Comprehensive Notes in LEA
Comprehensive Notes in LEA
ADMINISTRATION
PRELIMINARY NOTES
Philippine Army
1936 – Commonwealth Act #88 created the State Police
1938 – Commonwealth Act #343 – reconstituted
Liberation Period
1945 - The MPD was reconstituted and placed
under American control. Col. Marcus Ellis Jones became the Chief of Police of
the MPD.
• Aug. 1966 – RA 4864 – Police Act of 1966 –
national police - the PC/INP became the nucleus of a united police force in
the country
• 1990 – R.A. 6975 – Creation of the Philippine
Most Recent
BOARD QUESTIONS
Police administration
Refers to the processes used in the organiztion
(POSDCRB/POSDC)
> POSDCRB
Planning - setting performance objectives
Organizing - dividing the work to be done
Staffing - filling the org with the right people/position
Directing - making decisions
Coordinating – interrelating various parts of work
Reporting – keeping executives informed
Budgeting – fiscal planning, accounting, and control
Approaches in Managing
Police Organizations
Classical Approach
“The more people arrested and thrown to jail, the more the
police organization is effective and efficient”.
Comparing the old and new concepts …
The Political Era
The Reform Era
The Community Era
The Political Era (1840-1930)
The police forces were characterized by:
Authority coming from politicians and the law
A broad social service function
Decentralized organization
An intimate relationship with the community
Extensive use of foot patrol
The Reform Era (1930-1980)
The police forces were characterized by:
Authority coming from the law and professionalism
Crime control as their primary function
A centralized and efficient organization
Emphasis on preventive motorized patrol and rapid response to
crime
The Community Era (1980’s-present)
Under this era of policing, police forces are
characterized by:
Authority coming from community support,
A government agency Police are the public and the public are the
police
for law enforcement
The Traditionalist The Community Oriented
PART THREE
PERSONNEL MANAGEMENT
(HUMAN RESOURCES MANAGEMENT)
POLICE PERSONNEL
IN of
Flow RE: R.A 8551
Personnel Career
Pointers:
RECRUITMENT PROCESS -
Citizenship
Note: Qualifications -
Morality
-
Eligibility
-
Education
SELECTION PROCESS -
Age
Note: Procedures/Tests -
Height
Pointers:
-
Agility
-
Weight
-
Medical
-
NP
-
Interview
APPOINTMENT
Note: Nature of Appointment
Appointing Authorities
TRAINING
Note: Standards of Training
Field Training
In Service Training
APPRAISAL
Note: Purposes
Standards of Evaluation
PROMOTION
Note: System of
promotion
Kinds of Promotion
ASSIGNMENT
Note: Purpose
Powers/Authorities
RETIREMENT
Note: Nature of
Retirement
PART FOUR
POLICE PATROL
(Management and Operations)
Why is patrol referred to as the “backbone” of police
organization?
Note:
- The Peel Principle
- Koban System, COPS, Community-Oriented
•
Prevention v.s. Repression
Prevention is the objective aimed towards ways and means to reduce the
desire of the human
being to commit crime. (proactive)
Note:
• Proactive measure (assurance of omnipresence)
• Police Visibility
What are the Methods of Patrol?
Beat Patrol
• Foot Patrol
VIPs
• Bicycle Patrol
Advantages & Disadvantages of
each patrol method
Sector Patrol (Motorized Patrol) Practical Applications
• Automobile Patrol
Related name/terminology
• Motorcycle Patrol
Historical events
• Aircraft Patrol (Helicopter and Fixed Wing)
all traffic laws and rules and does not normally use its
flashing lights and siren while on its way to the scene
• URGENT CALL – also requires the responding police car to
observe all traffic rules and does not use its
flashing lights or siren.
• EMERGENCY CALL – In most cases, this category
work
initiating action to cope with the changing
the responsibility of the C/PNP and other chiefs of the different units or
headquarters within their area of jurisdiction to achieve the
objectives or mission of the police organization.
What are the basic considerations
in Police Planning?
Primary Doctrines
According to coverage
Local Plan
Regional Plan
National Plan
According to Time
Examples
Police Action Plan on the Strategy DREAMS
P-O-L-I-C-E 2000
Intermediate or Medium Range Planning
It relates to plans, which determine quantity and quality
efforts and accomplishments. It refers to the process of
determining the contribution on efforts that can make or
provide with allocated resources.
