. Swap shops and pawnshops, however properly
operated, occasionally are places where stolen property is recovered. Shop operators may share
information about criminal activities with the police to build credit and reduce the likelihood that they will
be formally

DESCRIPTION OF PERSONS AND TRACING THE FUGITIVE

A.DESCRIPTION OF PERSONS
Wanted Persons

a) Personal data and description should include the following:

1. Name – include aliases


2. Address – present, and past if any
3. Sex – because the name may not indicate sex
4. Color – brown, white, negro, etc
5. Nationality
6. Age – if unknown, make an estimate
7. Height – estimate in 2-inch blocks; for example, 5 feet 8 inches to 5 feet 10
inches
8. Weight – estimate in blocks of 10 pounds; for example, 130 to 140 pounds
9. Build – large, medium, small; stocky or stout, obese, slender or slim
10. Posture – erect, stopped, round shouldered, stiff, or slumped
11. Head-shape – round, flat on top, egg shape, high crown, or bulging at the
back
12. Hair – color, thick or thin texture, location or absence of part, sideburns,
receding hairline, type of baldness
13. Ears – small, medium, large; shape: oval, round, triangular or rectangular;
close to or sticking out from the head; lobes, if unusual shape
14. Face – Describe as seen from the front; round, square, oval, broad, and
long
15. Complexion – smooth, rough, fair, dark, sun-burned, freckled, sallow,
ruddy, pale or florid, indicate peculiarities such as if pockmarked or
pimpled
16. Forehead – sloping, receding, medium or bulging
17. Eyebrows – arched, straight, long, short, united, thin, thick or bushy,
plucked or Penciled
18. Eyes – large, medium or small, round or slanted, color, peculiarities such
as squint, bloodshot, spots, protruding, sunken, watery, glass eye, eye
piercing, dull, fixed, mobile; glasses (include bifocals, thickness and type
of rim)
19. Nose – small, medium, large; thin or thick; flaring or small nostrils
20.Mustach or beard – short, medium or long; color thick or thin; type of beard or
side Burns
21.Lips – thick, thin, puffy; pouting, retracted over teeth; red, pale or blue; hare-lip,
or other peculiarities
22. Mouth – describe as seen from the front; small, medium, large; thin medium
thick
23. Teeth – white, dull, stained; firm, loose; decayed; braces; broken or chipped;
False or jacket; missing; large or small; spaced, if noticeable
24, Chin – normal, receding, protruding, Peculiarities such as small, large, double,
flat or cleft chin
25. Neck – short, long, straight, curved, prominent Adam’s apple, or other peculiarities
26. Shoulders - small, heavy, narrow, broad, square, round or stropped.

b. Distinctive marks, scars, peculiarities and mannerisms:


1. Scars – size, shape, and location
2. Amputation and deformities – location, artificial braces, hearing aid, etc.
3. Speech- slow, rapid, accent, stuttering, nasal tone, feminine (for men) masculine
(for women) and general use of words
4. Dress – neat or sloppy, flashy or conservative, type; work, sport, business, cheap
or expensive; hat and shoes by color and style; suites; color, etc; shirts:
style and color; ties; style and color
5.Jewelry – type and where worn
6.Perfumes or lotions used
7. Habits – neatness, use and form of tobacco, use of gum, type of drinks and food,
drug addiction, scratching, backing, coughing, throat- clearing, finger-nail-
biting, cracking knuckles, shifting feet, gestures
8. General Characteristics – describe any and all distinctive identifying characteristics;
for example, loud or unusual laughter, dead pan or poker face,
associations with women, expressions, sports, gambling and places
frequented such as dance halls, movie house, pool parlors.
C.General Background – additional information such as the following maybe included:
family history, marital status education, employment, criminal record,
friends and associates, medical history.

