Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

OUR LADY OF THE PILLAR COLLEGE-SAN MANUEL INCORPORATED.

DISTRICT 3, SAN MANUEL, ISABELA

COLLEGE OF CRIMINOLOGY
ACADEMIC YEAR 2022-2023
FINALS

SPECIALIZED CRIME INVESTIGATION


NARRATIVE REPORT
SUBMITTED BY: AJAY FILE G. PAMMIT
SUBMITTED TO: WILLIAM MAPATAC
INTRODUCTION
Special Crime Investigation deals with the study of major crimes based on
the application of special investigative technique. The study concentrates more on physical
evidence, its collection, handling, identification and preservation in coordination with the
crime laboratory. Special Crime Investigation involves a close relationship between the
prober in the field and the crime laboratory technician. They work together as a team,
reacting to and extending one another’s theories and findings both working patiently and
thoroughly to solve a crime from their investigative discoveries. The present criminal justice
system in our country, the court relies more on physical evidence rather than extra-judicial
confession.
CHAPTER 1
CRIME AGAINST ROPERTY
Are crimes that are directed to a person’s belongings, intellectual properties and
property and it is any action whether by theft or destruction and without permission top the
rightful owner to intentionally permanently deprived, or risk depriving individual or
commercial entity form their physical or virtual property.
OBJECTS OF CRIME AGAINST PROPERTY
ROBBERY, BRIBERY and BURGLARY
This objects are aim to obtain money, property, or some other benefits arson.
ROBBERY
Is a theft accomplished by violence or the threat of violence, it almost requires the present of
a victim who is threatened with bodily harm.
ELEMENTS OF THE CRIME OF ROBBERY
The personal property belongs to another
The unlawful taking of that property
With intent to gain (ANIMUS LUCRANDI)
Violence against intimidation of any person or force upon things
The offense can be committed by a band or with the use of firearms on a street, road or alley
or by attacking a moving train, street car, motor vehicle, or airship or by entering or taking
the passenger conveyance by surprise and ;
Other analogous acts
FIVE CLASSES OF ROBBERY WITH VIOLENCE OR INTIMIDATION
Robbery with homicide
Robbery with rape, intentional mutilation, or the physical injuries
Robbery with the physical injuries
Robbery committed with unnecessary violence or with physical injuries
Robbery in other case
INHABITED HOUSE means any shelter, ship or vessel constituting the dwelling of one or
more persons, even though the inhabitants are temporarily absent from it when the robbery is
committed.
BRIGANDAGE brigands, also known as highway robbers, or a group of more than three
armed persons forming a band of robbers for the purpose of committing robbery in the
highway, or kidnapping persons for the purpose of extortion.
THEFT is committed by any person who, with intent to gain but without violence against or
intimidation of persons nor force upon things shall take personal property of another without
the latter’s consent.
ASPORTATION is the carrying away of someone else property that is an element of larceny.
USURPATION is the occupation of real property or any real rights in the property
belongings to another by means of violence against or intimidation of a persons.
CULPABLE INSOLVENCY is the fraudulent disposal or concealment and or disposal of
properties of a debtor to defraud his creditors.
SWINDLING also known as Estafa, it is an act of defrauding another person’s by any means
of unfaithfulness or abuse of confidence and deceit or fraudulent acts.
SYNDICATED ESTAFA is a swindling that is committed by a syndicated consisting of five
or more persons formed with the intention of carrying out the unlawful or illegal acts,
transactions, enterprise or scheme and etc.
CHATTEL MORTAGE is a conditional sale of personal property as security for the payment
of a debt, or the performance of some other obligation specified therein the condition being
that the sale of shall be void upon the seller paying to the purchaser of some money or doing
some other act named.
MALICIOUS MISCHIEF are attempts against another’s property inspired sometimes by
hatred or a desire for revenge and sometimes by the mere pleasure of destroying.
BOUNCING CHECKS is an act of making or drawing and issuance of check without
sufficient funds or credits.
ARSON is the intentional burning or setting fire the property of another or own property
under circumstances which expose to danger the life or property of another.
LEVELS OF OFFENSE FOR ARSON
Attempted arson – the commission of the felony directly by over acts but does not fulfill all
the acts of execution.
Frustrated arson – perform all the acts of execution necessary to produce the felony but the
felony was not produced by the reason of the timely arrival of the victim.
Consummated arson – already perform all the acts of execution necessary to produce the
felony.
LEGAL PROVISIONS ON CRIME AGAINST PROPERTY
REVISE PENAL CODE commonly known as the revise penal codes of the Philippines and
an act revising the penal code and other penal laws of the Philippines, it contains the general
penal laws of the Philippines.
SPECIAL PENAL CODE is one the source of the Philippine criminal law, aside from the
revised penal code. There are special penal laws that deal with crime against property, here
are some of the special penal laws pertaining to property crimes.
BATAS PAMBANSA BILANG 22 also known as Anti-Bouncing check law. An act
penalizing the making or drawing and issuance of a check without sufficient funds or credits.

