Download as pdf or txt
Download as pdf or txt
You are on page 1of 165

POLICE INTELLIGENCE

HISTORICAL SETTING

MOSES (Numbers 13:17)

RAHAB (Joshua 2- 1:21)

DELILAH (Judges 16)


EVENTS AND PERSONALITIES IN THE WORLD OF
INTELLIGENCE

1. Sun Tzu such as stratagem, delay, the use of spies,


the making and keeping of alliances, the uses of
deceit, and a willingness to submit, at least
temporarily, to more powerful foes

2. Akbar He created a powerful military system and


instituted effective political and social reforms.
3. Alexander The Great - A Greek Conqueror, was
able to identify those who are disloyal to him by
ordering the opening of communication letter of
his men and was successful in uplifting the esprit
de corps and morale of his men.
a. Common spies
b. Double spies
c. Spies of consequences
d. Intimidated spies
4. Genghis Khan created the largest empire ever to exist,
spanning the entire Asian continent from the Pacific
Ocean to modern-day Hungary in Europe.

5. Hannibal Carthage led an attack on Saguntum, an


independent city allied with Rome, which sparked the
outbreak of the Second Punic War.

6. Julius Caesar famous not only for his military and


political successes, but also for his steamy relationship
with Cleopatra
7. George Washington
8. Alfred Redl
7. George Washington “Father of His Country.” He not
only served as the first president of the United States, but
he also commanded the Continental Army during the
American Revolution (1775–83) and presided over the
convention that drafted the U.S. Constitution.

8. Alfred Redl the former head of Austria-Hungary's


military espionage, committed suicide in Vienna. As it
turned out, Redl had betrayed Austria-Hungary's spy-
network in Russia and had sold sensitive information on
war preparations to the Czar's military intelligence.
PRINCIPLES OF INTELLIGENCE
10 PRINCIPLES OF INTELLIGENCE
1. Timeliness
2. Commander’s Needs
3. Principle of Planning
4. Integral Part of Military Operation
5. Flexibility
6. Imagination and Resourcefulness
7. Principle of Security
8. Principle of Continuity
9. Need to Know
10. Compartmentation
ASIS - Australian Secret Intelligence Service -
Primary responsibility is gathering intelligence
from mainly Asian and Pacific interest using
agents stationed in wide variety of areas.
Its main purpose like other most agencies is to
protect the country's political and economic
interest and ensure the safety of its citizens
against national threats.
Bundesnachrichtendienst - BND, Federal
Intelligence Service, is the foreign intelligence
agency of the German government, the BND act
as the early warning system to alert the German
government against threats to its interest coming
from abroad.
CATEGORIES OF INTELLIGENCE
Categories of Intelligence
1. National Intelligence - integrated product of
intelligence developed by all government
departments concerning the broad aspect of
national policy and national security.

2. Departmental Intelligence - the intelligence


required by the department or agencies of
the government to execute his mission and
discharge its responsibilities.
3. Military Intelligence - refers to the knowledge
by the military institution essential in the
preparation and execution of military plans,
policies and programs.

CIA - Central Intelligence Agency, is the civilian


intelligence agency of the USA. It is the largest
intelligence agency in the world.
Classifications of Documents

1. Top Secret - calls for the utmost degree of


protection, Unauthorized revelation of this
materials and information will cause
extremely severe damage to the nation,
politically, economically, or militarily.
2. Secret - unauthorized disclosure of this
documents or things may put at risk the
national security, cause serious injury to the
reputation of the nation.
3. Confidential - Unauthorized revelation of
which may be injurious to the reputation of the
nation or governmental activity or will cause
administrative humiliation or unnecessary injury.

4. Restricted - this are information which should


not be published or communicated to anyone
except for official purposes. These records are
daily files, routine in nature even if lost or
destroyed will not affect operation or
administration.
Classification of Sources of Information
Classification of Sources of Information

1. Open Sources - 99% of the information


collected are coming from open sources or
obtained from overt operation.

2. Close Sources - only 1% of information are


obtained from covert operation.
Elements of Clandestine Operation
1. Sponsor - directs the organization conducting
the clandestine activity.

2. Target - person, place or things against which


the clandestine activity is to be conducted.

3. Agent - refers to a person who conducts the


clandestine operations, includes principal agents,
action agents, and support agents.
4. Principal Agent - leader or management agent in
clandestine operation usually undertaken by the case
officer.

5. Action Agent - one who conducts the clandestine


operation that includes:

a. Espionage Agent - agent who clandestinely procure or


collect information.

b. Propagandist - agents who molds the attitudes,


opinions and actions of an individual group or nation.
6. Support Agent - agent who is engaged in activities
which supports the clandestine operations that includes
the ff:

a. Surveillant - agent who observes persons and places


of operation of int
b. Investigator - agent who undertakes to procure
information or things of clandestine operation.

7. Procurer of Funds - agent who obtains money when


needed for operational use.
8. Safe House Keeper - agents who manages and
maintains a safe house for clandestine
operations like meetings, safe heavens, training,
briefing and debriefing.

9. Communication Agent - agent who is detailed


to secure clandestine communications.
Coding - the changing of message from plain
clear text to unintelligible form, also known as
encrypting.

Decoding - transforming of coded message into


plain text, also known as decrypting.
Counter Intelligence - phase of intelligence
covering the activity devoted in destroying the
effectiveness of hostile foreign activities and the
protection of information against espionage,
subversion and sabotage.
TYPES OF COUNTER INTELLIGENCE
Types of Counter Intelligence
1. Passive CI Measures - protection of classified and
sensitive information against unauthorized access
through secrecy, communication security and other
safeguards.

2. Active CI Measures - are those measures which


seek actively to block enemies effort to gain
information or engage in espionage, subversion
and sabotage.
Categories of Counter Intelligence
Operations
1. Military Security - it encompasses the measures
taken by a command to protect itself against
espionage, enemy operation, sabotage, subversion, or
surprise.

2. Port Boundary and Travel Security - application of


both military and civil security measures for counter-
intelligence control at point of entry and departure,
international borders and boundaries.
3. Civil Security - active and passive counter-
intelligence measures affecting the non-military
nationals permanently or temporarily residing in
an area under military jurisdiction.