B.TRACING THE FUGITIVE


1. The Fugitive. Consider the following:
a) His full name and known aliases
b) Description and distinctive marks, etc.
c) modus operandi
d) Motive
e) Associates, past and present, and girlfriends
f) Habits and hangouts, resorts he is known to frequent
g) Criminal record-photograph, fingerprints, (NBI record check)
h) Resident – last known and previous locations
i) Employment – last known and previous emlployuhers
j) Relatives – names and address of all available
k) Close friends – names and addresses
l) Physical condition
m) LTO record check (verification) operators-chauffeur or owner’s license
n) Social Security number
o) Selective service history
p) Hand writing specimen (for comparison)
2. Alarms
a) Teletype
b) Circular
c. “Wanted” cards at various agencies
d) Stop at local police stations-accident report, minor offense, traffic violations etc.
e) Stop at court –minor charge arrest
f) If parolee, notify the Parole Board concerned
g) If the person frequents the race tracks, notify the authorities at the tracks
h) Notify former arresting officer
3. Other means of Apprehension
a) Cover the mail
b) Tail his associates, relatives or girlfriends
c) Cover the postal telegraph
d) Where relatives or close friends are known to be in a hospital or institution cover the
same for visits
e) If he is a seaman, contact the local shipping or marine agencies (he must have papers
that will give leads as to his whereabouts)
f) Place a stop at the Department of Foreign Affairs, Passport and Visa Division, if you
havereason to believe that the subject will go abroad
4. Sources of Information
a) Police officers, PNP records, NBI records, records of local police agencies, records of other
government agencies.
b) Neighborhood checks – residents and storekeepers
c) Parole and probation officers
d) Banks – safety deposit box and cancelled checks
e) Insurance companies
f) Public utility companies – MERALCO, MWSS, Gas Company, and transportation companies
g)Telephone Company – application information and toll charges
h) Election Board
I) fraternal organization
j) Military service records – Is he receiving allotment checks? Is he a patient in a government hospital?
Where?
k) Veterans organization
l) School records – for subject or transfer of his children
m) Labor organization
n) Laundry and dry cleaners
o) Loan organization
p) Auto rental agencies and person from whom he might have borrowed or rented a car
q) Membership in Mutual Benefit Association – reports of accidents, other requests, etc
r) Social service and welfare agencies
s) Department of Foreign Affairs – Information from previous passport(s)
t) If an alien, Commission on Immigration and Deportation where you can get information on whether he
is registered and also the names and addresses of his contacts in the Philippines
u) If a naturalized citizen – the Office of the Solicitor General and the courts; application contains all
details on the subject and the names and addresses of his witnesses.
v) Prison records will show his correspondence
w) Credit houses and investigators
x) Hospital records, including his personal physician
y) Stores where subject purchased car, food or clothing
z) Bills of car repairs, financing insurance
aa) employment agencies
bb) telephone and city directories
cc) bondsmen, when bail is forfeited
dd) employees of the hotel where subject is known to have been a guest – slips for phone calls; baggage
checked of shipped; walk-in-messages; guests
ee) Health Department; owner employee of restaurant; License Department; photos in applications;
marriage license-maiden name of wife, witnesses, date, officiating priest.

A. SURVEILLANCE
In the investigation of a certain case, a point is reached when the investigator sometimes finds it difficult
to secure leads through questioning of the complainant and witnesses. In such a situation, the
investigator has to go to the field to locate the criminal or, if he is known to study his habits, movements
and possible accomplices in the commission of the crime.

Surveillance (/sərˈveɪ.əns/ or /sərˈveɪləns/) is the monitoring of behavior, activities, or other changing


information for the purpose of influencing, managing, directing, or protecting people. This can include
observation from a distance by means of electronic equipment (such as closed-circuit television (CCTV)
cameras) or interception of electronically transmitted information (such as Internet traffic or phone calls). It
can also include simple no- or relatively low-technology methods such as human intelligence agents
and postal interception. The word surveillance comes from a French phrase for "watching over"
(surmeans "from above" and veiller means "to watch") and is in contrast to more recent developments
such as sousveillance.
Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation of crime. It is also used by criminal organizations to
plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence, and
by private investigators.
Surveillance is the covert observation of people, places and vehicles, which law enforcement agencies
and private detectives use to investigate allegations of illegal behavior. These techniques range from
physical observation to the electronic monitoring of conversations. Surveillance also carries major risks,
however. The detection of a private investigator's presence in an area will compromise his future activities
there. For undercover officers, any unmasking of their identity and purpose may result in injury or death.

Surveillance Technologies
Subject – the person, place, or object being watched or under surveillance

Surveillant– the person or group of persons working as a team who does the surveillance or who
maintain watch or perform the observation.

Convoy – an associate of the subject who follows the subject in an attempt to detect surveillance.

Contact – any person with whom the subject speaks, to whom he pass articles, or from whom he
receives articles
.
Made – the surveillant being recognized as the surveillant by the subject or convoy.

Lost – the subject is lost when the surveillant do not know his whereabouts. The subject is lost when the
subject eluded him.

Fingerman– an individual who can positively point out the subject.

Put the finger on – go identify a subject by pointing him out either in person or in photograph.
Put to bed – when the subject under surveillance has returned to his quarter and apparently retired for
the night.

