Post on 18-Jan-2016
transcript
Welcome to Unit #4 SeminarPlease feel free to chat with each other until
class starts.
I will attempt to use the microphone again, so keep your speakers turned up.
Thanks for your cooperation: Instructor Rodney Leonard
UNIT #4 Unit 4: Surveillance and Constitutional
Issues This unit explores various types of
surveillance, as well as the legal issues surrounding the uses of electronic, audio, and covert surveillance. We will discuss proper procedures involving photo array and in-person lineups.
What will you learn in this unit? The different types of surveillance techniques The purpose of bugs, pen registers, and beepers as
they pertain to surveillance The proper procedure for intercepting wire or oral
communication The necessary procedures for implementing a
Rogues Gallery file The guidelines required when using a police artists
or other type of facial recognition tool
What do I have to do to complete this unit? Review Key Terms Read Chapter 8 & 9 in Text Optional Reading: Chapter 25 Attend the weekly Seminar Respond to the Discussion Board Take the Quiz Visit Extra Extra
Key Terms Loose Surveillance Shadow Pen Register Identi-Kit Composite Images
Chapter 8
Surveillance:A Fact-Finding Tool—Legality and Practice
Osterburg & Ward, 2007
Chapter 8: Surveillance Conducting a surveillance is generally
expensive. Indeed, to be successful, considerable resources in the form of work hours, equipment, and time (sometimes measured in months) must be invested. Given certain conditions, however, it may be the only means by which particular information can be obtained.
Terms to know Surveillance: the observation of a person, place, or thing,
generally but not necessarily in an unobtrusive manner. Electronic or technical surveillance: the use of any form of
technological or computer equipment to monitor the movement or actions of a suspect
Subject: the party under surveillance. Surveillant: the person conducting the surveillance. Tail: to follow and keep under surveillance; a surveillance. Stakeout: also called a plant or fixed surveillance; here, the
surveillant remains essentially in one position or locale. (The term is derived from the practice of tethering animals to a stake, allowing them a short radius in which to move.)
Cont… Undercover: an undercover agent who often gets to know or
work alongside the subject. The term roping describes this situation, and the undercover agent is said to be planted.
Convoy: a countermeasure to detect a surveillance; a convoy, usuallya person, is employed to determine whether a subject is under surveillance.
Shadow: to follow secretly; to place a person under surveillance.
Be made: to be detected or suspected of being a surveillant by the subject.
Burn the surveillance: when a surveillant’s behavior causes the subject to surmise or know he or she is under surveillance.
Cont… Mustard plaster: a form of open surveillance; here, the
subject is followedso closely that surveillant and subject are almost in lock step. It is tantamount to protective custody.
Tailgating: a form of open surveillance in which the subject’s vehicleis closely followed.
Mail cover: a method of tracking mail delivered to a particular personor address.
Bugging: eavesdropping by electronic means, such as a hidden microphone or radio transmitter; bug: a device used for such eavesdropping.
Cont… GPS device: Global Positioning System device, a
global navigation satellite system that provides reliable positioning, navigation, and timing services.
Pen register: a device that records all numbers dialed on a telephone; it is generally installed at the telephone company’s central office.
Beeper: a battery-operated device that emits radio signals that permit it to be tracked (as it moves about) by a directional finder-receiver. Also called GPS device, beacon, transponder, and electronic tracking device.
Fixed Surveillance surveillant remains in fixed location
Moving Surveillance subject moves about and surveillance follows
Technical Surveillance involves electronic eavesdropping device
and/or optical devices
Kinds of Surveillance
Osterburg & Ward, 2007
Chapter 9
Eyewitness Identification: Guidelines and Procedures
Osterburg & Ward, 2007
Chapter 9: Eyewitness Identification When a crime has been witnessed by a victim or
another person, either might be able to identify the offender. This possibility must be exploited without delay. The first step is to arrange for both victim and eyewitness to scrutinize the mug shot files of the Rogues Gallery; then, if this effort is unsuccessful, to reconstruct and image of the offender with an artist’s sketch, facial-features kit, or computer-generated sketch. The reconstruction should be distributed within the department and, to enlist the public’s cooperation, in the vicinity of the crime.
Use random number of photographs (6 or more)
Do not give clues to witnesses Allow only one witness at a time to view Do not allow witnesses to communicate
with one another Conduct lineup after positive identification
is made Make record of all photos shown to witnesses
Using the Rogues Gallery
Osterburg & Ward, 2007
Witness must have adequate opportunity to observe the crime
Witness must have the capacity to observe the suspect commit the crime
Witness must be sufficiently attentive to the actions of the suspect
Identification must be completely the result of the witness’s own memory
Eyewitness Identifications:Court Requirements
Osterburg & Ward, 2007
Chapter 25
Managing Criminal Investigations
Osterburg & Ward, 2007
Five elements:
1. The initial investigation
2. Case screening
3. Management of ongoing investigation
4. Police-prosecutor relations
5. Continuous monitoring of investigative process
Elements of MCI
Osterburg & Ward, 2007
Is there a witness? Is a suspect named? Can a suspect be described? Can a suspect be located? Is stolen property traceable? Is physical evidence present? Is there a distinguishable MO?
Solvability Factors
Osterburg & Ward, 2007
Increase in productivity Reallocation of resources
(via case screening) proactive investigations formation of task force units better case preparation
Rejection of favoritism as basis of selection for detectives
Potential Benefits of MCI
Osterburg & Ward, 2007
UNIT SUMMARY This unit explored various types of surveillance, as
well as the legal issues surrounding the uses of electronic, audio, and covert surveillance. We discussed proper procedures involving photo array and in-person lineups. We also looked at constitutional issues involving criminal investigations, as well as protections of citizens' rights.
Any Questions Please ask ?????
Office Hours
Following Seminar on AIM (MrRodneyLeonard)