4. Special Operations - counter subversion,


sabotage and espionage.
OBJECTIVES OF COUNTER-INTELLIGENCE
Objectives of Counter-Intelligence
1. It denies information to the enemy
2. It reduces the risk of a command
3. Aid in achieving surprises
4. Increases the security of the command
5. Decrease the ability of the enemy to create
information about he forces.
Functions/Activities of Counter-Intelligence

Functions/Activities of Counter-Intelligence
1. Protection of Information against espionage
2. Protection of personnel against subversion
3. Protection of installations and materials
against sabotage
Cryptography - arts and science of codes and
ciphers.

Crypto Analyst - refers to those persons who break


intercepted codes.

Cryptographer - refers to a person who is highly


skilled in converting message from clear to
unintelligible forms by use of codes and ciphers.
Delilah - a biblical personality, she was able to gain
information by using her beauty and charm, she was
responsible for the fall of Samson, a known Israelite
leader and enemy of the Philistines.

Frederick The Great - Father of organized military


espionage.

FSD - Federal Security Service of the Russian


Federation, is the main domestic security agency of
the Russian Federation, and the main successor of
the Cheka, NKVD and the KGB.
General Directorate For External Security -
France external intelligence agency, operating
under the direction of the French Ministry of
Defense.

Informants - any person who hand over


information to the agents which is relevant to
the subject.
Fundamentals of
Criminal Investigation
and Police Intelligence
FUNDAMENTALS OF CRIMINAL INVESTIGATION
FUNDAMENTALS OF CRIMINAL INVESTIGATION

Criminal Investigation- is an art that deals with the identity and location
of the offender and prove his guilt in a criminal proceeding.

Criminal Investigation- it is the systematic method of inquiry that is


more a science than an art. The logic of scientific method must however,
be supplemented by the investigator's initiative and resourcefulness. The
sequences of the investigation should be regarded by scientific, operating
framework that requires improvising on the part of the investigator.
Criminal Investigation is an Art – based on intuition,
felicity of inspiration or by chance; and a Science –
based on adequate professional preparation and
abundance of certain qualities
Investigator- is the person who is charged with the
duty of carrying out the objectives of criminal
investigation. He is an individual who gathers
documents and evaluates facts about crime
Special Crime Investigation- deals with the study of major
crimes based on the application of special investigative
techniques. It is also the study concentrates more on
physical evidence; it’s collection, handling, identification and
preservation in coordination with the various criminalists in
the crime laboratory. Special crime investigation involves
close relationship between the investigator in the field and
the investigator in the laboratory- the Criminalist.
Duty of Criminal Investigator

1.Establish that, in fact, a crime was committed under the


law.
2.Identify and apprehend the suspect.
3.To recover stolen property.
4.To assist the state in prosecuting the party charged with
the offense.
Job of the Criminal Investigator

1.Discover whether or not an offense has been


committed under the law.
2.After determining what specific offense has been
committed, he must discover how, when, where, why,
what offense was committed.
METHODS OF IDENTIFICATIONS OF CRIMINALS
Methods of Identifications of Criminals

Criminal are identified thru the following:

1. Confession and Admission


2. Statement of witnesses
3. Circumstantial Evidence
4. Associative Evidence
A. Confession- this is an expressed acknowledgement
by the accused in criminal cases of the truth of his guilt as
to the crime charged or of some of the essential part there
of. There is no implied confession for it is positive and
direct acknowledgement of guilt. It is the best means of
identifying criminal.
Rules in Confession

a.Confession need not to be in writing


b.Confession may be written in a language which the
accused does not speak
c. Confession must be freely and voluntarily made
Voluntarily – means that the accused speak of his free
will and accord, without inducement of any kind and with
the full and complete knowledge of the nature and
consequences of the confession.

Freely- when the speaking is so free from the influence


affecting the will of the accused at the same time the
confession was made.
Requirement for confession as proof of guilt

1. Other corroborative evidence must support it.


2. Corpus delicti- must be established separately (the actual
commission of the crime charged. It refers to a particular
crime and signifies that specific offense had been actually
committed by someone being composed of two elements:
that certain results were produced, that someone is criminally
responsible
3. Confession must be made voluntarily.
B. By EYE-WITNESS TESTIMONY- description made by
eyewitness

Value of identification by eyewitness testimony depends on the


following: (credibility-bringing honor)

1. the ability of the eyewitness testimony to observe and remember


the relative “distinctiveness” of the accused appearance
2. The prevailing conditions, visibility and observation
3. The lapse of time between the criminal event and identification
Methods of Identification made by eyewitness

1. Verbal Description
2. Photographic files
3. General photograph- files of photograph in any given
establishment.
4. Artist Assistance or composite sketches
5. Police line-up- selecting the suspect from a group of innocent
persons to eliminate the power of suggestions as factor of
identification
Cartography- the art of sketching the image
of a person or the art of making map
Bases of the eyewitness in the identification of criminal

1. Face-forehead, eyebrow, mustache, eyes, ears, cheeks, mouth, lips,


teeth, chin, jaw, etc.
2. Neck- shape, length, Adam’s apple
3. Shoulder- width and shape
4. Waist- size, shape of the abdomen
5. Hands- length, size, hair, condition of the palms
6. Fingers- length, thickness, stains, shape of nails and condition
7. Any deformities (cross eyed, limping and etc.)
8. Teeth
9. Gait
Bases of Physical Description of Physical Appearance

1. Mug Shot
2. Artist Drawing
3. Composite Sketches
4. Verbal description or Portrait Parle
WORLDWIDE DEVELOPMENT
WORLDWIDE DEVELOPMENT