CHAPTER 2
CYBER CRIME
Also known as computer crime, is the use of computer as an instrument to further
illegal ends. They are criminal offenses committed via a internet or otherwise aided by
various forms of computer technology.
TYPOLOGIES OF CYBER CRIMES
CYBER DEPENDENT CRIMMES are crimes that can only be committed through computer,
computer networks, or other form of ICT.
CYBER ENABLED CRIMES are traditional crimes that are increased in their scale or reach
by the use of computers, computer networks, or other form of ICT.
CYBER ASSISTED CRIMES are crimes in which the use of computer in an incidental
aspect of the commission of the crime but may afford evidence of crime.
DICTM – Directorate for Information and Communication Technology
INFORMATION AND COMMUNICATION TECHNOLOGY refers to the totality of the
electronic means employee to systematically collect, process, store, present, and share
information to end users in support of their activities.
CYBER TRESPASS – crimes that involves crossing or violating boundaries of other people
digitally.
CYBER DECEPTIONA AND THEFT – this involves offenses such as online fraud and IP
theft.
CYBER PORN AND OBSCENITY – this involves the exploitation of the children and
distribution of porn materials through the internet.
CYBER VIOLENCE - this refers to the kind of emotional violence that can be enacted online
such as bullying or harassment.
ILLEGAL ACCESS refers to the access to the whole or any part of a computer system
without right (RA10175, sec.4).
ACCESS – refers to the instructions, communication with, storing data in, retrieving data
form, or otherwise making us of any resources of a computer system or communication
network.
COMPUTER SYSTEM – refers to any devise or group of interconnected or related devices,
one or more of which, pursuant to a program, performs automated processing of data.
ILLEGAL INTERCEPTION – refers to the interception made by technical means without the
right of any non-public transmission of computer data to form or within a computer system
including electromagnetic emissions.
COMPUTER DATA – refers to any representation of facts, information or concepts in a form
suitable for processing in a computer system.
COMPUTER VIRUS is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another.
BOOT SECTOR VIRUS is a type of virus can take control when you start or boot your
computer.
WEB SCRIPTING VIRUS is a type of virus exploits the code of web browsers and web
pages.
BROWSER HIJACKER is a type of virus hijacks certain webs browser functions, and you
may be automatically directed to an unintended website.
RESIDENT VIRUS is a generally term for any virus that insert itself in a computer system’s
memory.
DIRECT ACTIONS VIRUS is a type of virus comes into actions when you execute a file
containing a virus.
CYBERSQUATING – refers to the acquisition of a domain name over the internet in bad
faith to profit, mislead, destroy reputation, and deprives other from registering the same.
CYBERSEX – refers to the willful engagement, maintenance control, or operation, directly
or indirectly, of any lascivious exhibition of sexual organs or sexual activity.
LIBEL – is a libel public and malicious imputation of a crime, or of a vice or defect, real or
imaginary, or any act or omission, condition, status, or circumstances tending to the cause the
dishonor etc.
REPUBLIC ACT No.7610 – also known as the SPECIAL PROTECTION OF CHILDREN
AGAINST, EXPLOITATION AND DISCRIMIMNATION ACT.
CHILD TRAFFICKING is the act of trading or dealing with children including, but not
limited to, the act of buying and selling of a child for money.
PHOTO OR VIDEO VOYEURISM – refers to the act of taking photo or video coverage of a
person or a group of persons performing sexual act or any similar activity.
REPUBLIC ACT No.8484 is an act regulating the issuance and use of access devices and
prohibiting, and penalizing fraudulent acts committed in relation to access device.
SKIMMING – or copying or counterfeiting any credit card, payment card or debit card, and
obtaining ay information therein with the intent of accessing the account and operating the
same whether or not cash is withdrawn.
CRIMINAL ACTS IN RELATION TO DATA PRIVACY
Unauthorized processing of personal information and sensitive personal information.
Accessing personal information and sensitive personal information due to negligence
Improper disposal of personal information and sensitive personal information
Processing of personal information and sensitive personal information for unauthorized
purposes
Unauthorized access or intentional breach
Concealment of security breaches involving sensitive personal information
Malicious disclosure Unauthorized disclosure.

