Professional Documents
Culture Documents
Cdi 1 - Notes
Cdi 1 - Notes
1
CHAPTER I
BASIC CONCEPT OF CRIMINAL INVESTIGATION
Who is a CRIMINAL?
This refers to a person convicted of a crime by a final judgment.
In its criminological sense, criminal offender refers to any rational
individual who commits an anti-social act that is detrimental to the society;
In strict legal terms, a criminal offender refers to a person:
a. Who committed an act punishable by existing criminal law; and
b. Was tried and convicted of final judgment by a competent court.
What is INVESTIGATION?
The term investigation comes from the Latin word “investigare” which
means: to track, trace or probe.
It is the act or process of investigating or the condition of being
investigated. It also refers to a searching inquiry for ascertaining facts;
detailed or careful examination.
2
CRIMINAL INVESTIGATION AS A PROCESS = it involves systematic process
of identifying, collecting, preserving, and evaluating data or raw facts to
produce valuable information for the purpose of bringing a criminal offender to
justice. As a process, it is based on systematic plan.
1. PERSEVERANCE
It refers to the steadfastness, persistence and resolution to bring the
desired conclusion in spite of obstacles connected with criminal
investigation.
2. ENDURANCE
this is the ability of the investigator to last physically and mentally
hence; he must have the extraordinary physical and mental energy,
enduring sleepless nights and tiresome days.
1. RECOGNITION
it involves the efforts of identifying data, including physical things that
may provide relevant information regarding the criminal case being
investigated. it is otherwise known as IDENTIFICATION STAGE of
investigation. The earlier the significant facts are identified, the sooner
the case will be solved.
2. COLLECTION - refers to the acts of gathering those identified data or
facts, or physical things that are significant to the case under
investigation. Collection maybe done by scraping the bloodstains found at
the crime scene, interviewing the neighbor who saw the burglary, or
examination of drug dealer's bankbook.
3. PRESERVATION
is a function that is almost simultaneously performed during the
collection stage. It includes act of keeping the collected evidence in their
true and original form, preventing contamination or destruction of
substantive value.
Preservation does not only involve the process of packaging physical
evidence in order that they can be safely transmitted to the evidence
custodian or to the crime laboratory. It covers the process of maintaining
the objectivity of facts or information that has been gathered from the
testimony of witnesses, victims or other persons involved in the criminal
cases.
4. EVALUATION
refers to the process of determining the probative value of the evidence.
4
5. PRESENTATION
is primarily manifested inside the courtroom. The investigator, with the
help of the prosecutor, must be able to present facts and information in a
very simple and convenient manner in order to convince the court and
other parties involved in the criminal case about the validity and
truthfulness of the evidence they are trying to prove or establish.
The following are further possible questions using the 5 W's and 1 H:
1. WHO QUESTIONS: these are questions used to inquire on the identity of the
victims or offended party, name of the suspect, accomplices, accessories and
witnesses of the crime such as:
1. Who reported the crime? who discovered the crime?
2. Who saw how the crime was perpetrated?
3. Who is the victim? Who had any misunderstanding with him?
4. Who is the offender/perpetrator/culprit?
5. Who are the companions, associates, or accomplices of the perpetrator?
3. WHERE QUESTIONS: these are questions that localize the place of the
incident - the city oor town, the district or barangay, the street or road, the
number of the house or building. These questions are necessary in pinpointing
the particular location of the crime such as:
1. Where the crime discovered?
2. Where did the offense take place?
3. Where are the victims, witnesses or culprits?
4. Where do the victims/ witnesses/culprits live?
5. Where was the suspect when he was apprehended?
6. Where are the weapons or tools used in committing crime?
7. Where did the investigator secure or obtain the evidence?
4. WHEN QUESTIONS: these are questions needed to determine and fix the
time, day, month and year when the crime was committed. These questions
should be specified and as accurate as possible such as:
1. When was the crime committed?
2. When was it discovered?
3. When was the police notified?
4. When was the victim last seen?
5
5. When was the suspect arrested?
6
TOOLS OF CRIMINAL INVESTIGATION
7
TOOLS OF CRIMINAL INVESTIGATION
I. INFORMATION
is the knowledge or facts which the investigator had gathered or acquired
from persons or documents, which are pertinent or relevant concerning
the commission of the crime or criminal activities.
INFORMATION AS A TOOL
8
INFORMANT AND INFORMER
The solution of a crime sometimes depends on the information furnished by the
informants and informers. Informers are general synonymous with each other
for they provide information to the police authorities.
