LAW ENFORCEMENT OPERATIONS Word
LAW ENFORCEMENT OPERATIONS Word
LAW ENFORCEMENT OPERATIONS Word
Course Outline:
This course outline provides a comprehensive overview of the key topics and modules
covered in the course on law enforcement operation and planning with crime mapping. Each
module is designed to build upon the foundational knowledge and skills needed to utilize crime
mapping techniques in law enforcement settings effectively. Students will be able to engage with
the material through lectures, case studies, practical applications, and discussions to enhance
their understanding of the subject matter.
Module 1
Time of Making an Arrest – An arrest may be made on any day and at any time of the day or
night.
Miranda Rights
1. The right to be informed of the cause and nature of the accusation
2. The right to remain silent
3. The right to counsel
Arrest without a Warrant
a.) “When, in his presence, the person to be arrested has committed, is actually committing, or
is attempting to commit an offense” (par. A, Sec. 5, Rule 113);
This is also termed inflagrante delicto arrest.
b.) “When an offense has just been committed, and he has probable cause to believe based on
personal knowledge of facts or circumstances that the person to be arrested has committed
it” (par. B, Sec. 5, Rule 113); This is also known as hot pursuit arrest. The phrase “has just
been committed” connotes “immediacy” (Pestilos vs. Generoso, G.R. No. 182601 November
10, 2014). The measurement of immediacy is between the time the offense was committed
and the time the arrest was made.
c.) “When the person to be arrested is a prisoner who has escaped from a penal establishment
or place where he is serving final judgment or is temporarily confined while his case is
pending, or has escaped while being transferred from one confinement to another” (par. C,
Sec. 5, Rule 113).
Custodial Investigation – shall include the practice of issuing an “invitation” to a person who is
investigated in connection with an offense he is suspected to have committed, without prejudice
to the liability of the “inviting” officer for any violation of law.
Seizure- detention of an individual or her property, and removing that property from the control
of the citizen, or in effect, taking control of the individual.
Search Warrant- A search warrant is an order in writing issued in the name of the People of the
Philippines, signed by a judge and directed to a peace officer, commanding him to search for
personal property described therein and bring it before the court (sec. 1, Rule 126, Rules of
Court).
Modes of Search
1. Search by Virtue of a Warrant – A mode of search executed by law enforcers upon the written
order of the Judge.
2. Warrantless Search – A mode of search by police officers executed without the benefit of a
warrant.
Validity of Search Warrant
A search warrant shall be valid for ten (10) days from the date of its issuance and
thereafter considered void once not executed within the period required (Sec. 10, Rule 126,
Rules of Court).
Time of Making Search
Section 9, Rule 126 of the Rules of Court clearly states that “the warrant must direct that
it be served in the day time, unless the affidavit asserts that the property is on the person or in
the place ordered to be searched, in which case a direction may be inserted that it be served at
any time of the day or night.” Same mandate is stated under Rule 14.3 of the Philippine National
Police Handbook (2013).
Rules on the Use of Body-Worn Cameras in the Execution of Warrants (A.M. No. 21-06-08-SC)
• During search it is required to have at least one body-worn camera and one alternative
recording device, a minimum of two devices to capture the events during the execution of the
arrest.
• In case of unavailability, the officer can file a motion before the court, to use alternative
devices.
• When searching by virtue of the warrant, the officers wearing the body-worn camera shall
notify the person/occupants to be searched that the search is recorded
• Video and audio recording shall be activated upon arrival at the scene to be searched
Module 2
Checkpoints (Philippine National Police Handbook (2013)
Rule 11.2 Composition
In the conduct of checkpoint proper, the checkpoint team shall be composed of, but not
limited to, the following:
a. Team Leader (TL) - shall lead and take responsibility in the conduct of checkpoint preferably
an officer with the rank of at least Police Commissioned Officer;
b. Spotter - PNP personnel who will point/profile suspected vehicle subjects for checkpoint;
c. Spokesperson - TL or member who is solely in charge of communicating with the motorists
subject to the checkpoint;
d. Investigation Sub-team - in charge of investigation and documentation of possible incidents in
the checkpoint including the issuance of a Traffic Citation Ticket (TCT) or Traffic Violation
Report (TVR);
e. Search/Arresting Sub-Team - designated to conduct search, seizure, and arrest, if necessary;
f. Security Sub-Team - tasked to provide security in the checkpoint area; and
g. Blocking/Pursuing Sub-Team - team tasked to block/pursue fleeing suspects/vehicles.
Police Patrol
An organization within an organization. It serves as the nucleus or focal point of the
department.
Classification of Police Functions
1. Line Functions- are the “backbone” of the police department; they include such operations as
patrol, investigation, traffic control, vice control, and juvenile control as well as supervision of
the personnel performing those operations.