CHAPTER 3
RULE OF EVIDENCE
EVIDENCE
Is the means sanctioned by the rules of court, of ascertaining on a judicial proceeding
the truth respecting a matter of Fact.
OBJECT OR REAL EVIDENCE – also known as the physical evidence, it is any type of
evidence that is real or has an objective existence.
THE CRIME SCENE – is the focus of the preliminary investigation and also the primary
source of physical evidence.
THE VICTIM – is a potential source of physical evidence, particularly in the case of sex
crimes.
THE SUSPECT – it can be prime source of physical evidence, transfers of evidence readily
occur and must be sought out on both the suspect.
DEMONSTRATIVE EVIDENCE – usually in the form of charts and diagrams, demonstrate
or illustrate the testimony of a witness.
DOCUMENTARY EVIDENCE – consist of writing or any material containing letters,
words, numbers, figures, symbols or other modes of written expressions.
PATROL EVIDENCE RULE – also called parol evidence. It bars evidence of any agreement
made before or at the same time as the actual written agreement, which were not included in
the final written agreement.
TESTIMONIAL EVIDECE – is where a person take the stands and answer the questions
about a case. It can be help in understanding motives or explaining those things found at the
crime scene.
ADMISSIONS is the act, declaration or omission of a party as to relevant fact may be given
in evidence against him.
CONFESSION is the declaration of an accused acknowledge his guilt of the offense charged
or of any offense necessarily included therein may be given in evidence against him.
HEARSAY RULE is an exclusionary rule, prohibiting hearsay or out of court statements
offered as proof of that statement from being admitted as evidence because of the inability of
other party to cross-examine the maker of the statement.
DYING DECLARATION – refers to the declaration of dying person
DECLARATION AGAINST INTEREST – statement against interest, sometimes called
admissions or confessions.
ACT OR DECLARATION ABOUT PEDIGREE – the act or declaration of a person
deceased, or unable to testify, in respect to the pedigree of another person.
A LAY WITNESS – it is a person who watched certain events and describes what they saw.
AN EXPERT WITNESS OR A SPECIALIST – is someone who is educated in a certain area.
They testify with respect to their specialty area only.
A CHARACTER WITNESS – someone who knows the victim, the defendant or other person
involved in the case.
CHAPTER 4
CRIME AGAINST PROPERTY INVESTIGATION
INVESTIGATION
Is an inquiry, judicial or otherwise, for the discovery and collection of facts
concerning the matter or matters involved? It is the process of eliciting, inquiring, soliciting
and getting vital information/facts/circumstances in order to establish the truth.
CRIME INVESTIGATION is an assembled of methods by which crimes are studied and
criminal apprehended.
SPECIAL CRIME INVESTIGATION is a special study of modern techniques in the
investigation of serious and specific crimes including murder, homicide, rape, abortion,
robbery, arson kidnapping, blackmail, carnapping and criminal negligence.
ROBBERY INESTIGATION – under revised penal code article 293-298, the act of gaining,
taking any personal property belonging to another by means of violence or intimidation of
any person, or using force upon anything is guilty of robbery.
THE EVIDENCE NEEDED TO FILE THE CRIME OF ROBBERY ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
ENTRY ROUTE – After a robbery, it is important to investigate how the offender got in. it is
important to find the entry, which is not necessary to a door.
ASK THE VICTIM – Find out from the victim what has been stolen and where are the traces
being moved by the perpetrator.
LATENT FOOTWEAR PRINTS – Collect all the paper and then look for footwear prints on
the Paper at your unit or send the papers to the crime laboratory for investigation.
TYPES OF EVIDENCE IN CONNECTION WITH ROBBERIES