1720s, ENGLAND: - JONATHAN WILD He was a buckle


maker then a brothel operator; a master criminal who
became London’s most effective criminal investigator. He
was the most famous THIEF-CATCHER in 1720s. His
methods or techniques made popular the logic of
EMPLOYING A THIEF TO CATCH A THIEF. He conceived
the idea of charging a fee for locating and returning stolen
property to its rightful owners.
1750s, ENGLAND: - HENRY FIELDING An
Englishman who wrote a novel entitled “Tom Jones”
and was appointed as magistrate (sheriff) for the
areas of Westminster and Middle Age, London. He
was the creator of the BOW STREET RUNNERS
while he was the magistrate; he formed a group of
police officers attached to the Bow Street Court, and
not in uniform, performing criminal investigative
functions.
1753, ENGLAND: - SIR JOHN FIELDING The younger
brother of Henry Fielding who took over the control of Bow
Street Court in 1753. His investigators were then called
Bow Street Runners and became quite effective because
of his personal guidance despite the fact that he was
blind. He introduced the practice of developing paid
informants, printing wanted notices, employing criminal
raids, and bearing firearms and handcuffs.
1800, LONDON: - PATRICK COLQUHOUN A prominent
London president who proposed the unique idea of creating
sizeable uniformed force to police the city of London in order to
remedy the public outcry concerning the alarming increase of
criminality during the early 1800s. His proposal was considered
too radical and was dismissed by the Royal Court.
1811, FRANCE: - EUGENE ‘Francois” VIDOCQ He was a
criminal who turned Paris Investigator. He made popular the
concept of “SET A THIEF TO CATCH A THIEF”. He introduced
the concept of ‘TRADE PROTECTION SOCIETY’, which is a
forerunner of our present-day credit card system. For a fee,
any owner of a shop or business establishment could obtain
particulars concerning the financial solvency of new customers.
He created a squad of ex-convicts to aid the Paris police in
crime investigation
1829, LONDON: - SIR ROBERT PEEL The founder and
chief organizer of the London Metropolitan Police – the
SCOTLAND YARD. He reiterated the idea of creating
sizeable police force in his recommendations, which lead
to the passage of the Metropolitan Police Act. He
introduced the techniques of detecting crimes such as:
detectives concealing themselves, and secretly
photographing and recording conversations.
1833, ENGLAND: The Scotland Yard employed the
first undercover officer while in

1835, USA: TEXAS RANGERS was organized as


the first law enforcement agency with statewide
investigative authority, the forerunner of the Federal
Bureau of Investigation.
1852, USA: - ALLAN PINKERTON - America’s most
famous private investigator and founder of Criminal
Investigation in USA. He established the practice of
handwriting examination in American courts and
promoted a plan to centralize criminal identification
records.

1856, USA: - KATE WAYNE: The first woman detective


in the history of criminal investigation, hired by the
Pinkerton Agency.
1961,USA: - Mapp vs. Ohio (376 vs. 584): The
Supreme Court ruled the illegally obtained
evidence is inadmissible in state criminal
prosecutions.

1966, USA: - MIRANDA vs. ARIZONA (384 vs.


436): The US Supreme Court established
procedural guidelines for taking criminal
confessions.
1983 – MORALES vs. JUAN PONCE ENRILE (GR#61016-17; April
26,1983; SCRA 538)

The ruling in this case makes it clear that the MIRANDA WARNING as it is
generally called have to be made so that a confession can be admitted.
Therefore, while upon police custody for investigation, the accused must be
appraised of his:
1. Right to remain silent with explanation that anything that he might say
maybe used against him in the court of the law;
2. Right to talk to a lawyer, a relative, or a friend, and have a lawyer ready
and a friend present while he is being questioned; and
3. Right to the appointment of a lawyer if he cannot afford one.
1985 – PEOPLE vs. GALIT (GR#51770;March 20,1985) - The
right to a counsel maybe waived but the waiver, to be valid,
must be made with assistance of a counsel.
GENERAL PRINCIPLES OF CRIMINAL INVESTIGATION
GENERAL PRINCIPLES OF CRIMINAL INVESTIGATION

In the performance of his duties, the investigator must seek to


establish the six (6) cardinal points of investigation, namely:
what specific offense has been committed; how the offense was
committed; who committed it; where the offense was
committed; when it was committed; and why it was committed.
The Phases of Criminal Investigation

a)Preliminary Investigation - identify the criminal


through CACA
b)Follow Up Investigation - trace and locate the
criminal; and
c)Final Investigation - proved by evidence the guilt of
the suspect/s.
Tools of an Investigator in Gathering Facts

a) Information – Data gathered by an investigator from other persons


including the victim himself and from Public records; Private records;
and Modus Operandi file.
b) Interrogation and Interview – Questioning of witnesses, suspects, and
offended parties.
c) Instrumentation – Scientific examination of real evidence, application
of instrument and methods of the physical sciences in detecting crime.
INFORMATION

All evaluated materials of every description including those


derived for observation, reports, rumors, imagery, and other
sources from which intelligence in produced.

Information is a communicated knowledge by others


obtaining by personal study, investigation, research, analysis,
observation. The use of modern gadgets in intelligence and
other things and material that possess or contain a desire
information or knowledge.
Two General classifications of sources of
information:

1.Open Sources – 99% of the info collected are coming


from open sources.
2.Close Sources – 1% of info from close sources.
Overt Intelligence – is the gathering of information or
documents procured openly without regard as to
whether the subject or target become knowledgeable of
the purpose

Open Sources: Includes information taken from


Enemy activity – POW – Civilians - Captured
documents
Map - Weather, forecast, studies, report - Agencies
Covert Intelligence – is the secret procurement of information, which is
obtained without the knowledge of the person or persons safeguarding vital
intelligence interest.

Close Sources: are information usually taken through:


 Surveillance
 Casing
 Elicitation
 Surreptitious entry
 Employment of technical means (Bugging and Tapping device)
 Tactical Interrogation
 Observation and Description
Other sources of Information: Overt and Covert
Routine patrol and Criminal investigation
Use of informants and Interrogations
Search and seizures and Cordon and scratch
Checkpoints and Police public relations activities
Coordination with law enforcement agencies
Inmates of various city jails, national penitentiary, military
stockade.
Statistics
Persons as sources of Information

Informant Net – It is a controlled group of people who


worked through the direction of the agent handler. The
informants, principal or cutouts supply the agent handler
directly or indirectly with Intel information
Informants (Asset) – people selected as sources of
information, which could be voluntary, or in consideration of a
price.
Informant – refers to a person who gives
information to the police voluntarily or involuntarily
with out any consideration
Informer – those who give information to the police
for price or reward
Types of Informants