Who is Informant?
The word informant is a general term that refers to any person who gives
information to the police authorities relative to a crime.
Strictly speaking, an informant is any person who furnishes the police
information relevant to a criminal case about the activities of criminals or
syndicates without any monetary consideration. The informant may
openly give information or may serve as a witness voluntarily.
Voluntarily or willingly provides information to the criminal investigators
and offers to be a witness. (requires anonymity)
9
the group. Care must be given to this kind of informant because women,
given the skills and expertise, are more dangerous than men. They often
give free romance that will result in blackmailing the investigator or will
result to an extended family for support. Women are said to be most
effective among informants because they could easily penetrate the ranks
of criminals with less suspicion.
Who is Informer?
Is a person who provides information to the police on a regular basis.
They are either paid regularly or in case-to-case basis, or none at all.
They are cultivated and established by the police on a more or less
permanent character and as long as they are loyal and useful to the
police organizations.
Generally paid by the investigator and should be registered with the
investigator’s agency. Informers are actually informants by profession
usually recruited or paid assets of investigating agencies.
- CIVIC-MINDEDNESS
- VANITY
- REPENTANCE
- FEAR
- AVOIDANCE OF PUNISHMENT
- SHOWING GRATITUDE FOR GAINING SOMETHING
- COMPETITION OR RIVALRY
- REVENGE
- JEALOUSY
- REMUNERATION
Interview and interrogation are similar with each other, in the sense that, they
are both ways of obtaining information from a certain suspects or persons
that has knowledge on a crime. however, the following provides a clear
distinction between the two.
INTERVIEW
Is the simple questioning of a person believed to possess information,
which are relevant to the investigation of a crime or criminal activities. in
10
an interview, the interviewee is willing and cooperative with the person
conducting the interview.
"Never allow the interviewer to conduct nor let anyone to conduct an interview
without prior visit to the crime scene."
1. COGNITIVE INTERVIEW
is conducted to willing and cooperative witnesses, where they are given
the full opportunity to narrate their accounts without intervention,
interruption and interference from the interviewer. After the subject has
finished his narration, the investigator now subjects him to the style of
direct examination and cross-examination, to clarify the unexplained
portions to arrive at a vivid and complete picture of the testimony.
11
time to earn for their living especially during the ordeal of testifying
during the trial.
3. HATRED AGAINST THE POLICE - this hatred maybe due to previous
bad experience with rogue members of the police organization.
4. BECAUSE OF BIAS OF WITNESS - the witness maybe an acquaintance,
friend, helper or benefactor of the suspect. All of these and other
relationship of the witnesses to the suspect must be explored so that an
intelligent approach is properly applied.
5. AVOIDANCE OF PUBLICITY - there are witnesses who are shy and they
shun publicity that will bring discomfort to their ordinary or obscure way
of living.
6. FAMILY RESTRICTION - some famous and respected families preserve
their reputations by instilling to their members the need of the approval
of the elders on matter affecting their families.
What is INTERROGATION?
Is the vigorous and confrontational questioning of a reluctant suspect
about his participation in the commission of crime. it is confrontational
in the sense that the investigator places the guilt on the accused. This
processed is also applied to an uncooperative or recalcitrant
suspect/witness.
It is one of the most difficult but most interesting phases of criminal
investigation and detection. It is a challenging battle of wit between the
investigator and the suspect.
What is Confession?
CONFESSION - is the direct acknowledgement of guilt.
13
NOTE: Confession obtained from the defendant by means of force or
intimidation/violence is null and void and cannot be used against
him/her in the trial and the like.
2. JUDICIAL CONFESSION
This confession is made by the accused is open court. The plea of guilt
maybe made during arraignment or any stage of the proceedings where
the accused changes his plea of not guilty to guilty.
This is conclusive upon the court and may be considered to be a
mitigating circumstance to criminal liability.
A plea of guilty when formally entered on arraignment is sufficient to
sustain conviction of any offense, even a capital one, without further pro
What is Admission?
Illustration: The accused was charged with homicide. During the trial,
acknowledged that he owned the murder weapon but did not acknowledge that
he is the one who committed the crime. To acknowledge ownership of the
murder weapon is an indirect acknowledgment of guilt because an owner of the
weapons used in committing the crime is presumed to be the perpetrator.