Hair

Blood and saliva

Material fits

Video film or still film

Weapons, bullets and causes

Fibers

Clothes

Tool marks

Fingerprints

Explosives

Footwear and gloves prints, tire marks

Glass and paint

Fibers

BRIGANDAGE INVESTIGATION (article 306-307) – Revised Penal Codes of the


Philippines, and the Anti-Piracy and Anti-highway robbery law of 1974, criminalized the act
of committing robbery in the highway, or kidnapping persons with the purpose of extortion or
to obtain ransom or any other purposes to be attained by means of force and violence by more
than three armed person or band of robberies.
THE EVIDENCE NEEDED TO FILE A CRIME OF BRIGANDAGE ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
THEFT INVESTIGATION – Is committed by any person who, with intent to gain but
without violence against or intimidation of persons nor, force upon things shall take persons
property of another without the latters of consent.
THE EVIDENCE NEEDED TO FILE THE CRIME OF THEFT ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
USURPATION – is the occupation of real property belonging to another person’s by means
of violence or intimidation?
THE EVIDENCE NEEDED TO FILE THE CRIME OF USURPATION ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
CULPABLE INSOLVENCY – also known as fraudulent insolvency
THE EVIDENCE NEEDED TO FILE THE CRIME OF CULPABLE INSOLVENCY ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
ESTAFA – Also known as swindling is an act of defrauding another person by unfaithfulness
or abuse of confidence; deceit or fraudulence acts.
THE EVIDENCE NEEDED TO FILE THE CRIME OF ESTAFA ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
BASIC METHOGS OF FIRE INVESTIGATION
Preservation of the fire scene
Examination of the fire scene
Recording the fire scene
Fire scene sketch
Physical evidence examination and testing
Source of information
TAPE RECORDED STATEMENTS – it should be made in permanent recording, for the
preservation to avoid any alterations and to ensure the availability to the court.
SHORTHAND NOTES – the stenographer should be introduced to the subject. Some
investigation request the subject to initial all pages of the shorthand notes.

FINAL REPORT ON ARSON SHOULD INCLUDE THE FF;


Case number
Date of reports
Name, tittle, address of persons requesting investigation and date of request
Subject; owners or occupants; and personal circumstances
Date and hour of fire alarm
Weather conditions
Complete and detailed description of building
Location of loss
Occupants
Fire history
Insurance
Evidence
Photographs
Fingerprints
Suspects
Motives
Modus operandi
Property
Witnesses
Financial reports
Court action
Assisting officers
CHAPTER 5
CYBER CRIME INVESTIGATION
Is the process of investigating, analyzing and recovering data for digital evidence of a crime
This helps the investigator determine the perpetrator of a cybercrime and their intent.

