[go: up one dir, main page]

75% found this document useful (56 votes)
161K views64 pages

Cdi 1 Fundamentals of Crim Invest and Intelligence 1000

This document provides definitions for various terms related to criminal investigation and police intelligence. It defines terms such as accessory, accident analysis, active crime scene, agent, alias, alibi, and arson. The document also discusses historical figures involved in early criminal investigation and intelligence work, such as Allan Pinkerton and Alphonse Bertillon. Overall, the document serves as a reference for the fundamental concepts, processes, roles and historical developments in the fields of criminal investigation and police intelligence.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
75% found this document useful (56 votes)
161K views64 pages

Cdi 1 Fundamentals of Crim Invest and Intelligence 1000

This document provides definitions for various terms related to criminal investigation and police intelligence. It defines terms such as accessory, accident analysis, active crime scene, agent, alias, alibi, and arson. The document also discusses historical figures involved in early criminal investigation and intelligence work, such as Allan Pinkerton and Alphonse Bertillon. Overall, the document serves as a reference for the fundamental concepts, processes, roles and historical developments in the fields of criminal investigation and police intelligence.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 64

CDI 1.

FUNDAMENTALS OF CRIMINAL INVESTIGATION AND POLICE


INTELLIGENCE

1. 5th Century B.C., Rome. Rome created the first specialized investigative unit
named as questors/trackers/murderers due to their cruel treatment to suspects
in investigating crimes.
2. Abandonment is a parent's desertion of his/her own child.
3. Accessory is a person who aids or contributes before, during and after an
unlawful act in a subordinate or secondary capacity.
4. Accident Analysis is the process of determining factors on how accidents occur
and how to mitigate and prevent its effects through clinical and statistical
methods.
5. Accident refers to that occurrence in a chain of events that usually produces
unintended. Injury, death or property damage.
6. Accommodation Address is the forwarding address of the agent’s mail
packages other communications (Guevara, 2010).
7. Accomplice is a person who benefits from the crime.
8. Accuracy means the probable truth of the information.
9. Accusation is a complaint or a formal charge to another person claiming that he
or she is responsible for committing a crime or any unlawful act.
10. Accused is to formally charge or declare another person of being guilty of a
punishable offense; to state that one lays blame for a fault, a crime, or
wrongdoing upon a named person.
11. Acquaintance stalking is where the stalker and the victim know each other
only casually.
12. Action is the door of the clandestine task and further classified according to the
task he was assigned.
13. Active CI Measures are those measures that seek actively to block enemies'
effort to gain information or engage in espionage, subversion and sabotage.
14. Active Crime Scene is a crime scene that is still giving off evidence and has not
yet been completely processed and cleaned. A single Officer-in-charge is
responsible for coordinating the investigation at the scene. Unauthorized
people (including witnesses) must be excluded from an active crime scene. In
contrast with Passive Crime Scene.
15. Active Measures are measures that seek activity blocks the enemy’s effort.
16. Active Operation means all organs of every security system whose task is to
prevent intelligence activity in a given area.
17. Activity is the product of the knowledge after the collection processing
dissemination and used.
18. Actus Reus is proof that a criminal act has occurred.
19. Adipocere is the soapy appearance developed by a body in a hot, moist
location.
20. Admission is a statement containing some of the information about the
elements of a crime, but not a full confession.
21. Admission is only as acknowledgement of a fact or circumstance from which
guilt may be inferred. It implicates but does not directly incriminate.
22. After Mission Report is an account submitted immediately upon completion of
mission by an undercover agent (Guevara, 2010)
23. Agent Handling is the management of agents, principal agents and agent
networks by intelligence officers typically known as case officers.
24. Agent in Place is an agent who has been recruited by intelligence service w/in
a highly sensitive service.
25. Agent is a person that who is aware that he/she is engage in counter operation
activity and willingly accepts control and direction. This person acts on behalf
of another whether individual, organization or foreign government, works
under the direction of a principal agent or case officer.
26. Agent Mixed is three or more agent assessing for the same assignment.
27. Agent of Influence is an agent who uses influence to gain info.
28. Agent Provocateur was employed by the Russian for the purpose of internal
security and political repression.
29. Aggravated Assault is an unlawful attack intended to inflict severe bodily
injury upon another person. Also called Felonious Assault. In some specific
instances, law enforcement officers, teachers, and people operating public
conveyances can legally use reasonable physical force.
30. Aggressor is one who aggresses; a person who initiates a quarrel, or fight,
making an unprovoked attack.
31. Aging Cover is the process of being in an area/ condition/ cover and
undercover for the considerable period of time to acquire a seemingly true
identity for the purpose of gaining root of his accepted fictitious background.
32. Agitator is a person who engages in spying or in support of those who do, or
who seeks to detect them. And whose primary objective is to obtain
information pertaining to process, activities, movements or operations of others
(Guevara, 2010).
33. Agriprof is a person or group of persons tasked to agitate and spread
propaganda among the population usually for a certain cause (Guevara, 2010).
34. Aid and Abet is any assistance rendered by encouraging words, acts support, or
presence.
35. Aircraft was introduced as a method of conducting aerial reconnaissance.
36. Akbar is the “Great Mogul” and sagacious master of Hindustan who employed
more than four thousand agents for the sole purpose of bringing him the truth
that his throne might rest upon it.
37. Alexander The Great is the King of Macedonia, became the first ruler to utilize
intelligence as a weapon of government.
38. Alfred Redl is one of the most brilliant intelligence agents, though he was
homosexual. Chief of the Austro-Hungarian secret service and at the same time
agent of the Russia (convicted of treason-he committed suicide).
39. Algor Mortis is the postmortem cooling process of the body. This can be
helpful in homicide investigations.
40. Alias is a fictitious name sometimes used by fleeing felons/criminals; a false
name used to conceal true identity.
41. Alibi is a plea of having been somewhere else at the time of a crime.
42. Allan Pinkerton (1819-85) showed an early interest in the world of Chartism
before immigrating to the United States in 1842.
43. Allan Pinkerton is America’s foremost private detective. By profession, he was
a self-employed barrel and cask maker. While scouting for wood supplies to be
used in his business, he detected and later apprehended a local gang of
counterfeiters. Soon after his counterfeiting experience, local citizens besieged
him for assistance in recovering stolen property and other investigative
matters.
44. Alphonse Bertillon is a French police clerk who introduced the first systematic
identification system based on Anthropometry or Anthropometrical
Signalment. Recognized as the founder of Criminal Identification.
45. Analysis is to determine the significance of the information.
46. Analysis of the area of Operation is a detailed comprehensive study with
emphasis on weather and terrain data designed to enable the COP to determine
the effects of the area of operation on the opposing forces.
47. Anarchist is a person who proposes the over-throw of the government by
creating disorder and violence.
48. Angle Collision is an impact between two traffic units approaching on separate
roadways or other paths that intersect.
49. Announced Inspection is one w/c has been so published to the office that all
concerned personnel are usually aware of its imminence to certain selected
personnel.
50. Announced Security Inspection is an inspection whose imminence is known
only.
51. Anonymous Informant is those who give information through the telephone
with the hope that the informant cannot be identified.
52. Anonymous Informants include those anonymous letter senders, phone callers,
or text senders who give information about suspects or fugitives of justice.
53. Anthrax is a single-celled bacterial organism capable of forming spores. Used
as a biological weapon producing pneumonia-like symptoms (Guevara, 2010).
54. Anthropometry was based on the fact that every human being differs from
every other one I the exact measurements of the body, and that the sum of
these measurements yields characteristics formula for each individual
(Florendo, 2012).
55. Anti-terrorism is a defensive measure used to reduce vulnerability to terrorist
acts (Guevara, 2010).
56. Approach is a process of getting people to start talking.
57. Area Condition and Habit is a description of the locality as whether the place is
a residential, commercial, highly urbanized, rural condition, income of
operation, operation data.
58. Area of Operation is the aspect of the operational environment exclusive of the
military forces involved (Guevara, 2010).
59. Area Target Study is an act of collecting and analyzing available information
about an area.
60. Arrest is the legal taking of a person into custody in order that he may bind to
answer for the commission of an offense. (Sec 1, Rule 113)
61. Arson is the malicious, deliberate burning of a building or property.
62. Artificial Cover is the technique of using fabricated biographical data adopted
for the purpose.
63. Asphyxiation is a condition where the brain and body tissues receive
insufficient oxygen to support the red blood cells.
64. Assault means (1) Unlawfully threatening to harm another person, (2) actually
harming another person, or (3) attempting to harm another person. Includes
not only threats of bodily harm and attempts to cause bodily harm, but also
(usually) battery.
65. Assessment is the shifting and shorting evaluated information with respect to
the mission.
66. Assets as used in intelligence service refers to the institution, agencies and
organization or juridical person.
67. Assimilate means to be absorbed into the system of a foreign society (Guevara,
2010).
68. Assistant Team Leader is the one who implements or executes the order/s
coming from his/her superiors.
69. Associative Evidence is pieces of physical evidence which may identify the
criminal by means of clues, personal properties or the characteristics patterns of
procedure deduced from the arrangement of objects at the crime scene.
70. Audio Surveillance is checking on persons by listening through wire-tapping or
use of electronic eavesdropping equipment to pick up conversations of persons
and their associates (Guevara, 2010).
71. August Vollmer served as an Army Sergeant in the Philippines during the
Spanish-American war and became an Army Policemen who oversaw the
integration of former Guardia Civil into the new Insular Constabulary. His
experience in the Philippine convinced him of the need to professionalize
policing and shield it from politics. He reluctantly accepted the position of
Marshal of Berkeley California when a posse was commissioned in order to
respond to a train derailing incident and it was then that his innovative
approach to policing began to be recognized. Following the lead of European
development in Criminal Investigation, he established the first crime laboratory
in the United States in order to support his efforts to professionalize policing.
72. Australian Secret Intelligence Service has its primary responsibility has
gathering intelligence from mainly Asian and Pacific interest using agents
stationed in a wide variety of areas. Its main purpose like other most agencies
is to protect the country's political and economic interests and ensure the safety
of its citizens against national threats.
73. Background Investigation is a check made on an individual usually seeking
employment through subject's records in the police files, educational
institutions, place of residence and former employers.
74. Bad cop/good cop technique (a.k.a. Mutt & Jeff, Hot & Cold) is an approach,
one cop plays tough and intimidating while the other plays soft and
accommodating. The objective of the bad cough is to lead the suspect to
cooperate with the good cop (Torres, 2013).
75. Bag Man is the one who collects illicit or illegal money such as ransom in
kidnapping, delivering bribe money through middleman (Guevara, 2010).
76. Bait Money is the currency with recorded serial numbers that is available to
add to the loot taken in a robbery. It is often placed at a teller position in a
bank.
77. Barriers are structure or fence intended to stop access.
78. Baseline is one of the plotting methods for the crime scene. Establishes a
straight baseline between two fixed points. Measurements are taken at right
angles from the baseline.
79. Battered-woman Syndrome means under duress and feeling trapped in a cycle
of violence, a battered woman may lash out lethally at her tormentor.
80. Belle Boyd (1844-1901) was described by her biographer Joseph
Hergesheimer, as the most famous woman concerned with
official secret activities in civil war.
81. Biographical Intelligence deals with individual personalities who have actual
possession of power.
82. Biological Warfare Convention prohibits developing, producing and
stockpiling bacteriological and toxin weapons (Guevara, 2010).
83. Biological Warfare involves the use of diseases to debilitate population, food
or livestock (Guevara, 2010).
84. Bird is a slang term for an informer (Guevara, 2010).
85. Blackmail is the act of forcing somebody to pay money or do something by
threatening to reveal shameful.
86. Blind Reporting lets sexual assault victims retain anonymity and guarantees
their confidentiality when they share information with law enforcement.
87. Blood Money is the price paid for causing a person’s death.
88. Bonafide means in good faith; valid and certified.
89. Briefing is to instruct as a preparation for action.
90. British Intelligence succeeded greatly by means of censorship and its code
room combined with skillful use of covert agents.
91. Brothel is an establishment, which commonly functions as a house of
prostitution.
92. Bug is a surveillance device that requires a communication channel. A “bug”
usually involves a radio transmitter, in which the user can pick up the data
from poorly configured wireless computer networks or tune in to the radio
emissions of a computer monitor (Guevara, 2010).
93. Bugging is using a concealed electronic device to record conversations within a
room without the consent of those people involved.
94. Bunco Game is the act or trick contrived to gain the confidence of the victim
who is then defrauded.
95. Burn-out is the discovery of the mission.
96. Cabinet Noir is a secret police organization. The creation of Cardinal Richelieu.
This designed to intercept and analyzed correspondence within the French
Court and between the lesser nobility, it did much to preserve the sometimes
tenuous security of the throne of King Louis XIII.
97. Cadaveric Spasm is a condition in specific muscle groups (rather than the
entire body) after death.
98. Capability is the physical ability of a writ; agent’s placement or access to
another target.
99. Cardinal Richelieu (1585-1642) gave France her first organized system of
espionage.
100. Carjacking is a fairly new category of robbery, this is the taking of a motor
vehicle from a person by (the threat of) force.
101. Carroll Decision means vehicles may be searched without a warrant if 1) there
is probable cause for the search, and 2) the vehicle would be gone before a
search warrant could be obtained.
102. Cartography is where the witness and the investigator develop a picture of the
criminal with the help of a skilled cartographer. Based on the description of the
witness, the artist draws a composite face that approximates the criminal’s
facial appearance.
103. Case Officer is an intelligence officer who is trained specialist in the
management of agents and agent network.
104. Casing is the reconnaissance and surveillance of a place or building to
determine its suitability for intelligence.
105. Cause-And-Effect Thinking serves as a directional purpose during the
investigative process, as one or more facts generate further related factual
insights.
106. Censorship is the control and examination of the civil, national, armed forces,
field press and POWs.
107. Central Intelligence Agency (CIA) is the agency created under the UN National
Security Act of 1947.
108. Certification of Destruction is the certification by a witnessing officer that the
classified matter describes therein has been disposed of in his presence
approved destruction methods.
109. Chain of Custody refers to record of individuals who maintained control over
the evidence from the time it was obtained by the police until it is presented in
court.
110. Chain of Evidence is the documentation of what happened to the evidence from
when it was discovered until when it is presented in court.
111. Character is some of the traits that serve as index to the essential or intrinsic
nature of a person.
112. Characteristics features of a piece of evidence can be: Class characteristics:
features that are not unique to an item but that group it in a specific category.
Individual (or identifying) characteristics: features that set the item apart from
others of the same type.
113. Charles Dickens is a famous English novelist that popularized the Scotland
Yard. He edited a popular magazine in London in which appeared many
articles describing the noble investigative efforts of the “yard.” It was through
his writings and other literary efforts the London’s public became gradually
more acceptant of the officer in plain clothes.
114. Check Kiting is a method of operation in which several operation in which
several checking accounts based upon non-existent funds are opened in an
attempt to withdraw funds.
115. Chimel Decision means search incidental to lawful arrest must be made
simultaneously with arrest.
116. Chinese Intelligence - In 1932, TALLI organized the china’s Secret Police (the
BIS) to conduct espionage and counterespionage against Japanese Spies and
Chinese Communist.
117. Chinese water torture is an interrogation technique, repeatedly dripping water
on the forehead of the suspect. The goal is to drive the suspect to near insanity
thereby obtaining a confession.
118. Christopher Marlowe (1564-93) was a considerable poet and playwright. He
was also accomplished spy, and he was “Talent Spotted” by John Dee,
astrologer to Queen Elizabeth, and recruited by Sir Francis Walsingham head
of the English Secret Service.
119. CIA (Central Intelligence Agency) is the civilian intelligence agency of the USA.
It is the largest intelligence agency in the world.
120. Cipher is a method of transforming a text to conceal its meaning.
121. Circumstantial Evidence is a fact or event that tends to incriminate a person in
a crime.
122. Civic-Mindedness is the sense of duty and obligation to assist the police.
123. Civil Security encompasses active and passive CI measures affecting the non
military nationals permanently or temporarily residing in an area under
military jurisdiction
124. Clandestine Activities are actions used to accomplish intelligence, counter
intelligence and other similar activities, sponsored or conducted by
government, all departments in such a way to guarantee secrecy or
concealment (Guevara, 2010).
125. Clandestine means secret or furtive.
126. Clandestine Operation is a secret action, undertaken by intelligence/counter
intelligence agent in behalf of an organization.
127. Clarity Probe used to elicit additional information in an area, which the
response is clear.
128. Classified Information include all information containing document
cryptographic devices, development project and materials following on the
categories of Top Secret Confidential or Restricted.
129. Classified Matter is any information in materials in any form or any nature, the
safeguarding of which is necessary in their interest of Natural Security and
which is classified of such purpose by the responsible classification authority.
130. Classify refers to the assigning of information or material, one of the four (4)
security categories after determination been made that the information requires
the security projection as provided.
131. Close Tail (or 'Tight Tail') is a moving surveillance that keeps the subject
constantly in view. Close tailing is a moving surveillance where subject is kept
constantly within view; tight tailing.
132. Close up are shots indicating one specific evidence with ruler or measuring
device placed alongside the evidence (Torredes, 2013).
133. Codes are systems on which arbitrary group of symbols represented by other
letter rather than by a complete words phrases or sentence.
134. Coercion is the use of a forceful means or physical compelling means to obtain
information from a suspect or offended party.
135. Cognitive Interview is an interviewing technique that helps victims or
witnesses put themselves in their mind at the scene of the crime.
136. Cold Case is a crime or an accident that has not yet been fully solved and is not
the subject of a recent criminal investigation, but for which new information