Shadow and tail – to follow an individual whenever he goes, on foot or by vehicle overtly and
covertly
Decoy – a person of object used by the subject in an attempt to elude surveillance.
Types of Surveillance

A. According to Sensitivity/intensity
1. Discreet - careful to avoid social embarrassment or distress, esp. by keeping
confidences secret; tactful surveillance maintained on a "loose" basis, the prevention
of detection being paramount, even to the loss of the subject being tailed. Generally, the
guiding rule is to discontinue surveillance rather than risk actions which make the subject
aware of the surveillance.
2. Close -. Continuous observation of the subject is maintained at all times, even if the
subject appears to become suspicious or openly accosts the surveillant and accuses him
of watching or following him
3. Loose - Observation of the subject or object is not continuous. The surveillance maybe
discontinued if the subject becomes suspicious or when the services of another
surveillant are required
4. Harassment –
a. Anonymously or otherwise contacts, communicates or causes a communication with
another person by verbal, electronic, mechanical, telegraphic, telephonic or written
means in a manner that harasses.
b. Continues to follow another person in or about a public place for no legitimate
purpose after being asked to desist.
c. Repeatedly commits an act or acts that harass another person.

d.Surveils or causes another person to surveil a person for no legitimate purpose.

e. On more than one occasion makes a false report to a law enforcement, credit or social
service agency.
f. Interferes with the delivery of any public or regulated utility to a person.

5. Combination of Loose and Close Surveillance. Circumstances, which usually depend


on the specific act of the subject, may necessitate a change from a loose surveillance to
a close surveillance without prior notice.

B. According to method
1. Fixed or stationary - Maybe referred as a stakeout.
Is conducted when a person, object, or activity being watched is not expected to move
from one area. The surveillant may however, move from one vantage point to another in
the immediate area
2. Moving –Maybe referred to as a tail or shadow.
A moving surveillance is conducted when a person, object or activity being watched
move from one place to another. The surveillant may however, move from one vantage
point to another in the immediate area.
3. Technical -Electronic monitoring, or wiretapping, refers to the surveillance of email, fax,
and Internet and telephone communications. This activity requires a court order to
proceed, based on a U.S. government affidavit showing that a crime has been, is being
or will be committed. However, if a person risks severe injury or death, the government
can ask to start monitoring communications right away, the U.S. Department of Justice
states. Similar exceptions are made for organized crime or national security cases. Once
an order is granted, police agencies can identify criminal conspirators to deter or punish
the offenders involved. Other examples of electronic monitoring include drones, license
plate readers, computer forensics and subpoena of data stored in the cloud. New
technologies can push the limits of privacy. For instance, stingray tracking devices allow
law enforcement to determine the location of a suspect's cell phone, as well as the
identity of random individuals close by.

FIVE TECHNIQUES OF FOOT SURVEILLANCE


a. One-Man Surveillance. One investigator is used to conduct the surveillance. It is best employed
in a fixed surveillance. It should be avoided in moving surveillance because it provides the least
amount of flexibility in the surveillant, in addition to watching the subject should take notes, watch
for convoys, and collect evidences.

b. Two-Man or “AB” Surveillance


In the “AB” technique of surveillance, the surveillant behind the subject is always known as “A”
surveillant. “A” follows the subject and “B” either follows on the same side of the street or from
across the street.

c. Three-Man or ABC Surveillance. The most effective technique of foot surveillance is the
“ABC” technique. It employs three surveillance, and is intended to keep two sides of the subject
covered. “A” follows the subject. “B” follows “A” and concentrates on keeping “A” in sight rather
than the subject. “B” also watches for convoys. The normal position for “B” is behind “A”. “C”
normally operates across the street from slightly to the rear of the subject.

d. Leapfrog Surveillance. Two or more surveillants are used to conduct the leapfrog technique
of surveillance. This is a variation of the “AB” and “ABC” methods. It is simple to execute and
greatly reduces the chances of the subject reorganizing surveillant. Surveillant “A” follows “B”.
Both surveillants operate on the same side of the street as the subject. After a variable time or
distance has elapsed by prearrangement of signals, “A” falls back and allows “B” to assume the
position “A” and “A” becomes “B”.

e. Progressive Surveillance. The Progressive technique of surveillance is used when extreme


caution is mandatory. It can be presupposed by the surveillants that the subject will resort to
every method it elude possible surveillance. It is a slow technique and limited to subject that
follow habitual daily routines.

Casing – is reconnaissance or surveillance of a building, place or area to determine its suitability for
intelligence use or its vulnerability in an intelligence operation.