Anti Cybercrime Agencies in the Philippines in response to the challenges of cybercrime the
Philippines enacted its first law regulating the internet on June 14 2000 Republic act No.8792
this also known as the Philippine Electronic Commerce Act of 2000.
National Computer Emergency Response Team is a division under the Cybersecurity Bureau
of the Department of information and technology.
Department of justice office of cybercrime was created under Republic act No. 10175 the
cybercrime prevention act of 2012 .
National Bureau of investigation Cybercrime Division is tasked to investigate all cyber
related crimes punishable under Cybercrime Prevention Act and related laws.
PNP Anti- cybercrime Group is a national operational support is Unit primarily responsible
for the implementation of pertinent Philippine law on cybercrimes and advocating the anti-
cybercrime campaign of the PNP.
Computer Crime response is the actual police intervention in a computer crime incident
where the acquisition of matters of evidentiary value is traceable within the computer’s
hardware, software, and its network.
The importance of this investigation is that they help people who suffered from computer
crimes and surely they are able to locate or to know who and what is the intent of the
perpetrator.
CHAPTER 6
INTERROGATION AND INVESTIGATIVE INTERVIEW
INTERROGATION
Is a process of questioning by which police obtain evidence. The purpose of
interrogation is to elicit from the suspect or from his or her relatives or associates information
that they may be surprising in order to protect the suspect from being subjected to criminal
prosecution.
INTERVIEW – Is defined as a structured conversation where one person or the “interviewer”
seeks to gather information from another or the “interviewee” as part of any investigation or
intelligence operation.
INVESTIGATIVE INITERVIEWING – Is a technique develop by practitioners to response
to the large body of scientific evidence that abusive and coercive techniques elicit unreliable
information.
REID METHOD – Also known as the “the reid technique of interviewing and interrogation”.
Is the interrogation technique widely used by police departments.
FACTUAL ANALYSIS – It is an inductive approach where each individual suspect is
evaluated with respect to specific observation relating to the crime. It relies not only on crime
scene analysis, but also on information learned about each suspect.
BEHAVIOR ANALYSIS APPROACH – It is a non-accusatory question and answer session,
involving both standard investigative questions and structured ‘behavior provoking’
questions to elicit behavior symptoms of truth or deception from the person being
interviewed.
9 STEPS OF INTERROGATION
Direct, positive confrontation
Theme development
Handling denials
Overcoming objections
Procurement and retention of suspect’s attention
Handling the suspect’s passive mood
Presenting an alternative question
Having the suspect relate details of the offense
Converting an oral confession to a written confession
PEACE METHOD – Peace model (Planning and preparation, engage and explain, account,
closure, evaluation), develop in united kingdom in response to a number of documented
forced confession and associated wrongful conviction in 1980’s.
PLANNING – refers to the process of getting ready to interview, both mentally and
strategically.
PREPARATION – covers what needs to be ready prior to the interview such as the location
of the interview, the environment, as well as technical and administrative matters.
OPEN ENDED QUESTIONS – refers to the question that allows the suspect to reply with
longer,more detailed responses and lack direction from the interviewer.
CLOSED QUESTIONS – refers to the questions which requires more definite and distinct
answers. (6 cardinals of questioning)
FORCED CHOICE QUESTIONS – refers to the question that greatly restrict the possible
answers to those what you have determined.
MULTIPLE QUESTIONS – refers to the questioning where the interviewer asks more than
one question at the same time. This can easily confuse an interviewee ad make the answers
given equally confusing the interviewer.
LEADING QUESTIONS – refers to the question that induce a particularly reply and may be
judged to have manipulated the interview.
MENDEZ METHOD – Also known as the “New Principles on Effective Interviewing for
Investigations and Information gathering” it is a concrete alternative for interrogation
methods that rely on coercion to extract confessions.
KINESIC INTERVIEW METHOD – the study of kinesics focused on the observable
outward physical behavior of the body in order to ascertain the person current emotional state
and the role of the body plays in communicating the information.
PRACTICAL KINESIC ANALYSIS PHASE – aim to observe and analyze the suspect’s
behavior in order to determine the subject’s truthful and deceptive behavior or at least to
determine those areas most sensitive to the subject.
5 WAYS TO RECOGNIZED THE CUES OF TRUTHFUL AND DECEPTIVE BEHAVIOR
GENERATED BY THE SUBJECT
Verbal cues
Practical kinesic statement analysis
Body language cues
Kinesic subject control
Confession behaviors
PRACTICAL KINESIC INTERROGATION PHASE – involves the interviewer determining
the subject’s frame of mind in response to the interview stress. Also helps the interviewer in
determining if the subject’s is suffering from personality disorder or psychosis.
CONCLUSION
As a student taking Bachelor of Science in Criminology benefits me in studying this subject
Specialized crime investigation 2 (CDI). The learning and knowledge of this subject can help
me in identifying crime mostly in crime against property. There was a designated laws which
punished different kind of crimes, the cases was usually have a specific name such as
robbery, theft, arson and etc.
The subject thought me how to identify crimes and what are the exceptions if you committed
those crimes. Especially the 6 cardinal points of questions which give a better understanding
in the subject in the reason of easy to understand. Hopefully I would study more about this
subject.

You might also like