1.Criminal Informant
2.Confidential Informant
3.Voluntary Informant
4.Special Informant
5.Anonymous Informant
Sub-type of Informant
1.Incidental Informant – a person who casually
imparts information to an officer with no intention of
providing subsequent information
2.Recruited Informant – A person who is selected
cultivated and developed into a continuous source of
information.
Categories of Recruited Informants:
1. Spontaneous or Automatic Informant – Informants who by
the nature of their work or position in society have a certain
legal, moral or ethical responsibilities to report info to the
police
2. Ordinary run of he Mill Informants – Informants that are
under the compulsion to report info to the police
3. Special Employee – informants who are of a specific
operational nature
Other classification of Informant
Automatic – Penetration - Full time - Rival –
Elimination - False Informant - Frightened
Informant - Self- aggrandizing Informant -
Mercenary Informant - Double Crosser Informant -
Woman Informant - Legitimate Informant
Common Motives of Informants

Reward – Revenge - Fear and avoidance


of punishment – Friendship - Patriotism –
Vanity - Civic-Mindedness – Repentance –
Competition -Other motives
INFORMANT RECRUITMENT
INFORMANT RECRUITMENT

1.Selection
2.Investigation
3.Approach
4.Testing
INTERVIEW AND INTERROGATION

1. Interview Defined. - An interview is the questioning of a


person believed to possess knowledge that is in official
interest to the investigator.
2. Importance of Interview. ­ - Interview in crime investigation
is very important considering that the person interviewed
usually gives his account of an incident under investigation or
offers information concerning a person being investigated in
his own manner and words.
The Person Interviewed

Consider:
a) His ability to observe.
b) His ability to remember
c) His ability to narrate.
d) His mental weakness because of stupidity or infancy
e) His moral weakness because of drunkenness, drug addiction,
his being a pathological liar or similar factors.
f) Emotional weakness resulted by family problems, hatred,
revenue, and love.
2. The Interviewer’s Personal Traits.
a) He must be a practical psychologist who understands the human psyche and
behavior.
b) He has a sincere interest in people.
c) He is clam, has self-discipline, and keeps his temper.
d) He is courteous, decent and sensitive.
e) He is self-assumed and professional.
f) He is cordial and agreeable, and never officious. But he should avoid over-familiarity
it.
g) He is forceful, persistent and patient. Some people just cannot be rushed.
h) He is analytical.
i) He is flexible and cautious.
j) He is a good actor and can conceal his own emotion.
k) He avoids third degree tactics and never deviates from the fundamental principle that
a person must be treated according to humanitarian and legal precepts.
l) he keeps the rules of evidence in mind.
3. Planning the Interview.
In planning the interview, the interviewer should consider:
a) The facts of the case which have been established so far.
b) The information needed to complete the picture
c) The sources of information that may be consulted such as
files and records.
d) The possibility of confronting the suspect with physical
evidence .
e) The time available for the interview.
4. Preparation of the Interview ­– Before interviewing a
witness, the law enforcer should mentally review the
case and consider what information the witness can
contribute. If the case requires it, he should acquaint
himself with the background of the witness.
Opening the Interview.
5.

a) The interviewer should identify himself and the agency to


which he belongs.
b) He should try to size up the interviewee and reach to tentative
conclusion about his type, then use the best interview
approach.
c) He should keep in mind the provisions of law regarding rights
of people under custodial investigation.
7. The Body of the Interview.
a) The interviewee should be allowed to tell his own story in his own words without
interruption.
(i) This allows for continuity and clearness.
(ii) Range of interview is broadened.
(iii)It helps the interviewee recall and relate evens in their proper order.
a) Interviewer should keep to the point at issue and should not wander too far from it.
b) Interviewer should be alert for hearsay information so he can question the interviewee
on the matter later.
c) Do not interrupt a trend of ideas by abruptly asking a question. Use the uninterrupted
account of the witness interview
d) However, you may guide the interviewee innocuous questions such as, “And then
what did you do?”
8. Questioning.
a) Dominate the interview. Be careful, do not allow the interviewee to be the one asking
the questions.
b) Do not ramble. Have a reason for every question asked.
c) Follow the order of time and bring out the facts in that order. This technique is called
“chronological questioning” and is considered the easiest as people tend to think in
terms of what happened first, the, second, then third. The interviewer should go step
by step in learning all the details concerning the planning and commission of the
crime and what happened after it was committed.
d) Exhaust each topic before moving on to the next.
e) Determine the basis for each material statement. It might be a hearsay.
f) Keep your questions simple and understandable. Avoid double-edged or forked
questions.
g) The dangers of leading and misleading questions should be borne in
mind. A question which suggests to the witness the answer which the
interviewer desires is a leading question. Questions which assume
material facts that have not been proven are misleading questions.
h) Wait for the answer to one question before asking a second one.
i) Ask important questions in the same tone of voice as the unimportant
ones.
j) As a rule, avoid trick or bluffing questions.
k) Where it is necessary to inquire into the past history of the interviewee
involving something unpleasant, it is wise to use introductory remarks
deploring the need for the question and saying that it is one of the
unpleasant but necessary of an officer.
9.Closing
a) Before closing the interview, the law enforcer should make a mental check of
the purpose of the interview and should analyze what he has learned, then
decide whether he has attained his objective. He should be guided in this
respect by the 5 W’s and I H- what, where, when who, why and how.
b) The interviewer should always the door open for a re-interview. Don’t forget to
say “THANK YOU” after the interview.