It aids in the planning of an operation by providing needed information. It assists the agent
handler to install confidence in his agent during briefing phase by being able to speak knowingly about the
area of operation. Casing is also considered a security measure because it offers some degree of
protection for those operating in an area unfamiliar to them.

Objectives of Casing

1. Selection of safe house


2. Selection of dead drops
3. Selection of clandestine meeting place
4. Casing for communication
5. Casing for reception site
6. Casing for target analysis
7. Casing in preparation for search

METHODS OF CASING

a. Personal Reconnaissance – A personal reconnaissance of an area is the most


effective method and will produce the most information since you know just what you are looking for.
b. Map Reconnaissance– A map reconnaissance alone may not be sufficient but it can
produce a certain amount of usable information. From a map, it is possible to get a good survey of road
and street network.
c. Research – Such information can be acquired through research. Research
normally entails a study of unclassified sources such as local newspapers, periodicals, public bulletins,
telephone and city directories, radio and television broadcasts, and other available references.
d. Prior Information – Your unit will have on file reports from other activities within
your unit, and also from other intelligence units that may provide you with information. In addition, town
studies, geodetic surveys, etc., can provide you with valuable information.
e. Hearsay – This type of information is usually gained by the person operating in the
area of performing the casing job. Casing should always be done with your ears open when visiting such
places as restaurants, bars, places of amusement, and while riding on a public transport facility. Some
hearsay information maybe gained by discreet questioning of the people in the area.

DEVELOPMENT AND CONTROL OF CONFIDENTIAL INFORMANTS

1) Confidential Informant Defined – Confidential informant is an individual who supplies


information on a confidential basis with the understanding that his identity will not be
made known.

a) Scientific approach in criminal investigation can assist law enforcers


immeasurably, but there is always that one case wherein the crime
laboratory cannot help. This is the reason why investigators must know the
man on the street, the man who can supply information.
b) Law enforcers must develop confidential informants everyday

2) Need for Informants


a) Informants increase accomplishments in all areas of investigation.
b) Without confidential informants, the officer’s source of information is limited
to what he gets though formal interview.
c) Informants enable law enforcer to infiltrate the criminal element and help
lower criminal morale. Advance information improves crime prevention and
enables the police to find put the identity of transient hoodlums.

3) Where to Find Criminal Informants and Whom to Develop


a) Legitimate persons and criminals
Hoodlums, criminals, fences, bookies, barbers, bartenders,
poolroom and dancehall operators, prostitutes, madams,
pawnbrokers, cab drivers, bell hops, service station attendants,
waitress and others. A class in themselves are persons who had
been accused or suspected of a crime.
Persons engaged in certain occupation should be considered.

4. How to Develop Confidential Informants

a) Constant need

(i) No matter what our scientific development might be, there will always come that time
when we will need informants.

(ii) Development of confidential informants should therefore be a continuous process.

b) Evaluation of the individual being considered as possible informant:


(i) Does he have access to information?
(ii) Can he develop the trust of his associates?
(iii) Intelligence and physical courage
(iv) His criminal record and background
(v) His pattern of behavior
c)Basic considerations
(i) Contact must be made in a neutral place. The officer making the contact should not be in
uniform or in police vehicles. Contacts should be made in such a manner that the
informant’s association with the law enforcement agency will not be disclosed. Get the
informer away from his local habitat to a place where he is not known. Call him by phone
and let him set the time and place.
(ii) Plan the interview as to the type of “approach”
1.Return of favor- Even small favors can help
a lot in developing informants. These may be
extended in various ways.

2. Monetary consideration – there may be


items when an offer has to pay for information. One must make sure he gets his money’s worth. Do not
overpay or you will have a professional informant.

3. Appeal to prospect’s ego – Men on the beat (patrolmen/ investigators) have a good opportunity of
developing informants. Being kind and friendly to children, for instance, may gain him the children’s father
as an informant.