could emerge from new witness testimony, re-examined archives, retained
material evidence, as well as fresh activities of the suspect. New technical
methods developed after the case can be used on the surviving evidence to re-
analyze the causes, often with conclusive results.
137. Cold Crime Scene is a crime scene that may have been tampered with.
138. Collation is the assembly of written information into a standard order.
139. Collection Agency is any person, unit, or activity that collects and processes
info by research, surveillance, interrogation or other exploitation of source.
140. Collection is the exploration of sources of info by collection agencies.
141. Collection Planning is the continuous process which ultimately coordinate and
integrate the efforts of all collecting agencies/units.
142. Collection refers to the act of gathering those identified data or facts, or
physical things that are significant to the case under investigation.
143. Collusion is the secret agreement for fraudulent or illegal purposes; conspiracy;
an agreement to defraud of his rights or to secure an object forbidden by law.
144. Combat Intelligence is used in planning and conducting tactical and
administrative operation concerning to weather, terrain and logistics.
145. Commercial Robbery is a robbery that is often committed in commercial
property.
146. Communication Agent is an agent that facilitates communication.
147. Communication is the process by which information is exchanged and
understood by two or more persons, usually with the intent to motivate or
influence others (Guevara, 2010).
148. Communication Security is the protection resulting from the application of
various measures which prevent or delay the enemy or unauthorized person in
gaining information through communication. This includes transmission,
cryptographic and physical security.
149. Communication Security Officer is a properly trained and cleared
Communication Security Officer shall be appointed in every department of the
government handling cryptographic communication.
150. Community Relations Program is a program that evaluates public attitudes,
identifies the mission of organization with public interest and executes a
program of action to earn public understanding and acceptance (Guevara,
2010).
151. Community Security is the protection resulting from the application of various
measures which prevent the enemy in gaining information.
152. Compartmenting refers to the grant of access to classified matter only properly
cleared person when such classified information is required in the performance
of their official duties.
153. Compass Point is just one of the plotting methods for the crime scene. Uses a
protractor to measure the angle at the intersection of two lines.
154. Compel means to force.
155. Competent Photograph represents accurately what it purports to represent, is
properly marked with identification, is placed in the chain of evidence, and is
secured until presented in court.
156. Competition Probe is effective when used in connection with teacher pupil
approach.
157. Complainant is a person requesting an investigation or that action is taken.
Complainant is often the victim of a crime.
158. Complaint is a sworn written statement charging a person with an offense,
subscribed by the offended party, any peace officer, or other public officer
charged with the enforcement of the law violated.
159. Complete Background Investigation is the detailed check on an individual’s
activity from the town a person was born and lived 15 years ago (Guevara,
2010).
160. Compromise is a method of reaching an agreement in a dispute.
161. Computer Crime are where frauds are perpetrated through the misuse of an
electronic machine. Computer Crime is the alteration, addition, deletion, theft
of information from a computer, cyberspace, or a computer network.
162. Confession is a statement that contains information about the elements of a
crime and that is provided and attested to by a person involved in committing
the crime. Can be oral or written. Contrast with admission. It is also an express
acknowledgement by the accused in a criminal prosecution of the truth of his
guilt as to the offense charge.
163. Confidence Game is taking advantage of someone after making them confident
that you can help them take advantage of someone else, often through a get-
rich-quick scheme. The swindler obtains money or property by a trick that
takes advantage of a victim's trust in the swindler. Confidence games are
classified as 1) Short-con games, where a victim is cheated of the money on
their person at the time of the swindle. 2) Long-con games, where a victim is
sent for a cheated of whatever money they can raise.
164. Confidential Informant is similar to the informant but he gives information
violation of the law to includes crimes and criminals.
165. Confidential is any information or material the unauthorized disclosure of it
would be critical to the interest and prestige of the nation.
166. Confidential source are exploited without the knowledge or against the will of
the foreign nation, criminals, subversives etc.
167. Conspirator is a person taking part in a conspiracy.
168. Contact is any individual whom the subject speaks or deal within any way
while under investigation.
169. Contact points are those part of the crime scene where the suspects’ body,
clothing’s or tools have disturbed, touched, made contact with, or stepped into.
Contact points may contain the suspects DNA, fingerprints, shoeprints, etc.
(Torres, 2013)..
170. Control is authority to direct an agent to carry out task.
171. Convoy is an accomplice or associate of the subject used to avoid
or elude surveillant.
172. Coroner is a public officer whose principal duty is to find and inquire the cause
of death.
173. Corpus Delicti ([Figurative] 'Body of Crime') means "the fact of a crime having
been actually committed." Before a person can be convicted of committing a
crime, it must be proved that crime has occurred (Black's Law Dictionary (6th
ed.) via Wikipedia)
174. Counter Agent is a force or agent acting counter actively.
175. Counter Espionage is action against a rebellion.
176. Counter Insurgency is the aspect of intelligence devoted to destroy the
effectiveness of inimical enemy intelligence activities to protect information
from espionage, individual against subversion and installation or material
against sabotage. Military, paramilitary, political, economic, psychological and
civic actions taken by the government to defeat subversive insurgency
(Guevara, 2010).
177. Counter Intelligence Investigation is an activity, which constitute the value of
the counter intelligence workload.
178. Counter Intelligence is an intelligence activity which concern principally with
the defending of the organization against penetration. It also refers to effort
made by intelligence organizations to prevent hostile or enemy intelligence
organization from successfully gathering and collecting intelligence against
them.
179. Counter Subversion is the aspect of counter intelligence designed to detect,
destroy, neutralize or prevent subversive activities through identification,
exploitation, penetration, manipulation, deception and depression of
individuals, groups of individuals, groups or organizations conducted or
suspected of conducting subversive activities (Guevara, 2010).
180. Counter-terrorism is a military or political activities intended to combat
terrorism.
181. Courage is the mental quality that recognizes fear or danger or criticism but
enables him to face it with calmness and firmness.
182. Cover Action Agent is a fully recruited agent who is in a senior position usually
with the government and id able to prevent influence from foreign government
upon direction of the sponsor.
183. Cover Family is the combination and/or compartment of individual, cell and
group cover.
184. Cover is the mean by which the individual group or organization conceals the
true nature of its acts and or its existence from the observer.
185. Cover Operatives are spies who enjoys diplomatic immunity (Guevara, 2010).
186. Cover Story is any scenario made to cover up the operation.
187. Cover Support is agent assigned in target areas with the primary mission of
supporting the cover story.
188. Covert Intelligence are operations which are so planned and executed as to
conceal the identity of or permit plausible denied by the sponsor or
concealment of the identity of sponsor (Guevara, 2010).
189. Covert Method is the discreet manner or secret gathering of information.
190. Cressus of Rome (Marcus Lucinos) employed both slave and freeman (fire
brigade). The intelligence operatives of Cessus, when not objectively looking
for fires, were devoted in the main to gathering evidence for Cressus to be used
in the Law Courts.
191. Crime Detection is a part of police operation focused on discovering,
identifying, and analyzing evidence that a crime has been committed, is being
committed or about to be committed.
192. Crime Intelligence is where information compiled, analyzed and/or
disseminated in an effort to anticipate, prevent, or monitor criminal activity.
193. Crime scene documentation refers to the recording of all available information
surrounding a crime scene and all activities which occurred therein (Torredes,
2013).
194. Crime Scene is the place where the crime was committed. All pieces of evidence
secured from the crime scene are reviewed as to its information potential.
Crime scene evidence often has significant value in providing the officer with
suspect-tracing information.
195. Crime Scene Photography is an investigator should not disturb the scene or any
object at the scene prior to photographing. Crime scene photography provides
permanent record of the facts at the crime scene and is not a substitute for field
notes, accurate measurements and sketches of the scene.
196. Criminal Informant is an informant who gives information to the police
pertaining to the underworld about organized criminals with the
understanding that his identity will be protected.
197. Criminal Information is an accusation in writing charging a person with an
offense, subscribed by the prosecutor and filed with the court.
198. Criminal Intelligence refers to the knowledge essential to the prevention of
crimes and the investigation, arrest, and prosecution of criminals
199. Criminal Intent is when a person does an unlawful act that they know to be
illegal.
200. Criminal Investigation as a Process is a systematic process of identifying,
collecting, preserving, and evaluating data or raw facts to produce valuable
information for the purpose of bringing a criminal offender to justice.
201. Criminal Investigation as a Science is a science because it involves the
application of knowledge of forensic sciences in the process of identifying,
locating, collecting, processing, and/or evaluating physical evidences.
202. Criminal Investigation as an Art is an art because it is governed by rigid rules
or fixed legal procedures but most often based on intuition (logic and tested
knowledge, immediate learning/consciousness) and sometimes by chance.
203. Criminal Investigation is conducted into three phases or stage- preliminary
(initial) investigation; In-depth (follow-up) investigation and final (concluding)
investigation; the process of searching for and collecting all possible relevant
facts to determine the truth of a crime: what happened, where, when, and how;
and who is responsible. Usually initiated by an officer's personal observation or
by information from a citizen. Follows a reconstruction process of deductive
reasoning based on specific evidence to prove that a suspect is guilty (or
innocent) of an offense. It also refers to the process of discovering, collecting,
preparing, identifying and presenting evidence to determine what happened
and who is/are responsible.
204. Criminal Investigator is a public safety officer who is tasked to conduct the
investigation of all criminal cases as provided for and embodied under the
revised penal code, criminal’s laws and special laws which are criminal in
nature. They are fact-finders since they focus their efforts on facts that are
related to criminal activities.
205. Criminal Jurisprudence refers to the science of laws or the application of laws,
particularly criminal law, to detect and investigate crimes for the purpose of
promoting justice.
206. Criminal Law is a branch of municipal or substantive law that defines crimes,
establishes punishments, and regulates the investigation and prosecution of
people accused of committing crimes.
207. Criminal Potentiality is the possession of knowledge, skills or facilities that
could easily be adopted for criminal use.
208. Criminalistics is the application of natural sciences and their technology to
examine physical evidence that can be used to establish that a crime has been
committed and who is/are responsible. It involves the study of criminal things,
or those physical objects that may explain or give proof to the commission of
crime. It can also be defined, as a profession and scientific discipline directed
towards the recognition, identification, individualization, and evaluation of
physical evidence by application of the natural sciences on matters of law and
science.
209. Criminals Bad Luck is the unconscious or subliminal act aiming at self-betrayal
a.k.a. “Vebrecherpech” clue. Faulty acts; Carelessness; Negligence; and Vanity
(belief in their own cleverness)
210. Cross Projection (Sometimes called Exploded view or Bird’s eye view) also
describes the immediate scene only, specifically inside a room as the scene of
the crime. The room is treated as the cardboard box where the side and the
cover are collapsed to the same plane as the bottom.
211. Crossbar is a structure intended to physically prevent the entry of vehicles
situated on railroad crossings and entry and exit gates of establishments and
residential areas.
212. Crypt is something that is concealed or hidden (Guevara, 2010).
213. Cryptanalysis came from the Greek word Kryptos-hidden and Analyein-to
loosen or to unite is the art of defeating cryptographic security systems and
gaining access to the contents of encrypted messages without being given the
cryptographic key; the process of deciphering coded texts or messages.
214. Cryptogram is an encrypted text/message complete with heading of message
written in counterintelligence text or language which implies/convey hidden
meaning.
215. Cryptographic Security is that component of communication security which
results from the provisions of technically sound crypto-system and their proper
use.
216. Cryptography is the practice and study of techniques for secure communication
in the presence of third parties called adversaries.
217. CSI Effect is a recent phenomenon in relation to criminal investigation that
results to an “unrealistic expectations of the public in the conduct of criminal
investigation” due chiefly to the popularity of fictional TV shows such as CSI
(Torres, 2013)..
218. Cultural Understanding and a Wide Range of Interest is an awareness and
understanding of cultures different from the investigator’s own can be of great
advantage. Such insight can assist appreciably in information gathering,
interviewing, informant recruiting, and many other tasks commonly
encountered during criminal investigation. Because specific behaviors and
traits are unique to various groups, development of an awareness of cultural
diversity can provide the investigator with new insights.
219. Curb is a concrete edge bordering the sidewalk.
220. Curiosity is the desire to learn by being inquisitive (the eagerness of the
investigator to know more about the crime).
221. Curtilage is that portion of a residence not open to the public. Sidewalks and
alleys are open to the public. But the curtilage is reserved for private use by the
property owner or the family.
222. Custodial Arrest is a law officer, having decided that a suspect is not free to
leave, deprives the suspect of liberty to leave custody.
223. Custodial Interrogation is the interrogation by law enforcement officers of a
person that has been taken into custody or otherwise deprived of freedom in a
significant way. Requires that the Miranda warning be given.
224. Custodial Investigation involves any questioning initiated by law enforcement
officers after a person has been taken into custody or otherwise deprived of his
freedom of action in any significant way.  It is only after the investigation
ceases to be a general inquiry into an unsolved crime and begins to focus on a
particular suspect, the suspect is taken into custody, and the police carry out a
process of interrogations that lends itself to eliciting incriminating statements
that the rule begins to operate (People vs. Marra, 236 SCRA 565).
225. Custodians is an individual who has possession of or otherwise charged with
the responsibility for safeguarding and accounting of classified matters.
226. Cut-Out is a mutually trusted intermediary, method or channel of
communication, facilitating the exchange of information between agents.
227. Cyber Cop is an investigator in computer forensics.
228. Cyber stalking is preying on a victim via computer and the Internet.
229. Cybercrime is a crime committed by using a computer.
230. Dactyloscopy is the scientific study of fingerprints as a method of identification
(Florendo, 2012).
231. Damage to National Security refers to the prejudice, embarrassment or jury to
the country resulting from act or omission.
232. Danger Warning Sign refers to signs intended to caution road users of a hazard
that lies ahead and of its nature.
233. Daniel Defoe was one of the great authors of the late 17 th and early 18th
centuries.
234. Dead Drop Spike is a concealment device used to hide money, maps,
documents, microfilm and other items.
235. Dead Drop/Dead Letter Box is a method of espionage trade craft used to pass
items between 2 individuals using a secret location and thus not require to
meet directly.
236. Debriefing is the subject is cooperative or under same degree of rented and is
aware of the intelligence interest.
237. Debris refers to the accumulation of broken parts of vehicles, rubbish, dust and
other materials left at the scene of the accident by the collision.
238. Deceitful Witnesses are the liar type of witnesses. Let them lie and order them
to repeat several times their narration. They will be enmeshed in
contradictions. If possible, the lies must be tape recorded for the confrontation
about their contradiction. Pressure them for possible cases of perjury or
obstruction of justice and they will tell the truth.
239. Deceleration is the negative acceleration or rate of slowing down of a vehicle.
240. Deception is an attempt to mislead another generally as to its capabilities and
intention to confuse enemy about one’s plan and intention (Guevara, 2010).
241. Decisiveness is the promptness of making decision in a state of clear and
forceful manner.
242. Declaration and Acts Indicative of Guilt are actions on the part of a suspect
which raise an inference of guilt.
243. Declassify is the fact of removing the security classification from classified
information or matter.
244. Decoy is a person or object used by the subject in an attempt to elude
surveillance.
245. Decoy Vehicle is an identical vehicle with that of the vehicle where the
principal may be located, it usually tails or fronts the principal’s vehicle
(Guevara, 2010).
246. Deduction is concerned in finding out the rearing of information as to the area
of operation.
247. Deductive Reasoning (Reasoning from general to particular) assuming a theory
of the crime and attempting to support by a careful appraisal of how the
information collected in the investigation support the theory. It forms a general
conclusion prior to having a complete explanation based on facts. With the
deductive conclusion in mind, the investigator considers the emerging
evidence, contrasting it with the conclusion to determine its validity.
248. Defector in Place is a person who turns himself against the government but not
physically deserted his country (Guevara, 2010).
249. Defector is a person who turns away or against his allegiance to the
government (Guevara, 2010).
250. Defendant is an individual charged and brought to trial. Before being charged,
an individual is usually a suspect.
251. Delilah is a biblical personality, she was able to gain information by using her
beauty and charm, she was responsible for the fall of Samson, a known Israelite
leader and enemy of the Philistines.
252. Department Intelligence is the intelligence required by an agency or
department of the government in order to execute its mission and
responsibility.
253. Department is use to cover any Philippine Government Department Service, or
instrumentality.
254. Departmental Reference, many police agencies have established file listings of
voluntary informants cultivated in prior investigation. The files may be cross-
referenced by name, type of information obtained, and occupation. Such
information may prove to be very useful or of no value at all depending on the
information.
255. Deposition is a written record of evidence given orally and transcribed in
writing in the form of questions by the investigator and answer of the deponent
and signed by the latter (Catalino, M.G. et al, 2011).
256. Description is actual reporting of what was observe.
257. Detection is the fact of discovery. It is the chance event which triggers the
operation of our criminal justice system. This occurs when a possible crime is
observed by the police or are reported to its attention (Torres, 2013).
258. Direct Question is a focused question with little chance of misinterpretation.
The expected answer is specific and brief. Compare with Indirect Question.
259. Directing is the intelligence staff officer or the unit commander will determine
the required information relevant its mission and responsibility.
260. Discipline is a prompt and willing obedience to all orders both for your men