Note: Although the words “interview” and “interrogation” have similar


meanings, there are those who prefer to use “interview” when
questioning witness and informants, and “interrogation” when
questioning suspects.
A Philosophy of Interview and Interrogation:

The RIGHT officer, Asking the RIGHT questions,


In the RIGHT manner, At the RIGHT time and in the
RIGHT place, Will get the RIGHT answers.
INTERROGATION IN GENERAL
INTERROGATION IN GENERAL

Interrogation Defined. An interrogation is the


questioning of a person suspected of having committed
an offense or of a person who is reluctant to make a full
disclosure of information in his possession which is
pertinent to the investigation.
Purpose of Interrogation

a) To obtain information concerning the innocence or guilt of suspect.


b) To obtain a confession to the crime from a guilty suspect.
c) To induce the suspect to make admissions.
d) To know the surrounding circumstances of a crime.
e) To learn of the existence and location of physical evidence such as
documents or weapons.
f) To learn the identity of accomplices
g) To develop information which will lead to the fruits of the crime.
h) To develop additional leads for the investigation
i) To discover the details of any other crime in which the suspect
participated.
Preliminary Conduct. – The interrogator should identify himself a t the
outset and state in general the purpose of the interrogation. He must
advise the suspect of his rights against self-incrimination and inform him
that he does not have to answer questions and that, if he does answer,
these answers can be used as evidence against him. he must inform the
suspect of his right to counsel and that a state appointed counsel will be
made available without cost to him if he so desires. No questioning of the
suspect unless the latter has definitely waived his right to be silent.
Ordinarily the investigator should be alone with the suspect and, of
course, the latter’s lawyer, if he has requested counsel.
The Interrogation Room – The room should
provide freedom from distractions. If should be
designed simply to enhance the concentration of
both the interrogation and the subject on the
matter under questioning.
INTERROGATION TECHNIQUES
Interrogation Techniques

a) Emotional Appeals
b) Sympathetic Approach
c) Kindness
d) Extenuation – The investigator indicates he does not
consider his subject’s indiscretion a grave offense.
e) Shifting the Blame
f) Mutt & Jeff
g) Open Technique
h) Common Interest Technique
i) Record File
j) Exasperation Technique
k) Egotist (Pride and Ego) Technique
l) Silent Technique
m) Question Barrage Technique
CRIMINAL INTERROGATION SYSTEMS

1. Types of Offenders and Approaches to be used in Dealing With


Them:
a) Emotional Offenders have a greater sense of morality. They easily
feel remorse over what they have done. The best approach in
interrogating this type of offender is the sympathetic approach.
b) Non-Emotional Offenders normally do not feel any guilt, so the best
way to interrogate them is through the factual analysis approach, that
is, by reasoning with the subject and letting him know that his guilt
has already been, or will soon be, established.
Interrogation Witnesses and Other Prospective Informants:

a) Give the witness or prospective informant an assurance that the


offender will not harm him or any member of his family, and that
there is a witness protection program specially designed to
meet that contingency when it becomes necessary.
b) If such witness or prospective informant refuses to cooperate
with the police, try to sever any bond between him and the
offender, and proceed to interrogate the witness or informant as
if he were the suspect.
DEVELOPMENT AND CONTROL OF INFORMANTS
A. DEVELOPMENT AND CONTROL OF INFORMANTS

1. Confidential Informant Defined – a confidential informant is an


individual who supplies information on a confidential basis with the
understanding that his identity will not be made known.
a) Scientific approach in criminal investigation can assist law enforcers
immeasurably, but there is always that one case wherein the crime
laboratory cannot help. This is the reason why investigators must to
know the man on the street, then man who can supply information.
b) Law enforcers must develop confidential informants everyday.
Need for Informants
a) Informants increase accomplishment in all areas of investigation.
b) Without confidential informants, the officer’s source of information is
limited to what he gets through formal interview.
c) Informants enable law enforcers to infiltrate the criminal element and
help lower criminal morale. Advance information improves crime
prevention and enables the police to find out the identity of transient
hoodlums.
d) Informants are an investigative “short cut’ to solve cases, to recover
stolen property, and to make apprehensions.
Where to Find Criminal Informants and Whom to Develop
a) Legitimate persons and criminals
(i) Hoodlums, criminals, fences, bookies, barbers, bartenders,
poolroom and dancehall operators, prostitutes, madams,
pawnbrokers, cab drivers, bell hops, service station
attendants, waitresses and others. A class in themselves is
persons who had been accused or suspected of a crime.
(ii) Persons engaged in certain occupations should be
considered.
Use of Informants
a) Maximum benefit. – The confidential informant
should be used for the maximum benefit of the
entire organization, not of only one (1)
officer/investigator.
b) A designated executive should be aware of the
identity of the informant. – At least two (2)
individuals in the law enforcement agency should
know the identity of a confidential informant.
UNDERCOVER INVESTIGATION

Preparation for undercover work should be sufficiently


thorough:
a) To preclude compromise
b) To minimize danger to the undercover operative
c) To ensure the ultimate success of the investigation

Undercover investigation should not be attempted until other


investigative techniques have failed or are deemed impractical.
Factors to consider before undercover investigation is
initiated:
a) The exact result desired
b) Jurisdiction
c) The importance of the investigation
d) Available planning information
e) Availability of qualified personnel
f) The equipment and preparation necessary
g) Danger to the investigator involved.
b) Specific qualifications
(i) Ability to act out an assumed role
(ii) Good memory in an investigation in which no notes can be taken or
report submitted.
(iii) Skill adaptable to the occupation assumed.
(iv) Physical appearance and capabilities consistent with his assumed
qualifications.
(v) Well-grounded in the lingo and techniques of the subject criminal
operations
(vi) In special situations, the undercover investigator should possess certain
linguistic abilities, hobbies, sports, musical talent and personal
background for the particular and undercover assignment.
Authority for undercover operations must be from the top officer of
the organization, for this requires coordination with other agencies.

1. The fewest number of persons must know the undercover


operation. Otherwise, the investigation or the operative himself might
be jeopardized.

2. The background or cover story regarding the assumed identity of


the undercover operative must be such that he can easily win the
confidence of the suspect or organization sought to be infiltrated, and
should seldom be wholly fictitious.
Badge and credentials must never be carried.

1. A weapon should only be carried if it is consistent with the background story.

2. Provide safe communication systems between the undercover agent and


headquarters relaying information or instructions.

3. Arrangements for drops and safe houses must be made and, if necessary,
the undercover operative himself may be placed under surveillance.

a. The undercover operative must never pose as a criminal unless no other


approach appears adequate.
4. The role of the undercover operative is to gather
information or evidence against the suspect(s) or the
organization, never to instigate the commission of a
crime.