2. Staff Functions- Staff functions are those operations designed to support the line functions,
Staff members are necessarily advisors who are typically assigned to planning, research,
legal advice, budgeting, and educational services. Staff members are often civilians with
specialized training who serve within the department but do not deal with daily operations on
the street.
3. Auxiliary Functions- Auxiliary functions involve the logistical operations of the department.
These include training, communications, jailing, maintenance, record keeping, motor
vehicles, and similar operations.
Objectives Of Police Patrol
1. Preventive Enforcement - falls under the heading of protection, and involves the prevention of
crime through the noticeable presence of police vehicles and personnel.
2. Selective Enforcement - This involves going either where the trouble is, or where the trouble
is likely to occur.
3. Traffic Enforcement- Large police departments have traffic divisions, but the majority of the
departments are small, and have only patrol division to handle traffic enforcement.
4. Emergency Call for Service- One of the duties and purposes of patrol is the handling of
emergency calls for service.
Types Of Patrol
1. Foot Patrol – it is the most expensive type of patrol in terms of human resources and most
departments have reduced their foot patrols to a minimum because of this.
3. Helicopter Patrol – the most expensive type of patrol in terms of financial resources.
Helicopters are costly which makes procurement a challenge. Usually, this type of patrol is
used in securing a vast area.
4. Canine Patrol – a type of patrol that uses canine dogs to detect explosives and illegal drugs
in luggage.
5. Bicycle Patrol – a type of patrol that utilizes bicycles in monitoring an area. It can gain access
to small alleys which makes crime prevention more effective.
6. Cyber Patrol – the most latest type of patrol where police officers savvy with computer
technology monitor computer data and transactions to detect crimes such as money
laundering, pornography, prostitution, human trafficking, and others.
Inquest Procedures
The inquest proceedings shall commence upon the presentation of the arrested person
by the police officer before the inquest prosecutor. The concerned police officer shall also
submit the following documents:
a. Affidavit of Arrest;
b. Statement(s) of the complainant(s);
c. Affidavit(s) of the witness(es) if any; and
d. Other supporting evidence gathered by law enforcement authorities in the course of their
investigation of the criminal incident involving the arrested person.
Documents to Be Submitted
The investigator shall ensure that, as far as practicable, the following documents shall be
presented during the inquest proceedings:
d. Theft and Robbery Cases, Violation of the Anti-Piracy Law, Anti- Highway Robbery
Law, and Violation of the Anti-Fencing Law
1) List/Inventory of the articles and items subject of the offense; and
2) Statement of their respective value.
e. Rape, Seduction, and Forcible Abduction with Rape Cases
1) Medico-Legal Report (Living Case Report), if the victim submitted herself for medical or
physical examination.
f. Violation of the Anti-Carnapping Law
1) Machine copy of the certificate of motor vehicle registration;
2) Machine copy of the current official receipt of payment of the registration fees of the subject
motor vehicle; and
3) Other evidence of ownership.
g. Violation of the Anti-Cattle Rustling Law
1) Machine copy of the cattle certificate of registration; and
2) Picture of the cattle, if readily available.
h. Violation of Illegal Gambling Law
1) Gambling paraphernalia;
2) Cash money, if any.
Module 3
POLICE PLANNING
POLICE PLANNING – is a tool to ensure the accomplishment of the public safety objectives
and mission, its components such as the police, fire, and jail operations must adopt the utmost
skill and careful planning.
Types Of Police Plans
1. Policy or procedural plan – This refers to the Standard operating procedure (SOP) which
serves as a guide to members performing routine field operations which includes some
special operations under the following procedures:
a. Field Procedures – designed to be used in situations of all kinds, and provided to guide
officers and men in the field.
b. Headquarters Procedures – designed to guide officers assigned in the duties of dispatching,
jails, or matrons and other personnel concerns could be reflected in the duty Manual.
c. Special Operating Procedures – designed to guide members operating under the special
operation.
2. Tactical plans – These are procedures designed to deal with specific situations at known
locations. Included in this type are plans for dealing with an attack against buildings with alarm
systems and an attack against police headquarters by lawless elements. Further, plans for the
conduct of blockades, jail emergencies, and procedures for the holding of special community
events, such as larger public meetings, athletic contests, parades, religious celebrations,
carnivals, strikes demonstrations, and other street affairs are also included in this category.
3. Operational plans – These are plans designed for operations of operation divisions like the
patrol, detectives, traffic, fire, and juvenile control divisions. These plans are prepared for the
effectiveness of carrying out primary police tasks. For instance, patrol activities are outlined in a
way to cover the areas which are seen as crime-prone areas and its units are distributed based
on the needs of service and special details as forecasted by the decision-makers. Similar plans
are needed in crime prevention programs, juvenile and vice control require mapping of activities
in an orderly manner to attain maximum effectiveness of its operation.