and self.
261. Discreet is which every effort is made to ensure that the subject is unaware that
he is under surveillance.
262. Discretion is the ability of tendency to act or decide w/ providence. It is the
wise use of one’s own judgment.
263. Disinterested Type is the uncooperative and indifferent subject. To deal with
them is to find out their field of interest so that they will talk. Their
indifference should be demolished to arouse their interest or be flattered.
264. Dispatch is to instruct someone to carry out a task.
265. Disposal Plan is the disposal of the info in case of possible compromise.
266. Dissemination is the final phase of the cycle wherein the process of
information.
267. DNA (Deoxyribonucleic Acid) is the organic substance in the nucleus of cells
that provides the genetic code for individual characteristics.
268. Doctrine of Informer Privilege is a legal principle recognizing that an
informer/ confidential informant’s identity should not be disclosed during trial
if such disclosure would result in retaliation to the informer/ confidential
informant.
269. Doctrine refers to a codification of beliefs or a body of teachings or instructions,
taught principles or positions, as the body of teachings in a branch of
knowledge or belief system.
270. Document covers any form of recorded information photographs, films and are
included in matter.
271. Document Intelligence means assembling, analyzing and disseminating
information about those individual or groups whose interest is the overthrow
of a democratic country (Guevara, 2010).
272. Documentary Evidence includes writings, including official records. It is one
which is supplied by written instruments, or derived from symbols which
ideas are represented on material substances, like letters, wills, deed or
contract.
273. Documentary Security is the protection of documents, classified matters and
vital records from loss, access to unauthorized persons, damage, theft and
compromise through proper storage and procedure.
274. Documentary Source Of Information is any type of information of a printed
nature, or data otherwise recovered and stored for retrieval. Such information
may be obtained from within the police agency, from other criminal justice
agencies, and from sources not connected with law enforcement.
275. Domestic Violence is a group of behaviors (physical, sexual, emotional, and/or
economic abuse) over an intimate partner.
276. Double Agent is an enemy agent who has been captured, turned around and set
back where he came from as an agent of his captors
277. Double Crosser wants to get more information from the police more than what
he gives.
278. Double Strip Search Method is a modification of the strip search method.
The rectangle is traversed first parallel to the base then parallel to a side.
279. Dr. Hans Gross. Father of Criminalistics, he published a book entitled “Modern
Criminal Investigation” which pave the way for Edmund Locard to incorporate
modern science to police works (Torres, 2013)..
280. Drivers License Guide is an aid to determining whether or not a driver's license
is authentic.
281. Drunken Type is a style of questioning by the investigator should be adapted to
the psychology of the subject. When the drunken subject has sobered, another
interview will be conducted, confronting him about his disclosures while in the
state of drunkenness. The written statement must be taken during his sobriety.
282. Duress Code is a type of coded system used as internal defense which uses
certain word in casual conversation alarming the personnel concern (Guevara,
2010).
283. Dye Pack is a bundle of currency that contains tear gas and a colored dye.
During a robbery, when the robber takes such a bundle across an
electromagnetic field in the facility, the tear gas container explodes, a cloud of
colored smoke is emitted, and the money is stained with brightly colored dye.
284. Marine Police is the first body of public-order officers to be named police in
England, a force established in 1798 to protect merchandise in the port of
London.
285. Eaves Dropping is the act of secretly listening to the private conversation of
others without their consent.
286. Economic Intelligence deals with the extent and utilization of natural and
human resources to the industrial potential of the nation (Guevara, 2010).
287. Edmund Locard is a French criminologist, he established the world’s first crime
laboratory in Lyon, France. He expounded Dr. Gross’ theory by stating that
“when two object come into contact with one another, they leave traces of each
other behind” (there is always something left behind at the crime scene). This
became known as Locard’s Exchange Principle upon which modern forensic
science owes its theoretical foundation (Torres, 2013).
288. Elder Abuse is the physical or mental mistreatment, exploitation, or abuse of
the elderly. It can include fraud, assault, battery, murder, etc.
289. Electric Surveillance is a method of listening to and recording spoken
interactions by using devices which gather and amplify sound.
290. Elements of a Crime are those conditions that must be proven to exist for an act
to be classified as a particular crime. These are the set of specific conditions that
must occur for an act to be called a specific kind of crime. Even if a suspect is
known or has confessed, elements of a crime must still be proved.
291. Elicitation is the technique of acquiring information through conversation to a
person who is not aware of the specific purposes of the conversation.
292. Elimination Prints means that fingerprints of all individuals that are not
suspects and whose prints are likely to be found at the crime scene.
293. Embezzlement is the fraudulent appropriation of property by the person to
whom it was entrusted.
294. Emotional Abuse is causing fear or feelings of unworthiness in others,
especially the weaker. Methods include ignoring or constantly belittling them.
295. End Products is the result after evaluation, analysis, interpretation and
integration of raw materials.
296. Endurance is the physical and mental stamina, measured by the ability to
withstand pain fatigue, stress and hardship.
297. Entrapment is deceiving or tricking a person into committing a crime not
contemplated by the individual entrapment does not imply the mere act of
police officer furnishing a person the opportunity to violate the law, where the
criminal intent was already present.
298. Entry point is that part of the scene where the suspect gained access inside a
room, house or a building (Torres, 2013).
299. Equipment includes machinery, apparatus, devices, supplies, ammunitions.
300. Escape and Evasion is the exits planning in case of emergencies from
immediate focal point.
301. Escort Personnel is desirable for both the specialist and the office that an escort
accompany the specialist during the survey.
302. Escrow Account is under a control of an agent by putting his/her salary in a
bank to be withdrawn only after a fulfillment of a condition.
303. Espionage is the primary and most important human collective agent. It
involves a government or individual obtaining information that is considered
secret of confidential without the permission of the holder of the information.
304. Essential Items are all items in the scene must be included. Never decide
outright that some items are irrelevant. As you proceed in the investigation,
these seemingly irrelevant items will become relevant or material in the
investigation.
305. Ethnic Extremism is a small minority group who falsely use their ethnicity for
selfish political gains (Guevara, 2010).
306. Eugene Francois Vidoque is a former convict who became the head of Surete,
which was recognized at that time as France’s premier detective agency. He is
credited for his effective use of criminals to catch criminals. Vidoque’s
unorthodox approach later became a model for John Wilkes Booth who
infamously stated that “it takes a thief to catch a thief” (Torres, 2013).
307. Evaluating is to determine the pertinence and reliability of the information
308. Evaluation as to the Course is the determination of the reliability of the person
who give information as well as the accuracy and pertinence of the
information.
309. Evaluation as to the Information refers to the sums of hearsay which on either
accurate or inaccurate.
310. Evaluation is the process of determining the probative value of the evidence. It
is to determine or asses the value of the info gathered; systematic
determination of merit, worth and significance of something or someone using
criteria against a set of standards.
311. Evidence Custodian is the one in charge in the collection, preservation, tagging
of the articles of evidence found at the crime scene.
312. Evidence is the means sanctioned by these rules of ascertaining in a judicial
proceeding the truth respecting a matter of fact.
313. Exceptional Force is more than ordinary force.
314. Exclusionary Rule under the courts may not accept evidence obtained by
unreasonable search and seizure, no matter how relevant to a case. However,
see the exception, the Inevitable-Discovery Doctrine.
315. Executive/ VIP Security are those measures taken by agent, security officers,
law enforcement officers to protect heads of states, foreign, national or local
dignitaries
316. Exit point refers to that part of the scene where he left, took flight or escaped
(Torres, 2013)..
317. Expandable Agent is an agent though whom false info is leaked to the enemy.
318. Exploitation is using people illegally or taking unfair advantage of them.
319. Extortion is the use of coercion, force, or fear, property is obtained from others
with his consent.
320. Eye is a slang term for a person conducting surveillance on a specific person
(Guevara, 2010).
321. Facial Composite is a graphical representation of an eyewitness memory of a
face, as recorded by a composite artist. Facial composites are used mainly by
police in their investigation of (usually serious) crimes.
322. Facsimile is the exact copy of the original.
323. Fact is a statement or observation that can be verified by other verifiable points
of information.
324. False flag refers to covert or clandestine operations conducted by governments,
companies, corporations or other organizations, which are designed to appear
as if they are being carried out by other entities. The name is derived from the
military concept of flying false colors; that is, flying the flag of a country other
than one’s own (Guevara, 2010).
325. False Informant reveals information of no consequences or value.
326. Faulty Reasoning often centers on generalization, stereotyping,
oversimplifying, or incorrect assumptions.
327. Fear is where a person under an illusion of oppression by enemies or of other
impending danger.
328. Federal Bureau of Investigation is the first established in 1908 as Anti-
Subversion Law.
329. Felony is a major crime that usually carries a penalty of imprisonment of over
one year in a state penitentiary or death. Examples are: aggravated assault,
homicide, and robbery. More serious than a misdemeanor.
330. Fence is one who receives and disposes of stolen property on a regular basis.
331. Field Identification is the identification of a suspect by a victim of a crime or a
witness to a crime within minutes of a crime. Also known as on-the-scene or
show-up identification. A Supreme Court case (United States v. Ash, Jr.)
established that a suspect does not have the right to have counsel present at
field identification. New Mobile Identification Technology reported that the
length of time it takes to solve a crime is strongly correlated with the length of
time it takes for a positive identification to be established.
332. Field Interview is the spontaneous questioning at the crime scene.
333. Final or Closing report contains a summary of all the findings, reports,
documents and affidavits and well as the recommendations of the lead
investigator. Unlike progress reports, there can only be one final report (Torres,
2013).
334. Financial Intelligence Experts are individual who by virtue of their official
capacity tracks down laundered money amounting to hundreds of millions of
dollars under different local, and offshore accounts and names (Guevara, 2010).
335. Finger Man is an individual who positively point the subject.
336. Fingerprint Classification is a classification of fingerprints is done by pattern
matching, the ridge characteristics of fingerprints. Dactyloscopy is the science
of fingerprinting. A great set of illustrated fingerprint web pages are at the
informal Australia (New South Wales) police web site.
337. Fingerprint Identification, once several finger prints are classified as similar,
they are analyzed by visual comparison.
338. Fingerprints, everyone has unique and permanent fingerprints, including
identical twins (with identical DNA). Once several finger prints are classified as
similar, they are analyzed by visual comparison in fingerprint identification.
339. Finished Sketch is the sketch with a scale of proportion and drawn by a
draftsman which can be used for court presentation.
340. Fire Prevention is so potentially destructive without human assistance with
assistance it can becaused to devastate those things you are attempting to
secure and professionally accomplished, often in way that does not leave
recognizable evidence of sabotage.
341. Flattery means that people are susceptible to praise.
342. Flexible is capable of being modified and responsive to changing condition.
343. Flip is apprehended criminals who turn informants.
344. Flipping is a real estate transaction where a middleman buys a property
(perhaps just below its estimated market value), then resells it (even within
minutes) for a greatly increased price.
345. Flowcharting is a technique used in data description, which visualizes event or
commodity flow over a given period (Guevara, 2010).
346. Follow – up interview which is frequently necessary in many cases because
additional on vital points is necessary (Arnilla, 2012).
347. Follow-Up or In-Depth Investigation follows up the preliminary or initial
investigation. The in-depth inquiry begins with a general reexamination of all
facts, leads and other types of information secured during the preliminary
investigation.
348. Forensic Anthropology is forensics using techniques developed through
research by physical anthropologists and archaeologists.
349. Forensic Entomology is the study of insects found on a dead body or at the
scene of a death.
350. Forensic odontology is the study of the teeth, dentures (false teeth), bite marks
for the following purpose (Arnilla, 2012).
351. Forensic Science is the applied science that uses techniques and technologies of
physics, chemistry, and biology to examining physical evidence left at a crime
scene. Chemical tests can be made on hair, blood, dirt, cloth fibers, etc. Tools
include DNA testing, microscopy, and spectroscopic analysis. A forensic
scientist may study: 1) Audio and video recordings: analyze, enhancing as
needed. 2) Crime scenes: examine. 3) DNA profiles: use in the comparison of
biological material and with those of victims and suspects. 4) Documents:
examine physically (e.g. handwriting, typewriting) and chemically (e.g. inks
and papers). 5) Drugs and poisons in human tissue and body fluids: analyze. 6)
Evidence such as bullets, casings, fibers, glass, gunshot residues, metals, oils,
paints, petrol, plastics, soils, etc.: examine and compare. 7) Fires and
explosions: examine the scenes to establish cause and origin. 8) Forensic
ballistics: conduct tests with firearms and ammunition. 9) Illicit drugs: identify.
10) Latent information (including fingerprints, foot prints, shoe prints, tire
marks, and tool marks): detect, enhance, record, save, and identify. 11) Plant
materials: identify botanically.
352. Forgery is the making or alteration of the name or amount on a check or
document with the fraudulent intent.
353. Form Hypotheses is the construction of an explanation of an occurrence.
354. Formal Interrogation is the systematic attempt to exploit to an appropriate
depth those are of the interrogee’s knowledge which have been identified in
the screening process.
355. Formal Investigation- It refers to official inquiry conducted by the government
agency in an effort to uncover facts and determine the truth. This type of
investigation is usually considered as some form of inquiry concerning criminal
activity.
356. Francis Tukey and Allan Pinkerton are America’s early public detectives who
were appointed by influential mayors due to the criminal occurrences in the
nineteenth century.
357. Fraud - Intentional deception in order to cause a person to give up property or
a lawful right.
358. Frightened Informants are the weakest link in criminal chain, motivated by
anxiety.
359. Fruit-of-the-Poisonous-Tree Doctrine is Illegally obtained evidence must be
excluded from trial. See the exception, the Inevitable-Discovery Doctrine.
360. Fugitive is someone who is running away from justice, enemy or brutal
treatment.
361. General Photograph Method is the investigator shows to a witness/victim a
variety of faces that may not necessarily/directly represent the face of the
criminal. The photographs shown to the witness only represent different
features of faces.
362. Genghis Khan used intelligence to conquer China and invade Cathay.
363. Geographic Branch produces maps, photographs, and terrain studies.
364. Geographical Intelligence deals with the progress of research and development
as if the economic and military potential of a nation.
365. German Intelligence gained a high reputation for offensive effectiveness
throughout Europe but declined at the outset of the war.
366. Golden Rule of Criminal Investigation is “Do not touch, alter, move, or
transfer any object at the crime scene unless it is properly marked, measured,
sketched and/or photographed.”
367. Good Faith Doctrine is allows that illegally obtained evidence may be
admissible if the police can be shown to have been unaware they were
violating a suspect's Fourth Amendment rights.
368. Grand Larceny is larceny where the value of the taken personal goods or
property is above a specific amount (specified in State law); a felony.
369. Gratitude or Gain is an expression of appreciation to obtain a privilege or an
interest in the welfare of his family during his detention.
370. Gray Propaganda is a misinformation wherein the source is clear but the desire
result is indirect (Guevara, 2010).
371. Group Cover provides security for three or more individuals appearing to be
working together.
372. Group or Pretext Interview is for witness known to be reluctant or hostile, and
for those who are believed to refuse or cooperate in the investigation or those
who may be persuaded to cooperate (Arnilla, 2012).
373. GRU - Military Intelligence Organization is concerned with political events
and economic conditions and also collects information for intelligence purpose
all over the world.
374. Guerilla is a member of paramilitary group organized to harass the enemy.
375. Guerilla Warfare is the irregular combat waged independently by small
insurrectionist bodies (Guevara, 2010).
376. Gullibility is where people who accept every story at face value and can see no
wrong in anyone.
377. Hackers refers to persons breaking into a computer system (Guevara, 2010).
378. Hanibal, Hanibal’s invasion of Italy, his brilliant and futile raid in history,
gained him many victories and nearly bled Rome to death.
379. Harassment- Suspected criminals are under surveillance wherein you can
harass him.
380. Henry Fielding Englishman who wrote a novel, “Tom Jones,” was appointed as
magistrate (Sheriff) for the areas of Westminster and Middlesex in London. He
operated out of a court in London located on Bow Street. Shortly after his
taking office, the London population saw a group of police officers attached to
the Bow Street Court, and not in uniform, performing criminal investigative
functions.
381. High Pressure Probe serves pin down a subject in a specific area or it may be
used to point out contradiction in what the subject has said.
382. Home Invasion is a new type residential robbery, often committed in private
homes,
383. Homicide is a death in which another individual is the direct or indirect cause
of the death.
384. Honest Witnesses are the truthful and cooperative witnesses where the
investigator could rely upon, with little or no problem in handling them.
385. Hostage Situation is a situation where priorities are to preserve life, capture the
hostage takers, and recover/protect property. Negotiable items are food and
drink. Non-negotiable items include punishments (including sentences up to
the death penalty) and transportation (generally not negotiable because it is
difficult to monitor and control).
386. Hot Crime Scene is an undisturbed crime scene. Compare with a cold crime
scene.
387. HOW Questions: These are designed to help the investigator determine how
the crime was committed, the means/tools are employed, the crime was
discovered, and the culprit enters the building/room. How questions are very
significant in preparing the modus operandi file or report.
388. Howard Vincent is the head of the Scotland Yard organized investigators
known as the CRIMINAL INVESTIGATION DEPARTMENT. He is a London
lawyer without field police experience, who had observed operations of the
Paris police. The Department contained several hundred detectives.
389. Human Intelligence is the category of intelligence derived from information
collected and provided by human sources.
390. Hypothetical Probe presents a hypothetical situation and to get the subject to
react to the hypothetical situation.
391. Ideology is a closely organized system of beliefs, values, and ideas forming the
basis of a social, economic, or political philosophy or program.
392. Imagery Intelligence (IMINT) is where imagery are derived from, but is not
limited to, radar, infrared, optical, and electro-optical sensors.