Examples
Master Plan Sandigan-Milenyo (Anti-Crime Master Plan)
Master Plan Sandugo (Internal Security Operations)
Master Plan Banat (Anti-Illegal Drugs Master Plan)
Master Plan Sang-ingat (Security Operations Master Plan)
Master Plan Saklolo (Disaster Management Master Plan)
Sangyaman (Protection and Preservation of Environment,
Cultural Properties, and Natural Resources Master Plan)
Operational or Short Range Planning
Functional Plans - include the framework for the operation of the major
functional units in the organization, such as patrol and investigations.
Operational-efficiency, effectiveness, and
productivity plans are essentially the measures or
comparisons to be used to assess police activities and behavior (outputs) and
results (outcomes).
Time-specific Plans are concerned with a specific purpose and conclude when
an objective is
accomplished or a problem is solved.
Procedural Plan – guides routine and field
Operations (Ex. Field Procedures/HQ Procedures)
Tactical Plans – these are the procedures for
coping with specific situations at known locations such as plans for dealing
with an attack against buildings, attack against the PNP headquarters by
lawless elements. Plans shall be likewise be made for blockade and jail
emergencies and for special community events, such as longer public
meetings, athletic contests, parades, religious activities, carnivals,
strikes, demonstrations, and other street affairs.
Operational Plans – These are plans for the operations of
special divisions like the patrol, detective, traffic, fire and
juvenile control divisions.
Extra-office Plans – Plans made to organize the
community to assist in the accomplishment of objectives in
the fields of traffic control, organized crime, and
juvenile delinquency prevention.
Field Operations
• Oplan Salikop – CIDG Strategic Plan against Organized Crime Groups (OCG)
• OPLAN BANTAY DALAMPASIGAN that sets forth the operational guidelines on the
heightened security measures and sea borne security patrols.
POLICE INTELLIGENCE
AND SECRET SERVICE
“If you know the enemy and know yourself, you need not fear the
result of a hundred battles.”
“If you know yourself and not the enemy, for every victory, you are a
fool who will meet defeat in every battle” - SUN TZU
• Capabilities – form a police/military standpoint, enemy capabilities are courses of action which
the enemy can adopt and which, if adopted, will influenced the
accomplishment of the friendly mission, either favorable or not. From a broader national
standpoint, capabilities of a nation are the available, workable, courses of action to accomplish
national objectives.
MOSES
One of the first recorded formalized intelligence efforts, with format,
can also be found in the Holy Bible Numbers 13:17
“And Moses sent them to spy out the land of Canaan and said unto them,
get you up this way southward, and go up into the mountain; and see the
lands, what it is; and the people that dwell therein, whether they are
strong or weak, few or many; and what the land they dwelt in, whether
in tents, or in strongholds; and what land is; whether it be fat or lean,
whether there be wood therein, or not. And be of good courage and bring
of the fruit of the land.” The scriptures also named the twelve
intelligence agents whom the Lord directed Moses to sent into the
land of Canaan and records that “all those men were heads of the
children of Israel.”
THE 12 MEN SENT BY MOSES TO SPY CANAAN
Sun –Tzu
A Chinese philosopher, creator of the “The Art of War”
“Information must be obtained from men who knew the enemy
situation.”
“Know thy enemy and know yourself, you need not fear the results of
a hundred battles”
“If you know yourself and not the enemy, for every victory, you are a
fool who will meet defeat in every battle.”
Alexander the Great
Akbar
He was known to be the sagacious master of the Hindustan. He
employed more than 4,000 agents for the sole purpose of bringing him
the truth that his throne might rest upon it.
Genghis Khan
Napoleon Bonaparte once said, “One Spy in the right place is worth
20,000 men in the field”. He organized two Bureaus of Interest: Bureau
of Intelligence – which consolidate all incoming information regarding
the enemy for presentation to the emperor and to obtain information
as desired, and Topographic Bureau – which maintains a large map
which covers the latest information regarding both enemy and friendly
forces. He maintained Military Intelligence and Secret Political Police
Service all over Europe. His main arm was “Spy against spy” concept.