SITAR Model
The SITAR model – was then portrayed as a bunch of five conventions, for example, synoptic
planning, incremental planning, transactive planning, advocacy planning, rational
planning and radical planning. These in no way, shape, or form exhaust the scope of
contemporary planning customs, however, they cover enough ground to delineate the significant
improvements in planning hypothesis and practice since about 1960, advancements which have
grown up.
Disadvantages:
• Limiting the number of alternatives and results considered normally creates a chance of
missing the most ideal arrangement.
• Decision-creators for the most part settle for an adequate ‘sufficient’ alternative and the nature
of an ultimate choice brings it down.
• Often difficult to reveal a radical proposition utilizing this methodology, since the change at
each stage should be little.
• Works just for circumstances where nonstop dynamic and execution are satisfactory.
3. Transactive planning – is one alternative rather than complete sensible planning. This sort of
acumen depends on individual correspondence and talk among planners and the people
influenced by planning. It depends on social learning theories, gathering, and sharing
information, and helping social developments with acquiring from their experiences. In
Transactional planning, the goal is shared learning. The transactive planning approach is based
on the unsullied experience of people’s lives uncovering policy issues to be tended to. Planning
isn’t finished concerning a strange target neighborhood beneficiary yet in very close contact with
the people impacted by decisions. Planning contains less of field studies and data
examinations, and a more noteworthy measure of social trade set apart by a pattern of normal
learning Transactive planning moreover insinuates the progression of decentralized planning
establishments that assist people with accepting expanding accountability for the social cycles
that supervise their administration help. The reason for the Transactive planning model is to
make the goals, which are accomplished by human interchanges and discourse among
planners and the individuals influenced by planning.
4. Advocacy planning – was developed in the sixties. It was established in enemy systems
displayed upon the legitimate profession and generally applied to shield the interests of the frail
against strong local communities, natural causes, poor people, and the disappointment against
the setup forces of business and government and it was characterized and discussed by Paul
Davidoff. One impact of the advocacy planning has been to move the detailing of social policy
from reserved alcove dealings out of the shadows. Especially in working through the courts, it
has infused a more grounded portion of standardizing standards into planning and more
prominent affectability to unintended results of choices. A build-up of this can be found in the
expanding prerequisites for ecological, social, and monetary effect reports to go with a huge
scope project proposition, regardless of whether starting in the private or public area. Another
outcome has been the more grounded linkage between social researchers and legal executive
cycles in policy choices.
Advantages:
• Raising the public’s mindfulness.
• Method of participatory planning and drawing in with the more extensive local area.
• Allows planners to contend among themselves while speaking to the perspectives of
their customers.
• Raise the standard and nature of planning practices and results.
• Creating a climate that energizes uplifting perspectives towards helpful cooperation.
Criticism:
• Traditional planners are the significant criticizers-they couldn’t acknowledge the idea of
pluralism and the state of numerous interests in planning.
• Too entrusting and hard for the planners in question.
• Advocate Planners are demographically not quite the same as their ‘customers’.
• Raises assumptions among the helpless that can’t be met.
• Weakens the political impact of poor people.
5. Radical planning – a stream of metropolitan planning that tries to oversee advancement in a
fair and local area-based way. It is a vague custom, with two standards of reasoning that
occasionally stream together. One rendition is related to unconstrained activism, guided by an
optimistic yet even-minded vision of confidence and a common guide. Like transactive planning,
it focuses on the significance of self-awareness, an agreeable soul, and independence from
control by unknown powers. More than other planning draws near, nonetheless, its place of
flight comprises explicit meaningful thoughts regarding aggregate activities that can accomplish
solid outcomes in the short term. The second stream of radical ideas takes a more basic and
comprehensive gender everywhere to scale social cycles: the impact of class structures and
monetary connections; the control practiced by culture and media; and the authentic elements
of social developments, encounters, collisions, and battles. The emphasis is less on specially
appointed critical thinking through the revived local area, and more on the hypothesis of the
state, which supposedly permeates the personality of social and financial life at all levels, and
thus decides the design and development of social issues.
Planning Process
The cycle of radical planning follows:
• Criticism of the ‘current request’ of the given practice (or set up traditions).
• Creation of new information, elaboration of an elective proposition (‘rising above’).
• Development of activity system and strategies.
• Dissemination of ‘data’, discovering partners.
• Clash/Conflict with the current request and organizations.
• Expansion on account of achievement
General Steps in Planning
The following steps provide an orderly means of development of plans:
a. Frame of reference. It involves the analysis of the matters relating to the issue, concern, and
opportunities for which needs are identified that calls for immediate actions.
b. Clarifying the problems. This involves the identification and understanding of the problem
which requires a solution. A situation must exist for which something to be done or simply
means the determination of the objectives.
c. Collecting all pertinent facts. This involves the collection of pertinent facts relative to the
problem where the solution is being sought for.
