CDI 1 Module 5 & 6
CDI 1 Module 5 & 6
FUNDAMENTALS OF
CRIMINAL INVESTIGATION
AND INTELLIGENCE
CDI 1
SYRA B. ENRIQUEZ
Department of Criminal Justice Education
1 | P a g e Crime Detection and Investigation 1
Fundamentals of Criminal Investigation and Intelligence
Bataan Heroes College
CHAPTER V
NOTABLE ACCOUNTS AND HISTORY OF INVESTIGATION (Additional
Information)
I. Who are the pioneers in criminal investigation and what their significant
contributions in the development of crime detection and investigation?
1. KING HAMMURABI
• King of Babylon created one of the first bodies of written law
• The code was then implemented to detect those who refused to obey the law. It
imposes the LEX TALIONES (Law of Retribution)
• LEX TALIONES – It is a principle where punishment of an offender is equal to
what he did or known as (“An eye for an eye and a tooth for a tooth principle”)
A. TEN TITHING – Grouping a 100 persons into one under the charge of the
High Constable. The constable is the first form of English Police deals with serious
breaches of the law.
B. TITHING – Grouping a ten persons together to protect one another and to
assume responsibility for the acts of the group’s members.
8. KATE WAYNE
• First women detective in history criminal investigation that was hired by Pinkerton
Agency.
Other significant developments in the field of criminal investigation include, but are not
limited to, the following events:
20.1859, USA.
• USA Appellate courts recognized/accepted photograph as admissible evidence
when they are relevant and properly verified.
NEW YORK vs. CASTRO was the first case in which the admissibility of DNA was
seriously challenged. It set in a motion a string of events that culminated in a call for
certification, accreditation, standardization, and quality control guidelines for both DNA
laboratories and the general forensic community.
25.1999, USA.
• The FBI upgraded its computerized fingerprint database and implemented the
Integrated Automated Fingerprint Identification System (IAFIS), allowing
paperless submission, storage and search capabilities directly to the national
database maintained at the FBI.
Take note: the evolution of criminal investigation is closely similar with the historical
developments in Criminalistics. To enrich your knowledge in criminal investigation and
Criminalistics, research more on their historical background.
2. JANUARY 9, 1901
• The Manila Police Department was organized with Col. Matthew Harmon as the
first chief of police.
3. 1913
MODULE 6:
POLICE INTELLIGENCE
History of Intelligence
1. Holy Bible- where you can find the just recorded intelligence operations in history.
Moses-One of the first recorded formalized intelligence efforts, with format, can
also be found in the Holy Bible Numbers 13:17
The scripture also named the 12 intelligence agents when the Lord directed Moses
to send into the Land of Canaan and records that “all those men were heads of the children
of Israel”.
4. Sir Francis Walsingham of England- He was credited with creating the first viable
secret service in England. He protected Queen Elizabeth I from countless assassins.
“Regarded as the “First Great Spymaster.”
5. Mata Hari (1876-1917) - Ironically, Mata Hari is one of the best known spies in
history, yet she was one of the worst.
When World War I broke out, Mata Hari was in Berlin, where she had recently
befriended the Chief of police, who subsequently enlisted her into the ranks of the German
Secret Service. She carried on her life as before dancing naked on the stage and dispensing
her services liberally to those who could afford her.
10. Alfred Redl- One of the most brilliant intelligence agents, though he was a
homosexual. He rose to become chief of the Austro- Hungarian Secret Service, or in other
terms, director of their military intelligence system. For more than half of his time as
director of intelligence, Redl was acting as an intelligence agent of Russia. “Homosexual
Double Spy”
11. William “Wild Bill’’ Denovan- headed the Office of Strategic Service
(OSS), the immediate forerunner of the Central Intelligence Agency (CIA).
A lawyer and millionaire Republican, Donovan enjoyed Roosevelt’s trust, friendship and
most crucial of all- direct access to the inner sanctums of the White House
12. Edward I - An English monarch who started utilizing state informants specially to
determine seditious writing against the crown and identify of his enemies.
Rewards are given to wards for every useful information gathered.