Frederick the Great
• Karl Schulmeister
He was Napoleon’s eye, Napoleon’s military secret, born on August 5, 1770. He began his
career in offensive espionage under a cover role. He was able to infiltrate the Austrian
General Staff.
• Wilhelm Stieber
He incorporated intelligence in the General Staff Support System. He further device
military censorship and organized military propaganda. He introduced military
censorship and organized military propaganda. He works as a census taker and
developed informal gathering of data.
• Alfred Redl
He was one of the most brilliant intelligent agents. Though a homosexual, he became
Chief of the Austro – Hungarian Secret Service. He became a double agent of Russia.
Brahma Kautilya
He was member of the New York Police Department in early 1900, he was the
head of the Italian Squad. Through extensive intelligence network, he was
credited to smash and neutralization of the Black Society.
• Federal Bureau of Investigation
First established in 1908 as an investigative arm of the U.S. Department of Justice and became
what is known as the F.B.I. under its first director John Edgar Hoover in 1924. On September 6,
1939 by a presidential directive, it came to its responsibility the task of a domestic intelligence.
• Central Intelligence Agency - The agency was created under the US National Security Act of
1947. It was the Central Intelligence group established during the time of President Truman in
January 1946. The CIA was under the National Security Council.
• Committee for State Security - Russia - The Intelligence agency known as the KGB - Komitet
Gosudarstvennoy Bezopasnosti (KGB)
• Mossad – Israel
• 1900 – Europe powers developed modern staff systems and place intelligence on the same level with
personnel, operations and logistics. Intelligence then functioned in time of peace and war.
Intelligence during this period, concentrated on information about the armed forces of the enemy
and their capabilities. AIRCRAFT was introduced as a method of conducting aerial reconnaissance.
WIRELESS TELEGRAPH was used wherein CODES AND CIPHERS were applied. ARMY
INTELLIGENCE rapidly expanded during this period.
• GERMAN INTELLIGENCE – gained a high reputation for offensive effectiveness throughout Europe
but declined at the outset of the war.
• BRITISH INTELLIGENCE – succeeded greatly by means of censorship and its CODE ROOM combined
with skillful use of COVERT agents.
• GERMAN INTELLIGENCE – started the war with the world’s best organized intelligence
service through advance preparation of intelligence accompanied by troop movements.
GERMAN INTELLIGENCE WEAKENED by the attitude of the Officer Group wherein they
subordinated intelligence to operation and did not regard intelligence assignment
worthy of a soldier.
• JAPANESE INTELLIGENCE – failed because it was not provided with sufficient number of
trained personnel to assemble and evaluate the mass of materials which were collected
although Japanese Intelligence was involved in short war and defensive in nature.
• BRITISH INTELLIGENCE – the delay in the use of German V-BOMB against them was
their main achievement during this time.
• In 1942 – a female special agent was able to transmit vital information concerning the
activities and installations of the main research station at Penemuenda. Its intelligence
failed in the defeat of GENERAL MONTGOMERY’S forces at ANNHEIM.
• US INTELLIGENCE – In 1941, The US Strategic Service was established to research and analyze
military, political and economic information as it affected the security of the country. US JOINT
CHIEFS OF STAFFS – was organized to act in support of the army and the navy in the collection and
analysis of strategic information and to be responsible for the planning and operation of special
services. US greatest contribution to intelligence was the development of the AMPHIBIOUS
WARFARE where coordination of many types of intelligence activities was required to provide
adequate knowledge of the successful operation of a complex military force transported over water
with the objective of establishing itself on an enemy – held shore against opposition. US successes in
WW II were based on personnel drawn from CIVILIAN POPULACE, BUSINESS AND PROFESSIONAL
MEN AND WOMEN.
• CHINESE INTELLIGENCE – In 1932, TAI LI – organized the China’s Secret Police to conduct espionage
and counterespionage against Japanese Spies and Chinese communist.
• SOVIET INTELLIGENCE – AMTORG was organized for the purpose of purchasing all kinds of
materials for the Soviet Union.
• SMERSH or “DEATH TO SPIES” was organized during the war as counterintelligence concerned with
disaffection among Soviet troops and anti-communism in any form. Its five major divisions are:
Administration, Operation, Investigation, Prosecution, and Personnel.