393. Imagination means forming mental images of what is not present, or creating
new ideas by combining previous experiences is indispensable in the many
investigations that are not complete.
394. Incest - Sexual intercourse with a person that is known to have nearer kinship
than first cousin. In some states this is a crime not only for biological but also
adopted relationships.
395. Incidental Informant is a person who casually imparts information to an
officer with no intention of providing subsequent information.
396. Indirect Question is a vague question that skirts the issue and might be
misinterpreted. Should be used little, unless one needs an unexpected answer
that might lead in a new direction. Compare with Direct Question.
397. Inductive Reasoning is based on the results of further investigation and
evidence gathering.
398. Industrial Intelligence is the gathering of information about product,
manufacturing technique, process from manufacturing formulas that cannot
and can be used of value or advantage (Guevara, 2010).
399. Inevitable-Discovery Doctrine is illegally obtained evidence may still be used if
it can be shown that it would most likely have been discovered legally
eventually. This is an exception to the fruit-of-the-poisonous-tree Doctrine.
400. Inference is a process of reasoning by which a fact may be deduced.
401. Infiltration is the insertion of action agent inside the target organization.
402. Informant Net is a controlled group of people who worked through the
direction of the agent handler. The informant’s principal or cutouts’ supply the
agent handler directly or indirectly with intelligence information.
403. Informant refers to a person who gives information to the police voluntarily or
involuntarily without any consideration.
404. Informants with Ulterior Motives are individuals who provided the police
with information for self-serving reasons. They do not demand or receive
money for their information; however, serving as informant benefits them in
some fashion.
405. Information Intelligence is any information gathered or received which is of
intelligence interest.
406. Information is any knowledge derived from any source which can be used as a
basis or as a means for decision making to facilitate the successful termination
of a criminal investigation.
407. Information Net is a controlled group of people who worked through the
direction of the agent handler.
408. Information or Reference File is all information on possible future value that is
cross-indexed in this file. Much information is collected which has no
immediate interest but which may be of future value.
409. Informers are those who give information to the police for price or reward.
410. Ingenuity means original truth, in accordance with the law.
411. Initial (Spot report) is made immediately after an incident. Usually, within 24
hours. Usually made by patrol officers or first responders. In some cases,
entries in the police BLOTTER made by desk officers also constitute a spot
report (Torres, 2013).
412. Initiative is taking action in the absence of orders.
413. Inquest is an effort to search the basic cause of an incident such as a
commission of a crime.
414. Inquisition means more historical description than a current usage to describe
any penetrating investigation concerning a religious issue.
415. Inspection is to determine if the recommendation or the survey was made.
416. Integration is the combination of the elements stated in assessment with other
known information or intelligence to form a logical feature or hypothesis of
enemy activities or an of the operational area characteristic of the mission of the
command.
417. Integrity means honesty and completeness.
418. Intellectual approach is a method of interrogation where the questioning is
characterized by frankness and matter-of-fact accusations. The suspect is
confronted with hard, undisputed facts and encouraged to weight the
advantages of cooperating rather than not-cooperating (Torres, 2013).
419. Intelligence Agency is a government agency responsible for the collection,
analysis or exploitation of information and intelligence in support of law
enforcement, national security, defense, and foreign policy objectives.
420. Intelligence Analysis is the process of taking known information about
situations and entities of strategic, operational, or tactical importance,
characterizing the known and with appropriate statements of probability the
future actions in those situations and by those entities.
421. Intelligence Assessment is the development of forecasts of behavior or
recommended courses of action to the leadership of an organization based on a
wide range of available information sources both overt and covert.
422. Intelligence Axioms are facts that require no proof because the truth of this
statement is obvious.
423. Intelligence Cycle refers to the intelligence operations process. The intelligence
cycle is focused on the commander’s mission and concept of operation.
424. Intelligence Estimate is a logical and orderly examination of the intelligence
factors affecting the accomplishment of the mission.
425. Intelligence files are necessary to permit ready access to all available
information.
426. Intelligence Information is all those evaluated information of every description
including those derived from observation, reports, rumors, imagination and
other sources from which intelligence is produced.
427. Intelligence is the end product resulting from the collection, evaluation,
analysis, interpretation of all available information, concerning specific
restricted areas.
428. Intelligence Journal is a permanent chronological record of reports and
messages that have been received and transmitted.
429. Intelligence Officer is a person employed by an organization to collect, compile
and analyze information that is used to that organization.
430. Intelligence Operation is the result of intelligence planning.
431. Intelligence Summary contains a brief summary of information of intelligence
interest covering a period of time designated by the COP. It is an aid in
assessing the current situation and updates other intelligence reports.
432. Intelligence Test is a test designed for the capacity of a person to take in
information.
433. Intelligence Workbook is a systematic arrangement of subject heading which
aids in the sorting, evaluation, and interpretation of all information and in the
preparation of intelligence reports.
434. Interaction is the combination of information to a logical picture of the
hypothesis of enemy activity.
435. Interest is a feeling of attraction.
436. Intermittent means going and coming at intervals.
437. Internal Defense Operation is directed against armed insurgent secessionist
movement, as well as the ultra-rightist.
438. Internal Development Operation is undertaken to improve the political,
economic and social dissatisfaction of the people towards the government.
439. Internal security intelligence refers to the knowledge essential to the
maintenance of peace and order.
440. INTERPOL is an acronym for the International Criminal Police Organization
(ICPO). Where member countries assist on another in the pursuit of suspected
criminals and terrorists (Guevara, 2010).
441. Interpret Data is the investigator should be as objective as possible in the
interpretation. Is the information obtained true? The data may be reviewed by
another investigator to provide a second opinion. The officer may conclude, at
this point, that the result is true or not.
442. Interpretation is establishing the meaning and significance of information.
443. Interrogate is to talk to an unwilling person (could be a relative or friend or
suspect or even a witness) that is reluctant to give you information. Contrast
with interrogate.
444. Interrogation is the skillful questioning of an unwilling person (could be a
relative or friend or suspect or even a witness) that is reluctant to give you
information and that is suspected of direct or indirect involvement in the crime
being investigated. Contrast with the interview.
445. Interrogation report is an oral or written statement of information by the
question of the interrogee.
446. Interrogee is any person who is subjected to the interrogation process.
447. Interview is to talk to a willing person that wants to give you information.
Contrast with interrogate.
448. Intimate (and former-intimate) Stalking is where the stalker and the victim
may be married or divorced, serious or casual sexual partners, or former sexual
partners. They may be current or former cohabitants.
449. Intuition the immediate apprehension or cognition – quick and ready insight
without the conscious use of reasoning. It has been pointed out that many
police investigators have a “sixth sense” resulting in hunches that those outside
the profession rarely perceive. This is often the result of experience and
training. Applying one’s experiences to a situation is generally a subconscious
thought process.
450. Investigate is to observe and study closely; inquire systematically in a search
for the truth. Make a patient, careful, step-by-step inquiry, observation, or
examination; also a recording of evidence or a legal inquiry.
451. Investigate is to seek information about searching or examining.
452. Investigation is the collection of facts or knowledge from other sources either
from regular source public spiritual citizens or informants and informers.
453. Investigative Report is a recent type of investigative pursued by the members
of the press on their own initiative.
454. Investigator is someone who gathers, documents, and evaluates evidence and
information (Florendo, 2012)
455. J. Edgar Hoover, under his dictatorship in 1924, the Federal Bureau of
Investigation was organized. This bureau then contributed to the overall
development of criminal investigation. The creation of a nationwide
identification file in Washington, D.C. operated by the FBI, was a major step in
consolidating identification records of thousands of individual police
departments.
456. Japanese Intelligence failed because it was not provided with a sufficient
number of trained personnel to assemble and evaluate the mass of materials
which were collected although Japanese Intelligence was involved in short was
and defensive in nature.
457. Jealousy is one of the most powerful motivations can be utilized by an agent
for subversive agent looking for storage to aid them.
458. Joe Blow Approach is “I know the answer to everything Approach”. Elicitor
adopts the attitude of being approachable in any field.
459. John Fielding is the younger brother of Henry who took over the control of
Bow Street Court in 1753. His investigators were then called “Bow Street
Runners” and became quite effective because of developing paid informants,
printing wanted notices, employing criminal raids, and bearing firearms and
handcuffs.
460. Jonathan Wild is a buckle maker, a brothel operator, and a master criminal
who became London’s most effective criminal investigator. He was the most
famous thief catcher. His methods made popular the logic of “employing a
thief to catch a thief.” He conceived the idea of charging a fee for locating and
returning stolen property to its rightful owners.
461. Journal File contains a record copy of each message or document noted in the
journal.
462. Juvenile Delinquency is where a young person who habitually breaks the law.
463. Karl Schulmeister is Napoleon’s military secret service and Napoleon’s eyes.
He acted as the spy sent by Napoleon to study the characters of the Generals,
his royal foes selected to defeat him.
464. Kill Zone is a point or specific area where a possible attack on a principal or
VIP may be executed (Guevara, 2010).
465. Kneeling Search is a searching technique that requires the suspect to kneel on
the ground with hands raised over or behind his head. Note that some suspects
could still make counteractions against the arresting officer even if they are
assuming this position.
466. Knowledge is keeping self-abreast of current development in his military
specialty and command.
467. Known criminals/fugitives include a group of criminals who have an existing
record in the police files. If the criminal has an official record in any law
enforcement unit’s file, the address of his relatives, friends and other
acquaintances can be located. These persons could offer a description of the
criminal. Background investigations can be conducted on them to gather more
personal data concerning the criminal.
468. Know-nothing Type are the reluctant type of witnesses. They are found among
the uneducated and of low level of intelligence. The technique to be applied is
gone down to their level of intelligence and by interrogation.
469. Komitet Gosudarstvennoy Bezopaznosti (KGB) is the counterpart of the CIA,
the most brilliant intelligence in the world.
470. La Surete Nationale is a part of French Intelligence Services.
471. Larceny has the following elements: 1) felonious taking or stealing (includes
removal by carrying, leading, and driving); 2) of someone else's personal goods
or property; 3) valued above (for grand) or below (for petty) a specific amount
(which is $100 in many States); 4) with the intent to deprive the owner
permanently of the goods or property; 5) Unlike robbery, larceny does not use
force or threat. Unlike burglary, larceny does not involve illegal entry of a
building. The most common types of larceny are (1) from motor vehicles; (2)
shoplifting; (3) from buildings; (4) motor vehicle accessories.
472. Leading Question is a question that has the answer in the question. e.g. "Were
his eyes blue?" Avoid using these in an interview.
473. LeapFrog is a variation of tailing which concentrates on the subject and guards
the surveillant and the subject (Guevara, 2010).
474. Legal Knowledge is what today’s investigator must possess, a solid grounding
in criminal and to a lesser degree, in civil law. The office must be able to
distinguish between a criminal violation and a civil violation in order to
determine appropriate action.
475. Legend is usually placed at the bottom of the sketch outside the sketch of the
scene. Numbers represent the objects in the crime or letters in order not to
unnecessarily crowd the graphic presentation. Their descriptions are found in
the legend.
476. Liaison is the exchange of info or the planning of joint efforts by separate
groups often of military units.
477. Liaison Program is the assignment of a trained intelligence personnel agency in
order to obtain info on police intelligence value.
478. License Plate is a popular type of black color car that should be used and care
must be taken that the license plates are not identified.
479. Limited Area Control is a restricted area in which a lesser degree of control
than in an exclusion area but in which the security interest would be controlled.
480. Line Intelligence is the type of intelligence that is an immediate nature and
necessary for more effective police planning and operation.
481. Line-up Identification is when the suspect is in custody, having victims or
witnesses pick out who they believe is the suspect from among five (or more)
individuals physically presented before them.
482. Link Analysis is a technique used to show the relationship between individuals
and organizations by means of visual graphic design (Guevara, 2010).
483. Live Drop occurs when two persons meet to exchange items or information.
484. Local Agency Check refers to the investigation of the records and files of
agency in the area of principal residence of the individual being investigated:
Mayor, Police, Fiscal where the individual is a resident.
485. Log is a chronological record of activities that took place in the establishment
under surveillance.
486. Long-range photography shows the scene with a prominent landmark at the
background to indicate its general location. Long-range photographs must be
taken in four (4) different ANGLES: front, right side, back and left side of the
photographers move in a clockwise fashion; or front, left side, back and right
side of the photographer moves in a counterclockwise fashion.
487. Loose is applied frequently or infrequently, period of observation varied on
each occasion.
488. Loose Surveillance is the on and off continuous close shadowing of the subject
(Guevara, 2010).
489. Loose Tail is the casual observation of the subject in which a general
impression of the subject’s habit and associates is determined (Guevara, 2010).
490. Lord Baden Powell (1857-1941) better known as the founder of the Boy Scout
movement, Baden Powell was also an active spy. His penchant for dressing up,
love of charades and often embarrassing eccentricity ideally suited him to the
world of 19th-century espionage.
491. Lost occurs when the surveillance does not know the whereabouts of his
subject or the subject had elude the surveillance.
492. Loyalty is the faithful allegiance to the Philippine Government and its duly
constituted authority.
493. LUCIFER is developed in the early 1970’s which is a crypto-system that used
both substitution and transportation (Guevara, 2010).
494. M15 is an intelligence agency devoted to counter-espionage and security.
495. Made occurs when the subject under surveillance becomes aware that he is
under surveillance and identifies the observer. Also known as burn-out.
496. Major John Andre (1751-80) is the only spy honored by a memorial tablet at
Westminster Abbey, under the office of the Regiment of foot.
497. Maltreatment through neglect, emotional abuse, medical neglect, physical
abuse, sexual abuse, and elder abuse.
498. Manager of Storage Area is an agent who arranges the storage, distribution,
and transportation of operational supplies.
499. Manhattan from Missouri is an approach wherein the elicitor adopts an
unbelievable attitude above anything. He questions all statements and
opposition.
500. Manslaughter is the unlawful killing of another person, with no prior malice.
Two types: involuntary manslaughter and voluntary manslaughter.
501. Mapp vs. Ohio (376 vs. 584) 1961, U.S.A. - This criminal case, the Supreme
Court ruled that illegally obtained evidence is inadmissible in state criminal
prosecutions. This case established the Doctrine of the Poisonous Tree.
502. Master Note Taker is the one who writes down in shorthand all observations at
the crime scene such as weather condition, time of dispatch and time of arrival
at the crime scene and other relevant data that’s should be taken down note.
503. Material evidence is evidence that relates to a specific case and subject.
Compare with relevant evidence.
504. Material Photograph is a photograph that relates to a specific case and subject.
505. Matter includes everything, regardless of its physical character.
506. Measurements and Signature Intelligence – MASINT uses information gathered
by technical instruments such as radar’s, lasers, radiation detectors seismic, and
other sensors to measure objects or events to identify them by their signatures.
MASINT is critical in updating data on smart munitions.
507. Measurements are the element of sketch wherein measurements are shown in
the sketch to show accurate spaces and distances of relevant objects to their
point of reference.
508. Measurer makes all relevant measurements of the scene such as the distance of
the body of the victim to the firearm used; in a motor vehicle collision, the
distances of the two vehicles to the points of references.
509. Medium range are shots highlighting a spot appearing in the long-range shot.
This may also be taken in order to show the positions of several evidence
relative to one another (Torredes, 2013).
510. Memory Decay is to minimize the resulting decay effects and memory error by
an interview or interrogation immediately after an event. Refresh information
within 2 days and the loss is reduced.
511. Memory Error is a memory of an event that can be in error because of: 1)
Weakness of sensory perception (eyesight, hearing). 2) Location at the time of
the incident. 3) Memory decay. 4) Retroactive inhibition. 5) Rationalization.
512. Memory Method is applied when a security condition on the place of
observation allows, the observer can only pass by or linger for a very short
period of time.
513. Mercenary has information for sale, needed something for the exchange of
information.
514. MERMER (Memory and Encoding-Related Multifaceted
Electroencephalographic Response) is a brain-wave response elicited when the
brain processes significant information it recognizes. Sometimes used to
determine if a suspect has seen the crime scene before. The basis of an
experimental method called Brain Fingerprinting.
515. Microphotography are photographs taken through a microscope of minute
evidence (e.g., hair, fiber, etc.). Contrast with macrophotography.
516. Military Information are terms that include all facts, document, materials,
photographs, diagrams, maps and reports of or observation of any kind which
increases our knowledge of a possible true or false, accurate or inaccurate,
positive or negative.
517. Military Intelligence is the intelligence used in the preparation and execution
of military and police plan policies and programs.
518. Military Security encompasses the measures taken by a command to protect
itself against sabotage, espionage, enemy operation, subversion or surprise.
519. Minimization is the act of minimizing the culpability of the suspect.
520. Miranda vs. Arizona is a landmark case which resulted in what is known today
as Miranda right. Ernesto Miranda had confessed to rape and kidnapping, after
two-hour interrogation. Because the interrogators failed to inform Miranda of
his right to counsel and remain silent, his conviction was overturned.
521. Miranda Warning is given to a suspect once, usually just before their first
Custodial Interrogation. Informs of: 1) the right to remain silent, 2) the right to
have counsel present, and 3) the right to have the state appoint and pay counsel
if the suspect cannot afford one. Warns a suspect that anything said can be