5. Plans for the operation must provide actions or


alternatives in case the undercover is arrested.
6. Reminders to the undercover operative:
a) Act as natural as possible.
b) Do not overplay the part.
c) Do not indulge in any activity, which is not in conformity with the
assumed identity.
d) Do not make notes unless they are to be mailed or passed
immediately: (Use codes and never place return address in
letters and envelopes).
e) Do not use intoxicants except to play the part.
f) Limit association with women to that necessary to play the part
SURVEILLANCE
SURVEILLANCE

Surveillance is the discreet observation of


places, persons and vehicles for the purpose of
obtaining information concerning the identities
or activities of subjects.
Objectives of Surveillance:
a) To detect criminal activities
b) To discover the identity of persons who frequent the
establishment and determine their relationship.
c) To discern the habits of a person who lives in or frequents the
place.
d) To obtain evidence of a crime or to prevent the commission of
a crime.
Shadowing or Tailing. It is the act of following a
person.

Its objectives are:


a) To detect evidenced of criminal activities.
b) To establish the association of a suspect
c) To find a wanted person
d) To protect a witness
There are three (3) types of shadowing employed, depending upon
the objective of the surveillance:

a) “Loose Tail” is employed when a general impression of the subject’s


habits and associates is required.
b) “Rough Shadowing” without special precautions may be used where
the criminal must be shadowed and he is aware of this fact; or where
the subject is a material witness and must be protected from harm or
other undesirable influences.
“Close Tail” surveillance is one is which extreme precautions are
taken against losing the subject.
“Roping” or Undercover Work. – It is a form of
investigation in which the investigator assumes a
different and unofficial identity (a cover story) in
order to obtain information. The general objective
of an undercover investigation is to obtain more
information.
Arrest of Undercover Agent. – If the police arrest
an investigator, he must act in accordance with his
orders.
Standard Methods of Recording Investigative Data

a) Photographs;
b) Sketching crime scenes;
c) Written notes (what you have seen or observed);
d) Developing and lifting fingerprints found at the crime scene:
e) Gathering physical evidence;
f) Plaster cast;
g) Tape recording of sounds;
h) Video tape recording of objects; and
i) Written statements of subjects(s) and witnesses
SCIENTIFIC EXAMINATION OF REAL EVIDENCE
Scientific Examination of Real Evidence

a) The Crime Scene Search

Processing and Securing a Crime Scene –


Processing a crime scene includes the application of
diligent and careful methods by an
investigator/policeman to recognize, identify, preserve
and collect facts and items of evidentiary value that may
assist in reconstructing that which actually occurred.
Protecting the Crime Scene and the Evidence –This
requires making careful and detailed notes and sketches;
using correct procedures in taking photographs of the
scene; taking written statements and transcribing verbal
statements of witnesses, suspects and marking and
preservation of collected physical objects of evidentiary
nature.

b) Laboratory examination of objects and substances located


usually at the crime scene Objects and substances needing
examination in some cases are carried, intentionally or
unintentionally, by suspects from the crime scene.
Custodial Investigation/Interrogation.

It is the skillful questioning of a suspect or a hostile witness to


divulge information on the crime being investigated. It must be
remembered, however, that police investigators cannot learn
proper interrogation merely by reading books. The success of
interrogation depends on its legality, topic, physical insight and
experience.
PROCEDURE AT THE CRIME SCENE
PROCEDURE AT THE CRIME SCENE

Upon Arrival at the Crime Scene

a. Record time/date of arrival at the crime scene, location of the scene,


condition of the weather, condition and type of lighting direction of wind
and visibility
b. Secure the crime scene by installing the crime scene tape or rope
(police line)
c. Before touching or moving any object at the crime scene determine
first the status of the victim, whether he is still alive or already dead.
Only a coronal or a medical examiner shall remove the dead body
unless unusual circumstances justifies its immediate removal.
d. Designate a member of the team or summon other policemen
or responsible persons to stand watch and secure the scene,
and permit only those authorized person to enter the same.
e. Identify and retain for questioning the person who firs notified
the police, and other possible witnesses.
f. Determine the assailant through inquiry or observed him if his
identity is immediately apparent. Arrest him if he still in the
vicinity.
Separate the witnesses in order to get independent
statements.
Recording - As a rule, do not touch, alter or remove anything at the
crime scene until the evidence has been processed through notes,
sketches and photographs, with proper measurements.

Searching for Evidence

a) A general survey of the scene is always made, however, to the


location of obvious traces of action, the probable entry and exit
points used by the offender(s) and the size and shape of the area
involved.
b) The investigator examines each item encountered on the floor, walls,
and ceiling to locate anything that may be of evidentiary value. You
should:
i. Give particular attention to fragile evidence that may be destroyed or
contaminated if it is not collected when discovered.
ii. If any doubt exists as to the value of an item, treat it as evidence until
proven otherwise.
iii. Ensure that the item or area where latent fingerprints may be present is
closely examined and that action taken to develop the prints.
iv. Carefully protect any impression of evidentiary value in surfaces
conducive to making casts or molds.
iv. Note stains, spots and pools of liquid within the scene and treat them as
evidence.
v. Treat as evidence all other items, such as hairs, fiber, and earth
particles, foreign to the area in which they are fund – for example, matter
found under the victim’s fingerprints.
vi. Proceed systematically and uninterruptedly to the conclusion of the
processing of the scene. The search for evidence is initially completed
when, after a thorough examination of the scene, the rough sketch,
necessary photograph and investigative note have been completed and the
investigator has returned to the point from which the search began. Further
search may be necessary after the evidence and the statements obtained
have been evaluated.
a) In large outdoor areas, it is advisable to divide the area into strips
about four (4) feet wide. The policeman may first search the strip on
his left he faces the scene then the adjoining strips.
b) It may be advisable to make a search beyond the area considered to
be immediate scene of the incident or crime. For example, evidence
may indicate that a weapon or tool used in the crime was discarded or
hidden by the offender somewhere within a square-mile area near the
scene.
c) After completing the search of the scene, the investigator examined
the object or person actually attacked by the offender.
METHODS OF CRIME SCENE SEARCH
Methods of Crime Scene Search

A. Strip Search Method The three (3) searchers A, B, and C proceed slowly at the
same place along paths parallel to one side of the rectangle.

B. The double strip or grid method of search is a modification of the Strip Search
Method. Here, the rectangle is traversed first parallel to the base then parallel to a
side.

C. Spiral Search Method - searchers follow each other along the path of a spiral,
beginning on the outside and spiraling in toward the center.