POST WAR PERIOD: The superpowers
Intelligence Defined
• Webster defines intelligence as the capacity for understanding and for other forms of
adaptive intellect of behavior; the mind in operation; the power of meeting any situation,
especially a novel situation, successfully by proper behavior adjustments; the ability to
apprehend the interrelationships of presented facts in such a way as to guide action
towards goal; knowledge of an event, circumstances, etc., received or imparted; the
gathering or distribution of information; the staff of persons engaged in obtaining such
information.
• Line Intelligence – it is an intelligence activity that has the immediate nature and value
necessary for more effective police planning and operation.
• Undercover Work – is an investigative process in which disguises and pretext cover and
deception are used to gain the confidence of criminal suspects for the purpose of determining
the nature and extent of any criminal activities that maybe contemplating or perpetuating.
Functional Classification
of Police Intelligence
• Criminal Intelligence – refers to the knowledge essential to
the prevention of crimes and the investigation, arrest, and
prosecution of criminal offenders.
• Internal Security Intelligence – refers to the knowledge
essential to the maintenance of peace and order.
• Public Safety Intelligence – refers to the knowledge
essential to ensure the protection of lives and properties.
Forms of Intelligence
• Armed Force Intelligence – deals with the armed forces of the nation. It
includes the position of the armed forces, the constitutional and legal basis of its
creation and actual role, the organizational structure and territorial disposition,
and the military manpower recruitment and Order of Battle
• Security Intelligence – means that the total sum of efforts to counsel the national policies, diplomatic
decisions, military data, and any other information of a secret nature affecting the security of the
nation form unauthorized persons. It is an effort to deny information to unauthorized persons by
restricting to those who are explicitly authorized to possess it.
• Counter-Intelligence - counter intelligence is the organized effort to protect specific data that might
be of value to the opponent’s own intelligence organization. Some of its functions are: Censorship – of
the following: correspondence, broadcast, telecast, telephone conversations, telegrams and cables,
etc., prevention of the dissemination of any information that might aid an opponent; maintenance of
files of suspect; surveillance of suspects; mail reading, wire tapping and recording; infiltration of the
enemy intelligence organized to procure information about its method, personal, specific operations
and interest.
PHASE 1
COLLECTION OF
INFORMATION
PHASE 4
MISSION
DISSEMINATION AND
USE OF INFORMATION
PHASE 3
PROCESSING THE
COLLECTED INFORMATION
PHASE 1
Planning the Collection Effort
• This phase of the cycle is concerned with the examination and collation of all collected
information.
Collection – organization of raw data and information into usable form; grouping similar
items of information so that they will be readily accessible.
Recording – is the reduction of info into writing or some other form of graphical
representation and the arranging or this info into writing or some form of graphical
representation and the arranging of this into groups of related items. Police log book and
Journal, Intel-work Sheet - Intel Files, Situation Maps - Rouges Gallery, Modus Operandi
Files Evaluation – examination of raw information to determine intelligence value,
pertinence of the information, reliability of the source and agency, and its credibility or
truth of information.
Evaluation is the determination of the pertinence of the info to the operation, reliability of
the source of or agency and the accuracy of the info.
RELIABILITY ACCURACY
A - Completely 1 - Confirmed by
reliable other
B - Usually reliable 2 - Probably true
C - Fairly reliable 3 - Possibly true
D - Not usually 4 - Doubtfully true
reliable 5 - Improbable
E - Unreliable 6 - Truth cannot be
F - Reliability cannot judged
be judged
As to Source of Info
T- Direct Observation by Comdr/Chf of Unit
U- Report by DPA or Resident Agent
V- Report by PNP/AFP Troops
W- Interrogation of Captured Enemy
X- Observation of gov’t/civilian employee
Y – Observation from populace
Z- Documentary
PHASE 4
Dissemination & Use of Information
This phase of the cycle refers to the activities of transferring the
processed information to the proper users, most particularly the
authority that requires the activity. Processed information can be
disseminated through annexes, estimates, briefing, message, reports,
overlays, and or summaries.
Methods of Dissemination
• Fragmentary orders from top to bottom of the command
• Memorandum, circulars, special orders
• Operations order, oral or written
• Conference – staff members
• Other report and intelligence documents
• Personal Contact
Who are the users of intelligence?
• National leaders and military commanders – formulation and
implementation of national policies.
• Advisors and Staff – preparations of plans and estimates
• Friendly nations or other branches of the armed forces.
