
Fundamentals of Criminal Invest & Intel Module 2
Presentation
•
Professional Development
•
Professional Development
•
Hard
Wilfredo Beralde
FREE Resource
144 Slides • 0 Questions
1
MODULE 2 - PART 1
This is now the Module 2 of the our subject; the emphasis is on the tools and phases of criminal investigation and the different techniques of obtaining information. The same with volume 1, you will be reading and watching video at end of every Part to supplant further learning and information as long as the subject matter is concerned.
I would like to ask an apology ahead of times for the introductory statement in every video as it was designed "PARTLY" under the old curriculum and was just spliced aligning it to the NEW CURRICULUM.
The content is still relevant for it follows the prescribed table of specifications of the Board of Criminology.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
In the next slide is a video presentation detailing the slides presented above:
You can watch and listen, after which proceed to the next part of the module!
17
18
Module 2 - Part 2
The Identification of Suspects
The same with Part 1 of this module, I would like to reiterate and correct the part and series of the video presentation to suit the Table of Specification prescribed by the Board of Criminology.
I am presenting the slides before the video to enhance your understanding regarding the subject matter.
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
In the next slide is a video presentation detailing the slides presented above:
You can watch and listen, after which proceed to the next part of the module!
44
45
Module 2 - Part 3
Locating the Suspect and Proving the Guilt of the Suspect
This Part comprises 2 subject matter; how to locate the offender and how to prove the guilt of the accused.
The manner of presentation is the same, video series will be presented to explain the nature of the subject matter for a more better understanding of the course.
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
In the next slide is the video for the above lesson!
64
65
THE INTELLIGENCE & CRIMINAL INVESTIGATION
This part discusses the processing of information such as but not limited to: Intelligence; Surveillance; Informants; Informers; Regular and Cultivated sources of information; Undercover;
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
Finally, the last topic is all about background investigation, cyber intelligence and cyber investigation, cryptography (codes and ciphers), classification of information and sources, security and access of documents and its classification.
130
The Background Investigation
A background investigation also known as background check is a process a person or company uses to verify that an individual is who they claim to be, and this provides an opportunity to check and confirm the validity of someone's criminal record, education, employment history, and other activities from their past.
131
Another term applied for BI aside from background check is background evaluations, which seek information about an applicant's employment, criminal, and personal history in an effort to investigate behavioral reliability, integrity, and personal adjustment.
Background evaluations are conducted to determine whether there are any historical facts that would interfere with subject`s performance including violations of statutes, regulations, or laws. It is important to note background evaluations are a different process than competency-based assessments and are typically handled apart from the traditional assessments.
Relating this in our subjects will tell us that background investigation can also be conducted employing IN-DEPTH INQUIRY as to the history of the subject whether involve in a crime or not.
132
CYBER INTELLIGENCE & CYBER INVESTIGATION
CYBER INTELLIGENCE involves collecting information on cybercrime from a wide array of public, private and open sources, and then processing and analysing that information.
The objective is to enrich and expand the store of law-enforcement data and thus help make the fight against cybercrime as effective as possible. To this end, it aims to developed a number of cyber-intelligence products:
Cyber Bits: short intelligence notifications on cyber-related topics
the Open-Source Intelligence (OSINT) Dashboard, which aims to capture the most important events from the passing week in a broadly understood cyber domain
the Common Taxonomy for the National Network of Computer Security Incident Response Teams (CSIRTs).
133
Cyber Intelligence are designed to raise awareness and trigger discussions on further actions. Most are aimed at a broad audience, while a few are intended only for law enforcement authorities. Rather than providing a detailed assessment, they bring important news quickly to the attention of the law enforcement.
On the opposite side is an ideal TEAM intended for this purpose and as a practice, WE DON`T HAVE YET this kind of response in the Philippines
134
The Cyber Investigation
The tactics investigators use to catch the suspects involved can vary based on the type of cybercrime committed. Before investigating, there are still a few key steps an investigator must take to ensure they gather and analyze all the evidence correctly.
Finally, the investigators must be guided by Republic Act 10175, the CYBERCRIME PREVENTION ACT OF 2012.
Cyber Crime Investigation is a broad term in the investigation community. Cyber crimes can be as simple as password stealing, phishing schemes, or as complex or cruel as child exploitation, human trafficking, and ransomware attacks and many more.
135
This will give you the opportunity to gather surface-level information that will help you prioritize your resources and time in the right direction. After you answer all the questions above, you should have an idea of what tools you need to use to document, find the evidence, how to preserve, collect and observe chain of custody of evidence.
The Philippine National Police are guided with the Revised PNP Operational Procedure, 2021 towards this purpose.
In investigating CYBER CRIME you need to know what exactly happened. This is a great part to ask the rudimentary questions: “Who, what, where, why, how, when, and which?”