(Gacayan, 2005)
14
b. Weakest Link - among the suspects, there must be a careful selection
of who among them is the weakest link where the interrogation will
begin. By tricks and bluffs, this weakest link will be told that his
companions had already confessed. That this weakest link had dealt
the fatal blow or that he received the lion share of the loot in order to
intrigue him.
c. Drama - the weakest link maybe used to fake pain and agony by
ordering him to shout, accompanied by banging a chair on the wall to
make it appear that a commotion is going on. The other suspects in
separate rooms must hear the drama before telling them that their
partner had confessed.
15
purposes of emphasis during the confrontation of the
contradictions.
h. Mutt and Jeff or Sweet and Sour Method - the first set of
investigators must appear to be rough, mean and dangerous. When
they had finished the interrogation, the second investigator intervenes
by stopping the first set of investigators. By being sympathetic and
understanding, he begins his interrogation. If the suspect still refuses
to cooperate, then the process is repeated until there is a confession.
INSTRUMENTATION
It is the process of applying instruments or tools of the police sciences in
criminal investigation and detection. In the process of instrumentation,
the following equipment are being used, namely:
16
4. Forensic Ballistics developed by Dr. Calvin H. Goddard, a U.S. Army
Physician with a rank of Lieutenant Colonel. It is used for determining whether
or not the evidence bullet and test bullet came from a single gun through the
use of bullet comparison microscope.
7. In 1984, Alex Jeffrey’s, a British biologist and genetics expert, discovered the
concept of DNA genetic fingerprinting.
17
INVESTIGATIVE TECHNIQUES
18
CHAPTER IV
INVESTIGATIVE TECHNIQUES
Corpus delicti - (latin word for the “body of the crime”) - used to describe the
physical or material evidence that a crime has been committed. ex. corpse of a
murder victim.
The Police Station, which has territorial jurisdiction of the area where the crime
incident was committed, shall immediately undertake the necessary
investigation and processing of the crime scene, unless otherwise directed by
higher authorities for a certain case to be investigated by other units/agency.
a. A Police Blotter is an 18” x 12” logbook with hard-bound cover that contains
the daily register of all crime incident reports, official summary of arrests, and
other significant events reported in a police station.
b. As a general rule, all crime incidents must be recorded in the official police
blotter.
19
c. A separate Police Blotter, however,
shall be maintained for offenses
requiring confidentiality like violence
against women and children and those
cases involving a child in conflict with
the law to protect their privacy pursuant
to R.A. 9262 (Anti-Violence Against
Women and Children Act of 2004) and
R.A. 9344 (Juvenile Justice and Welfare
Act of 2006).
The conduct of police operation involving sensational cases, high profile and
heinous crimes must be covered by Case Investigation Plan.
20
ELEMENTS OF SKETCH
1. Measurements
2. Compass Direction
3. Essential elements
4. Scale and Proportion
5. Legend
6. Title
What are the SPECIFIC KINDS OF SKETCHES?
ROUGH SKETCH -Made by the prober at the crime scene. Scale and
proportion are ignored and everything is approximated. It is to be used as basis
of the finish sketch
FINISH SKETCH -Made primarily for court room presentation. All elements of
sketching must be present.
CRIME SCENE PHOTOGRAPHY
The main objective is to create a visual record of the crime scene before
any item is moved as possible physical evidence.
Take photograph of the crime scene with or without markers.
21
22
What are Methods of Crime Scene Search?
1. STRIP SEARCH METHOD = In this method, the area is blocked out in the
form of a rectangle. The three (3) searchers, A, B, and C proceed slowly at the
same pace along, paths parallel to one side of the rectangle.
ENT
RAN
CE
EX
IT
23
3. SPIRAL SEARCH METHOD = In this method, the three searcher follow each
other along the path of a spiral, beginning on the outside and spiraling toward
the center.
2nd Zone
1st Zone/grid
search
4th Zone
3rd Zone
24
6. Point to point- searcher will stand in a straight line and move forward
together.
What is meant by reconstruction of the crime?
After completion of the search, an effort must be made to determine from the
appearance of the place and its objects what actually occurred and what the
circumstances of a crime were. This is known as reconstructing the crime.
Kinds of reconstruction
• Physical Reconstruction— The physical appearance of the crime scene
is reconstructed from the description of witnesses and the indication of
the physical evidence.
• Mental Reconstruction—From the physical reconstruction, some
conclusions can be made concerning the consistency of the accounts of
various witnesses. No assumption should be made concerning actions
which are not supported by evidence. The final theory developed by the
investigator should provide a line of investigative action.