used against the suspect in court. It does not have to be given before a field
interview or a regular interview.
522. Misdemeanor is an offense that is less serious than a felony. A minor crime that
usually carries a penalty of a fine or a short sentence (no more than one year) in
a county or municipal jail. Examples are pilferage and shoplifting.
523. Mission Order is a duty slip in which all personnel on undercover operations
shall carry at all times and must be duly approved by their immediate
supervisors and filed appropriately with their respected offices (Guevara,
2010).
524. Modus Operandi (MO) is a characteristic method used by a criminal for a
particular type of crime.
525. Mole (also known as sleeper agent) is tasked with monitoring an organization
or individual. A mole can spend years in the same place only responding to
missions when assigned. They are trained to be visible but to keep their
motives unknown.
526. Moral is the distinctive identifying qualities w/c serve as an index to the
essential or intrinsic nature of a person.
527. Moral Obligation to the Agent is the cause of loss incurred by him as a result
of his connection with the intervals.
528. Moses is one of the first recorded formalized intelligence efforts, with a format
that can be found in the Holy Bible.
529. Mossad (Institute for Intelligence and Special Operations) is responsible for the
intelligence collection and covert operation of the Israel government, Its
Director reports directly to the Israel Prime Minister.  It is one of the entities of
the Israeli intelligence community along with AMAN (Military Intelligence)
and SHIN BET (Internal Security).
530. Motive is the reason why a crime was committed.
531. Moving is following the subject from place to place to maintain a continuous
watch of his activities. Residence where illegal activities are going on.
532. Moving Surveillance (or 'Tailing') is following people or vehicles on foot or in a
vehicle to observe their behavior, companions, destinations, etc.
533. Mug shot is a photographic portrait taken after one is arrested.
534. Multiplicity is the ability to compare two or more protected collected agencies.
535. Murder is the most severe statutory crime, carrying a penalty of life
imprisonment or (in some states and at some times) death. Unlawful killing of
another person, with prior malice. Three types: 1) First-degree murder requires
premeditation and the intent to cause death. 2) Second-degree murder involves
the intent to cause death but not premeditation. 3) Third-degree murder
involves neither premeditation nor intent.
536. Naked Confession is a confession that is not corroborated.
537. National Agency Check consists of LAC supplemented by investigation of the
records and files of the following agencies: PNP. ISAFP, NBI, CSC, Bureau of
Immigration and other agencies.
538. National Intelligence are integrated products of intelligence development by
all government department concerning national policies and security.
539. National Interest refers to the general concept of national security and well-
being.
540. National Pride Approach is the natural propensity of all persons to defend
their country and it’s policies.
541. National Strategy is the art and science of developing and using the political,
economic, and psychological power of a nation.
542. Natural Cover is using actual or true background.
543. Need to Know is the dissemination of classified information or matter to be
limited strictly to those person whose duties requires knowledge or possession
thereof.
544. Negative Agent is characterized by blackmail and threat.
545. Negative Branch has these counter Intelligence functions: investigate disloyalty
and sedition, investigate enemy activities, and investigate graft and fraud in an
organization.
546. Negative Control are Black Mail and Threat.
547. Negative Intelligence is a generic term meaning three different things.
548. Neglect means the failure to properly care for a child. Also, failure to care for a
property or one's actions.
549. Neighborhood Investigation is one of the most crucial steps in kidnap for
ransom cases which is often overlooked. The objective is to identify and
interview in person all individuals in the area where the victim was kidnapped
or the last known sighting area during the window of opportunity. (Last time
seen until the time discovered missing).
550. Nerve Agent is a chemical agent that interferes with the central nervous system
(Guevara, 2010).
551. NICA (National Intelligence Coordinating Agency) is the primary intelligence-
gathering arm of the Philippines. Its motto is Knowledge is Safety. It is headed
by a Director-General and is assisted by a Deputy Director-General. The
Director-General reports directly to the President of the Philippines.
552. No-Knock Warrant is a warrant that may be issued when there is concern that
evidence might be easily destroyed, or that there are explosives or other
specific dangers to the officers.
553. Non-Official Cover (NOC) is a term used in espionage (Particularly by the
CIA) for agents or operatives who assume covert roles in organizations without
ties to the government for which they work. Such agents are typically
abbreviated in espionage lingo as a NOC (pronounced as “Knock”) (Guevara,
2010).
554. Nonverbal Communication is the messages conveyed physically, particularly
by posture and gesture, but also by distance, dress, eye contact, mannerisms,
rate of speech, and tone of voice. Nonverbal communication is usually more
spontaneous than verbal communications, and therefore indicates the truth or
falsehood of what is said in field interview, regular interview, or interrogation.
555. Normal Interview is for a cooperative witness or those who may be persuaded
to cooperate (Arnilla, 2012).
556. Observation is the complete and accurate awareness by an individual on his
surroundings that comprises all the major senses to register and recognize its
operational and intelligence significance.
557. Observational Ability is the act of observing is a noting and recording of facts.
Under most circumstances, the investigator will use the sense of seeing and
hearing, the former being the more significant. E.g. the criminal investigator
must be able to note visual details while observing a subject for only a brief
time. The accuracy of descriptions of facial features, clothing, automobiles, etc.
is often crucial importance in a criminal case.
558. Ocharana is a war born in the reign of Tsar Alexander II with 100,000 agents on
its payroll operating from bases in every major city in Russia and several
capitals abroad.
559. Offense is an act of committing violations against the law.
560. Office of Naval Intelligence is tasked with collecting and recording such naval
Intelligence as may be useful to the department “In Time of War” as well as in
peace the office of Naval Intelligence became the first true government
Intelligence agency to function in Washington.
561. Officers include any government or armed forces officials’ officer permanently
or temporarily employed in a department.
562. On the Spot is applied when security condition on the place of observation
allows the observer to sketch or draw the object on the area at any time.
563. One Man Shadow is the most common because it involves the use of the least
number of men. In this type of surveillance, the shadower will follow the
subject and make notes authentically of that entire subject does.
564. Open Source refers to any information that can be legitimately obtained e. free
on request, payment of a fee.
565. Open Tail is surveillance in which no extraordinary means are used to avoid
detection.
566. Operation is an action conducted by military forces or that can range from a
recon mission. Opinion of an individual, group, organization of action.
567. Opinion is a personal belief. Not necessarily the truth.
568. Opportunity is the chance or time given to the offender in committing the
crime.
569. Oprichnina is Russia’s first political police. This was founded in 1565 by Ivan
the Terrible, the first Grand Duke of Muscovy to be crowned Tsar.
570. Orders of Battle is a summary recording on one’s specific criminal activities
with entries governing matters with intelligence and tactical operation.
571. Ordinance is the act of the legislative body of a municipality relating to all the
rules (including for misdemeanors) that govern it. Contrast with criminal
statute.
572. Ordinary run of the Military Informant are informants that are under the
compulsion to report information to the police.
573. Ordinary Witness is any person who perceived the commission of the crime
and testified before the court.
574. Organization refers to the intelligence personnel or the intelligence unit itself.
575. Organizational Ability is like a successful business executive, the police
investigator is continually processing various types of information. Written
information, verbal information, current case assignments, and follow-ups of
past investigations all require an ability to organize. The investigating officer is
receiving and processing formal reports from a multitude of sources. This
demands an orderly method of information retention that will result in the
availability of records and facts when needed.
576. Organizational Cover is an account consisting of biographical which when
adopted by an individual will assume the personality he wants to adopt.
577. Organized Crime is a combination of two or more persons for the purpose of
establishing by terror, threat, intimidation or conception in the city or any
municipality or any community of either monopoly or criminal activities in a
field that provides continuing financial support (Guevara, 2010).
578. Overt intelligence is the gathering information or documents procured openly
without regard as to whether the subject or target becomes knowledgeable of
the purpose.
579. Overt Method is a method of collecting information from open source.
580. Parallel Proceedings is the pursuit of civil and criminal redress concurrently.
581. Partial Background Investigation is an investigation of the background of an
individual but limited only to some of the circumstances.
582. Passive Counter-intelligence Measures is the protection of classified and
sensitive information against unauthorized access through secrecy,
communication security, and other safeguards.
583. Passive measures are those measures which seek to conceal info from the
enemy.
584. Patrick Colquhoun is a notorious thief catcher and former convict. He
proposed the unique idea of a sizeable uniform force to police the city. He and
those criminals under his direction operated with the complete sanction of the
police. At the end of a lengthy criminal career in 1809, he offered his services as
an informer to the Paris police authorities. He surfaced as a secret informer in
1817 and, under police authorization, formed the first Paris police detective
bureau.
585. Patriotism means the zealous love of one’s country.
586. Peace Time Contingency is a politically sensitive military
operation normally characterized by the short term rapid
projections or employment of forces in condition short of
conventional war (Guevara, 2010).
587. Pedophile is a person sexually attracted to young children.
588. Penetration Agents are agents who have reached the enemy to
get the information and would manage to get back alive.
589. Penetration refers to the recruitment of an active agent inside the
target organization.
590. Penetration Security Inspection is an inspection conducted in such a manner
that office personnel are not aware that such action is taking place. Civilian or
military against any personal injury.
591. Persistence means continuing in the face of opposition or refusing to give up
when faced with an adverse situation. To persist until all available facts of an
investigation are known and until satisfied that further effort will be
unproductive is the working definition of persistence for the investigator.
592. Personal Background Investigation is the investigation of the background of an
individual but limited only.
593. Personal Cultivation are contacts made during a past investigation proves to
be useful to the present case.
594. Personal Reconnaissance is the most effective method and will produce the
most info since you know just what you’re looking for.
595. Personnel Security includes all the security measures design to prevent
unsuitable individuals or persons of doubtful loyalty to the Philippine
Government.
596. Personnel Security Investigation is an inquiry into the character, reputation,
discretion, integrity, morals, and loyalty of an individual in order to determine
a person's suitability for appointment and access to classified matters.
597. Pertinence is relevant to the matter being considered.
598. Photography (Competent photograph) accurately represents what it purports
to represent, has been properly identified and recorded, properly placed and
kept in the chain of evidence, secured until court presentation. Material
photograph - relates to a specific case and subject. Relevant photograph helps
to explain testimony.
599. Photography is the process of producing an image on a ventilated material by
variant from a radiant energy
600. Physical Abuse is physical harm including beating, whipping, and burning.
601. Physical Evidence is a piece of evidence addressed to the senses of the court
that are capable of being exhibited, examined or viewed by the court. This
includes but not limited to fingerprints, body fluid, explosives, hazardous
chemicals, soil/burned debris, bombs, electronic parts used in the commission
of the crime.
602. Physical Form is the information that may actually be in a real form – meaning
the failure to retrieve it or receive it at the right time will be useless. E.g.
Fingerprints on bottle of beer and interview.
603. Placement is the location of a prospective agent with respect to the target.
604. Plain-view Evidence is evidence that is not concealed and visible to an officer
engaged in a lawful activity.
605. Planning and Directing Effort is a phase where the Intel Staff Officer or unit
commander determines the required or important information relevant to the
mission.
606. Planning the Collection Effort is the determination of those enemy activities or
characteristics of the area of operations.
607. Plea Bargaining is a process whereby the accused and the prosecutor reach a
mutually satisfactory conclusion to the case, subject to court approval. Usually,
the defendant pleads guilty to a lesser offense in return for a lighter sentence
than if they had been tried and convicted of a greater offense.
608. Police Blotter is an 18" x 12" logbook with hardbound cover that contains the
daily register of all crime incident reports, an official summary of arrests and
other significant events reported in a police station. A separate police blotter
shall be maintained for offenses requiring confidentiality like violence against
women and children and those cases involving a child in conflict with the law
to protect their privacy pursuant to RA 9262 (anti-violence against women and
children act of 2004) and RA 9344 ( juvenile justice and welfare act of 2006).
609. Police Intelligence is the gathering of information regarding the activities of the
criminal and their law violators for the purpose of effecting their arrest
obtained evidence of their activities and for stalling their plans to commit a
crime (Guevara, 2010). It could also mean the end product resulting from the
collection, evaluation, analysis, integration, and interpretation of all available
information regarding the activities of criminals and other law violators.
610. Police Intelligence Operations includes discovery, identification activity,
surveillance, liaisons, programs, informant management (Guevara, 2010).
611. Police Intelligence Process refers to the cyclical steps followed by intelligence
planning to the dissemination of processed information (Guevara, 2010).
612. Police is a personification of the state designated to put in practice and enforce
the law, protect property and reduce civil disorder in civilian matters
(Florendo, 2012).
613. Police Line-Up or Show-Up involves a process of letting/allowing a witness to
select the primary suspect from a group of chosen persons (suspect and
innocent person). This method is more convenient than the other methods since
the “element of suggestion” is avoided or minimized in the identification
process.
614. Police reports are the official record of the actions taken by various police
personnel in relation to an event, incidence or crime (Torredes, 2013).
615. Political Intelligence deals with domestic and foreign affairs and relations of
government operations.
616. Political Strength stems from the character of the people and room the type
and stability of the government and the soundness of its foreign policy.
617. Polygraph is an instrument that records certain physiological changes in a
person undergoing questioning in an effort to obtain truth or deception
(Florendo, 2012).
618. Pornography is a subject matter that is judged to morally offensive to the
degree of being obscene; there is considerable debate over what constitutes
pornographic material since there is no legally workable definition of
obscenity.
619. Port Frontier and Travel Security have to do with the application of both
military and civil security measures for CI control of entry and departure.
620. Portrait Parle is the using of descriptive terms in relation to the person at
features of individual and it can briefly describe as a word description or
spoken pictures.
621. Positive Branch has a function of Collecting, evaluating and disseminating
intelligence.
622. Positive Control is characterized by professionalism and rapport.
623. Positive Identification uses information that identifies an individual beyond
question and is legally acceptable pertaining to and originating from a
particular individual.
624. Postmortem Lividity is the dark blue or purple discoloration that the body
develops when the heart stops beating at death.
625. Prejudice is an opinion or leaning adverse to anything without just grounds or
before obtaining sufficient knowledge.
626. Preliminary or Initial Investigation involves the first exposure of the criminal
offense to the investigative process. It serves as the foundation for the case;
therefore, it must be a proper foundation or the entire investigation is in
jeopardy. The first police representative on the crime scene will usually be a
uniformed patrol officer. His duties are to provide aid to the victim, to secure
the crime scene for later investigation, and to begin documenting the facts of
the crime.
627. Preservation includes the act of keeping the collected evidence in their true and
original form, preventing contamination or destruction of its substantive value.
628. Pre-surveillance Conference is a conference held among the team members or
units before surveillance is conducted.
629. Prima Facie ('at First Sight') is evidence that is sufficient (if not rebutted) to
prove a proposition or fact. In a lawsuit, prima facie evidence must be
presented on every required element; otherwise, the claim may be dismissed.
630. Primary Crime Scene is the place where the crime was committed (Torres,
2013).
631. Primary Source is information obtained directly in its original form without
any change by any intermediary agency.
632. Principal Agent is a managerial agent and in most cases the leader of the agent
network.
633. Principle of Communication states that “intelligence adequate to their needs
must be communicated to all the decision-makers in a manner that they will
understand and in the form that will permit its most effective use.”
634. Principle of Continuity states that “Intelligence coverage must be continuing so
that shape of what happened today could be studied in the light of what
happened before, which turn would enable to predict the shape of things to
come.”
635. Principle of Interdependence states that “Intelligence is artificially subdivided
into component element to ensure complete coverage, eliminate duplication
and to reduce the overall task coverage, or manageable size.”
636. Principle of Objectivity states that “Intelligence must be based on the decision-
maker own plans and intentions as much as on consideration of the intelligence
target itself.”
637. Principle of Selection states that “Intelligence should be essential and pertinent
to the purpose at hand.”
638. Probable Cause is evidence of a state of facts that warrants the belief by a
reasonable person that a crime has been committed and/or a certain person is
guilty. Required for a search to be authorized and conducted.
639. Probe means to keep the people talking incessantly.
640. Processing is where collected information will be transferred into intelligence.
641. Procurement is the process of obtaining information needed for intelligence
purposes.
642. Procures and supplies is an agent who supplies or procured ordinary as well
as critical operational materials.
643. Proficiency concentrate on increasing our physical, mental and technical
capabilities.
644. Profiling (or 'Criminal Profiling' or 'Psychological Profiling') is a method of
narrowing the field of suspects by identifying the individual's likely mental,
emotional, psychological, and even physical characteristics.
645. Progress reports contain a brief of actions taken after the initial investigation.
Usually, criminal cases involve several progress reports which the lead
investigator collates alongside the initial report and other documents (Torres,
2013).
646. Projection is the process of putting the blame on other persons, not alone to the
suspect.
647. Prone Search is the suspect in this search lies on his stomach with arms and
legs outstretched. One disadvantage of this search is that the suspect’s frontal
area cannot be searched properly. This type of search can be dangerous if the