5. SIS- Secret Intelligence Service- Great Britains intelligence agency and also known
by its wartime designation, “MI6”, equivalent to US’s CIA, in charge with gathering
information overseas and with other strategic services ranging from foreign espionage
to covert political intervention.
Note:
The counterpart of these intelligence organizations in the Philippines is the National
Intelligence Coordinating Agency (NICA) which is under the Office of the National
Security Adviser
Col. Rudolph Abel - (Russian) - was probably the highest ranking and most successful
spy whoever infiltrated the United States.
Mathew Cevetic- a famous undercover assignment of FBI infiltrated the communist party.
What is Intelligence?
Definition of Intelligence:
In the Military parlance, it is the product resulting from the collection, evaluation,
analysis, integration, and interpretation of all available information which concerns one or
more aspect of foreign nations or are areas of operations and which is immediately or
potentially significant to planning.
In the Police parlance, it is the end-product resulting from the collection, evaluation,
analysis, integration, collation and interpretation of all available information which
concerns one or more aspects of criminal activity significant to police planning operation.
OBJECTIVE OF INTELLIGENCE
▪ The fundamental objective is to ensure rational and timely decisionmaking.
Today all countries have their intelligence services so with all their various
government agencies. They may be different in their organization, efficiency and method
but they all have the basic functions:
1. The collection or procurement of information
2. The evaluation of the information which then become intelligence.
3. The dissemination of intelligence to those who need it.
effective use. Intelligence is useless if it remains in the minds, or in the files of its
collectors or its producers. e. Principle of Selection
Intelligence should be essential and pertinent to the purpose at hand.
f. Principle of Timeliness
Intelligence must be communicated or must be available on time to the decision
maker to permit its most effective use. g. Principle of Usefulness (Use)
Intelligence must be adequate for the purpose for which it will be utilized.
h. Principle of Flexibility
Intelligence must have the ability to change or be changed according to
circumstances. Hench, alternatives must be drawn.
i. Principle of Security
Security is achieved by measures which the intelligence takes to protect and
preserve the integrity of its organization personnel, method, sources, information and
results of its activities.
j. Principle of imagination and foresight
The operator and the agent must be given the leeway to use his resourcefulness to
obtain more than what is normally required.
Intelligence teams which is composed of specialized agents, translator teams and photo
interpreter team usually engaged in the following activities:
PHASES OF RECRUITMENT
The cardinal principle in Police intelligence at all levels is the proper, economical and
most productive use of personnel and equipment employed and/or utilized in planning the
collection of information and dissemination of intelligence
2. CLOSE SOURCES
▪ They can be located inside a building, safe or vaults. 1% of all
information is from close sources. This can be from: Surveillance;
Casing; Elicitation; Surreptitious entry; Employment of technical
means (bugging and tapping); Tactical interrogation; Observation
and description.
➢ These are evaluation based on the existing situation, current domestic and foreign
situations, national objectives, etc. In here, there is no set formula but judgment
and experience are necessary.
3. Establishment of priorities (P.I.R’s)
➢ This is necessary to decide which items of information are more important – a
system of priority is needed; critical importance and lesser importance; EEI –
highest priority intelligence requirements essential to planning.
B. Evaluation
• The determination of the pertinence of the information to the Operation reliability
of the source or of the agency the accuracy of the information; or examination of
raw information to determine intelligence value.
Evaluation to Determine:
a. Pertinence (usefulness) - Does it hold some value to current operation?
Is it needed?
b. Reliability (dependable) -Judging the source of information
c. Credibility (truth of information)
▪ Is it possible for the reported fact or event to have taken place? Is the
report is consistent within itself? Is the report is confirmed or
corroborated by information from different sources or agencies? If the
report does not agree with information from other sources, which one
is more likely to be true?
EVALUATION GUIDE
(CUFNUR)
C. Interpretation
• It is establishing the meaning and significance of information. It involves the
following:
Criteria of Dissemination:
INTELLIGENCE OPERATION
➢ It is the result of intelligence planning. Planning is always ahead of operation
although an operation can be made without a plan. It is usually due to sudden and
inevitable situations but definitely, this is poor intelligence management.