DEDUCTIVE REASONING -It forms a general conclusion prior to having a
complete explanation based on the facts
INDUCTIVE REASONING- It forms a general conclusion after gathering
evidence and after further investigation
25
Packaging = Physical evidence should be packed in order to prevent loss,
tampering, breakage or deterioration.
EVIDENCE/ITEM DESIRED CONTAINER
1. Paper Envelope
3. Firearm Box or board of exact size
4. Hair Wrap it first with filter paper before placing
it in an envelope
5. Dirt = same=
6. Cloth Box – Do not fold the area where there is
stain. Encircle the location of the stain
using a chalk for easy identification.
7. Seminal stain If moist, drop distilled water using a
dropper
and use the same to collect it, then place it
in a test tube
26
NOTABLE ACCOUNTS IN
INVESTIGATION
27
CHAPTER V
NOTABLE ACCOUNTS AND HISTORY OF INVESTIGATION (Additional
Information)
1. KING HAMMURABI
King of Babylon created one of the first bodies of written law
The code was then implemented to detect those who refused to obey the
law. It imposes the LEX TALIONES (Law of Retribution)
LEX TALIONES – It is a principle where punishment of an offender is
equal to what he did or known as (“An eye for an eye and a tooth for a
tooth principle”)
A. TEN TITHING – Grouping a 100 persons into one under the charge of
the High Constable. The constable is the first form of English Police deals
with serious breaches of the law.
B. TITHING – Grouping a ten persons together to protect one another
and to assume responsibility for the acts of the group’s members.
28
Established the London Metropolitan Police which became the world’s
first modern organized police force.
He introduced the techniques in detecting crimes such as detectives
concealing themselves, and secretly photographing and recording
conversations.
His memorable principle was “The Police are the Public and the Public are
the Police”
7. ALLAN PINKERTON
America’s foremost private detective. He became the first detective of the
Chicago Police Department in 1849. He then opened his private
detective agency in the early 1850’s in partnership with Chicago
attorney, EDWARD RUCKER. Their business immediately became
successful and formed the North-Western Police Agency. (PINKERTON'S
AGENCY)
8. KATE WAYNE
First women detective in history criminal investigation that was hired by
Pinkerton Agency.
29
15. 1248, China:
A Chinese book SHI DUAN YU (the washing away of Wrongs) was written
containing a description on how to distinguish drowning from
strangulation. This was the first recorded application of medical
knowledge to the solution of crime.
20.1859, USA.
USA Appellate courts recognized/accepted photograph as admissible
evidence when they are relevant and properly verified.
NEW YORK vs. CASTRO was the first case in which the admissibility of
DNA was seriously challenged. It set in a motion a string of events that
culminated in a call for certification, accreditation, standardization, and quality
control guidelines for both DNA laboratories and the general forensic
community.
25.1999, USA.
The FBI upgraded its computerized fingerprint database and
implemented the Integrated Automated Fingerprint Identification System
30
(IAFIS), allowing paperless submission, storage and search capabilities
directly to the national database maintained at the FBI.
Take note: the evolution of criminal investigation is closely similar with the
historical developments in Criminalistics. To enrich your knowledge in criminal
investigation and Criminalistics, research more on their historical background.
2. JANUARY 9, 1901
The Manila Police Department was organized with Col. Matthew Harmon
as the first chief of police.
3. 1913
The genesis of Criminal Investigation in the Manila Police Department,
presently known as the Western Police District took place.
31
32
POLICE INTELLIGENCE
33
CHAPTER VI
POLICE INTELLEGENCE
History of Intelligence
1. Holy Bible- where you can find the just recorded intelligence operations in
history.
Moses-One of the first recorded formalized intelligence efforts, with
format, can also be found in the Holy Bible Numbers 13:17
The scripture also named the 12 intelligence agents when the Lord
directed Moses to send into the Land of Canaan and records that “all those
men were heads of the children of Israel”.
34
He introduced a primitive form of “Cabinet Noir” (Internal Monitoring)
when he instigated postal censorship into the army and investigated letters
and malcontents.
5. Mata Hari (1876-1917) - Ironically, Mata Hari is one of the best known
spies in history, yet she was one of the worst.
When World War I broke out, Mata Hari was in Berlin, where she had
recently befriended the Chief of police, who subsequently enlisted her into the
ranks of the German Secret Service. She carried on her life as before dancing
naked on the stage and dispensing her services liberally to those who could
afford her.