subject has knowledge in judo, aikido and other similar forms of defense
tactics.
648. Proof Beyond a Reasonable Doubt is proof of such a convincing character that
you would be willing to rely and act upon it without hesitation in the most
important of your own affairs. However, it does not mean absolute certainty.
649. Propaganda is a form of communication that is aimed at influencing the
attitude of a community toward some cause or position.
650. Propagandist is an agent that undertakes action to mold the attitudes,
651. Prosecution is the trial in the court of law for a criminal offense.
652. Protective Security is as those measures taken to prevent physical access
653. Provocateur is an agent who induces an opponent to act to his own detriment
by discrediting himself or revealing his time purpose or identity.
654. Provocation is an action taken in order to incite a reaction from a known
adversary to observe the reaction of the adversary.
655. Pseudo Crime Scene is a crime scene staged to mislead, cover-up, or conceal
what really happened (Torres, 2013).
656. Psychological Intelligence is a planned activity in peace and war directed
toward enemy, friendly and neutral audiences in order to create an attitude-
behavior favorable to the achievement of political and military objectives
(Guevara, 2010).
657. Psychological Warfare is where operations are directed towards populations in
the friendly rear areas on the territory occupied by friendly force. Used to
facilitate military operation and promote maximum cooperation (Guevara,
2010).
658. Public Safety Exception means law officers may interrogate a suspect without
first giving the Miranda Warning if a public threat exists that they believe may
be removed or reduced by having the suspect talk.
659. Public Safety Intelligence is the knowledge essential to ensure the protection of
lives and properties.
660. Put the Finger On means to identify the subject by pointing him out in a person
or in the photograph.
661. Put to Bed means the subject under surveillance returns to the quarter and
apparently retire for the night.
662. Quarles Decision is where a warrantless search is justified only in emergencies
(in absence of arrest or consent. See also Carroll Decision and Chimel Decision.
663. Questioning is the questioning portion that is the heart of the interrogation.
664. R.A 1400. Otherwise known as Anti-Wire Tapping Law.
665. R.A 157. Creating the Bureau of Investigation under the Department of
Justice.
666. R.A 1700. Otherwise known as the Anti- Subversion Law.
667. Rabbit refers to the subject or person being followed in a surveillance
operation (Guevara, 2010).
668. Raid is a planned, organized invasion by law officers, using the element of
surprise, to recover stolen property, seize evidence, or arrest a suspect.
669. Rape is sexual intercourse with a person against their will.
670. Rapport is a feeling of ease and harmony in a contact or relationship between
people.
671. Rationalization is also called 'the theory of closure'. The mind does not like
incomplete packages. So it is likely to complete something that is unresolved,
and soon believe that invention is true. Minimize this creation of memory error
by an interview or interrogation immediately after an event. It is the use of
reasons, which are acceptable to the subject that led to the commission of the
crime. The application of this technique depends upon the nature of the crime.
672. Reasonable Doubt is the level of certainty a juror must have to find a defendant
guilty of a crime. A real doubt, based upon reason and common sense after
careful and impartial consideration of all the evidence, or lack of evidence, in a
case.
673. Reclassifying or Regarding refers to the act of changing the assigned
classification of the classified information or matter.
674. Recognition is the first step that involves the efforts of identifying data,
including physical things that may provide relevant information regarding the
criminal case being investigated.
675. Recon Vehicle is also known as a counter-attack vehicle in a convoy
deployment, it fronts the principal’s vehicle to neutralize all possible threats
(Guevara, 2010).
676. Reconnaissance means to gather specific areas or to detail information at a
particular time and place.
677. Recording means to put in writing, it is the reduction of info writing.
678. Rectangular-Coordinate is one of the plotting methods for the crime scene. If
two adjacent intersecting walls of a room are at right angles, locations are
plotted by their distances measured at right angles from each wall.
679. Red Gestapo is the security organized by East Germany to combat the covert
activities of the West Germany Group when it was still divided by the Berlin
Walls.
680. Reflective Interview Technique (Mirror technique) is an approach where the
investigator presents a psychological mirror to the suspect and reverses the
situation by making him understand the feelings of the victim. The questioning
here is usually framed in this manner: “How would you feel if it was your own
child that was killed?”, “The victims’ body is yet to be found, don’t you think
the victim deserves a proper Christian burial?”, etc. (Torres, 2013).
681. Regular Source provides information regularly such as foreign press and radio
routine activities and contact officials abroad or at home.
682. Rehab is the harlot of Jericho who sheltered and concealed the agents of Israel,
she made a covenant with the agents and duped their pursuers.
683. Rehabilitation is the restoration of a normal life by special training programs,
also restoration to former privileges when training is satisfactory completed
(Guevara, 2010).
684. Re-investigation in some cases, a reinvestigation is resorted to whenever fatal
errors are committed in the earlier investigations which prevent the closure of
the case. This usually happens when unethical investigative practices are
resorted to, thereby requiring re-investigation in order to prevent a miscarriage
of justice (Torres, 2013).
685. Relevant evidence is evidence that helps explain testimony. Compare with
material evidence.
686. Reluctance to Talk can be due to: 1) Fear of self-involvement 2) Ignorance of
the criminal justice system. 3) Inconvenience. 4) Distrust of police. 5)
Association with or sympathy for the suspect. 6) Fear of reprisal.
687. Remote Data Terminal is a hand-held device captures fingerprints and photo
images at the crime scene. Transmits images through the law enforcement
communications network to an AFIS database and to the FBI's NCIC 2000
database.
688. Remuneration is a payment or reward for goods or services or for losses
sustained or inconvenience caused.
689. Repentance is one who has a change of heart and wishes to report a crime that
is preying on his conscience.
690. Reporting means to give detailed information about research or investigation.
691. Reputation is the opinion or estimation in w/c one is generally held.
692. Res Gestae is a spontaneous response at (or shortly after) the time of a crime
and closely related to actions in the crime. Considered more truthful than a
later (and possibly prepared) response.
693. Research is the investigation to get facts through the files of other agencies or
company records.
694. Residential Assignment is related to the neighborhood of the subject, where the
agent will live as a new resident without making any suspicion. His mission is
to make friends within its neighborhood and gather information regarding the
subject and possibly getting closer to the subject.
695. Residential Robbery is a robbery that is often committed in private homes,
hotel and motel rooms, garages, and elevators.
696. Restricted is any information and material; which requires special protection
other than those determined to be confidential secret and top secret.
697. Revenge is one of the strongest motivations in committing crime.
698. Rigor Mortis is the stiffening of parts of the body after death (attributed to
enzyme breakdown).
699. Rival Elimination Informants is the identity of these informants is usually
anonymous since their purpose in providing information is to remove their
competitors.
700. Robert Peel reiterated the idea of creating a sizeable police force. The eventual
passage of his recommendations, known as the Metropolitan Police Act, was to
have a tremendous impact on the history of criminal justice in general and on
the development of criminal investigation specifically.
701. Rough Shadowing is employed without special precautions, the subject may be
aware of the surveillance, employed also when the subject is a material witness
and must be protected from harm or other undesirable influences.
702. Rough Sketch is the sketch made by the investigator at the crime scene which is
full of important details but without the scale of proportion. This is used as the
basis for the finished sketch.
703. Rough Tailing is a moving surveillance where it does not matter if the
surveillance will be detected by the subject.
704. Sabotage is the damage done to property installations by an enemy agent. This
is an action against materials, premises or utilities or their products which may
insure, interfere with or obstruct the national security or the ability of a nation
to prepare for or carry on war.
705. Saboteur is an agent who undertakes positive action against unfriendly power
resulting in the loss temporarily or permanently of an article
material/facilities which are being used.
706. Safe House is a place or building enclosed mobile or apartment where police
undercover and operatives meet for the purpose of the briefing or plainly to
report (Guevara, 2010).
707. Safehouse Keeper is an agent that manage and maintain the safe house for
operational use such as for briefing, meetings and debriefing
708. Safe is a semi-portable strongbox with a combination lock. Broken into by 1)
Blowing: using cotton, primer cap, copper wire, and nitroglycerin. The
burglar pushes cotton into part of the safe door crack or into a hole drilled in
the safe near the locking bar area; then he puts nitroglycerin on the cotton. 2)
Burning: using a burning bar or an oxyacetylene tank, a hose, and a torch. 3)
Chopping a hole in it. With a sledge and chisels or a heavy chopping
instrument (e.g., an ax) the burglar chops in the bottom of the safe a hole large
enough to allow removal of the contents. 4) Peeling: using a breast drill, a set
of graduate drills, and a jimmy. The burglar drills a hole in one corner of the
safe and enlarges this hole by using other drills until the narrow end of a
jimmy can be inserted in the hole and the door pried partially open. 5) Pulling
or dragging: with a heavy plate of steel by using a V plate or V-cut and
drilling holes in the corners in which to insert bolts. The burglar inserts a V
plate over the dial with the V in place behind the dial. 6) Punching with a
short-handled sled, a steel chisel, and a drift pin. A downward blow with a
sled (or by holding a chisel to the dial and using a sled to knock off the dial)
shears the dial from the safe door and exposes the spindle of the safe
mechanism.
709. Scale of Proportion is the element of the finished sketch. It is the essence of the
finished sketch to the actual size or measurements at the scene.
710. Scientific Intelligence deals with the progress of research and development
711. Search as generally applied in criminal investigation, refers to the examination
of an individual’s person, house, papers or effects, or other buildings and
premises to discover contraband or some evidence of guilt to be used in the
prosecution of a criminal act.
712. Search Patterns are systematic approaches to look for evidence at a crime
scene; recommended ones are: 1) Circle-Search Pattern: begins at the center of
the area to be searched; spreads out in widening concentric circles. 2) Grid-
Search Pattern: divides the scene into two sets of essentially parallel lanes,
using stakes and string; the lanes are traversed and then cross-traversed at
right angles. 3) Lane-Search Pattern: divides the scene into one set of parallel
lanes, using stakes and string. 4) Zone-Search (or Sector-Search) Pattern:
divides the scene into equal squares on a map of the area and numbers each
square. Officers are assigned to particular squares.
713. Search Warrant is an order in writing issued in the name of the people of the
Philippines, signed by a judge and directed to a peace officer, commanding
him to search for personal property described therein and to bring it before the
court. (Sec. 1, Rule 126 of the RPC)
714. Secessionist is an insurgency which aims to establish an autonomous region
over the province of Minsupala, Basilan and Tawi-Tawi.
715. Secondary Crime Scene is the place where the crime was continued (Torres,
2013).
716. Secondary Source is information obtained and partially evaluated, condensed,
recorded by intermediate agency.
717. Secrecy is the state of being secret.
718. Secret Agent is a person engaged in espionage.
719. Secret is any information or material that the unauthorized disclosure of it
would endanger national security causes serious injury to the interest and
prestige of the nation or of any government activity or of a great advantage to
a foreign nation.
720. Security Clearance is the certification by a responsible authority that the
person described is cleared for access to clarified matter the appropriate level.
721. Security Inspection is as a counter-intelligence service performed to determine
compliance w/ established security police and procedures.
722. Security is the protection of classified information material and equipment
from disclosure to unauthorized persons and the protection of defense
installation and equipment from damages.
723. Security Survey is a counterintelligence service to assist the commander in
determining security measures required to protect the installation from
possible sabotage, espionage, subversion and unauthorized disclosure of
access to classified diff. information and martial certain therein.
724. Seduce is concerned on Strategic and Counterintelligence
725. Seizure as usually applied in relation to search, refers to the confiscation of
property by an officer with legal authority to do so. In criminal investigation,
it is the logical consequence of search.
726. Selection is particularly desirable to able to identify an informant who has
access to many criminal in-group or subversive organization.
727. Self-Aggrandizing moves around the center of criminal’s delight in surprising
the police about bits of information.
728. Semi-Memory Method is applied when the security condition of the area in
such a way that the observer in the making notes of what was observed.
729. Sensory Form is the outward manifestations of a criminal event that can be
perceived by our five senses – eyes, ears, nose, tongue and hands.
730. Serial Killer is someone who murders 3 or more people with "cooling off"
periods in between.
731. Serial Murder is killing more than two separate people with a 'cooling-off'
period between each killing.
732. Serious Indebtedness is the person is heavily indebted. Always looking for a
fast and easy way to recoup his losses.
733. Sertorious is the possessor of the white fawn that tried to follow Polyaenus
everywhere. The pawn was used as intelligence agents.
734. Shadowing is the observation of a person’s movement. The act of following
person. Also known as tailing.
735. Shield Vehicle is a heavily armored vehicle located at the side of the principal’s
vehicle (Guevara, 2010).
736. Shoplifting is taking items from retail stores without paying.
737. Shrinkage is an unexplained or unauthorized reduction of inventory from a
retail establishment.
738. Signal Intelligence results from collecting, locating, processing, analyzing, and
reporting intercepted communications and non-communications.
739. Signatory is the part of the sketch where the name of the sketcher and the
team leader or the officer in charge are written and signed.
740. Silent Technique is employed against nervous or the confident type of
interreges.
741. Simple assault (usually a misdemeanor) – (1) Intentionally causing another
person to fear immediate bodily harm or death or (2) Intentionally inflicting or
attempting to inflict bodily harm on another.
742. Sir Francis Walsingham is credited with creating the first viable secret service
in England.
743. Sir Llewelleyn William Atcherly is the Chief Constable of West Riding,
Yorshire. He pioneered the recording of M.O. (modus operandi) files as
investigative aid that can be used to identify criminals based on the tools they
use, the manner of commission, the time of the crime, and other pertinent data
(Torres, 2013).
744. Situation Map is a temporary graphic display of the current dispositions and
major activities of the enemy.
745. Sketch is the graphic representation of the scene of the crime with complete
measurements of the relative distances items or objects. Sketch includes scales,
with important dimensions at the scene being shown to a good degree of
accuracy.
746. Sketch of Details includes the positions and exact locations of the physical
evidence in the crime scene. It describes the immediate scene only like the
room in which the crime was committed and the details of items in the room.
747. Sketch of Grounds is the kind of sketch that illustrates the scene of the crime
with the nearest physical surroundings, such as the room adjacent or opposite
the room of the crime scene, the number of floors of a building or house, the
yard and the other natural structures.
748. Sketch of Locality deals with the vicinity of the crime scene in relation to the
environs, to include neighboring buildings, structures, or means of access
leading to the scene.
749. Sketcher makes sketches of the immediate, background and inside the scene of
the crime.
750. Sketching consists of pulling ideas in an accurate pictorial form to describe a
specific area.
751. Slamming is the unauthorized switch of a long-distance carrier; in the early
21st century, this is the most common and fastest-growing category of
complaints to the FCC.
752. Sliding is switching carriers on a specific call, from the long-distance carrier to
an unauthorized carrier.
753. Smash-and-Grab is a burglary where a window is broken in order to steal
merchandise. Also called hit-and-run.
754. Smersh or “Death to Spies” was organized during the war as
counterintelligence concerned with disaffection among Soviet Troops and anti-
communism in any form.
755. Snippet is a fragment of information (Guevara, 2010).
756. Snitches are jailhouse informants.
757. Social Assignment is where the agent will gain access to the subject by going
to the different hangout places of the subject and gather information like
knowing how to drink socially without getting drunk.
758. Social Investigation is an abbreviated and limited form of area study some in
the context of strategic intelligence and focused primarily on the psychological
factor that will influence the organizational efforts that is a part of a strategic
campaign plan.
759. Sociological Intelligence is a form of intelligence that deals with the
demographic and psychological aspects of groups of people.
760. Sociology Intelligence deals with the demographic and psychological aspects
of groups of people.
761. Solid Barriers are constructed in such a usual access is afforded or permitted
through a force.
762. Solvability Factors are factors crucial to resolving an investigation and to
consider when deciding whether to investigate a crime.
763. Source is a person who for any reason submits info of intel interest.
764. Soviet Intelligence (AMTORG) was organized for the purpose of purchasing
all kinds of materials for the Soviet Union.
765. Special Informant gives information concerning specialized cases only it is
regarded as a special treatment by the operative.
766. Special Operations are those counter-subversion, sabotage and espionage.
767. Speculators served as an information-collecting agency.
768. Spies of Consequences are low informers and unreliable renegades of value
chiefly in spreading false info to the enemy.
769. Spiral Search Method is the searchers (3 people are good) follow each other
along the path of a spiral beginning on the outside and spiraling in towards
the center.
770. Sponsor refers to the organization of the government that authorized,
approve, direct and control support clandestine operation.
771. Spot Reports is one time reports used by echelons to transmit intelligence or
information of immediate value. The most expeditious means of transmission
consistent with requisite security.
772. Spotting means to look out for the purpose of recording information.
773. Spy is a person instructed to act secretly to gather information.
774. Stake-Out is the observation of a place from a fixed point.
775. Stalker is someone that deliberately and repeatedly attempts to contact,
follow, or in any other way harass or intimidate another person. The first
U.S.A. anti-stalking laws were passed in 1990 in California.
776. Standing Search is done by instructing the subject to raise his hands above or
behind his head with feet spread apart as far as possible. In some situations,
this is not recommended because some suspects could still maintain their
balance.
777. State Informer was created in 1734 enjoining all informers to expose criminal
activities and be compensated.
778. State the Problem is the problem would be to identify, locate and arrest the
perpetrator of the crime and attempt to recover all stolen property in a
thorough legal manner designed to ensure the greatest probability of justice.
779. Statement is a legal narrative description (from a suspect, witness,
complainant, etc.) of events related to a crime.
780. Stationary is the observation of a place usually bookie stall, a gambling, joint a
residence where illegal activities are going on.
781. Stationary Surveillance (Fixed or Stakeout Surveillance) is used when you
know or suspect that a person is at or will come to a known location when you
suspect that stolen goods are to be dropped or when informants have told you
that a crime is going to be committed.
782. Statutory Rape is sexual intercourse with a minor, male or female, of age
under (usually) 14 years, whether with their consent or against their will.
783. Stockholm Syndrome is a condition where a hostage sympathizes with their
hostage takers and fears the rescuers (such as the military and the police) more
than the captors.
784. Storage Area is where the supplies are stored in a safe area.
785. Stranger Stalking is the stalker and the victim do not know each other at all.
786. Strategic Intelligence is information concerning existing patterns or emerging
trends of criminal activity designed to assist in criminal apprehension and
crime control strategies for both short and long term investigative tools. 
787. Strategic of Police Intelligence is that knowledge pertaining to the capabilities,
vulnerabilities and probable cause of action of a foreign nation or enemy.
788. Street Robbery is a robbery that is often committed on public streets and
sidewalks, in alleys, and in parking lots.
789. Strip Method is the area that is blocked out in the form of a rectangle. The
searchers (3 people are good) proceed slowly at the same pace along
paths parallel to one side of the rectangle.
790. Strongman is an agent ready to provide protection during dangerous phases
of the clandestine operation.
791. Subject is a person or place or object being surveyed or watched (Guevara,
2010).
792. Subversion is an organized and systematic conspiracy designed to discredit
and overthrow duly constituted authority (Guevara, 2010).
793. Subversive Activities are activities designed to disrupt or even overthrow
ruling parties or government (Guevara, 2010).
794. Subversive Organization is the most dangerous of all the undercover
assignment, the agent will join the organization of the subject itself, he must
know the ideologies of the group and the actions while inside should conform
to the organization to avoid any suspicion.
795. Suitability is the availability of the unit in selecting the area of interest.
796. Sun Tzu is generally credited with instigating the first fully operational
espionage network.
797. Superior Reasoning Ability is the ability to analyze logically a multitude of
facts and determine how they interrelate is basic to the investigative process.
Although this ability is essential at all levels of law enforcement, the
investigator is confronted with continual mental challenges on a daily basis.
798. Support Agent is an agent engage in the activities which support the
clandestine operation.
799. Surveillance is a form of clandestine investigation which consists of keeping of
any person or other target under physical observation relevant to the purpose
of the investigation. Surveillance is defined as the discreet observation of
persons, places and vehicles for the purpose of obtaining information
concerning the identities or activities of criminals.
800. Surveillant is the person who conducts the surveillance or performs the
observations. While the subject is the person, place or vehicle being observed
by the surveillant.
801. Survey - Determine the unforeseen defect of a unit and make a
recommendation for its correction or improvement.
802. Suspect is an individual considered to be directly or indirectly connected with
a crime (no matter whether by physical activity or by planning or by
supervising). Compare with a defendant (after a suspect is charged and
brought to trial). A suspect is developed through 1) Information from victims,
witnesses, or others likely to know about the crime or suspect. 2) Physical
evidence left at the crime scene. 3) Psychological profiling. 4) Information in
police files. 5) Informants. 6) Surveillances, undercover assignments, and
raids.
803. Suspect is any person believe to be associated w/ prohibited activity.
804. Sympathetic approach is best used for sensitive suspects who commit crimes
because of fits of jealousy or emotions. The questioning here usually starts
with “I understand how you felt”, “If I were on your situation, I would
probably do the same thing” (Torres, 2013).
805. Syndicate Crime Groups means two or more persons collaborating or mutual
helping one another in the commission of a crime.
806. Tact is the ability to deal with others in respective manners.
807. Tactical Intelligence is information regarding a specific criminal event that can
be used immediately by operational units to further a criminal investigation
plan tactical operations and provide for officer safety.
808. Tactical Interrogation is the process or method of obtaining information from
a captured enemy who is reluctant to divulge information.
809. Tailing or Shadowing is the observation of a person’s movement.
810. Talkative Type are witnesses who are prone to exaggerate, adding irrelevant
or new matters to their narration. The skillful investigator could prune the
unnecessary matters from the relevant ones.
811. Target is a person, place, things or activity against which the clandestine
organization or operational activities.
812. Target Selection is the first phase in the process of identifying criminals and
subversive elements. It involves utility, probability of success, required
resources and objectives (Guevara, 2010).
813. Team Leader is the one who directs the processing of the crime scene.
814. Teaser Bait Approach is the elicitor accumulates the sources of knowledge
about a particular subject.
815. Technical Intelligence concerns foreign technical developments, which have
practiced military application and the practical performance, capabilities and
limitations of materials and installation used by foreign military forces
(Guevara, 2010).
816. Technical is surveillance by the use of communication and electronic
hardware, gadgets, system, and equipment.
817. Telecommunication Intelligence is concerned with the operations and facilities
of long-distance communication media including telegraph, telephone, radio,
satellite, television and other electronic communications (Guevara, 2010).
818. Temperament means mode of emotional response.
819. Testimonial Evidence is the most common form of evidence, and it is obtained
through interview and interrogation – events which witness see, smell, taste,
and touch are described to the investigator through oral and written
testimony.
820. Testing is the testing program should begin, of course, with limited
assignment with gradual integration into more important areas. The
occasional testing of an informant should continue through the entire
affiliation.
821. The Ninja is derived from the word “Ninjitsu-the art-making oneself invisible)
served the shoguns of the 12th century in Japan. They were drawn from the
physical and social cream of samurai youth reputed to be able to walk on
water, to obtain intelligence while and to appear and disappear at will.
822. Theories are the beliefs regarding the case based on the evidence, patterns,
leads and tips and other information developed or uncovered in a case.
823. Thomas Byrnes is the Chief of the detectives New York City, was one of the
famous investigators of the nineteenth century. An unusually keen-minded
individual with 32 years of police experience, he trained his detectives in
recognizing individual criminal techniques. This method was later to be
known as “modus operandi” or method of operation and is considered an
essential tool of investigation to this day.
824. Three Man Shadowing or ABC Method of Shadowing where A, B, and C, A is
closest to subject (S), he follows S at a distance which depends on the
pedestrian traffic. B follows A, at about the same distance from A as A is from
S, or, if vehicular traffic is moderate, may be approximately opposite him on
the other side of the street, B and C take turns in occupying the A position,
thus preventing A becoming a familiar and noticeable figure to S.
825. Time and Date (Sketching) includes the exact time of the preparation of the
sketch but most importantly the time and date of the occurrence of the crime
should be recorded.
826. Time Log is accurate reporting depends entirely on timeless, delay in
reporting.
827. Timid Witnesses are the shy witnesses. The approach must be friendly and
reassuring the confidentiality of their information. They should be hidden
from the devouring press by interviews or photo sessions.
828. Tips refers to leads provided by citizens that aid in the progress of investing.
Generally, tips involve the identity of the suspect.
829. Top Secret is any information and material the unauthorized disclosure of it
would cause grave damage to the nation politically, economically or militarily.
830. Topographic Bureau maintains a large map that covers the latest information
regarding both enemy and friendly forces.
831. Toxicology is the study of poisons.
832. Trace Evidence is evidence that is barely visible. Includes fingerprints as well
as small particles of glass or dirt.
833. Tracing Identification involves the use of all other information that may be
indicative of the personal identity of an individual.
834. Transmission Security is a component of communication security that results
from all measures design to protect the transmission from interception, traffic
analysis and initiative deception.
835. Transportation and Communication Intelligence is concerned with operation
and facilities not only the military but also the civilians.
836. Triangulation is one of the plotting methods for the crime scene. Make
straight-line measurements from two fixed objects to the location of the
evidence, creating a triangle. The evidence is in the angle formed by the two
straight lines, at the distance that you measured from each fixed point.
837. Truth is concerned with what actually happened. It may be hard to discover
from a witness due to: 1) Memory error. 2) Predisposition: witness may
sympathize with the victim or suspect, and alter a story. 3) Reluctance to talk.
838. Two-Man Shadow is more advantageous because it permits mediatory change
and are more likely to recognize.
839. UCR is the FBI's Uniform Crime Reporting Program is a U.S.A.-wide
voluntary cooperation by over 16,000 city, county, and state law enforcement
agencies to report data on crimes brought to their attention. This covers 95% of
the U.S.A.'s population.
840. Undercover Agent is an intelligence officer w/c is performing undercover
work.
841. Undercover Assignment is an investigative technique in which an agent
conceals his official identity and obtains information from that organization.
842. Undercover Operation (also called Roping) is disguising one's own identity or
using an assumed identity for the purpose of gaining the trust of an individual
or organization to learn secret information or to gain the trust of targeted
individuals in order to gain information or evidence.
843. Undercover Work is an investigation process in which disguises and pretext
cover and deception are used to gain the confidence of criminal suspects.
844. Unsolicited Contact are voluntary informants who self-initiate the police
contact. Identified subjects who report criminal activity without being
solicited, or subject who give anonymous tips over the phone or by letter.
845. Upgrading is the act of assigning the information or matter to the higher
classified that previously assumed to it.
846. US Strategic Service does research and analyze military, political and
economic info and to be responsible for the planning and operation of special
service.
847. Utility refers to the type of criminal activity, amount and frequency of
criminal activity and its impact (Guevara, 2010).
848. Vanity is a conceited act/character of the crime resulting in self-betrayal or
tantamount to guilt, gaining favorable attention and importance by the police.
849. Vault is a stationary security chamber of reinforced concrete, often steel-lined,
with a combination lock.
850. Victimology/Victim Profiling is a detailed account of the victim’s lifestyle and
personality, assists in determining the nature of the disappearance, the risk
level of the victim and the type of person who could have committed the
crime. Complete information regarding the victim’s physical description,
normal behavior patterns, family dynamics and known friends and
acquaintances should be obtained as soon as possible.
851. Victims are the direct recipients of the crime itself who suffered direct or
indirect loss/injury as a consequence thereof (Torredes, 2013).
852. Voluntary Informant is a type of informant who gives information freely and
willfully as a witness to a certain act. Voluntary Informant is anyone,
regardless of a criminal or law-abiding background, who provides
information to the public without ulterior motive or payment.
853. Voluntary Manslaughter is intentionally causing the death of another person
in the heat of passion that is adequately provoked by words or deeds.
854. Voyeurism is peeping in other people's windows. A.k.a. 'Peeping Tom'.
855. Walk-Through is the type of investigation on a case wherein the suspect is
easily determined and located and the detective must only observe the legal
guidelines to reach a solution.
856. Wall Search is the initial purpose of using this search is to put the suspect in
an “off-balanced position”. This is the safest type of search. It does not
necessarily require a wall. Any object that can support the weight of the
suspect (such as a car) can be used.
857. Walshingham of England protected Queen Elizabeth I from countless
assassins.
858. Warrant of Arrest is an order in writing issued in the name of the people of
the Philippines, signed by a judge and directed to a peace officer, commanding
him to take a person into custody in order that he may bound to answer for
the commission of an offense. (Sec. 1, Rule 126 of the RPC)
859. Waterboarding refers to the practice of strapping a suspect to a board with his
or her head lowered, then the face is covered and water is poured over it
causing the suspect to gag and experience the sensation of drowning.
860. Weakness of Character is a character that can easily be dominant in fair prey.
861. What Questions are purposely used to find out what happened or what took
place before, during and immediately after the commission of the offense.
862. Wheel Search Method is the area that is considered to be approximately
circular. The searchers gather at the center and proceed outward along radii
or spokes. Procedure is repeated several times depending on the size of the
circle and the number of searchers.
863. When Questions are questions needed to determine and fix the time, day,
month and year when the crime was committed. When questions should be
specified and as accurate as possible.
864. Where Questions are questions that localize the place of the incident is the city
or town, the district or barangay, the street or road, the number of the house or
building. Where questions are necessary in specifically pinpointing the
particular location of the crime scene.
865. Where-are-they is the appropriate type of investigation to use in the case
wherein the suspect has been tentatively identified but has not been located.
The case may have a simple solution or it involves complex mystery.
866. Who Questions are questions used to inquire about the identity of the victims
or offended party, name of suspect, accomplices, accessories and witnesses of
the crime.
867. WHODUNIT is a case in which no suspects are initially identified. Majority
crimes reported to the police under this category are rarely solved.
868. Why Questions: These are questions that endeavor to ascertain the motives,
causes, antecedents, previous, incidents, related facts, background occurrences
that might help explain the commission of the offense.
869. Wilhelm Stieber has contributions to the science of Military Censorship and
organized Military Propaganda. He worked as a census taker and developed
in informal format in the gathering of data.
870. Wire Tapping is the telephone line is tapped somewhere along the line, either
in the street line or in the telephone company.
871. Wireless Telegraph was used wherein codes and ciphers were applied.
872. Wiretapping is the interception of telephone calls.
873. Witness is an individual who saw a crime or some part of it being committed
or who has relevant information. Witness is any person who has direct
knowledge of facts concerning an event or activity.
874. Witnesses who refuse to answer are the most difficult subjects to deal with.
Find out the reasons for their personality. The cause may be trauma, shock,
fear, hatred, and others. Remove these fetters of silence and they will start
talking.
875. Work Assignment is where the agent will be employed where the subject work
to acquire information. The agent must know his work and focus his mindset
and habit to his work assignment
876. Written Form is a criminal act that may also provide information in a written
form like receipts from the motel, food and drinks in the pocket of the suspect.
877. Year 1285 A.D., England. The Statute of Winchester was enacted establishing a
rudimentary criminal justice system in which most of the responsibility for law
enforcement remained with the people themselves.
878. Year 1811. France. Eugene “Francois” Vidocq established a squad of ex-convicts
to aid the Paris Police in investigating crimes. He worked under the theory of
“Set a thief to catch a thief.” He introduced the concept of “Trade Protection
Society,” which became the forerunner of our present-day credit card system.
He is credited, as the founder of La Surete, France’s National Detective
Organization.
879. Year 1829, London. Robert Peel is the founder and chief organizer of London
Metropolitan Police. He introduced the techniques in detecting crimes such as
detectives concealing themselves, and secretly photographing and recording
conversations.
880. Year 1833, England. London Metropolitan Police employed the first undercover
officer.
881. Year 1835, Texas Rangers. Was organized as the first law enforcement agency
with statewide investigative authority. This is the forerunner of the Federal
Bureau of Investigation (FBI).
882. Year 1852, U.S.A. Allan Pinkerton was America’s foremost private detective.
This individual truly deserves the title of “America’s Founder of Criminal
Investigation.” Among methods pioneered were “shadowing,” the art of
suspects surveillance, “roping,” working in an undercover capacity, they have
the motto, “We never sleep.”
883. Year 1852, U.S.A. Charles Dickens is a great novelist in which through his story
entitled bleak house, he introduced the term detective to the English language
(Adams & Taylor, 1995).
884. Year 1856, U.S.A. Kate Wayne is the first woman detective in the history of
criminal investigation. She was hired by the Pinkerton Agency and contributed
to the resolutions of big cases of the United States of America.
885. Year 1859, U.S.A. The Appellate Courts of USA recognized/accepted
photographs to be admitted as evidence in court proceedings upon its
relevancy and after verification.
886. Year 1865, U.S.A – U.S. Secret Service was founded to investigate counterfeiting
activity in post-civil war in America. This agency was created purposely to
counteract the proliferation of fake dollars and paper money in America.
887. Year 1866, Liberty, Missouri, USA. The Jessie James Gang made the first hold-
up which marks the beginning of the gang’s 15-year hold-up and robbery spree
(12 bank hold-ups and 12 train stagecoach robberies in 11 states). Clay County
Savings Association was their first victim and their take was $60,000.00.
888. Year 1866, U.S.A. Thomas Byrnes is an unusually keen-minded individual who
trained his detectives in recognizing individual criminal techniques. He
founded the criminal “modus operandi,” or method/mode of operation.
889. Year 1877, England. Howard Vincent headed the newly organized Criminal
Investigation Department in Scotland Yard.
890. Year 1882, France. Alphonse Bertillon is a French Police Clerk who introduced
and established the first systematic identification system based on the
Anthropological Signalment (Anthropometry). He is considered the founder of
Criminal Investigation.
891. Year 1887. Dr. Arthur Conan Doyle popularized the scientific Criminal
Investigation by creating the fictional detective Sherlock Holmes and his friend
Watson.
892. Year 1892, England. Francis Galton is an English man who published his study
on classifying fingerprints and recognized the uniqueness of the fingerprints to
be used as evidence against a suspect.
893. Year 1909-1924. John Edgar Hoover became the head of the Federal Bureau of
Investigation, which was established by the attorney general from 1909 to 1924.
894. Year 1913, Philippines. The genesis of Criminal Investigation in the Manila
Police Department, presently the Western Police District took place.
895. Year 1918, England. A new concept was introduced in the field of Criminal
Investigation. This is known as “Team Policing.” In this concept, there was no
patrol division or criminal investigation per se. In this system, a team of police
officers is assigned to patrol and investigate all criminal matters within their
area of jurisdiction or district.
896. Year 1954, USA. Dr. Paul Kirk is the best-known Criminalist who headed the
Department of Criminalistics at the University of California, USA.
897. Year 1966, USA. Miranda Vs Arizona is the US Supreme Court established
procedural guidelines for taking criminal confessions. The case is the origin of
the present Miranda rights of every accused under the custody of police.
898. Year 2100 B. C., Babylon. The Code of Hammurabi was then implemented to
detect those who refused to obey the law. It imposes the Lex Taliones principle
where punishment of an offender is equal to what he did.
899. Zone Search Method is one searcher is assigned to each subdivision of a
quadrant and then each quadrant is cut into another set of quadrants.

REFERENCES

Books/Printed Materials:

Cael, B. G. & Agas, J. L. (2000) A guide to criminal investigation. Manila: Mary Jo


Publishing House, Inc.

Claro, Lylani S. (2012). Fundamentals of Criminal Investigation (Unpublished).


University of Baguio, Baguio City.

Cordillera Career Development College (2014). Compiled Review Materials


(Unpublished). Buyagan, La Trinidad, Benguet.

Dulipas, Benjamin O. (2012). Police Intelligence and Secret Service (Unpublished).


University of Baguio, Baguio City.
Florendo, A. M. (2012). Fundamentals of Criminal Investigation. Quezon City:
Wiseman's Books Trading, Inc.
Guevara, R. M. (2010). Police Intelligence and Secret Service. Quezon City: Wiseman's
Books Trading, Inc.

Guevarra, Ricardo M. (2012). Criminology Licensure Examination Reviewer (2nd ed).


Quezon City: Wiseman’s Books Trading.

Ifugao State University (2013). Compiled Review Materials (Unpublished). Nayon,


Lamut, Ifugao.

Kings College of the Philippines (2014). Compiled Review Materials (Unpublished).


Pico, La Trinidad, Benguet.
Lud-ayen, Charesma Grace K. (2010). Fundamentals of Criminal Investigation
(Unpublished). University of Baguio. Baguio City.

Manwong, R.K., (2004) Essentials of criminal investigation. Baguio City: RK Manwong


Production and Publication.

Manwong, Rommel K. (2013). My Quizzer in Criminology: A Reviewer (5th ed). Quezon


City: Wiseman’s Books Trading.

Mountain Province State Polytechnic College (2013). Compiled Review Materials


(Unpublished). Bontoc, Mountain Province.

Moyao, Leah G. (2014). Fundamentals of Criminal Investigation (Unpublished). Araullo


University. Nueva Ecija.

Padduyao, Fernando B. (2014). Reviewer for the Criminology Board Examination.


Bulacan: St Andrews Publishing House.

Peckley, Miller F. (2014). Licensure Examination for Criminologists Reviewer. Bulacan:


Crimzone Enterprizes.

PLT College, Inc. (2013). Compiled Review Materials (Unpublished). Bayombong,


Nueva Vizcaya.

Saint Mary’s University (2015). Compiled Review Materials. Bayombong, Nueva


Vizcaya.

Soriano, Oscar G. (2016). Compendium on Review Materials for Criminology Board


Examination. Cabanatuan City: Nueva Ecija Review Center and Educational
Supplies.

University of Baguio Review Center (2017). Compiled Criminology Board Review


Materials (Unpublished). Gen. Luna Road., Baguio City.

University of the Cordilleras (2015). Compiled Review Materials (Unpublished). Gov.


Pack Road., Baguio City.

Vicente, Jezreel B. (2011). Fundamentals of Criminal Investigation (Unpublished).


University of Baguio, Baguio City.

Internet sources:

____(2016). Definition of terms on Criminal Investigation. Retrieved on February 28,


2017, from http://criminologyboardexamreviewer.weebly.com/intelligence-
and-secret-service-reviewer-1.html
Arnilla, A.A.(2012). Police Intelligence Reviewer | Espionage. Retrieved on January
29, 2017, from https://www.scribd.com/document/270519053/Police-
Intelligence-Reviewer

Fundamentals of Criminal Investigation | Forensic Science. (n.d.). Retrieved on


February 01, 2017, from
https://www.scribd.com/doc/79803758/Fundamentals-of-Criminal-
Investigation

Torres, A. G. (2013). Fundamentals of Criminal Investigation.pdf | Crime Scene |


Forensic Science. Retrieved on February 02, 2017, from
https://www.scribd.com/doc/170878326/Fundamentals-of-Criminal-
Investigation-pdf

You might also like