4. Development of “friendship” helps because the informant respects the officer to the possible informant
himself or his relatives.
5. Involvement in illegal activity – The illegal activity serves as pressure on the possible informant. The
attitude toward him, though, should be “put up or get out”

6. Fear motive – This is fear of the police or of his associates.

7. Revenge motive.

8. Perverse motives – To eliminate competition, for example.

9. Bad publicity – Especially applicable to businessmen.

(iii) Officer’s Ability


1. Develop an informant to the point that he really respects you. – Do not call your
informants a “stool pigeon” or a “stoolie” when talking to him.
2. Secrecy in contacts cannot be over-emphasized. – It helps maintain the confidence
of the informant. You may use fictitious names over the phone. Contact should be
discreet and the meeting place frequently changed.
3. The informant may expect a few favors in return. Make him understand that your
association with him does not give him the license to operate illegally. You must
have him understand also that he is not an employee of the police even though he
is being paid for the information. It may be necessary to hold some thing over his
head.
- Be sure that your informant does not brag about his
association with you.
- Make sure he is giving you good information. Test him with
facts you know.
- Do not allow yourself to be interviewed by an informant. Give
him the facts he needs to know, and nothing

4. Use of Informants
a) Maximum benefit- The confidential informant should be used for the
maximum benefit of the entire organization, not of only one (1) officer/ investigator.

b) A designated executive should aware of the identity of the informant. – At least two (2) individuals in
the law enforcement agency should know the identity of a confidential informant. This gives him the
feeling that he is really cooperating with the police. It is also possible that something might happen to you
which would mean the loss of the informant to the entire police force. Besides the officer who developed
the informant, it is suggested that the other be a rank-officer to give the informant a feeling of importance.

c) Consider a program within your respective commands for the development of informants.

(i) Keep records as to the ability of your men to develop informants.

(ii) Keep records as to the accomplishments of each of the informants. This should tell
you who among the informants should be discarded.

(i) Keep records as to fugitives apprehended, loot recovered and cases given to you.
(ii) Maintain a tickler system to review your informants’ contribution to your command.
Self Assessment 2.1

Post-Test - Multiple Choices

Use the separate paper for your answer. Analyze carefully the statements or questions before
answering by choosing the best or nearest answer by encircling the corresponding letter of your
choice

1. Is reconnaissance of a building, place or area to determine its suitability for intelligence use or its
vulnerability in an intelligence operation

a. Casing
b. Intelligence
c. surveillance
d. military intelligence

2. Development of _____ helps because the informant respects the officer to the possible informant
himself or his relatives
a. Informant
b. friendship
c. informer
d. perpetrator

3. One investigator is used to conduct the surveillance. It is best employed in a fixed surveillance
a. Casing
b. Intelligence
c. One-man surveillance
d. military intelligence

4. Is the monitoring of behavior, activities, or other changing information for the purpose of influencing,
managing, directing, or protecting people
a. Casing
b. Intelligence
c. One-man surveillance
d. Surveillance
5. Mercenary informants They provide information to the police for financial reward
a.Informant
b. friendship
c. informer
d. perpetrator
e. Mercenary informants
6. This type of operations is done when the gathering of information or document is secret or without the
knowledge of the person or organization to whom such information or document are to be used.
a. covert Operation
b. combat operation
c. tactical operation
d. counter intelligence
7. This type of operations is done if the information or documents are procured openly without regard as
to the whether the subject of investigation becomes knowledgeable of the purpose for which is being
gathered
a. covert Operation
b. overt operation
c. tactical operation
d. counter intelligence
8. Determination of the pertinence, reliability and accuracy of the information
a. Recording
b.Analysis
c.Evaluation
d.Distribution

9. Designed to answer the question “what does this information means in relation to the enemy
situation, weather and area of operation.

a. Recording
b. Analysis
c. Evaluation
d. deduction
10. Is conducted when a person, object or activity being watched move from one place to another
a. Casing
b. Intelligence
c. One-man surveillance
d. Surveillance
e. moving surveillance

 Let’s Test What You Have Learned


Instructions: Identify whether the following statements are true or false. Just write
T if the statement is true and correct the statement if it is false. Use the separate paper
for your answer.

_____1. Develop an informant to the point that he really respects you. – Do not
call your informants a “stool pigeon” or a “stoolie” when talking to him
_____2. Confidential informant is an individual who supplies information on a
confidential basis with the understanding that his identity will not be made
known.
_____3. Anonymous information should be disregarded and should not be pursued, so
long as it may be fruitful.
_____4. Being unkind and cruel to children, for instance, may gain him the children’s
father as an informant.
____5. Police information and police intelligence can help investigators to develop
patterns and civil associations in a facility

 Critical Thinking
o Why do criminology students, conducted a study about the
importance of Police Intelligence in understanding criminal
behavior? Cite instances that will show the benefits of his studies.

Answer Self-Check 2.2


Key to Correction

Multiple Choices True or False

1.a 1. T
2.b 2. T
3.c 3. F
4.d 4. F
5.e 5.F
6.a
7.b
8.c
9.d
10.e

You might also like