10. Alfred Redl- One of the most brilliant intelligence agents, though he was a
homosexual. He rose to become chief of the Austro- Hungarian Secret Service,
or in other terms, director of their military intelligence system. For more than
half of his time as director of intelligence, Redl was acting as an intelligence
agent of Russia. “Homosexual Double Spy”
11. William “Wild Bill’’ Denovan- headed the Office of Strategic Service
(OSS), the immediate forerunner of the Central Intelligence Agency (CIA).
A lawyer and millionaire Republican, Donovan enjoyed Roosevelt’s trust,
friendship and most crucial of all- direct access to the inner sanctums of the
White House
35
of his enemies. Rewards are given to wards for every useful
information gathered.
Note:
The counterpart of these intelligence organizations in the Philippines is the
National Intelligence Coordinating Agency (NICA) which is under the Office
of the National Security Adviser
Col. Rudolph Abel - (Russian) - was probably the highest ranking and most
successful spy whoever infiltrated the United States.
What is Intelligence?
Definition of Intelligence:
36
In the Military parlance, it is the product resulting from the collection,
evaluation, analysis, integration, and interpretation of all available information
which concerns one or more aspect of foreign nations or are areas of operations
and which is immediately or potentially significant to planning.
h. Principle of Flexibility
Intelligence must have the ability to change or be changed according to
circumstances. Hench, alternatives must be drawn.
i. Principle of Security
Security is achieved by measures which the intelligence takes to protect
and preserve the integrity of its organization personnel, method, sources,
information and results of its activities.
j. Principle of imagination and foresight
The operator and the agent must be given the leeway to use his
resourcefulness to obtain more than what is normally required.
37
What are the Concept and Classification of Intelligence?
38
2. Covert- When the information is obtained without the knowledge of the
person against whom the information or documents may be used.
3. Semi Overt/ Covert- When the information is obtained from open sources
but the person against whom the said information will be used do not have
any knowledge about it.
39
WHAT ARE THE FUNCTIONAL CLASSIFICATION OF POLICE
INTELLIGENCE?
1. Criminal Intelligence (CRIMINT) - production of intelligence
essential to the prevention of crime and the investigation, arrest and
prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT) - knowledge essential to the
maintenance of peace and order.
3. Public Safety Intelligence (PUSINT) - knowledge essential to
ensuring the protection of lives and properties.
2. CLOSE SOURCES
They can be located inside a building, safe or vaults. 1% of all
information is from close sources. This can be from:
Surveillance; Casing; Elicitation; Surreptitious entry;
Employment of technical means (bugging and tapping);
Tactical interrogation; Observation and description.
40
What are the PHASES OF THE INTELLIGENCE CYCLE?
Evaluation to Determine:
a. Pertinence (usefulness) - Does it hold some value to current operation?
Is it needed?
b. Reliability (dependable) -Judging the source of information
c. Credibility (truth of information)
Is it possible for the reported fact or event to have taken
place? Is the report is consistent within itself? Is the report is
confirmed or corroborated by information from different
sources or agencies? If the report does not agree with
41
information from other sources, which one is more likely to be
true?
EVALUATION GUIDE
C. Interpretation
It is establishing the meaning and significance of information. It involves
the following:
Criteria of Dissemination:
42
immediate use and distributed by the most effective means appropriate to the
both time and security requirements.
INTELLIGENCE OPERATION
It is the result of intelligence planning. Planning is always ahead of
operation although an operation can be made without a plan. It is
usually due to sudden and inevitable situations but definitely, this is
poor intelligence management.
Infiltration - the insertion of action agent inside the target
organization
Penetration- recruitment of action agent inside the target
organization
Types of Approach:
1. Flattery- people are susceptible to praise
Variants:
a. Teacher- Pupil approach- the subject is treated as an authority. We
request him/her to enlighten us and we solicit his viewpoint and
opinions. The collector builds the theme that he is an ignorant
student who wants to learn from the all knowing teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal
having some specialized quality and you flatter him/ her by showing
enough concern for his/ her welfare to pay special attention to his
enjoyment. The collector attempts to build on professional
brotherhood and understanding of what the source of information is
going through and sharing the source’s frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and
assistance are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration of
he source of information and express curiosity on how one could
achieve such greatness.
