Search Header Logo
Fundamentals of Criminal Invest & Intel Module 2

Fundamentals of Criminal Invest & Intel Module 2

Assessment

Presentation

Professional Development

Professional Development

Hard

Created by

Wilfredo Beralde

FREE Resource

144 Slides • 0 Questions

1

MODULE 2 - PART 1

​ This is now the Module 2 of the our subject; the emphasis is on the tools and phases of criminal investigation and the different techniques of obtaining information. The same with volume 1, you will be reading and watching video at end of every Part to supplant further learning and information as long as the subject matter is concerned.

I would like to ask an apology ahead of times for the introductory statement in every video as it was designed "PARTLY" under the old curriculum and was just spliced aligning it to the NEW CURRICULUM.

The content is still relevant for it follows the prescribed table of specifications of the Board of Criminology.

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

media

12

media

13

media

14

media

15

media

16

​In the next slide is a video presentation detailing the slides presented above:

​You can watch and listen, after which proceed to the next part of the module!

media

17

18

​Module 2 - Part 2

The Identification of Suspects

​The same with Part 1 of this module, I would like to reiterate and correct the part and series of the video presentation to suit the Table of Specification prescribed by the Board of Criminology.

I am presenting the slides before the video to enhance your understanding regarding the subject matter.

19

media

20

media

21

media

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

media

34

media

35

media

36

media

37

media

38

media

39

media

40

media

41

media

42

media

43

​In the next slide is a video presentation detailing the slides presented above:

​You can watch and listen, after which proceed to the next part of the module!

media

44

45

​Module 2 - Part 3

Locating the Suspect and Proving the Guilt of the Suspect

​This Part comprises 2 subject matter; how to locate the offender and how to prove the guilt of the accused.

The manner of presentation is the same, video series will be presented to explain the nature of the subject matter for a more better understanding of the course.

46

media

47

media

48

media

49

media

50

media

51

media

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

In the next slide is the video for the above lesson!

media
media

64

65

​THE INTELLIGENCE & CRIMINAL INVESTIGATION

​This part discusses the processing of information such as but not limited to: Intelligence; Surveillance; Informants; Informers; Regular and Cultivated sources of information; Undercover;

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

media

77

media

78

media

79

media

80

media

81

media

82

media

83

media

84

media

85

media

86

media

87

media

88

media

89

media

90

media

91

media

92

media

93

media

94

media

95

media

96

media

97

media

98

media

99

media

100

media

101

media

102

media

103

media

104

media

105

media

106

media

107

media

108

media

109

media

110

media

111

media

112

media

113

media

114

media

115

media

116

media

117

media

118

media

119

media

120

media

121

media

122

media

123

media

124

media

125

126

127

128

129

​Finally, the last topic is all about background investigation, cyber intelligence and cyber investigation, cryptography (codes and ciphers), classification of information and sources, security and access of documents and its classification.

media

130

​The Background Investigation

A background investigation also known as background check is a process a person or company uses to verify that an individual is who they claim to be, and this provides an opportunity to check and confirm the validity of someone's criminal record, education, employment history, and other activities from their past.

media

131

​ Another term applied for BI aside from background check is background evaluations, which seek information about an applicant's employment, criminal, and personal history in an effort to investigate behavioral reliability, integrity, and personal adjustment.

Background evaluations are conducted to determine whether there are any historical facts that would interfere with subject`s performance including violations of statutes, regulations, or laws. It is important to note background evaluations are a different process than competency-based assessments and are typically handled apart from the traditional assessments.

media

​ Relating this in our subjects will tell us that background investigation can also be conducted employing IN-DEPTH INQUIRY as to the history of the subject whether involve in a crime or not.

132

CYBER INTELLIGENCE & CYBER INVESTIGATION

​ CYBER INTELLIGENCE involves collecting information on cybercrime from a wide array of public, private and open sources, and then processing and analysing that information.

The objective is to enrich and expand the store of law-enforcement data and thus help make the fight against cybercrime as effective as possible. To this end, it aims to developed a number of cyber-intelligence products:

  • Cyber Bits: short intelligence notifications on cyber-related topics

  • the Open-Source Intelligence (OSINT) Dashboard, which aims to capture the most important events from the passing week in a broadly understood cyber domain

  • the Common Taxonomy for the National Network of Computer Security Incident Response Teams (CSIRTs).

133

media

​Cyber Intelligence are designed to raise awareness and trigger discussions on further actions. Most are aimed at a broad audience, while a few are intended only for law enforcement authorities. Rather than providing a detailed assessment, they bring important news quickly to the attention of the law enforcement.

​On the opposite side is an ideal TEAM intended for this purpose and as a practice, WE DON`T HAVE YET this kind of response in the Philippines

media

134

​The Cyber Investigation

The tactics investigators use to catch the suspects involved can vary based on the type of cybercrime committed. Before investigating, there are still a few key steps an investigator must take to ensure they gather and analyze all the evidence correctly.

Finally, the investigators must be guided by Republic Act 10175, the CYBERCRIME PREVENTION ACT OF 2012.

media

Cyber Crime Investigation is a broad term in the investigation community. Cyber crimes can be as simple as password stealing, phishing schemes, or as complex or cruel as child exploitation, human trafficking, and ransomware attacks and many more.

135

​ This will give you the opportunity to gather surface-level information that will help you prioritize your resources and time in the right direction. After you answer all the questions above, you should have an idea of what tools you need to use to document, find the evidence, how to preserve, collect and observe chain of custody of evidence.

The Philippine National Police are guided with the Revised PNP Operational Procedure, 2021 towards this purpose.

In investigating CYBER CRIME you need to know what exactly happened. This is a great part to ask the rudimentary questions: “Who, what, where, why, how, when, and which?”

media

136

​CRYPTOGRAPHY

​CRYPTOGRAPHY, is an art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key.   Cryptography (Greek kryptos, “secret”; graphos, “writing”) refers both to the process or skill of communicating in or deciphering secret writings (codes, or ciphers) and to the use of codes to convert computerized data so that only a specific recipient will be able to read it using a key (see Encryption).   Cryptographers call an original communication the “cleartext or plaintext.” Once the original communication has been scrambled or enciphered, the result is known as the “ciphertext or cryptogram”. See below example...

media

137

​ In its broadest sense, cryptography includes the use of concealed messages, ciphers, and codes. Concealed messages, such as those hidden in otherwise innocent text and those written in invisible ink, depend for their success on being unsuspected. Once they are discovered, they frequently are easy to decipher.

Codes, in which predetermined words, numbers, or symbols represent words and phrases, are usually impossible to read without the key codebook. Cryptography also includes the use of computerized encryption to protect transmissions of data and messages.

Cryptography is important for more than just privacy, however. Cryptography protects the world’s banking systems as well. Many banks and other financial institutions conduct their business over open networks, such as the Internet.

138

​Below is an example of codebooks Below is an example of microscopic

writing

media
media

​Steganography is a method of hiding the existence of a message using tools such as invisible ink, microscopic writing, or hiding code words within sentences of a message. Cryptographers may apply steganography to electronic communications. This application is called transmission security.

139

​Example of Hidden code in a sentence (or innocent text). Can you spot/discover the hidden words?

​Take note: in this example, the secret communication is the WORD that was placed in every 5th place of the sentence and after period of the sentence.

media
media

140

​The CIPHERS and CODES

​ Ease of use makes ciphers popular. There are two general types of ciphers. Substitution ciphers require a cipher alphabet to replace plaintext with other letters or symbols. Transposition ciphers use the shuffling of letters in a word to make the word incomprehensible.

​ Ciphers are the secret codes used to encrypt plaintext messages. Ciphers of various types have been devised, but all of them are either substitution or transposition ciphers. In the opposite side is a known cipher disk used by Caesar known as cipher decoder.

media

141

​Examples of CIPHER

TRANSPOSITION CIPHER SUBSTITUTION CIPHER

media
media

​Transposition is simply "scrambling" the words such as ESSAPL whose plaintext is PLEASE (ignore the excess of one S). Substitution is moving the alphabet several spaces from the first letter to different letter. Can you decode the substitution cipher above?

142

​To easily process the gathered information the following standard prescribed codes of evaluation as to source and as to information shall be indicated on all information forwarded or disseminated.

media
media
media

​In other words, when an information is regarded as A-1 such information is completely reliable and is already confirmed, if another letter is added such as Z, it means it can be proven by a document or records. Above is called ADMIRALTY SCALE.

143

CLASSIFICATION OF RECORDS: Document Security Concern

  1. TOP SECRET RECORDS This is categorized as highly classified (Green or ORANGE in some state in US..

  2. SECRET RECORDSThis falls under the normally classified document (Red).

  3. CONFIDENTIAL RECORDSThis is categorized as classified document (Blue).

  4. RESTRICTED RECORDS – without any color (normally the usual black and white records), yet, prior to release must also cleared with records officer.

Kinds of Sensitive Information

  1. Proprietary Information – information related to status operations or activities. In business and industry, it relates to the structure, products and methods of operations of the organization.

  2. Trade Secret – refers to the formula, pattern device or compilation of information used in one’s business. It gives competitive advantage over others who do not know about.

​NOTE: The above color on classified records is an important code in protecting document.

144

​END OF MODULE 2

​Prepare for the next exam.

THE LAST MODULE WILL BE POSTED SOON!

media

MODULE 2 - PART 1

​ This is now the Module 2 of the our subject; the emphasis is on the tools and phases of criminal investigation and the different techniques of obtaining information. The same with volume 1, you will be reading and watching video at end of every Part to supplant further learning and information as long as the subject matter is concerned.

I would like to ask an apology ahead of times for the introductory statement in every video as it was designed "PARTLY" under the old curriculum and was just spliced aligning it to the NEW CURRICULUM.

The content is still relevant for it follows the prescribed table of specifications of the Board of Criminology.

Show answer

Auto Play

Slide 1 / 144

SLIDE

Discover more resources for Professional Development