D. Wheel Search Method. The searchers gather at the center and proceed outward
along radii or spokes. The procedure should be repeated several times depending on
the size of the circle and number of searchers.
Collecting Evidence. This is accomplished after the search is completed, the rough
sketch finished and photographs taken. Fragile evidence should be collected as they
are found. All firearms (FAs) found to have tampered serial numbers (SNs) shall be
automatically subjected to macro etching at the Philippine National Police Crime
Laboratory (PNP-CL). A corresponding report to the Firearms and Explosive Office
(FEO) must be made for verification purposes. In the collection, the investigator
should touch the evidence only when necessary.

Removal of Evidence. The investigator places his initials, the date and the time of
discovery on each item of evidence and the time discovery on each item of evidence
for proper identification. Items that could not be marked should be placed in a
suitable container and sealed.
Tagging or Evidence. Any physical evidence
obtained must be tagged before its
submission to the evidence custodian.

Evaluation of Evidence. Each item of


evidence must be evaluated in relation to all
other evidence, individually and collectively.
Preservation of Evidence. It is the investigator’s responsibility
to ensure that every precaution is exercised to preserve
physical evidence in the state in which it was
recovered/obtained until it is released to the evidence
custodian.

Releasing the Scene. The scene is not releases until all


processing has been completed. The release should be
effected at the earliest practicable time, particularly when an
activity has been closed or its operations curtailed.
GENERAL TYPE OF SKETCH
GENERAL TYPE OF SKETCH

Rough Sketch- made at the crime scene, no scale,


proportion ignored and everything is approximate

Finished Sketch- for courtroom presentation, scale


and proportion are strictly observed.
Kinds of Sketch

1. Sketch of locality gives a picture of the crime scene in


relation to its environs including neighboring buildings, roads,
etc.

2. Sketch of grounds includes the crime scene and its nearest


environment, ex a house w/ a garden

3. Sketch of details describes the immediate crime scene


only.
SCENE OF CRIME OPERATION (SOCO)

Composition of SOCO Team

The SOCO team is composed of but not limited to the following depending on the
nature of the case:
1. Team Leader
2. Assistant team leader
3. Photographer and photographic log recorder
4. Sketcher and Evidence Recorder
5. Evidence Recorder
6. Evidence Recovery Personnel
7. Driver/Security
Equipment

1. Basic Equipment - Crime Scene tape or Rope (Police Line),


Measuring device e.g. ruler and measuring tape, Recording materials
e.g. chalk, sketcher and paper pad, Camera with film, Video camera
or tape recorder, Evidence collection kit, Flashlight

2. Evidence Containers - String tags-large and small, Evidence tape


or masking tape, Roll of manila paper for wrapping, Plastic gallon, ½
pint bottles/vials-plastic and glass, ¼ pint bottles/vials-plastic glass,
Absorbent cottons, Rolls of fingerprint tape, Plastic bags-different
sizes, Paper bags-different sizes
3. Tools - Pair of scissors, Knife-heavy duty and folding knife, Adjustable
wrench, Pliers, Wire cutter, Complete screw driver set, Saw, Hammer, Ax
of hatchet, Shovel, Fingerprint magnifier, Nylon brush, Magnet, Spatula,
Box of plaster of Paris for casting or lifting foot marks, Goggles, Sifting
screen, Funnels of different sizes, Ladder, Hand lens of magnifier,
Weighting scale, Vernier caliper and micrometer, Scalpels

4. Evidence Gathering Equipment - Rubber glove and cotton, Box or filter,


White cotton sheet, Cotton balls and swabs, Fingerprint car, data card
and ink cards, Photo data card, Black and white latent print lifting cards,
Rolls of lifting card, Complete magna brush kit, Complete dusting kit,
Heavy duty rubber lifters, Camera whit no wide angel, normal and macro
lens, Arson kit, Casting and molding kit, Electric engraver
5. Miscellaneous - Rubber bands, Pencil, ball pens, pentel
pen-different color, Chalks, Permanent flat marker, Eraser,
Stapler with extra staple, Assorted paper clip and binders,
Notebooks, paper pads, sketch pads and drawing pads,
Drawing compass, Clippers, Magnetic directional compass,
Carbon papers and coupon bonds.
SCIENTIFIC AIDS TO CRIMINAL INVESTIGATION
SCIENTIFIC AIDS TO CRIMINAL INVESTIGATION

The scientific tools a criminal investigator can use are:

a. Fingerprinting (Dactyloscopy)
b. Photography
c. Forensic Chemistry
d. Medico-legal
e. Forensic Ballistics
f. Questioned documents examination
g. Polygraphy
h. DNA Analysis
DNA: THE LATEST SCIENTIFIC TOOL

Deoxyribonucleic Acid (de–ak–si–ri–bo–n(y)u–kle–ik) - is a


chemical substance found in all cells of living organism whose
composition have been passed on from parents to offsprings. It is
called as the genetic or hereditary material. A person’s DNA is the
SAME in every cell. It is contained in blood, semen, skin cells, tissue,
organs, muscle, brain cells, bone, teeth, hair, saliva etc.

Chemically, it is an acid and is composed of three sub-units, namely:

1. the phosphate group


2. a deoxyribose sugar, and
3. one of the four bases – Adenine (A), Thymine (T), Cytosine
(C) and Guanine (G)
BIOLOGICAL EVIDENCE AMENABLE FOR DNA ANALYSIS

 blood and bloodstains


 semen and seminal stains
 hair with follicle/root
 saliva and buccal cells
 tissues and skin cells
 organs
 bone marrow and bones
 teeth
LINE UP OF CASES WHERE DNA ANALYSIS MAYBE
USEFUL

 Sexual assault cases like RAPE


 Murder
 Homicide
 Robbery
 Hit and run
 Extortion
 Paternity cases
 Identification of remains in mass disaster
IDENTIFYING DNA EVIDENCE
IDENTIFYING DNA EVIDENCE
EVIDENCE Possible location of Source of DNA
DNA on the evidence
baseball bat or similar handle, end sweat, skin, blood, tissue
weapon
hat, bandanna, or mask inside sweat, hair, dandruff
eyeglasses nose or ear pieces, lens sweat, skin
facial tissue, cotton swab surface area mucus, blood, sweat, semen, earwax

dirty laundry surface area blood, sweat, semen


toothpick tips saliva
used cigarette cigarette butt saliva
stamp or envelope licked area saliva
tape or ligature inside/outside surface skin, sweat
bottle, can, or glass sides, mouthpiece saliva, sweat
used condom inside/outside surface semen, vaginal or rectal cells
blanket, pillow, sheet surface area sweat, hair, semen, urine, saliva
“through and through bullet outside surface blood,tissue

bite mark person’s skin or clothing saliva


fingernail, partial fingernail scrapings blood, sweat, tissue
COLLECTION OF DNA EVIDENCE
EVIDENCE CONDITION LOCATION COLLECTION MODE

DRIED Stain Small object Collect entire item.