43
c. Joe Blow Approach (Know it all) –The collector will become arrogant
and project a message that he/she knows it all. Eventually, the
source of information starts to show the intelligence collector, how
much he doesn’t know by divulging additional information, generally
prefaced by “Well if you know everything, did you know……?
d. National Pride Approach- nature propensity of all people to defend
their country and its policies. The collector will tie the required
information to national pride in an attempt to get the source to
confirm, deny or elaborate on information.
e. Partial- Disagreement approach- seek to produce talking by the
word “I’m sure if I fully agree”.
What is Casing?
Literally means putting a thing, or place in a case. As used in intelligence
operation – the continuous monitoring of a place or area at a given period
of time.
In intelligence operation, it is reconnaissance or surveillance of a
building, place or area to determine its suitability for intelligence use or
its vulnerability in operations.
What is Surveillance?
It is a process or act of keeping person, premises or vehicles under
observation in order to acquire detailed information concerning the activities,
identities and contact of the subject. It is concerned primarily with persons. It
involves many varied techniques and skills including preparation, foot
surveillance, automobile surveillance, stationary of fixed surveillance, and
reconnaissance. Also, tailing, shadowing, trailing or keeping the subject under
observation.
45
3. Technical and Audio- visual surveillance Uses communication and
electronic hardware’s, gadgets, systems and equipments. Ex: taps and bugs
COVER - Any device by person, organization to insure that one who does not
have the right to know must be aware of the real purpose of the mission. Or it
is a means by which an individual group or organization conceals the true
nature of its acts and or existence from the observer.
COVER STORY - A biographical data through fictional, which will portray the
personality of the agent he assumed: any scenario to cover up the operation.
ORGANIZATIONAL COVER
Any abound consisting of biographical data which when adopted by
an individual will assume the personality he wants to adopt.
UNDERCOVER ASSIGNMENT
It is an investigation technique in which an agent conceals his official
identity to obtain information from that organization.
46
b. Work Assignment- getting employed where the investigator can observe
the activities of the subject at his place of work.
c. Social Assignment- frequent places of entertainment and amusement
habitually being visited by the target.
d. Personal Contact Assignment- the investigator is required to develop
the friendship and trust of the target.
e. Multiple Assignment – the investigator is tasked to cover two or more of
the above specific assignments simultaneously; it can produce extensive
information with minimum expenses but more prone to compromise.
f. Rope job - striking up friendship with the subject.
1. SECURITY SURVEY
A counterintelligence service conducted in order to assist the chiefs
of office in determining the security measures required to protect
key installations from possible sabotage, espionage, subversion
and unauthorized disclosure of or access to- classified defense
information or materials.
2. SECURITY INSPECTION
A counterintelligence service conducted in order to determine
degree of compliance with established security policies and
procedures.
DEFINITION OF TERMS
1. Security
It is the protection of classified information, materials and
equipment from disclosure to unauthorized person.
2. Document Security
The placements of security classification, handling and use of
classified information.
3. Classified Information
This includes all information concerning document cryptographic
devices, development project and materials following on the
categories of Top Secret Confidential or Restricted.
4. Classified Matter
Any information in materials in any form or any nature, the
safeguarding of which is necessary in their interest of Natural
Security and which is classified of such purpose by
the responsible classification authority.
5. Classify
This refers to the assigning of information or material, one of the
four security categories after determination been made that the
information requires the security protection as provided.
6. Declassify
The act of removing the security classification from classified
information or matter.
7. Reclassifying or Regarding
47
Refers to the act of changing the assigned classification of the
classified information or matter.
8. Upgrading
Refers to the act of assigning the information or matter to the
higher classification than that previously assigned to it.
9. Certification of Destruction
It is a certification by a witnessing officer that the classified
matters described therein has been disposed of in his presence in
approved destruction methods.
12. Unauthorized
Refers to person not authorized to have access on classified
matters.
13. Compromise
Takes place through the loss of security, which results from
unauthorized persons, obtained knowledge of classified matters.
48
c. Special and Personnel staff of GHQ
d. General and Special staff of Major Service areas and unit
commanders
e. Superintendent of the PMA and PNPA
f. Commanders of post, depots, station of separate units
g. Chief of Military mission or group
h. Armed Forces Attaches
i. Commandants of service Schools
Deuteronomy 31:6
Be strong and of a good courage, fear not, nor be afraid of them: for the
LORD your God, he it is that does go with you; he will not fail you, nor
forsake you.
-END OF MODULE-
49