136
CRYPTOGRAPHY
CRYPTOGRAPHY, is an art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key. Cryptography (Greek kryptos, “secret”; graphos, “writing”) refers both to the process or skill of communicating in or deciphering secret writings (codes, or ciphers) and to the use of codes to convert computerized data so that only a specific recipient will be able to read it using a key (see Encryption). Cryptographers call an original communication the “cleartext or plaintext.” Once the original communication has been scrambled or enciphered, the result is known as the “ciphertext or cryptogram”. See below example...
137
In its broadest sense, cryptography includes the use of concealed messages, ciphers, and codes. Concealed messages, such as those hidden in otherwise innocent text and those written in invisible ink, depend for their success on being unsuspected. Once they are discovered, they frequently are easy to decipher.
Codes, in which predetermined words, numbers, or symbols represent words and phrases, are usually impossible to read without the key codebook. Cryptography also includes the use of computerized encryption to protect transmissions of data and messages.
Cryptography is important for more than just privacy, however. Cryptography protects the world’s banking systems as well. Many banks and other financial institutions conduct their business over open networks, such as the Internet.
138
Below is an example of codebooks Below is an example of microscopic
writing
Steganography is a method of hiding the existence of a message using tools such as invisible ink, microscopic writing, or hiding code words within sentences of a message. Cryptographers may apply steganography to electronic communications. This application is called transmission security.
139
Example of Hidden code in a sentence (or innocent text). Can you spot/discover the hidden words?
Take note: in this example, the secret communication is the WORD that was placed in every 5th place of the sentence and after period of the sentence.
140
The CIPHERS and CODES
Ease of use makes ciphers popular. There are two general types of ciphers. Substitution ciphers require a cipher alphabet to replace plaintext with other letters or symbols. Transposition ciphers use the shuffling of letters in a word to make the word incomprehensible.
Ciphers are the secret codes used to encrypt plaintext messages. Ciphers of various types have been devised, but all of them are either substitution or transposition ciphers. In the opposite side is a known cipher disk used by Caesar known as cipher decoder.
141
Examples of CIPHER
TRANSPOSITION CIPHER SUBSTITUTION CIPHER
Transposition is simply "scrambling" the words such as ESSAPL whose plaintext is PLEASE (ignore the excess of one S). Substitution is moving the alphabet several spaces from the first letter to different letter. Can you decode the substitution cipher above?
142
To easily process the gathered information the following standard prescribed codes of evaluation as to source and as to information shall be indicated on all information forwarded or disseminated.
In other words, when an information is regarded as A-1 such information is completely reliable and is already confirmed, if another letter is added such as Z, it means it can be proven by a document or records. Above is called ADMIRALTY SCALE.
143
CLASSIFICATION OF RECORDS: Document Security Concern
TOP SECRET RECORDS – This is categorized as highly classified (Green or ORANGE in some state in US..
SECRET RECORDS– This falls under the normally classified document (Red).
CONFIDENTIAL RECORDS– This is categorized as classified document (Blue).
RESTRICTED RECORDS – without any color (normally the usual black and white records), yet, prior to release must also cleared with records officer.
Kinds of Sensitive Information
Proprietary Information – information related to status operations or activities. In business and industry, it relates to the structure, products and methods of operations of the organization.
Trade Secret – refers to the formula, pattern device or compilation of information used in one’s business. It gives competitive advantage over others who do not know about.
NOTE: The above color on classified records is an important code in protecting document.
144
END OF MODULE 2
Prepare for the next exam.
THE LAST MODULE WILL BE POSTED SOON!
MODULE 2 - PART 1
This is now the Module 2 of the our subject; the emphasis is on the tools and phases of criminal investigation and the different techniques of obtaining information. The same with volume 1, you will be reading and watching video at end of every Part to supplant further learning and information as long as the subject matter is concerned.
I would like to ask an apology ahead of times for the introductory statement in every video as it was designed "PARTLY" under the old curriculum and was just spliced aligning it to the NEW CURRICULUM.
The content is still relevant for it follows the prescribed table of specifications of the Board of Criminology.
Show answer
Auto Play
Slide 1 / 144
SLIDE
Similar Resources on Wayground
136 questions
Θετικό κλίμα στην τάξη με τη χρήση του διαδραστικού πίνακα
Presentation
•
Professional Development
140 questions
so too neither either
Presentation
•
KG - University
142 questions
untitled
Presentation
•
KG - University
142 questions
untitled
Presentation
•
KG - University
135 questions
review
Presentation
•
KG - University
135 questions
TEAS Test Study Guide - Chemistry
Presentation
•
University
149 questions
Modal Verbs 4- Must-Should-Have to
Presentation
•
Professional Development
145 questions
IMPOSTOS Advanced level
Presentation
•
Professional Development
Popular Resources on Wayground
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
36 questions
6th Grade Math STAAR Review
Quiz
•
6th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade