Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

All Reports

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 30

CHAPTER II

THE BASIC CONCEPTS OF ARREST, SEARCH & SEIZURE, AND RAID

Unit 1. ARREST
The etymology of the term "arrest" is from the Latin term "arrestare" which means "cause to
stop" and "restare" which means "stay behind". The term was used last 14th century ago.

What is an arrest?
It is the taking of a person into custody in order that he/she may be bound to answer for an
offense or crime committed or involved with. An arrest is an act of apprehending and taking a
person into custody, usually because the person has been suspected of or observed committing a
crime. After being taken into custody, the person can be questioned further and/or charged. An
arrest is a procedure in a criminal justice system, sometimes it is also done after a court warrant
for the arrest. An arrest is made by an actual restraint of a person to be arrested (Section 2, Rule
113, Rules of Court).

Two Kinds of Arrest


An arrest could be made in two kinds;
1. In general rule which is by virtue of an arrest warrant; and
2. Under exceptional circumstances, it can be made even without a legal warrant of arrest (Section
5, Rule 113, Rules of Court).

WARRANTLESS ARREST
Under Section 5, Rule 113, Rules of Court

• In flagrante delicto arrest (Section 5, a) - caught in the act of commiting, attempting to commit,
or has just committed a crime

• Hot pursuit arrest (Section 5, b) - when he has personal knowledge of facts indicating that the
person to be arrested has committed an offense.

• Escapee arrest (Section 5, c) - if the person to be arrested is an escapee.

1. What is an arrest warrant?


It is an order in writing issued in the name of the people of the Philippines signed by a judge
directed to a peace officer, commanding him/her to arrest the person designated and take him into
the custody of law in order that he/she may be bound to answer for the commission of an offense
(Microsoft Encarta, 2008).

When is a warrant of arrest a valid document?


If it is issued upon an existing probable cause which is determined personally by the judge
after examination under oath or affirmation of the complainant and the witnesses he may produce.

Probable cause is defined:


Probable cause is defined as such facts and circumstances which could lead a reasonably
discreet and prudent man to believe that an offense has been committed and that the person to be
arrested has in fact been committed an offense. Further, the warrant of arrest must particularly
describe the person to be arrested.
Although probable cause eludes exact and concrete definition, it generally signifies a
reasonable ground of suspicion supported by circumstances sufficiently strong in themselves to
warrant a cautious man to believe that a person accused is guilty of the offense with which he is
charged.

What are the duties of the arresting officers Implementing the warrant of arrest?
1. While arresting the accused/suspect, the arresting officer should inform the cause of the arrest
and the fact that a warrant had been issued to him/her for his arrest.

2. The police officer who makes the lawful arrest should take the person arrested without
unnecessary delay and deliver/her to the nearest police station or jail.

In case of warrantless arrest, the arresting officer must deliver the arrested person to the
proper judicial authorities with a stringent observance of the provisions of article 125 of the RPC.

ART. 125
Delay in the delivery of detained persons to the proper judicial authorities. The penalties
provided in the next proceeding article shall be imposed upon the public officer or employees who
shall deatain any person for some legal ground and shall fail to deliver such person to the proper
judicial authorities within the period of: twelve (12) hours, fro crimes or offenses punishable by light
penalties, or their equivalent; eighteen (18) hours, for crimes or offenses punishable by
correctional penalties, or their equivalent: and thirty six (36) hours, for crimes or offenses
punishable by afflictive or capital penalties or their equivalent.

Execution of an Arrest Warrant


The head of office to home the warrant of arrest is delivered for execution shall cause the
warrant to be executed within 10 days from its receipt. Within 10 days after the expiration of the
period, the officer to whom it was assigned for execution shall have a report to the judge who
issued the warrant of arrest. If and when failed to execute the warrant, he/she shall state the
reasons for this failure (Section 4, Rule 113. Rules of Court).

Even if not served within the statutory period of 10 days, it remains valid. The warrant remains
valid unless:

a. The warrant is recalled by the issuing court;


b. The suspect is already arrested;
c. The suspect voluntarily submitted himself/herself to the jurisdiction of the issuing court; and/or
d. The respondent died

Is a warrant of arrest have an expiry date?


NO, it has no expiry date. This will remain valid until an arrest is affected or the warrant is
lifted by the issuing court.

Fundamental Rules on Arrest

1. A warrant of arrest can only legally be enforced within the Philippine territory where the warrant
is issued.
2. In arrest by virtue of a warrant of arrest, it is not essential that the arresting peace officer has
the warrant in his possession during the conduct of arrest.
3. In arrest without a warrant, the crime should be committed within the Philippine territory or state
whose agents are carrying out the arrest
WARRANTLESS ARREST OR ARREST WITHOUT A WARRANT

As a matter of general rule, it is a requirement that a warrant should be issued in the name
of the person to be arrested. If and when a peace officer arrests a person without an arrest
warrant more likely liable under Article 125 of the RPC. Under Rule 113, Section 5, Rules of Court,
the following are the situations in which a police officer may arrest a person even with a legal
warrant;

a. When in the police officer's presence, the person to be arrested has committed, is actually
committing, and or is attempting to commit an offense.
b. When an offense has in fact been committed and he has probable cause to believe based on
personal knowledge of facts or circumstances that the person to be arrested has committed. In
this instance, the "doctrine of hot pursuit" is on effect. Hot pursuit "in US, Fresh Pursuit", means
that an immediate, recent chase or follow-up without material interval for the purpose of taking into
custody any wanted person, or one suspected to have committed a recent offense while fleeing
from one police jurisdiction to another, necessitating the pursuit.

c. When the person to be arrested is an escapee. They are those who escaped from any penal
establishment or place where they are serving final judgement or are temporarily confined while
their cases are pending, or has escaped while being transferred from one confinement to another
may be arrested by any police officer even without a legal warrant, also even by a private citizen.

d. When, validly, the right is validly waived. This is when the person arrested give his/her consent
for his/her arrest and willing to be taken into custody.

e. When the person is on the state of violent insanity.

Standard Operating Procedure (SOP) of arrest without a legal warrant


 During the initial contact with the suspect, these steps must strictly be observed;
a. Put the suspect under restraint by freezing;
b. Properly introduce yourself and your authority to arrest;
c. Inform the arrested person of the reasons of such arrest and recite to her/him the "Miranda
rights/Miranda warning".
d. Then immediately conduct a thorough search for weapons and other illegal contrabands;
e. As a general rule, no unnecessary force shall be employed during the making of arrest;
f. All the illegal contrabands must properly be documented; and
g. Bring the arrested person to the station for further investigation and disposition.

Unit 2. SEARCH AND SEIZURE


What Is a search?
It is the act of examining persons, documents, papers, and effects to scout up the facts
about an issue or concern raised.

What is search and seizure?


In section 1, Rule 126, it is a search conducted by a peace officer to whom the search
warrant has been issued, for personal property described therein and bring it before the court.

What is a search warrant?


In section 1, Rule 126, A search warrant is an order in writing issued in the name of the
People of the Philippines, signed by a judge and directed to a peace officer, commanding him to
search for personal property described therein and bring it before the court.

What are Requisites?


A search warrant shall not be issued except upon probable cause in connection with one
specific offense to be determined personally by the judge after examination under oath or
affirmation of the complainant and the witness he may produce, and particularly describing the
place to be searched and the things to be seized which may be anywhere in the Philippines (Sec.
4, Rule 126).

Where is a Search Warrant to be filed?


An application for a search warrant shall be filed with the following
a) Any court within whose territorial jurisdiction a crime was committed

b) For compelling reasons stated in the application, any court within the judicial region where
the crime was committed if the place of the commission of the crime is known, or any court
within the judicial region where the warrant shall be enforced.

c) However, if the criminal action has already been filed, the application shall only be made in
the court where the criminal action is pending

PROBABLE CAUSE
Probable cause is defined as such facts and circumstances which could lead a reasonably
discreet and prudent man to believe that an offense has been committed and that the objects
sought in connection with the offense are in the place sought to be searched
Although probable cause eludes exact and concrete definition, it generally signifies a
reasonable ground of suspicion supported by circumstances sufficiently strong in themselves to
warrant a cautious man to believe that a person accused is guilty of the offense with which he is
charged.

Requisites For Issuing a Search Warrant


A search warrant shall not be issued except upon probable cause in connection with one
specific offense to be determined personally by the judge after examination under oath or
affirmation of the complainant and the witness he may produce, and particularly describing the
place to be searched and the things to be seized which may be anywhere in the Philippines.

Issuance And Form of a Search Warrant


If the judge is satisfied of the existence of facts upon which the application is based or that
there is probable cause to believe that they exist, he shall issue the warrant, which must be
substantially in the form prescribed by these Rules.

Personal Examination by the Judge of the Applicant and Witnesses


The judge must, before issuing the warrant, personally examine in the form of searching
questions and answers, in writing and under oath, the complainant and the witnesses he may
produce on facts personally known to them and attach to the record their sworn statements,
together with the affidavits submitted.

Particularity of Place to be Searched and Things to be Seized


The right of the people to be secure in their persons, houses, papers, and effects
against unreasonable searches and seizures of whatever nature and for any purpose shall be
inviolable, and no search warrant or warrant of arrest shall issue except upon probable cause to
be determined personally by the judge after examination under oath or affirmation of the
complainant and the witnesses he may produce, and particularly describing the place to be
searched and the persons or things to be seized (Sec. 2, Art. Ill, Constitution).

The place specified in the search warrant, and not the place the police officers who applied for
the search warrant had in mind, controls. For the police officers cannot amplify nor modify the
place stated in the search warrant.

Particularity of Place to be Searched and Things to be Seized


The rule is that a description of the place to be searched is sufficient if the officer with the
warrant can, with reasonable effort, ascertain and identify the place intended to be searched.
Where there are several apartments in the place to be searched, a description of the specific place
can be determined by reference to the affidavits supporting the warrant that the apartment to be
searched is the one occupied by the accused. The searching party cannot go from one apartment
to the other as the warrant will then become a general warrant.

What are the Instance Warrant Searches?


Search or seizure without a warrant, when lawful:
1) Consented search;
2) As an incident to a lawful arrest;
3) Searches of vessels and aircraft for violations of immigration, customs and drug laws;
4) Searches of moving vehicles;
5) Searches of automobiles at borders or constructive borders;
6) Where the prohibited articles are in plain view;
7) Searches of buildings and premises to enforce fire, sanitary, and building regulations;
8) “Stop and frisk” operations; and
9) Exigent and emergency circumstances (In times of war and within the area of military
operation)

CHAPTER III

THE BASIC CONCEPTS OF CRIME SCENE AND CRIME SCENE PROCESSING METHODS
AND PROCEDURE

Units I. CRIME SCENE

Crime scene is a venue or place from which most physical evidence or essential criminal
act could be find associated with crime will be obtained. It is claimed as a "treasure island" in
criminal investigation. The obvious reason is that several pieces of evidence are mostly found in
the crime scene which are very pivotal in solving crimes (Manwong, 2003).

What are the types of crime scene?

AS TO LOCATION:

1.Indoor Crime Scene –


The crime scene is in an enclosed area and affords the crime scene protection from
weather and allows to take time and process the scene in a slow, methodical manner without
concern for weather influences.
2. Outdoor Crime Scene –
This is in open locations including crime scenes inside the vehicle, airship, and vessel.

3. Continuing/Running Crime Scene –


This crime scene has a mixed location from indoor to outdoor or vice-versa, or continuing
outdoor alone, or one place to another of the same jurisdiction, or from one place to another
crossing to another area of jurisdiction.

AS TO THE TIME OF COMMISSION:

1. Day Time Crime Scene – from Sunrise to Sunset


2. Night time Crime Scene – from Sunset to Sunrise

Crime Scene Investigation

A comprehensive Inquiry of a crime by conducting a systematic procedure of various


investigative methodologies which involves the recovery of physical and testimonial evidence for
the purpose of identifying the witnesses, and arrest of the perpetrator(s) for prosecution.
Technically, It shall commence upon the arrival of the First Responders and conclude with the
lifting of the security cordon and release of the crime scene by the IOC. It is a post-incident police
operational procedure undertaken at the CS when the crime has been committed (PNP SOP,
Number ODIDM-2011-008. p.2).

Duties of Crime Scene Responders

 Team Leader. He is responsible for the overall safety and work performance of the
individual members of the crime scene processing team at the crime scene. Also, he is the
one who directs the crime scene processing.

 Assistant Team Leader. The one who implements or executes orders from the team
leader.

 Photographer. The member of the team is responsible for documenting the crime scene by
taking photographs.

 Sketcher. The member of the team is responsible for documenting the crime scene by
making a diagram of the immediate area of the scene.

 Measurer. The member of the team who is responsible for getting the measurements of all
evidence at the scene and will closely work with the sketcher as he needed the
measurements for his rough sketch and finish sketch.

 Master Note-taker. The member of the team is responsible for the documentation of the
crime scene by taking down extensive notes. In his taking of notes, all circumstances and
conditions are noted including those very minute details of minute value at the time.

 Evidence Processor/ Collector. Generally, this refers to the different crime scene
technicians or forensic specialists, who by virtue of their training or specialization, are
necessary to identity and collect physical evidence from the crime scene.

 Evidence Log Recorder/Custodian. The member of the team who is responsible for the
preparation of the evidence log, received, and records all collected evidence from the crime
scene, and maintain chain-of-custody of these evidences.
 Driver. The members of the team who provide security to the team and equipment before,
during, and after the release of the crime scene.

 Security. He is tasked with ensuring that the vehicle is properly maintained are always
there ready when needed. The security is the one who operates the police car during
response
CRIME SCENE SEARCH PATTERN: METHODS FOR COLLECTING EVIDENCE
EFFECTIVELY

Irrespective of the type of crime scene, the investigator has to decide the appropriate
method immediately, without delay, so as to collect the pieces of evidence in the intact form as far
as possible. Following are the basic search methods, usually commissioned on the crime scene:

1. Zonal Method/Sectoral Method


2. Strip Method
3. Line Search
4. Grid Method/Double Strip Method
5. Spiral/Circle Method
6. Wheel Search Method

1. Zonal Method/Sectoral Method. In this method, the crime scene is divided into different
zones or quadrants. The number of zones depends upon the size and complexity of the crime
scene. This method can be applied to both indoor and outdoor crime scenes. Different people
will be employed in individual zones and will search their zones thoroughly for the evidence
normally as well as using different techniques (UV/IR/Video). After searching in their own
zones, the zones will be exchanged to check the accuracy and double-check for any missing
items. This method cannot be applicable to very squeezed and complex crime scenes like
elevators, lift shafts, or stairs.

2. Strip Parallel Method. In this method, the virtual strips or lines are being imagined to walk
through the crime scene and look for the pieces of evidence. The method is well suited for
crime scenes like classrooms, where rows are present already, and each row can be
considered as a strip. Also, the minimum number of personnel is required for this method. One
person will start the walkthrough from one corner of the strip and will move towards the other
looking for the evidence. The walkthrough should be slow and thorough. If two personals are
employed, then each of them can start from two different points and continue to the different
ends to doublecheck the search.

3. Line Search. The line method is best used outdoors as well, and is similar to the grid search
with the exception that searchers generally only move in one direction, from one side of the
search area to the other. Because of trees, shrubs, rocks, or other objects that may make a
grid search unfeasible, the line method search is the next best method to use.

4. Grid Method (Two Parallel Strips. It is just like the strip method; the only difference is that
two strips are considered to form a grid. Again, only two people can do the searching, walking
through on separate strips, and then will switch their strips for more accuracy. It is a good
method for large indoor and outdoor crime scenes.
5. Spiral/Circle Method. This is well suited for larger indoor and outdoor crime scenes with fewer
obstacles (like furniture, etc.). The searcher will start either from the center of the room
(outward) or from the periphery (inward) search as shown in the images below. Also, two
investigators can search together, one moving from the center towards the periphery and the
other one vice versa.

Nota bene: Inward Spiral/ Centripetal Method is usually employed by one or more
searchers and is done slowly and methodically while the outward Spiral or Centrifugal Method is a
good method used by a single searcher to prevent any damage, contamination, and or alteration
of evidence at the center.

6. Wheel/Spoke Method. This method is only applicable to larger outdoor scenes like fields,
deserts, or other such open areas. It is like the zonal method; however, the wheel is divided
into various zones depending upon the size of the crime scene. Different individuals will be
employed in separate zones and then switch their zone for more accuracy. The investigators or
the searchers can begin from the epicenter moving towards their zones to complete the search
and then returning back to the epicenter for the discussion or collection procedures.
HOW CRIME SCENE SKETCH IS DONE?

Crime Scene Sketch. It is a graphic representation of the crime with a complete


measurement of the relative distances between items or objects. The sketch includes scale and
proportion, with important dimensions at the scene being shown to a good degree of accuracy
(Garcia, 2004).

Sketch. It is the process of recording information with respect to its location, position,
measurement, orientation, and details of finding in a sketch pad through symbols, art, and figures
(Garcia, 2004).

Two Basic Kinds of Sketch

Rough Sketch. A draft representation of all essential information and measurements at a crime
scene. This sketch is drawn at the crime scene. It shows all recovered items of physical evidence,
as well as other important features of the crime scene. It is prepared indicating the actual
measurement of things without scale and proportion observed and oriented to the NORTH. All the
measurements are approximated. All the necessary information is placed in the sketch. It is a
sketch made by the investigator at the crime scene which is full of important details but without
scale and proportion. It is where the finished sketch is based.

Finished Sketch. A precise rendering of the crime scene is usually drawn to scale. This type is
not normally completed at the crime scene Unlike the rough sketch, the finished sketch is drawn
with care and concern for aesthetic appearance. It is a sketch at the crime scene with scale (Scale
is the size of one object in relation to the other objects) and proportion (Proportion refers to the
size of the parts of an object in relation
to other parts of the same object) and drawn by a draftsman which can be used for court
presentation. If both the rough sketch and finished sketch are requested by the court shall be
presented by the draftsman to clear doubts of perjury.

Rough Sketch vs. Final Sketch

Specific Kinds of Sketch

1. Sketch of Locality. This deals with the vicinity of the crime scene in relation to the environs,
including neighboring establishments, structures, or the egress and ingress of suspects. This type
of sketch is practicable to be applied in arson cases, indicating the origin of the fire and the
manner it spreads naturally or unnaturally against the wind.

2. Sketch of Grounds. This is the kind of sketch that illustrates the scene of the crime with the
nearest physical surroundings like an adjacent room or the opposite room, the number of floors of
a building, and the yard including the other natural structures.

3. Sketch of Details. This encompasses the positions and exact locations of the physical
evidence at the crime scene. This type of sketch describes the immediate scene only such as the
room where the crime scene was committed and all the details at the crime scene.

4. Exploded sketch/ Cross projection sketch. This type of sketch describes the very scene only,
specifically, the indoor area of the crime scene. It uses the combination of the floor plan and the
four elevation views (the walls) of a room. The walls and the ceiling are drawn as if they are folded
out with the ceiling placed on one of the walls. The purpose of this type of sketch is to show the
point of interest of the walls, ceiling, and floor.

Why is sketching the crime vital?


1. To refresh the memory of the investigator;
2. To express the precise location of objects and their relationship to other objects and
surroundings:
scene;
3. To assist the prosecutor and the judge in understanding the conditions at the crime
4. To supplement photographs;
5. To assist in the questioning of witnesses and suspects.

Parts of Sketch

1. TITLE. It refers to the crime committed or the incident that happened such as vehicular
accident, homicide, downing, rape case, and others.
2. BODY. It is the proper sketch that includes the position of the victim and other items at the
crime scene.
3. COMPASS DIRECTION (Orientation). It is a standard arrow to indicate the north direction 4.
NATURE OF CASE. It refers to the status of the case whether currently committed or the days that
have passed after its discovery.
5. LOCATION OF INCIDENT. It refers to the place where the incident happened.
6. DATE/TIME OF INCIDENT. It refers to the exact time and date of the incident. This can be
obtained through interviewing the eyewitness and another person in the area that might have
knowledge of it.
7. NAME OF VICTIM. The part of the sketch where the name of the victim is written.
8. SUSPECT'S NAME. The part of the sketch wherein the name of the suspect/s are reflected.
9. LEGEND. It is usually placed at the bottom of the sketch outside the scene sketch. The
numbers or letters represent the object in the BODY so as not to crowd and obstruct the graphic.
10. SIGNATORY. The part of the sketch where the name of the sketcher and the team leader or
the officer in charge is written and signed.
11. Sketcher's Name and Signature. It is the portion of the sketch in which the name of the
sketcher and the team leader or the officer in charge is written and signed.

PART II
CHAPTER IV
POLICE INTELLIGENCE

History and Different Personalities Behind the Development of Intelligence "Police can only
act on intelligence. '" -P. Chidambaram –

Introduction
The strong aspiration for advanced information is not a contemporary day development of
intelligence. Throughout history, man exploits all his resources to imitate God's capability to
discern and to see what will transpire ahead of time. Men quickly absorb that foreknowledge will
always place them in a safe. better. and advantageous position.
History shows, that the ancient sources of intelligence were prophets, oracles, seers, and
astrologers. They usually predict the future or the outcome of events through heavenly
intervention, dream interpretation, and the formation of stars.
Early Recorded Activities of Intelligence
Many years ago, the concept of intelligence has been practiced and applied by popular
conquerors of their times. The advantages and impact of applying intelligence to conquest and
warfare are evidently noted in history. The below-enumerated personalities are the popular
conqueror of their times that applies the concept of intelligence. They are as follows;

1.) Moses
One of the first recorded formalized Intelligence efforts that can be found in the Holy Bible
(Numbers 13:17). Moses sent his 12 leaders of Israel to spy out the land of Canaan and people
dwelling in the place. (Numbers 13:17-21).
2.) Delilah
A biblical personality who gain Information by using her beauty and charm. She even
engaged into sex |just to obtain information from the powerful enemy. She was then responsible
for the fall of Samson a known Israelite leader who terrorized the Philistines.
3.) Rahab
(Joshua 2:1-21) The Harlot of Jericho who sheltered and concealed the agents of Israel,
made an agreement with the agents and deceived their pursuers. She was not only an unplanned
allied of immense value for the Jewish leader of that far distant day, but also established a plot-
pattern which is still of periodic relief to motion picture producers.

4.) Sun Tzu


One of the famous Chinese general, military strategist, writer, and philosopher. He was the
author of the book entitled "The Art of War", which extremely influence for both Western and
Eastern countries as far as warfare is concerned. Here are a few of Sun Tzu's famous art of war
quotes:

"f you know your enemy and know yourself, you need not fear the results of hundred battles'"
If you know yourself but not the enemy, for every victory, you will suffer defeat".
"If you know neither yourself nor the enemy. you are a fool who will meet defeat in every battle."
5.) Frederick The Great
He was known as the "Father of Organized Military Esplonage In history".

Classes Of Agents According to Frederick The Great


Common Spies. They are recruited from among poor folks and glad to earn even a small amount
of money or be accommodated in military service.
Double Spies. They are informers that are capable of spreading false information to the enemy.
Spies of Consequences. They are informers that provide information with the hope of getting
something In return.
Intimidated Spies. They are Informers who are forced by the circumstances to undertake
espionage against their will.

6.) Alexander The Great


He is a well-known Greek conqueror who learned that some of his men is not loyal to him
by devising the first "Letter Sorting" when rumors of discontent circulated among his allies.

7.) Napoleon Bonaparte


He once said, "One Spy in the right place is worth 20,000 men in the field". He organized
two Bureaus of Interest:

1. Bureau of Intelligence. It combines all incoming information pertaining to the enemy for the
emperor's presentation, and
2. Topographic Bureau. It maintains a large map that covers the latest information and situation
both enemy and friendly forces. He maintained Military Intelligence and Secret Political Police
Service all over Europe. His main arm was "Spy against spy" concept.
ESSENTIALS IN POLICE INTELLIGENCE
"Knowledge has the potential to be equated to power."

Intelligence Defined
Webster defines intelligence as:
Intelligence is the capacity for understanding and for other forms of the adaptive intellect of
behavior, the mind in operation.
Knowledge of an event, circumstances, etc. received or imparted: the gathering or
distribution of information: the staff of persons engaged in obtaining such information.

Psychology defines Intelligence as:


Intelligence is the capacity of a person to adjust to new situations through the use of what
has been previously learned.

Government Commission Task Force defines intelligence as:


it means the collection, processing, collation, interpretation, evaluation, and dissemination
of information, with reference to national security.
In a certain context, it may also mean the network or the system for the collection, collation,
interpretation, evaluation, processing, and dissemination of information, The term as used here
does not include any police powers of authorities, any investigative function other than involved in
the collection of information, or any function involved in the enforcement of laws, orders, or
regulations.

Dictionary of Military Terms:


Intelligence is the end product resulting from the collection, evaluation. analysis, integration,
and interpretation of all available information that may have Immediate or potential significance to
the development and execution of plans, policies, and programs of the users.

According to Police Parlance:


The end product results from the collection, evaluation, analysis, Integration, and
interpretation of all available information regarding the activities of criminal and other law violators
for the purpose of affecting criminals and other law violators for the purpose of affecting their
arrest, obtaining evidence, and forestalling plan to commit a crime.

Functions Of Intelligence
1. The collection or procurement of information
2. The evaluation of the information which then becomes intelligence
3. The dissemination of intelligence to those who need it
4. Counter-Intelligence or negative intelligence, which is dedicated to the concealment and
protection of one's own information from the adversary intelligence operation. It is a defensive
function of intelligence.

Principles Of Intelligence

Objectivity. It is "only the well-guided succeed". It is a basic intelligence principle that there must
be unity between knowledge and action. Therefore, Intelligence should interact with and condition
the decision. Intelligence must be adapted to the needs of the decision; it is both a contributor and
play-actor. Action or decision is planned by knowledge and guided by it at every step.

Interdependence. Intelligence is segmented into different components to ensure complete


coverage, eradicate duplication and lessen the overall task. Nevertheless. each segment remains
as an essential part of the whole, contributes equitably to the end result, and interacts with each
other.
Continuity. Intelligence must be continuous. It is essential that coverage must be done
continuously so that the shape of what happens today could be studied in the light of what
happened in advance, which in turn would enable us to predict the shape of things that is yet to
come.
Communication. Intelligence that is sufficient to their needs must be communicated to the person
in charge in a manner that they will understand to ensure its most effective Use.

Usefulness. Intelligence is just a waste of time if it remains in the mind of the collectors
themselves, or in the filles of its collectors. The story must be shown accurately to make it more
convincing. it must not only be reasonable or accurate but its significance must be presented.

Selection. Intelligence should be vital and pertinent to the purpose at hand. Intelligence involves
cultivating a network of sources of information, the means of gathering the most promising
intelligence information that provides leads. The sine qua nun of decision covers very nearly the
extent of human knowledge. Unless there is a selection of only the most essential and pertinent
intelligence information, intelligence will go off in one waste of time.

Timeliness. It explains that intelligence must be communicated on time to the decision-maker at


the most appropriate time to permit a positive result. for Intelligence that is too soon or too late is
likewise unusable. Timeliness is one principle that should be observed and complements all the
others.

Security. Security is everybody's responsibility. These measures of intelligence take to protect and
preserve the integrity of all activities at all levels of operation. If an Intelligence operation has no
security, the whole operation might be endangered.

WHAT IS POLICE INTELLIGENCE?

The end product results from the collection, evaluation, analysis, integration and
interpretation of all available information regarding the activities of criminals and other law violators
for the purpose of affecting their arrest, obtaining evidence, and forestalling plans to commit
crimes.

It refers to the evaluated and interpreted information concerning organized crime and other
major policy problems.

General Activities in Police Intelligence

Strategic Intelligence
The intelligence information which is primarily long range in nature with little or no practical
immediate operation value.

Line Intelligence
Which is of an immediate nature and necessary for more effective police planning and
operation.
National Intelligence
It is the integrated product developed by all the governmental branches, departments
concerning the broad aspect of national security and policy.
Counter Intelligence
Phase of intel covering the activity devoted in destroying the effectiveness of hostile foreign
activities and to the protection of info against espionage, subversion and sabotage.
Under Cover Work
Is an investigative job in which disguises and pretext cover and deception are used to gain
the confidence of criminal suspects for the purpose of determining the nature and extent of any of
criminal activities that maybe contemplating or perpetuating.

Functional Classification of Police Intelligence


Criminal Intelligence (CrimInt)
Refers to the knowledge essential to the prevention of crimes and the investigation, a rest,
and prosecution of criminal offenders.
Internal Security Intelligence (InsInt)
Refers to the knowledge essential to the maintenance of peace and order.
Public Safety Intelligence (PusInt)
Refers to the knowledge essential to ensure the protection of lives and properties.

Intel Information To Be Determined In Line Intelligence


Intel Information To Be Determined In Line Intelligence Are:
• People Living Condition Of The People, Sources Of Income, Education Of The People,
Government Livelihood Projects, Extent Of Enemy Influence To The People.
• Weather Visibility, Cloudy, Temperature, precipitation, wind.
• Enemy Location Of The Enemy, Strength Of The Enemy, Disposition,Tactical Capability,
Enemy Vulnerability
• Terrain Relief And Drainage System, Vegetation, Surface Material, Man-made Features.

What Are The Four (4) Phases Of The Intelligence Cycle?


• Planning
• Collection
• Processing
• Dissemination

The Intelligence Cycle


• It is a repetitive process used to produce intelligence from information

FORMS OF INTELLIGENCE

•Sociological Intelligence
Deals with the demographic and psychological aspects of groups of people.
•Biographical Intelligence
Deals with Individual’s personalities who have actual possession of power.
•Biographical Intelligence
Deals with Individual’s personalities who have actual possession of power.
•Geographical Intelligence
Deals with the progress of research and development as it affects the economic and
military potential of the nation.

Types Or Kinds Of Intelligence

Strategic Intelligence
An intelligence data that are not of an immediate value. It is usually descriptive in nature;
accumulation of physical description of personalities, modus operandi. It does not have immediate
operational value but rather long range that may become relevant to future police operations.
Line Intelligence
It is the kind of intelligence required by the commander to provide for planning and
conducting tactical and administrative operation in counter insurgency. This pertains to knowledge
of People, Weather, Enemy and Terrain (PWET).
Counterintelligence
This kind of intelligence covering the activity devoted in destroying the effectiveness of
hostile foreign activities and to the protection of information against espionage, subversion and
sabotage.

Functions of strategic intelligence, line intelligence and counter intelligence

1. Strategic Intelligence
Purpose: Long-term, broad-level intelligence that supports high-level planning and decision-
making.
Functions:
 National Security Planning: Provides insights into global or regional threats, such as military
build-ups, geopolitical shifts, or economic instability.
 Forecasting and Trend Analysis: Analyzes data to predict long-term trends and future
scenarios.
 Policy Formulation Support: Helps policymakers design strategies for diplomacy, defense,
and economic policies.
 Resource Allocation Guidance: Advises on prioritization of resources to address future
challenges or opportunities.

2. Line Intelligence
Purpose: Focused, actionable intelligence for immediate or short-term operational needs.
Functions:
 Tactical Decision-Making: Provides real-time information to support specific missions or
operations.
 Operational Support: Supplies intelligence for field units or teams conducting operations.
 Monitoring Local Developments: Tracks events, threats, or activities within a defined area of
responsibility.
 Incident-Specific Reporting: Delivers intelligence for addressing situational or localized
issues.

3. Counterintelligence
Purpose: Protects an organization or nation from espionage, sabotage, and other threats.
Functions:
 Threat Identification: Detects and neutralizes espionage, insider threats, and sabotage
efforts.
 Information Security: Safeguards classified and sensitive information from unauthorized
access.
 Investigation of Adversaries: Identifies and disrupts the activities of foreign intelligence
services or hostile groups
 Vulnerability Assessment: Examines weaknesses in organizational security systems and
processes.
 Offensive Counterintelligence: Uses deceptive or disruptive measures to undermine
adversarial intelligence operations.

Together, these types of intelligence ensure both proactive and reactive strategies for
maintaining security, achieving operational success, and supporting long-term goals.
The term functions refers to the specific roles, duties, or tasks that something is designed to
perform. In the context of intelligence, it means the purpose or activities carried out by strategic
intelligence, line intelligence, and counterintelligence to achieve their goals.

For example:
 A function of strategic intelligence is to forecast future threats to guide policy decisions.
 A function of line intelligence is to provide immediate, actionable information for tactical
operations.
 A function of counterintelligence is to detect and neutralize espionage activities.

POLICE INTELLIGENCE
Police Intelligence is an essential aspect of modern law enforcement, involving the
systematic gathering, analyzing, and utilizing of information to prevent and solve crimes. Police
intelligence helps law enforcement agencies predict and counter criminal activities, ensuring public
safety and security. It supports various police functions, from routine patrols to specialized
investigations and counter-terrorism efforts.

Key Elements Of Police Intelligence

1. INTELLIGENCE GATHERING
This is the process of collecting data and information from multiple sources, such as
informants, surveillance, and digital channels. The objective is to acquire timely and relevant data
about criminal activities, suspects, and threats to the community.

2. ANALYSIS AND ASSESSMENT


Once gathered, raw data is analyzed to identify patterns, trends, and insights. Analysts
assess the reliability of information, identify possible criminal connections, and determine the
significance of intelligence for ongoing investigations.

3. DISSEMINATION
Police intelligence must be communicated efficiently to the relevant units within the law
enforcement agency. Proper dissemination ensures that timely and actionable intelligence is
available for decision-making, response, and operational planning.

4. UTILIZATION IN LAW ENFORCEMENT OPERATIONS


Intelligence aids in planning strategic and tactical operations, such as apprehending
suspects, disrupting criminal organizations, and preventing crimes before they occur. Intelligence-
led policing focuses on proactive measures to combat organized crime, drug trafficking, terrorism,
and other serious offenses.

TYPES OF POLICE INTELLIGENCE

Criminal Intelligence
Information about individuals, groups, or activities involved in illegal conduct. This includes
gang intelligence, narcotics intelligence, and organized crime intelligence.
Strategic Intelligence
Long-term information that supports policy-making and resource allocation in law
enforcement.
Tactical Intelligence
Immediate and actionable intelligence that assists in short-term decisions and responses,
particularly in operations.

CHALLENGES OF POLICE INTELLIGENCE

1. Information Overload
With the vast amount of data generated daily, filtering relevant information can be challenging.

2. Data Security and Privacy


Ensuring data confidentiality while balancing public transparency
3. Technology and Resource Limitations
Advanced analytical tools require substantial funding and technical expertise.

4. Collaboration and Coordination


Effective intelligence requires cooperation between law enforcement agencies, often hindered by
jurisdictional boundaries and organizational silos.

FUNCTION OF POLICE INTELLIGENCE


Police intelligence serves several critical functions that enable law enforcement to protect
communities, solve crimes, and manage resources effectively. These functions help ensure that
law enforcement activities are both proactive and responsive to emerging threats and challenges.

1. CRIME PREVENTION
Police intelligence identifies potential crime hotspots, high-risk individuals, and emerging
criminal trends. By recognizing these threats early, law enforcement can take preventive measures
such as increased patrols, community outreach, or surveillance in targeted areas. This proactive
approach reduces the risk of crime and enhances public safety.

2. THREAT ASSESSMENT AND RISK MANAGEMENT


Police intelligence evaluates and categorizes threats, from organized crime and terrorism to
local disturbances. Through risk assessment, law enforcement agencies can prioritize their
response to the most pressing threats, allocate resources efficiently, and develop risk mitigation
strategies to handle potential crises.

3. INVESTIGATIVE SUPPORT
Intelligence provides essential information that assists in solving active cases. This includes
details on suspects, criminal organizations, and patterns of behavior. Intelligence also supports
evidence-gathering, suspect profiling, and establishing connections between crimes, which aids
detectives and investigators in building solid cases.

4. STRATEGIC PLANNING AND POLICY DEVELOPMENT


Intelligence helps law enforcement agencies to make long-term, informed decisions. By
understanding trends like cybercrime, drug trafficking, or gang activity, agencies can formulate
policies and strategies to address these issues effectively. Strategic intelligence also guides
resource allocation, training, and technology investments, aligning with long term agency goals.

5. OPERATIONAL AND TACTICAL SUPPORT


During active police operations, such as raids, surveillance missions, or high-risk arrests,
intelligence provides real-time tactical support. Intelligence allows officers on the ground to be
aware of critical details such as suspect locations, weapon threats, or escape routes-enhancing
their safety and the likelihood of a successful operation.
6. TARGETED ENFORCEMENT AND RESOURCE ALLOCATION
Intelligence enables law enforcement agencies to focus their efforts on high-impact targets,
such as organized crime groups or repeat offenders. This targeted enforcement approach ensures
that limited resources are used effectively, focusing on individuals and groups that pose the
greatest risk to the community.

7. INTERAGENCY COLLABORATION AND INFORMATION SHARING


Intelligence facilitates cooperation between local, state, federal, and even international
agencies. Through shared intelligence networks, law enforcement agencies can coordinate efforts,
avoid duplication, and pool resources. This collaboration is especially crucial when dealing with
crimes that cross jurisdictions, such as human trafficking, terrorism, or drug trafficking.

8. COMMUNITY ENGAGEMENT AND TRUST BUILDING


Intelligence activities often involve partnerships with community members who provide
insights into local issues and suspicious activity. Community-based intelligence fosters trust
between the police and the public, enabling better cooperation and a more accurate understanding
of community concerns. Programs like neighborhood watch or community advisory boards allow
police to gather information and address local issues proactively.

9. CRISIS MANAGEMENT AND EMERGENCY RESPONSE


In times of crisis-such as natural disasters, terrorist threats, or civil disturbances-
intelligence helps guide emergency response and crisis management efforts. It provides critical
information for planning evacuations, deploying resources, and coordinating responses with other
agencies. Intelligence ensures that responses to emergencies are well-coordinated and effective.

FUNDAMENTAL ELEMENTS OF POLICE INTELLIGENCE


Police intelligence is structured around several fundamental elements that guide the
effective collection, analysis, and application of information within law enforcement. Each of these
elements is critical to ensuring that police intelligence activities are accurate, efficient, and
actionable.

1. COLLECTION
The foundation of police intelligence is gathering information from diverse sources.
Collection efforts include field surveillance, interviews with informants, public records, and data
from electronic and digital platforms. Collection must be systematic, legal, and Unbiased, ensuring
reliable information to support law enforcement operations.

2. EVALUATION AND VALIDATION


Not all collected information is equally useful or reliable. Evaluation involves assessing the
credibility of sources and the accuracy of the data to distinguish valid information from potential
misinformation. This step reduces the risk of acting on unreliable intelligence, which can waste
resources and potentially lead to wrongful actions.

3. ANALYSIS
In this stage, analysts organize and interpret the validated information to identify patterns,
trends, and connections relevant to criminal activity. The goal is to turn raw data into actionable
insights. Analysis includes using various tools, such as crime mapping, link analysis, and statistical
modeling, to understand the broader criminal landscape and predict possible future activities.

4. DISSEMINATION
Intelligence must be communicated promptly to relevant law enforcement personnel and
agencies. Dissemination ensures that the right people receive actionable insights to make
informed decisions in real-time. Information can be shared through briefings, reports, and secure
digital platforms, considering confidentiality and the intended audience.

5. ACTION AND APPLICATION


Intelligence supports decision-making and strategic planning within law enforcement. It
allows for proactive responses, such as identifying and disrupting criminal networks, conducting
targeted operations, and improving public safety measures. Intelligence-led actions are generally
prioritized to address the most significant risks and threats.

6.FEEDBACK AND RE-EVALUATION


After intelligence has been used, feedback from operations informs future intelligence
activities. By reviewing the effectiveness of intelligence in real-world scenarios, police agencies
can identify areas for improvement in their intelligence cycle, enhancing future efforts and refining
collection, analysis, and dissemination techniques.

INTELLIGENCE NETWORKING IN LAW ENFORCEMENT

Intelligence networking is a critical aspect of modern law enforcement, enabling agencies to


share information, coordinate responses, and enhance collective efforts to combat crime. As
criminal activities become more sophisticated and often cross local and national borders, law
enforcement relies on intelligence networking to connect resources, knowledge, and expertise
across agencies. By building robust intelligence networks, law enforcement agencies can address
both local crime and global threats more effectively.

Key Components of Intelligence Networking in Law Enforcement

Interagency Collaboration
Intelligence networking promotes collaboration among local, state, and federal law
enforcement agencies. By sharing data on suspects, criminal organizations, and emerging threats,
agencies avoid duplicating efforts, streamline operations, and create a more comprehensive
picture of criminal activity. Examples of interagency collaboration include multi-agency task forces
and joint operations focusing on specific issues like drug trafficking, terrorism, and organized
crime.

Information Sharing Systems


Digital information-sharing platforms allow real-time data exchange among agencies. These
platforms include national databases for criminal records, wanted individuals, vehicle registrations,
and immigration status. They provide officers across different agencies with immediate access to
relevant information, which aids in both proactive and reactive measures. Systems like the FBI's
National Crime Information Center (NCIC) and Europol's databases exemplify such interagency
data-sharing efforts.

International Intelligence Networks


Criminal networks often operate beyond national borders, necessitating global cooperation.
International networks such as INTERPOL, EUROPOL, and various bilateral agreements allow
law enforcement agencies to exchange information on international threats like human trafficking,
drug smuggling, and terrorism. These networks coordinate international efforts, allowing agencies
to work together on global Investigations, identify cross-border threats, and apprehend suspects
who move between countries.

Community Intelligence Networks


Local communities are vital sources of intelligence for law enforcement. Engaging with
communities through neighborhood watch programs, community advisory boards, and anonymous
tip lines provides law enforcement with valuable local insights. This partnership not only enhances
intelligence collection but also builds public trust and promotes a sense of shared responsibility in
crime prevention.

Benefits of Intelligence Networking

1. Improved Crime Detection and Prevention


Intelligence networking enables law enforcement to detect patterns of criminal activity
and prevent crimes before they happen. By sharing intelligence on potential threats, agencies can
proactively address issues like organized crime, terrorism, and serial offenders.

2. Faster and More Coordinated Responses


Through intelligence networks, law enforcement agencies can coordinate responses to
threats and emergencies quickly. For example, in large-scale incidents of terrorist threats.
intelligence nerworking allows agencies to share real-time information and align their resources
effectively, improving overall response times.

3. Enhanced Resource Efficiency


Shared intelligence networks reduce the need for each agency to collect all information
independently, saving time, effort, and resources. By pooling resources and knowledge. agencies
can focus on areas of priority and eliminate unnecessary redundancies.

4. Better Identification of Cross-Jurisdictional and Organized Crime


Criminal networks often operate across multiple jurisdictions, making it challenging for
any single agency to address them fully. Intelligence networking enables agencies to see a
broader picture of criminal activities, track movements, and coordinate efforts against large-scale
operations, such as drug cartels or human trafficking rings.

Challenges in Intelligence Networking

1. Data Privacy and Security Concerns


Sharing sensitive information requires strict measures to ensure data privacy and
security. Law enforcement agencies must balance effective information sharing with protecting
citizens privacy rights and preventing unauthorized access to intelligence data.

2. Coordination and Bureaucraсу


Differences in agency structure, jurisdictional authority, and bureaucratic processes can
hinder smooth collaboration. Establishing clear protocols and reducing administrative barriers are
essential for effective intelligence networking.

3. Resource and Technology Limitations


Not all agencies have access to the same level of technology and resources for
intelligence networking. Smaller or rural agencies may lack the funding to implement advanced
data-sharing platforms, affecting their ability to contribute fully to larger intelligence networks.

4. Trust and Information Reliability


Agencies need to trust the information shared by other entities, which can be challenging
when sources or data verification standards vary. Ensuring information reliability and maintaining
open, transparent communication are crucial to building effective intelligence networks.

POLICE INTELLIGENCE INDIVIDUAL MANNING SYSTEM

Police Intelligence Individual Manning System


The Police Intelligence Individual Manning System (PIIMS) is an approach to staffing.
training, and deploying individual officers within police intelligence units. This system ensures that
intelligence roles are filled by individuals with the necessary skills, experience, and adaptability to
address the complex and dynamic needs of modern law enforcement. The PIIMS focuses on
optimizing personnel placement, enhancing capabilities, and promoting efficiency within
intelligence operations.

Key Components of the Police Intelligence Individual Manning System


1. Skill-Based Selection and Assignment
The PIIMS prioritizes placing officers with specialized skills in intelligence roles. Officers are
selected based on qualifications such as analytical ability, proficiency in data analysis tools,
knowledge of cybercrime, counter-terrorism experience, or familiarity with criminal networks. This
skill-based approach ensures that each individual has the expertise required for effective
intelligence gathering and analysis.

2. Targeted Training and Development Programs


Officers assigned to intelligence roles undergo specialized training programs focused on areas
such as:
• Data Analysis and Cyber Intelligence: Officers learn how to interpret and analyze data from
various sources, including social media, financial transactions, and surveillance footage.
• Advanced Surveillance Techniques: This includes training on digital and physical surveillance
methods, including using technology for remote monitoring.
• Information Security and Privacy Regulations: Ensuring that officers understand legal
frameworks surrounding data privacy and know how to handle sensitive information ethically and
securely.
• Cultural Awareness and Communication Skills: Officers may receive training in
understanding different cultural backgrounds and improving interpersonal skills, useful for
gathering intelligence from diverse communities.

3. Flexible Deployment
The PIIMS allows for flexible deployment of intelligence personnel based on current needs and
crime trends. Officers can be reassigned quickly to respond to emerging threats or specific
investigations requiring specialized knowledge, such as counter-terrorism or organized crime. This
adaptability helps intelligence units remain responsive to dynamic security challenges.

4. Performance Monitoring and Evaluation


Individual performance metrics are used to assess the effectiveness of officers within intelligence
roles. Performance monitoring may include evaluating successful intelligence operations, accuracy
in data interpretation, efficiency in reporting, and the quality of strategic recommendations.
Regular feedback enables continuous improvement and helps identify areas for additional training
or reassignment.

5. Rotation and Cross-Training Opportunities


To prevent burnout and broaden skill sets, the PIIMS includes rotational assignments. Officers
may spend time in different intelligence areas (e.g., cyber intelligence, narcotics, terrorism) to
develop diverse expertise and gain a comprehensive understanding of various criminal threats.
Cross-training opportunities also foster greater resilience and adaptability within the intelligence
workforce.

6. Specialization and Career Pathing


The system encourages officers to specialize in specific areas of intelligence, creating career
pathways for roles such as:
• Cyber Intelligence Analyst
• Financial Crimes Investigator
• Counter-Terrorism Specialist Human Intelligence (HUMINT) Officer
Career pathing provides officers with long-term professional development opportunities and aligns
individual career goals with organizational objectives, enhancing job satisfaction and retention.

7. Integration with Technology and Data Systems


Officers in the PIIMS use cutting-edge technology, such as data analytics software, real- time
crime mapping, and intelligence databases. PIIMS emphasizes familiarity with these tools,
enabling officers to work efficiently and make data-informed decisions.

8. Enhanced Communication and Collaboration


The PIIMS promotes strong communication channels within intelligence units and with other law
enforcement agencies. Regular interagency briefings, joint training sessions, and shared digital
platforms enable officers to collaborate effectively across jurisdictions, enhancing the overall
intelligence-gathering process.
Benefits of the Police Intelligence Individual Manning System
1. Increased Efficiency and Responsiveness
By matching officers' skills to specific intelligence needs, the PIIMS ensures that the right
personnel are assigned to the right tasks, which increases efficiency and allows for quicker
responses to emerging threats.
2. Improved Quality of Intelligence
Specialized training and performance evaluation help ensure high-quality intelligence. Officers are
better equipped to gather, interpret, and present data accurately, leading to more informed
decision-making.
3. Reduced Burnout and Higher Retention
With rotation and career pathing opportunities, the PIIMS reduces burnout and allows officers to
grow professionally. This encourages long-term commitment to intelligence work and builds a
knowledgeable, experienced workforce.
4. Enhanced Adaptability to New Threats
The flexible deployment and cross-training elements of PIIMS allow intelligence units to adjust
quickly to changing criminal trends, such as rising cyber threats or newly identified criminal
networks.

5. Promotes Ethical Standards and Accountability


By focusing on privacy regulations, legal standards, and individual accountability, the PIIMS
ensures that intelligence operations are conducted ethically, maintaining public trust and protecting
citizens' rights.

Police Intelligence Field Functions


The operational field functions of police intelligence are the practical applications of intelligence
work directly in the field by officers and agencies. These functions are designed to support real-
time police activities and ensure law enforcement has accurate, relevant information during
operations. The main objectives of police intelligence in the field include:

1. Preventing and Interdicting Criminal Activity:


Police intelligence helps identify potential threats or criminal operations before they can occur.
This may involve monitoring criminal groups, identifying planned crimes, or predicting criminal
activity patterns based on intelligence gathered.
2. Targeting High-Risk Individuals and Locations:
Intelligence is used to prioritize certain areas or individuals who pose the greatest risk to public
safety. Field officers rely on intelligence reports to focus their resources on these high-priority
targets.
3. Supporting Investigations:
Police intelligence provides critical information that aids in investigations, whether it's identifying
suspects, linking crimes, or gathering evidence. Intelligence may be collected through
surveillance, informants, or cyber tools.
4. Responding to Emergencies and Threats:
Intelligence functions ensure that police can respond quickly to emergencies or high-risk events.
Whether it's a large-scale protest, a terrorist threat, or a natural disaster, police intelligence helps
law enforcement prepare and respond effectively.
5. Coordinating with Other Agencies:
Police intelligence functions often involve collaboration with other law enforcement agencies,
intelligence units, or government bodies. Sharing information across agencies improves the overall
effectiveness of response efforts.

The Role of Technology in Police Intelligence Field Functions


Modern police intelligence relies heavily on technology, such as surveillance cameras,
drones, GPS tracking, and data analytics tools, to monitor, collect, and process information. These
technologies enhance the efficiency and effectiveness of intelligence functions in the field,
enabling law enforcement to act swiftly on intelligence.

Specialized Intelligence Field Functions in Policing


Specialized intelligence field functions are advanced roles and activities within law
enforcement designed to address specific, high-risk criminal activities or security threats. These
functions often require unique skills, knowledge, and resources to manage complex or specialized
cases, ranging from organized crime to counter-terrorism and cybercrime. Here are the key
specialized intelligence field functions in policing:

1. Counter-Terrorism Intelligence Operations


Objective:
The primary function of counter-terrorism intelligence is to identify, prevent, and disrupt terrorist
activities before they can take place. These operations focus on gathering intelligence related to
potential terrorist organizations, individuals, financing, weapons trafficking, and recruitment
networks.

Key Activities:
• Surveillance: Monitoring suspected terrorist cells, individuals, and key locations.
• Infiltration and Undercover Operations: Law enforcement agencies may deploy undercover
officers to infiltrate terrorist organizations and gather critical intelligence,
• Intelligence Sharing: Collaborating with national and international intelligence agencies, such
as the CIA, INTERPOL,, or other anti-terrorism units, to share data and prevent cross-border
terrorist activities.
• Threat Analysis: Identifying potential targets, tactics, and methodologies used by terrorist
groups to predict and counteract attacks.

2. Organized Crime Intelligence


Objective:
Organized crime intelligence focuses on dismantling criminal organizations that operate in
complex, large-scale operations involving illegal activities like drug trafficking, human trafficking,
arms smuggling, and extortion.

Key Activities:
• Tracking Criminal Syndicates: Surveillance and intelligence collection on the leadership and
operations of organized crime groups.
• Informant Handling: Developing and maintaining sources within criminal organizations to
provide inside information.
• Data Integration: Using intelligence from various sources, including law enforcement databases,
wiretaps, and financial transactions, to track organized crime operations.
• Asset Seizure: Intelligence-driven operations to track and seize illegal assets, including cash,
weapons, and properties obtained through illicit activities.

3. Cyber Intelligence Operations


Objective:
Cyber intelligence is aimed at monitoring and combating cybercrime activities such as hacking.
data breaches, online fraud, identity theft, and cyber espionage. As technology evolves,
cybercrime is becoming increasingly sophisticated, and intelligence units must stay ahead of
cybercriminals.

Key Activities:
• Monitoring Digital Networks: Analyzing internet traffic, monitoring online forums, and
intercepting encrypted communications related to cybercrimes.
• Tracking Online Fraud: Gathering intelligence on fraudulent activities conducted online,
including credit card fraud, phishing scams, and identity theft.
• Forensic Analysis: Working with cybersecurity experts to collect digital evidence from
cybercrime incidents, such as hacking and data breaches.
• Collaboration with Tech Firms: Partnering with technology companies to track cybercriminal
activities and receive real-time intelligence on threats.
4. Narcotics Intelligence and Drug Enforcement
Objective:
Narcoties intelligence focuses on tracking the production, distribution, and trafficking of illegal
drugs. Law enforcement agencies use intelligence to dismantle drug networks and interdict drug
shipments before they reach the streets.

Key Activities:
• Monitoring Drug Routes:
Surveillance of drug smuggling routes, including air, sea, and land trafficking routes.
• Targeted Operations: Conducting undercover operations to infiltrate drug cartels and gather
actionable intelligence on their operations.
• Collaboration with International Agencies: Working with international partners like the DEA
(Drug Enforcement Administration) or other regional drug enforcement units to combat global
narcotics trafficking.
• Drug Seizures: Intelligence-driven raids to seize illicit drugs, weapons, and cash from drug
trafficking operations.

5. Human Trafficking Intelligence


Objective:
Human trafficking intelligence is focused on detecting and disrupting human trafficking networks
that exploit individuals for forced labor, sex trafficking, and other forms of modern slavery.

Key Activities:
• Monitoring Exploitation Networks: Surveillance of individuals, businesses, and locations
known to be involved in human trafficking. Collaboration with NGOs: Partnering with non-
governmental organizations to identify victims and provide safe havens for survivors.
• Financial Intelligence: Tracing the financial transactions related to human trafficking to uncover
the methods used by traffickers to fund and expand their operations.
• Victim Identification and Support: Using intelligence to locate victims of trafficking and assist
with their recovery and reintegration into society.

6. Financial Crime Intelligence


Objective:
Financial crime intelligence deals with investigating and preventing crimes such as money
laundering, fraud, corruption, and illegal financial transactions that fund organized crime and
terrorism.

Key Activities:
• Money Laundering Investigations: Tracking illegal financial flows, shell companies, and
offshore accounts to prevent money laundering schemes.
• Asset Forfeiture: Seizing assets derived from criminal activities using intelligence- driven
financial investigations.
• Tracking Fraud Schemes: Investigating complex fraud activities, including tax evasion,
securities fraud, and credit card fraud.
• Financial Intelligence Units (FIUs): Collaborating with financial institutions and government
agencies to trace illicit financial activities and block fraudulent transactions.

7. Border and Immigration Intelligence


Objective:
Border and immigration intelligence focuses on monitoring and controlling illegal immigration,
human trafficking, and the smuggling of goods or weapons across borders.
Key Activities:
• Surveillance of Border Areas: Intelligence gathering at border points to monitor for smuggling
and illegal crossings.
• Tracking Smuggling Networks: Identifying and disrupting human and goods smuggling
operations through intelligence-sharing and undercover operations.
• Collaboration with Customs and Border Protection: Working alongside immigration and
border agencies to control the flow of people and goods entering a country.

INTELLIGENCE REPORTING AND DISSEMINATION IN LAW ENFORCEMENT


Intelligence Reporting and Dissemination in Law Enforcement
Intelligence reporting and dissemination are crucial components of the police intelligence cycle.
These processes ensure that actionable intelligence is accurately documented, analyzed, and
shared among relevant stakeholders, enabling law enforcement agencies to make informed
decisions and take appropriate actions. Proper reporting and dissemination enhance the
effectiveness of operations, collaboration, and response to emerging threats or criminal activity.

1. Intelligence Reporting
What is Intelligence Reporting?
Intelligence reporting refers to the systematic documentation of collected intelligence, including
details of investigations, surveillance, operations, and analysis. Reports contain information about
criminal activities, threats, suspects, and other key intelligence that guides decision- making within
law enforcement.

Key Elements of Intelligence Reports:


•Source and Credibility:
Each intelligence report must detail the source of the information, such as informants, surveillance
teams, or open sources, and assess the credibility of the data.
•Nature of Intelligence:
The report should specify the type of intelligence, whether it relates to organized crime. terrorism,
cybercrime, narcotics, or other areas of law enforcement focus
•Actionable Information:
Intelligence reports must highlight specific, actionable information that law enforcement can use
for tactical or strategic purposes. This may include suspect identification, planned activities, or
locations of interest.
•Context and Analysis:
An effective intelligence report provides context for the information presented. This includes
analysis of the data, linking it to past events, and offering insights into potential outcomes.
•Timeliness:
The information must be presented in a timely manner. Rapid reporting ensures that decision-
makers can act on the intelligence while it is still relevant and actionable.

•Recommendations:
Intelligence reports often include recommendations or suggested actions based on the analysis,
such as conducting surveillance, launching an investigation, or initiating a targeted operation.

Types of Intelligence Reports:


•Situational Reports: Provide an overview of an ongoing situation or event, summarizing key
intelligence for immediate use.
•Analytical Reports: Detailed analysis of trends, criminal activities, or suspects, often used for
long-term strategic planning
•Specialized Reports: Focus on specific areas like cybercrime, counter-terrorism, or narcotics
trafficking, providing detailed information relevant to those areas of law enforcement.

2. Intelligence Dissemination
What is Intelligence Dissemination?
Intelligence dissemination is the process of distributing intelligence reports and findings to the
appropriate stakeholders. The goal is to ensure that relevant personnel, agencies, and
organizations receive the information they need to act swiftly and effectively.

Key Principles of Intelligence Dissemination:


•Audience Identification:
The first step in dissemination is identifying who needs the intelligence. This could include field
officers, command centers, specialized units (e.g., narcotics or counter- terrorism), other law
enforcement agencies, or even international partners.
•Security and Sensitivity:
Intelligence must be disseminated securely. Sensitive information, especially regarding national
security, criminal investigations, or personal data, must be shared in compliance with legal and
privacy standards. Secure communication channels, encryption, and classified access levels are
often used to protect information during dissemination.

•Clear and Concise Communication:


Intelligence must be presented in a format that is easy to understand and actionable. Officers in
the field need brief but clear reports, while analysts and command staff may require detailed,
technical information.
•Timeliness and Relevance:
Timely dissemination is critical in police intelligence. Delays in sharing intelligence can lead to
missed opportunities or even the failure of operations. Only relevant information should be
disseminated to avoid overloading recipients with unnecessary data.
•Actionable Intelligence:
When disseminating intelligence, it is important to highlight the actionable aspects of the
information. Recipients should clearly understand what actions are required based on the
intelligence provided.

3. Methods of Dissemination
1. Oral Briefings:
 Purpose: Used for real-time sharing of intelligence, typically in command centers or
operational meetings.
 Format: Can be informal or formal, with intelligence officers or analysts summarizing key
points to law enforcement leaders and field agents.
 Advantage: Facilitates immediate discussion, questions, and clarification on the
intelligence.

2. Written Reports and Bulletins:


 Purpose: Formal documentation of intelligence that can be shared with multiple agencies
or units.
 Format: Can include situational reports, analytical reports, or intelligence bulletins,
depending on the audience and purpose.
 Advantage: Provides a record of the intelligence that can be referred to later and ensures
that information is available for planning and analysis.

3. Intelligence Dashboards and Platforms:


 Purpose: Digital tools and software platforms that allow for the visualization and sharing of
intelligence in real-time.
 Format: Interactive platforms displaying maps, timelines, and other data visualizations to
facilitate immediate analysis and decision-making.
 Advantage: Provides easy access to updated intelligence for multiple users across
different locations and agencies.

4. Secure Messaging Systems:


 Purpose: Used for encrypted communication and dissemination of sensitive intelligence.
 Format: Secure email, messaging apps, or specialized platforms such as encrypted
phones or online portals.
 Advantage: Ensures that intelligence is shared securely with authorized personnel,
preventing unauthorized access.

5. Intelligence Fusion Centers:


 Purpose: Centralized locations where intelligence from various sources is gathered,
analyzed, and shared with relevant partners.
 Format: Physical or virtual centers that combine intelligence from multiple agencies and
sectors (local, national, international)
 Advantage: Promotes interagency cooperation and ensures that intelligence is shared
efficiently across organizations.

4. Challenges in Intelligence Reporting and Dissemination


1. Information Overload:
With the sheer volume of intelligence collected, it can be challenging to filter and prioritize the
most important data. Without proper triaging, irrelevant or outdated information may be
disseminated, leading to confusion or poor decision-making.

2. Security and Privacy Concerns:


Sensitive data, including personally identifiable information (PII), must be protected during both the
reporting and dissemination processes. The mishandling of classified or private information could
lead to legal or reputational consequences.
3. Interagency Coordination:
Effective dissemination requires cooperation and trust between agencies. Sharing intelligence
across departments, regions, or even countries can be complicated by differing protocols,
confidentiality agreements, and operational priorities.
4. Timeliness:
Intelligence must be disseminated quickly to ensure that it is still relevant. Delays in distribution
can reduce the operational impact of intelligence, especially when time- sensitive action is
required.

5. Best Practices for Effective Reporting and Dissemination


•Ensure Clear Formatting and Consistency:
Standardize report formats to make it easier for recipients to quickly understand key findings.
Consistency helps ensure that intelligence is easily processed and acted upon.
•Regular Updates and Follow-ups:
Intelligence reports should be updated regularly, especially when new information emerges.
Regular briefings or updates ensure that field units and decision-makers are working with the most
current data.
•Use Technology to Enhance Speed and Accuracy:
Leverage technology such as encrypted messaging systems, intelligence platforms, and
automated reporting tools to speed up the process of dissemination and reduce human error.
•Provide Training on Intelligence Reporting:
Regularly train officers and analysts on how to properly document, analyze, and report
intelligence. Ensuring consistent practices across departments improves the overall quality of
intelligence reporting.
•Foster Interagency Cooperation:
Promote collaboration and trust-building exercises among different agencies to improve the
sharing of intelligence. Establish clear protocols for cross-agency information sharing to enhance
operational coordination.

You might also like