+ All Categories
Home > Documents > Presentation subhead Criminal Investigation Unit 4 Seminar Lecturer: Fred D. Collie.

Presentation subhead Criminal Investigation Unit 4 Seminar Lecturer: Fred D. Collie.

Date post: 18-Jan-2018
Category:
Upload: kelly-perry
View: 221 times
Download: 0 times
Share this document with a friend
Description:
Unit 4 Deliverables Read Chapters 8 & 9 in Criminal Investigation (38 Pages) Review Key Terms Attend Lecture 1 (25) Respond to the Discussion Board (25 points) Take the Quiz (45 Points)

If you can't read please download the document

Transcript

Presentation subhead Criminal Investigation Unit 4 Seminar Lecturer: Fred D. Collie Criminal Investigation: A Method for Reconstructing the Past 6 th edition By James W. Osterburg and Richard H. Ward (Osterburg & Ward, 2010) (Osterburg & Ward, 2010, p. 45) (Osterburg & Ward, 2010, pp ) Osterburg, J. W., & Ward, R. H. (2010). Criminal Investigation: for Reconstructing the Past (6th ed.). New Providence, NJ: Matthew Bender & Company, Inc. Unit 4 Deliverables Read Chapters 8 & 9 in Criminal Investigation (38 Pages) Review Key Terms Attend Lecture 1 (25) Respond to the Discussion Board (25 points) Take the Quiz (45 Points) Lecture: In-Private Chat We can communicate in-private during the lecture if needed. Midterm Essay Exam *Course Level Assessments (CLAs) are used to determine the level of mastery each student has achieved against each course outcome. Where do I get the information that I need to do well on the Mid-term? Chapter 13 in your text has all of the information that you will need to do well on the Mid- term. Just add explanation and examples. Midterm Essay Exam What are methods of inquiry and how are they used in criminal investigation? 2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest? 3. What is the scientific method and how is it applied to criminal investigation by criminal investigators? 4. Discuss three primary sources of information for criminal investigators and provide detailed practical examples of each source listed. How to respond to questions well Define Define the concept or term. Ensure that you properly cite your definition Explain Explain the term or concept using the course material and common, practical terms Provide Examples Provide practical examples that connect the academic material to the real world. Constitutional Reference Amendment 4 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Use random number of photographs (6 or more) Do not give clues to witnesses Allow only one witness at a time to view Do not allow witnesses to communicate with one another Conduct lineup after positive identification is made Make record of all photos shown to witnesses Using the Photo File Photo Array Photo Line-Ups TRADITIONAL An investigator shows a witness at least six pictures of possible suspects at one time. Critics say physical and verbal cues from the detectives conducting such a lineup can taint the results, even if the detectives are not deliberately trying to do so. Using a booking photo of a suspect from a past crime (with height markers and ID numbers across the chest, for example) can also suggest guilt in the recent crime. SEQUENTIAL BLIND Photos are shown to a witness one at a time by someone who does not know which picture is the suspect's. Experiments show that viewing pictures sequentially results in fewer misidentifications when the perpetrator is not in the lineup, probably because the witness isn't just comparing one person with another and picking the person who looks most like the criminal. However, a witness is also less likely to pick the correct person. Surveillance: A Fact-finding ToolLegality And Practice Constitutional Reference Amendment 4 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Justice may be blind, but she has very sophisticated listening devices. -- Edgar Argo Kinds of Surveillance Fixed Surveillance Surveillant remains in fixed location Moving Surveillance Subject moves about and surveillance follows Technical Surveillance Involves electronic eavesdropping device and/or optical devices (Osterburg & Ward, 2010) Surveillance at Wal-Mart Technical Surveillance Techniques Wiretaps Bugs, pen registers, beepers Monitoring conversations Monitoring telephone usage Monitoring movements of vehicles and items of commerce Visual enhancement devices (Osterburg & Ward, 2010) During a mobile surveillance, do not take unnecessary risks to keep up with a subject speeding, running red lights, or otherwise driving recklessly. While stationary, keep the vehicle windows closed and the doors locked. Regularly scan rear view mirrors to observe anyone or any activity to the rear. Alert other team members to any suspicious or unusual persons or activity in the area. In high-crime areas and in hours of darkness, remain in a heightened state of alert.(Accessed 7/26/11) Safety and Security Measures Position vehicle to enable a rapid response to assist others if needed. Ensure vehicle has emergency equipment lights, siren, and first-aid kit. Keep identification, weapon, and ballistic vest assessable. Know and use challenge, password, and other appropriate safety measures to prevent friendly fire situation from developing. When leaving a vehicle to go on foot surveillance, fully secure the vehicle and equipment inside. Safety and Security Measures(Accessed 7/26/11) Loose Surveillance Loose surveillance is used when the objective is to locate a suspect by tailing his or her relatives and friends. The surveillant exercises great caution while observing the subject, preferring to drop the tail rather than risk detection or exposure. Whether for espionage, burglary, or terrorism, this tactic applies when a groups activities are under scrutiny to determine their contacts and intentions (Osterburg & Ward, 2010, p. 218). ) Close surveillance The subject is kept under constant surveillance. Also termed tight surveillance, the aim is not to lose the subject even at the risk of being made. Example: an arsonist (known through an informant or a wiretap) who sets out to burn an inhabited building (Osterburg & Ward, 2010, p. 218). Shadow To follow secretly; to place a person under surveillance (Osterburg & Ward, 2010, p. 218). Identi-Kit A powerful investigative tool that creates accurate photo realistic facial composite sketches based on verbal descriptions provided by a witness or victim. Make customized wanted posters, transmit the composite sketch via the web,or fax, or export the composite sketch to other imaging programs. Identi-Kit facial composite software is available on CD or the internet as a hosted application.Accessed 7/26/11) Composite Images An image of a suspect produced by an artist or kit using witness descriptions. Computer-Generated Composites Pen Register A device that records all numbers dialed on a telephone; it is generally installed at the telephones companys central office Neither overhears conversations nor indicates whether a call was completed Presentation subhead Criminal Investigation Unit 4 Seminar Lecturer: Fred D. Collie


Recommended