BLOOD Stain Vehicle, Upholstery, Cut out stained area. Package separately. Collect
Stain Carpet, Wall paper, control.
Spatters Wood a. Scrape into paper packet. Collect control.
Unmovable surface, b. Transfer onto moistened cotton thread. Air dry
concrete wall thread.
Unmovable surface Tape lifting. Place in container.

SEMEN Liquid Victim a. Collect sample with rape kit.


Liquid Object, Scene b. Collect sample with swabs.
Wet Clothing Keep in refrigerator.
Dried stain Clothing, Carpet a. Collect liquid semen into tube.
Upholstery b. Transfer onto cotton cloth.
Unmovable surface Air dry.
Air dry. Package separately.
Collect as is. Package separately.
Cut out section with stain. Collect control.
Scrape sample into paper packet.
Collect control.
BLOOD Liquid Person Collect in EDTA tubes.
Liquid Scene a. Use syringe, collect into EDTA tube.
b. Transfer onto cotton cloth. Air dry.

BLOOD Clot Scene a. Collect clot in test tube.


b. Transfer onto cotton cloth. Air dry.

BLOOD Wet Clothing Air dry at room temperature. Package in paper bag.
Wet Object Air dry at room temperature. Package in paper bag.
Wet Water Collect sample with syringe. Place sample in plastic
container. Freeze sample.

DRIED Crust Person, Scene, Scrape crust into paper packet. Collect control blank.
BLOOD Stain Object Collect item directly.
Weapon
EVIDENCE CONDITION LOCATION COLLECTION MODE

URINE Liquid Person Direct deposit in container. Keep refrigerated.

SALIVA Liquid Scene Use syringe transfer into test tube. Keep
refrigerated.

TISSUE, Fresh Scene Place in container. Keep refrigerated.


ORGAN Dried Scene Place in container.
BONE

HAIR With tissue Scene Collect hair with tissue in container. Keep
With blood Scene refrigerated.
Intact hair Scene Separate hair from blood. Air dry. Collect in paper
Fragments Scene packet.
Control Person Pick up sample with clean forceps. Place in paper
packet.
Tape lift. Package in container.
Pulled (at least 20).
STAGES OF DNA ANALYSIS

 EXTRACTION – to obtain the DNA material from the specimen. Two commonly
used methods are Chelex, DNA IQ (rapid methods) and organic extraction.

 QUANTITATION - to determine the amount of DNA material extracted from the


sample. NBI make use of the QUANTIBLOT kit which is human specific and
highly sensitive up to picogram level.

 DNA AMPLIFICATION by PCR (Polymerase Chain Reaction)– to make many


copies of specific DNA fragment. PCR is a synthesis reaction that is repeated for
a number of cycles and results in exponential accumulation of the specific DNA
fragment. The thermal cycler is the machine that does this PCR and is compared
to a Xerox machine.
RA 7438

An Act Defining Certain Rights Of Person Arrested,


Detained Or Under Custodial Investigation As Well As
The Duties Of The Arresting, Detaining And
Investigating Officers, And Providing Penalties For
Violations Thereof.
Section 2. Rights of Persons Arrested,
Detained or Under Custodial
Investigation; Duties of Public Officers. –

(a) Any person arrested, detained or under


custodial investigation shall at all times be
assisted by counsel.
(b) Any public officer or employee, or anyone
acting under his order or his place, who arrests,
detains or investigates any person for the
commission of an offense shall inform the latter, in
a language known to and understood by him, of
his rights to remain silent and to have competent
and independent counsel, preferably of his own
choice, who shall at all times be allowed to confer
privately with the person arrested, detained or
under custodial investigation. If such person
cannot afford the services of his own counsel, he
must be provided with a competent and
independent counsel by the investigating officer.
(c) The custodial investigation report shall be
reduced to writing by the investigating officer,
provided that before such report is signed, or
thumb marked if the person arrested or detained
does not know how to read and write, it shall be
read and adequately explained to him by his
counsel or by the assisting counsel provided by
the investigating officer in the language or
dialect known to such arrested or detained
person, otherwise, such investigation report shall
be null and void and of no effect whatsoever.
(d) Any extrajudicial confession made by a
person arrested, detained or under custodial
investigation shall be in writing and signed by
such person in the presence of his counsel or in
the latter's absence, upon a valid waiver, and in
the presence of any of the parents, elder
brothers and sisters, his spouse, the municipal
mayor, the municipal judge, district school
supervisor, or priest or minister of the gospel as
chosen by him; otherwise, such extrajudicial
confession shall be inadmissible as evidence in
any proceeding.
(e) Any waiver by a person arrested or
detained under the provisions of Article
125 of the Revised Penal Code, or under
custodial investigation, shall be in writing
and signed by such person in the
presence of his counsel; otherwise the
waiver shall be null and void and of no
effect.
(f) Any person arrested or detained or under
custodial investigation shall be allowed visits by or
conferences with any member of his immediate
family, or any medical doctor or priest or religious
minister chosen by him or by any member of his
immediate family or by his counsel, or by any
national non-governmental organization duly
accredited by the Commission on Human Rights of
by any international non-governmental
organization duly accredited by the Office of the
President. The person's "immediate family" shall
include his or her spouse, fiancé or fiancée, parent
or child, brother or sister, grandparent or
grandchild, uncle or aunt, nephew or niece, and
"CUSTODIAL INVESTIGATION" shall
include the practice of issuing an
"invitation" to a person who is
investigated in connection with an
offense he is suspected to have
committed, without prejudice to the
liability of the "inviting" officer for any
violation of law.

You might also like