Infiltration - the insertion of action agent inside the target organization
Penetration- recruitment of action agent inside the target organization
1. Body wire/voice transmitter- such materials are usually hidden in a brief case, attached
to
the agents clothing or disguised as a cigarette case, a ball pen, any ordinary functional item
or the packages and the likes.
2.Tracking Devices- it is attached to a vehicle, the subject or the undercover agent w/c
transmit signal to a receiver and specifically indicates location.
6.Audio electronic devices- such as buried mikes, aero bat, micro eye TV camera,
parabolic and shotgun microphone.
Types of Approach:
1. Flattery- people are susceptible to praise Variants:
a. Teacher- Pupil approach- the subject is treated as an authority. We request
him/her to enlighten us and we solicit his viewpoint and opinions. The collector
builds the theme that he is an ignorant student who wants to learn from the all
knowing teacher, in
b. Kindred Soul approach-The subject has been place in a pedestal having some
specialized quality and you flatter him/ her by showing enough concern for his/
her welfare to pay special attention to his enjoyment. The collector attempts to
build on professional brotherhood and understanding of what the source of
information is going through and sharing the source’s frustrations.
c. Good Samaritan approach- is sincere and valid offers of help and assistance
are made to the subject.
d. Idol- The collector builds them based on his/her deep admiration of he source
of information and express curiosity on how one could achieve such greatness.
1. Competition Probe- this is effective when used in connection with the teacher- pupil
approach.
2. Clarity Probe- used to elicit additional information in an area which the response is
clear.
3. High Pressure Probe- it serves to pin down a subject in a specific area or it maybe
used to point out contradictions in what the subject has said.
4. Hypothetical Probe- present a hypothetical situation and to get the subject to react to
the hypothetical situation.
What is Casing?
➢ Literally means putting a thing, or place in a case. As used in intelligence operation
– the continuous monitoring of a place or area at a given period of time.
➢ In intelligence operation, it is reconnaissance or surveillance of a building, place or
area to determine its suitability for intelligence use or its vulnerability in operations.
What is Surveillance?
It is a process or act of keeping person, premises or vehicles under observation in
order to acquire detailed information concerning the activities, identities and contact of the
subject. It is concerned primarily with persons. It involves many varied techniques and
skills including preparation, foot surveillance, automobile surveillance, stationary of fixed
surveillance, and reconnaissance. Also, tailing, shadowing, trailing or keeping the subject
under observation.
Equipment used in the surveillance of a place: Ex: camera w/telephoto lens etc.
1. Turning Corner- If the subject turns a corner, the surveillant should not hurry. If
the subject is lost, the nature of the neighborhood will determine the subsequent procedure.
In most cases, it is preferable to lose the suspect than to alert him to the tail.
2. Entering a Building- If the building is a store, the surveillant should wait until the
subject comes out. In buildings having a number of exits, it is necessary to follow him
inside. If the subject enters an elevator, the surveillant should board the same elevator.
The surveillant may tell the elevator boy that his destination is the same floor as the
subject, or he may proceed to the top floor, if there are more than one surveillant, one
should alight at the subject’s floor and should proceed in a different direction then the
latter can return to the first floor and wait for the subject.
3. Taking a bus- The surveillant should board the same bus, sit behind the subject and
on the same side. If he misses the bus, he should hire a taxi and board the bus at a point
ahead.
4. Taking a taxi- When the subject takes a cab, the surveillant records the time, place
and name of the taxi’s company and license. He should endeavor to follow in another taxi.
If this results in failure, he should trace the taxi by means of recorded information and
ascertain the destination from the taxi driver.
5. Taking a train- If the subject shows his intention of buying a ticket, the surveillant
should endeavor to get in line behind him with one person intervening. If he hears the
destination requested by the subject he may buy a similar ticket. In the event that he is
unable to hear the destination, he should merely request for a timetable.
6. In a restaurant - The surveillant should allow a few minutes to elapse before
following the subject into a restaurant. He should then take an obscure sect and arrange to
finish his meal at the same time as the subject.
7. In a hotel- An inquiry can be made concerning the room of the subject. If he
registered, the surveillant can take the adjoining room.
8. In a telephone booth- The surveillant should either go into the next booth or stand
near enough to hear. He should note the telephone book use and the page at which it was
left open.
9. In the Theater- The surveillant should sit behind the subject and take not of the
various exits which are available.
▪
The complete and accurate awareness by an individual of his surroundings and
encompasses the use of all major senses to register and recognize its operational or
intelligence significance.
DESCRIPTION
▪ The factual reporting of what is observes. Or, it is the actual and factual reporting
of one's observation or the reported sensory experience recounted by another.
Clandestine Operation
➢ Clandestine operation is a secret action undertaken by an intelligence/counter -
intelligence organization in behalf of the Government or other friendly forces.
1. PRINCIPAL AGENT is a managerial agent and in most cases the leader of the
agent network..
2. ACTION AGENT- is the doer of the clandestine task and further classified
according to the task that he was assigned. (e.g. Espionage, Saboteur, Strongman,
Propagandist, Provacateur)
3. SUPPORT AGENT - an agent who engages in activities which support the
clandestine operation. This agent performs all types of auxiliary services at the
direction of the case or project officer.
COVER - Any device by person, organization to insure that one who does not have the
right to know must be aware of the real purpose of the mission. Or it is a means by which
an individual group or organization conceals the true nature of its acts and or existence
from the observer.
COVER STORY - A biographical data through fictional, which will portray the
personality of the agent he assumed: any scenario to cover up the operation.
COVER SUPPORT - An agent assigned in target areas with the primary mission of
supporting the cover story.
UNDERCOVER ASSIGNMENT
➢ It is an investigation technique in which an agent conceals his official identity
to obtain information from that organization.
What are the Types of Undercover Assignment?
Espionage- is the act or practice of spying. The use of spy by a government in order to
discover the military or political secret of other nations.
Sabotage- destruction of property or obstruction of public service to undermine a
government, police, or military effort.
Subversion- is an act that seeks to overthrow a constituted government it is also an act
or instance of subverting.
COUNTER-INTELLIGENCE INVESTIGATION
➢ It is an activity which constitutes the value of work load and includes
specific investigation of individual and incidence which for the most part
are conducted in an overt but discrete manner.
1. SECURITY SURVEY
➢ A counterintelligence service conducted in order to assist the chiefs of
office in determining the security measures required to protect key
installations from possible sabotage, espionage, subversion and
unauthorized disclosure of or access to- classified defense information or
materials.
2. SECURITY INSPECTION
➢ A counterintelligence service conducted in order to determine degree of
compliance with established security policies and procedures.
1. Security
➢ It is the protection of classified information, materials and equipment from
disclosure to unauthorized person.
2. Document Security
➢ The placements of security classification, handling and use of classified
information.
3. Classified Information
➢ This includes all information concerning document cryptographic devices,
development project and materials following on the categories of Top
Secret Confidential or Restricted.
4. Classified Matter
➢ Any information in materials in any form or any nature, the safeguarding of
which is necessary in their interest of Natural
Security and which is classified of such purpose by
the responsible classification authority.
5. Classify
➢ This refers to the assigning of information or material, one of the four
security categories after determination been made that the information
requires the security protection as provided.
6. Declassify
➢ The act of removing the security classification from classified information
or matter.
7. Reclassifying or Regarding
➢ Refers to the act of changing the assigned classification of the classified
information or matter.
8. Upgrading
➢ Refers to the act of assigning the information or matter to the higher
classification than that previously assigned to it.
9. Certification of Destruction
➢ It is a certification by a witnessing officer that the classified matters
described therein has been disposed of in his presence in approved
destruction methods.
13. Unauthorized
➢ Refers to person not authorized to have access on classified matters.
14. Compromise
➢ Takes place through the loss of security, which results from unauthorized
persons, obtained knowledge of classified matters.
d. Area and Unified Commands of the PA, PNP, and its equivalent to the PAF and
PN.
2. Secret (Red Color Code)
Any information and materials, the unauthorized disclosure of which endanger
National Security, causes serious injury to the interest and prestige of the nation or of
any government activity or of great advantage to foreign nation.
Deuteronomy 31:6
Be strong and of a good courage, fear not, nor be afraid of them: for the LORD your God,
he it is that does go with you; he will not fail you, nor forsake you.
-END OF MODULE-