D. Analyzing the facts. After gathering all the data needed, careful analysis and evaluation of
these data are made.
Module 4
CRIME MAPPING
The process through which crime analysts and researchers use location information
about crime events to detect spatial patterns in criminal activity. Early crime mapping efforts
typically involved placing physical markers, such as pins, on maps to designate the locations
where crimes occurred. Patterns of criminal activity were determined primarily through visual
inspection of these maps (Swatt, 2009, p.398).
Historical Background
The history of crime mapping can be traced back to early times when police officers
needed an indication to signify the place of occurrence of a crime. Physical markers such as
pins, and highlighters such as crayons, were used as a designation of the place (Swatt, 2009).
Unlike crime analysis, the history of crime mapping begins not with the establishment of the first
police force, but with researchers long before computers were invented. Contemporary theorists
in the field of criminology in their respective empirical research studies examined crimes in
relationship to the geographical areas of occurrence so as in connection to sociological factors.
In the 1800s, reliable maps were not readily available and census data were not
regularly collected, as they were in France and England at that time. The first substantive spatial
analysis of crime in the United States was conducted in the 1920s and 1940s by urban
sociologists in Chicago. Their crime research and related crime maps linked crime and
delinquency to factors such as social disorganization and poverty. These scholars’ spatial
analysis of juvenile delinquency and social conditions in Chicago is considered to be one of the
foremost examples of crime mapping in the first half of the 20th century (Groff & La Vigne,
2002). The sociologists who studied delinquency and its spatial distribution were Shaw and
McKay (1942).
2. Graduated Mapping - In this type, the analyst uses different symbols, colors, or shapes to
feature a particular representation (Santos, 2005). Like single symbol maps, the sizes of the
symbols used for point and line features of graduated size maps reflect their value. As noted
above, single-symbol maps are not appropriate for displaying data about crimes that occur at
the same locations repeatedly. Analysts use graduated size maps for this purpose because
these maps can account for multiple incidents at the same locations (Santos, 2005). Be it made
clear however that like single-symbol maps, graduated size maps are subject to overlapping
points if too many data are analyzed at once.
Disadvantage:
If you use the red shaded circle to represent crime against persons and a yellow shaded
to feature crimes against property, the difficulty of analyzing the map occurs when in a single
location, the same type of crimes occur in large repetitions. The prevalence of overlapping of
the symbols cannot be prevented when the data which the analyst is dealing with, is bulky even
though different colors are used. However, if the data is not too large which is enough for the
symbols of different colors to occupy, a graduated size map could be very useful.
3. Density Mapping - uses point data to shade surfaces that are not limited to area boundaries
(Santos, 2005). The difference between density mapping from other types is that density
mapping gets the use of different locations. Furthermore, in their most basic form, density maps
are shaded according to the concentration of incidents in particular areas (Santos, 2005).
Hence, the darker colors represent areas in which the incidents are more concentrated, and the
lighter colors represent those in which the incidents are less concentrated (Santos, 2005).
Simply put, the darker the color the more crime while the lighter the color the less crime occurs
in a particular location. Density mapping can easily be analyzed considering the concentration
of the symbols. Such maps are used to compare small variations in crime levels from one area
to another rather than to compare levels of crime within fixed artificial geographic boundaries, as
in area maps (Santos, 2005). This means that, unlike other types of mapping, density mapping
purely focused on the rates of crime in different locations other than in one boundary only.
Example:
If you want to know the level of theft occurrences in Negros Occidental, density mapping
could be applied. Finding that District Two has the highest theft occurrences, the police officer
can represent it with the darkest shaded circle while District Three which has the lowest theft
rate, shall be given the lightest shaded color.
4. Interactive Crime Map - Rather than a type of mapping, the term interactive crime mapping
refers to simplified geographic information systems made available to novice users over the
Internet (Santos, 2005). Of the four types of mapping, this is the only type that is accompanied
by technology. Crime mapping in this type is simply computer-based. Many police departments
have interactive websites where citizens and police officers can conduct basic crime mapping
themselves without looking, scrutinizing, or holding actual physical maps. According to Santos
(2005), these applications typically are not flexible or sophisticated enough to be useful to crime
analysts. One of the reasons of its inflexibility is the limited functions built in its system.
However, in the fast modernization of technology, such weaknesses can be corrected and
eliminated. One example of this is the Community Mapping Planning and Analysis for Safety
Strategies or simply COMPASS which is an interactive website hosted by the California Police
Department (Santos, 2005). In that type of mapping, the user can navigate and choose what
data he wants to know. Say for example, if the user wanted to identify the crime levels from one
district to the other, the interactive website will display details corresponding to the request. If
the number of arrests is the data that is being requested, the web will automatically supply the
information.
Prepared by:
Roman Golez, MSCJ, RCrim, CSP
Instructor