• Processor – basis for evaluation and interpretation.
• Head / chairman of an organization
• Any person with authority for purposes of planning.
INFORMATION
AND ITS SOURCES
INFORMATION IS THE LIFE-BLOOD
OF INTELLIGENCE
NO INFORMATION = NO INTELLIGENCE
• Techniques of Approach – the purpose is to gain the cooperation of the source and
induce him to answer questions which will follows.
• The “Open Techniques” – the interrogator is open and direct in his approach and
makes no attempts to conceal the purpose of the interrogator. It is best employed
when the interrogee is cooperative. It is frequently used at the tactical level where
time is a major interrogator.
• The “Common Interest” Technique – the interrogator must exert effort to impress
the interrogee of their common interest. The interrogator must look for he point out
the real advantages the interrogee will receive if he cooperates
• Record File (we know all technique) – the interrogator prepare a file on the source
listing all known information (record should be padded to make it appear to be very
extensive). The information must contain the life history of he interrogee to include
his activities and known associates (Party- bio-data of the interrogee is important).
The “we know all” s used in conjunction with the record file. During the approach,
the interrogator may ask the interrogee about a subject, if he refuses to cooperate,
the interrogator may provide the answer in order to impress him that the
interrogator knows him very well (all is known).
• Exasperation – Techniques (Harassment) – effectively employed against hostile type
interrogee. The interrogator must be alert because the interrogee may fabricate
information to gain relief from irritation (monotype). Subject Interrogee is placed in a
longer period of interrogation without rest or sleep. The interrogator permits the source
to go to sleep and subsequently awaken for another series of questioning (this is done
repeatedly). After many repetitions, the interrogee will be exasperated and will finally
cooperate hoping that he can be allowed to rest or sleep. Ask a question, listen to a reply
and then ask the same question repeatedly (use a tape recorder if possible). The purpose
is to bore the interrogee thoroughly until he begins to answer questions freely to end the
harassment.
• Opposite Personality Technique – also known as “Mutt and Jeff”, “Threat and Rescue”,
“Bud Guy – God Guy’, “Sweet and Sour”, “Sugar and Vinegar”, “Devil and Angel”. Use of
two (2) interrogators playing opposite roles.
• Egotist Techniques (Pride and Ego) – usually successful when employed against an
interrogee who has displayed a weakness or a feeling of insecurity. You may reverse the
technique by complimenting the interrogee in hopes of getting him to admit certain
information to gain credit. Described him as the best person, superior or comrade.
• “Silent” Technique – employed against nervous or the confident
type of interrogee. Look out the interrogee squarely in the eye
with sarcastic smile (force him to break eye contact first). He may
ask questions but the interrogator must not answer. Patience is
needed until the interrogator is ready to break silence.
INDUSTRIAL
SECURITY MANAGEMENT
(WITH R.A 5487)
FOCUS / VIP’S
PADPAO – stands for the Philippine Association of Detective and Protective
Agency Operators. It is a non-stock private organization, and it was
formed in May 1958.
R.A. 5487 – an act that regulates the organization and operation of the
private detective, watchmen or security guard agencies. It is known as
Private Security Agency Law.
Guard Services – for local - it directs the Chief of PNP to issue rules and
regulations concerning the implementing rules of
R.A. 5487 - 2003 Revised Rules and Regulations Implementing R.A. 5487 as
amended.
BASIC CONCEPTS OF SECURITY
• Purpose of Security – is to protect the establishment
• Enemy agent
• Traitorous person
• Irresponsible person
• Types of Sabotage
• Mechanical Sabotage
• Psychological Sabotage
• Mechanical Sabotage – is an act wherein they used the object or
substance within the area of an establishment.
• Warded lock- old type where the key is open and be seen through
• Disc tumbler lock- used in car doors, desk, drawers, etc.
• Pin tumbler lock –widely used I doors of offices and houses irregular in
shape and the key
• Lever lock- used in locker
• Combination lock- has 3 deals which must be aligned in proper order before
the lock will be open
• Code-operated lock- this opens by pressing a series of numbers buttons in
proper sequence
• Card-operated lock- coded cards whether notched, embossed or
embedded with magnetic-fuels are inserted to open
• Padlock- a pad and a lock combination
• Terminologies: