CJE 4610 CH 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

show-up

-Allows the police to conduct an immediate eyewitness identification of someone they have temporarily detained. -The practice permits the immediate clearing of a wrongfully suspected person, and detention is kept to a minimum

National Law Enforcement Telecommunication System (NLETS)

-Formed in 1966 as the Law Enforcement Teletype System (LETS) and incorporated as a not-for-profit in Delaware in 1973, LETS has morphed into this. -This handles some 1.5 billion transactions daily for law enforcement and other criminal-justice agencies. -In addition to providing secure channels for members' communication. -This is also a conduit for information and alerts flowing from the U.S. Department of Homeland Security (DHS). -This provides access to files from other states, such as those for wanted persons and concealed weapon permits; federal files, including the Federal Aviation Administration's (FAA's) aircraft registration data and tracking information; and the Canadian Police Information Centre (CPIC), which is similar to NCIC.

Regional Information Sharing System (RISS)

-These are used to provide core services at all centers information sharing, analytic services, loan of specialized investigative equipment, confidential funds, training conferences, and technical assistance. -These are used via over a secure intranet called RISSNET

Accurint for Law Enforcement (ALE)

-This is a provider of information and information services that go beyond credit reports. -Approximately 3,000 government entities use this, which has access to 12 billion public records, can easily retrieve information about businesses and individuals and among its capabilities is Person Alerts (PA), which automatically notifies law enforcement each time an individual who is a person of interest or a fugitive appears in the database.

Law Enforcement Intelligence Unit (LEIU)

-This was formed in 1956 by 29 local and state law enforcement agencies to exchange information about organized crime not available through normal police channels. -This originally excluded federal agencies, although that stance has been abandoned. In 2008, it changed its name to the Association of Law Enforcement Intelligence Units but kept its original acronym. Its present focus is gathering, recording, and exchanging information about suspected or known criminal figures, groups, and businesses and terrorism.

Immigration and Customs Enforcement (ICE)

A DHS program responsible for admitting those who may do so lawfully, denying entry to those who do not qualify, and arresting persons who attempt to enter unlawfully and also has the role of fighting terrorism by identifying those seeking entry into the country who would do us harm.

National Missing and Unidentified Persons System (NamUs)

A database now operated by the University of North Texas that has an estimated 100,000 missing person cases and more than 40,000 sets of human remains that have not been identified

crime analysis

A methodology that relies on a set of quantitative and qualitative techniques to analyze data valuable to police agencies and their communities.

photo array lineup

A procedure in which a series of usually six photographs, each in a separate folder, are shown sequentially to a witness for the purpose of determining if he/she can identify the perpetrator of a crime At least four fillers are used

live lineup

A process in which a series of "real people" are shown to an eyewitness to establish whether they can pick out the suspect All members appear simultaneously, although there is some interest in sequential appearances At least four fillers are used

geographic profiling

A specialty that rests on the premise that given a sufficient number of crimes, with adequate information suitable for analysis, a probabilistic map of the area in which the offender's residence is located can be calculated.

(1) what type of surveillance is involved, for example, a fixed location; (2) who the targets are; (3) the objectives, for example, to gather information to make arrests or to tail targets to lead them to other aspects of their operations and their associates; (4) what cars the targets drive; (5) the rough schedule the targets keep; and (6) the possibility of the targets operating anti-surveillance techniques and equipment

All surveillances should be based on a carefully conceived plan that includes a thoughtful selection of these characteristics

event analysis model

An approach of crime scene reconstruction that focuses is to identify as many event segments as possible; each event segment is a miniconclusion based on the verifiable data associated with it. In this approach, an incident" is any situation a reconstructionist is asked to investigate; the term is neutral and avoids the implicit assumption that a crime has been committed. An incident includes all of the activity from its beginning to its end.62 Incidents consist of macro components, "events"; these, in turn comprise a series of actions, "event segments," that are much like a series of time-phased photographs

National Center for the Analysis of Violent Crime (NCAVC)

An organization operated by the FBI that provides investigative and operational assistance to agencies dealing with violent crime

NIBIN

Ballistics intelligence database of the ATF

-What is it? -What function does it serve? -What does it tell about the timing and sequence of events? -What interrelationships does it have with other items of evidence?

Basic questions as each item of evidence is being considered during crime reconstruction

saw, heard, smelled, touched, and/or tasted.

Before any reinterviewing is done, the investigators should carefully assess what a witness said he/she . . .

-the agency lacks venue, which is rare, -the victim steadfastly refuses to assist in any way with the prosecution, which is not uncommon in domestic violence cases, or -it is determined that it is a civil matter.

Circumstances where investigative efforts are suspended

-Data defines the conclusion. -The context in which evidence is found, as well as its analysis, provides objective data. -Consider human testimony cautiously. -Effective forensic examination produces more refined data. -What happened is not the only question—its sequence is also important. -Use "reverse engineering" to work backward from the evidence to develop an understanding of what happened

Different approaches to crime scene reconstruction

El Paso Intelligence Center (EPIC)

Drug Enforcement Administration's (DEA) regional intelligence center that collects and disseminates information about aliens, drugs, weapons smuggling, and other activities

Solvability factors

Elements of information that have been demonstrated to correlate with higher probabilities of investigative success

Information -Criminal history and driving records -Incident reports -Statements by informants, witnesses, and suspects -Registration information for motor vehicles, watercraft, and aircraft -Licensing details about vehicle operators and professional licenses of all forms -Observations of behaviors and incidents by investigators, surveillance teams, or citizens -Details about banking, investments, credit reports, credit cards, and other financial matters -Descriptions of travel including the traveler(s) names, itinerary, methods of travel, date, time, and locations. -Statements of ideologies, beliefs, and values. Intelligence -A report by an analyst that draws conclusions about a person's criminal liability based on an integrated analysis of diverse information collected by investigators and/or researchers -An analysis of crime or terrorism trends with conclusions drawn about characteristics of offenders, probable future crime, and optional methods for preventing future crime/terrorism -A forecast drawn about potential victimization of crime or terrorism based on an assessment of limited information when an analysis uses past experience as context for the conclusion -An estimate of a person's income from a criminal enterprise based on a market and trafficking analysis of illegal commodities

Examples Distinguishing Between Information and Intelligence

aerial surveillance

First type of remote sensing

physical and technical/electronic

General types of surveillance

-Western States Information Network (WSIN), -Rocky Mountain Information Network (RMIN), -Mid-States Organized Crime Center (MOCIC) -Regional Organized Crime Information Center (ROCIC) -Mid-Atlantic-Great Lakes Organized Crime Law Enforcement -Network (MAGLOCLEN), and -New England State Police Information Network (NESPIN)

Members of RISS

-Trends. *Trends are general tendencies in the occurrence of crime across large geographic areas over extended periods of time. -Patterns. *If the same crime is committed repeatedly over a short period of time, sometimes, but not always, by the same offender, it is a pattern. -Series. *the same type of crime is committed over a short period of time, probably by the same offender. -Sprees. *When the same type of offense is committed at almost the same time by the same offender(s), it is called a spree. -Hot spots. *a location where various crimes are committed on a regular basis, usually by different perpetrators -Crimogens. *Either an individually known offender who is responsible for a large number of crimes or one victim who reports a large number of crimes.

Methods to link crimes

75 %

Mistaken eyewitness identification has been a factor in almost this percent of wrongful convictions

1) the safety of surveillance personnel, 2) a detailed briefing of everyone involved, including those responsible for providing security for the surveillance team and 3) making sure the right equipment is available and is checked out prior to the operation.

Most important elements of a surveillance plan

-Alert-Emerging Threat Analysis Capability (ETAC) and -Western Identification Network (WIN)

Non-members of RISS

STD

One of the most frequently used databases in the world and determines whether passports, identity cards, and visas have been reported lost or stolen. this also has databases that include piracy and radiological and nuclear materials. It belongs to the International Criminal Police Organization (Interpol)

fusion center

Places where people turn information and intelligence into actionable knowledge; it is the fundamental process by which homeland security and crime-related information and intelligence are shared

-Significant experience in homicide investigations -Trial and prosecution experience -Self-motivation -Compassion -Knowledge of technology and forensics -Communication skills -Patience and perseverance

Qualities of good investigators for cold cases

-If not already done, separate the witnesses. Establish how long they have been allowed to talk together if that has occurred. Record the information as part of the Brady requirement. -Have each witness, separately, provide a detailed description of the person he/she is to view. -Refrain from using suggestive words, for example, "We have the suspect in custody," and refrain from conduct that indicates you are sure you have the suspect. -Use more neutral language, such as "We have someone with us at another location and would like to know if you recognize him." -Whenever possible, present the suspect without handcuffs in a setting and under circumstances that tarnish the suspect the least. -Read the departmental form for show-ups to the witness. Make sure the witness understands it, and have him/her complete the form which includes his/her statement. -Bring the witnesses to the suspect's location one at a time and do not allow them to have contact with the other witnesses afterward. -Preferably, all contact with a witness at a scene should be digitally videotaped with audio. At a minimum it should be audio recorded.

Show-up procedure

Open-Source Intelligence (OSINT)

Sources of information available to everyone

(1) what act is the staging intended to conceal, and (2) what was the motive for staging the crime, the determination of which usually leads to the perpetrator

Staging investigations focus on these questions

-Conduct a comprehensive and thorough review of the documented scene, which may be very time-consuming in violent crimes because of the abundance of evidence.Page 208 -Carefully consider the victim's character, lifestyle, personal and professional associates, drug and alcohol use, normal hangouts, daily schedule and routines, physical condition, occupation, previous complaints to the police, and recent conversations with neighbors and friends -Look at the incident from several perspectives. -Identify and document in detail all possible indicators of staging. -Identify and document possible motives for the original act and for the staging. *The person staging the scene is not someone who happened by and gratuitously changed things; it is almost always someone who knew the victim and had some association or relationship with him/her. -Determine who benefits from the original act and the staging.

Steps in a staged crime scene investigation

1) Planning and direction 2) Collection 3) Processing and collation 4) Analysis 5) Dissemination 6) Reevaluation

Steps in intelligence/analytical cycle

surveillance

The continued observance of individuals, groups, locations, areas, and particular things

case screening model

The decision to inactive a case or refer it for further investigation is often made through this method, which requires the presence of a sufficient number of solvability factors to exist before a case will be referred for follow-up investigation.

(1) How, when, and where the crime was committed, including a chronological description of the events (2) the victim's identity and if appropriate, his/her medical condition and statement (3) the number of suspects, if any are in custody, whether they are in the jail or a hospital, and their descriptions or identities (4) whether composite sketches of suspects at large have been prepared and distributed 5) the words spoken by suspects during the commission of the crime, spontaneous statements made by them following their arrest, and any post-Miranda statements made by them to the arresting officer (6) the identities and statements of witnesses and any conditions noted, such any degree of drinking or appearance of having been using drugs (7) the nature and value of the property stolen (8) the types of physical evidence seized and (9) a description of any vehicles involved or a copy of an impound report for vehicles seized.

The incident and supplemental reports may answer many of these follow-up investigator's initial questions.

investigative plan

The method of showing hat lines of inquiry will be pursued and any special resources needed.

false allegation of a sexual crime

The most common staged nonfatal crime

National Crime Information Center (NCIC)

The most comprehensive criminal justice data set in the country, which is maintained by the FBI.

cold case

The most extreme form of a follow-up investigation

safety of officers

The most important aspect of every surveillance plan

remote sensing

The process of collecting and analyzing information about areas, objects, or events without being in contact with the focus of analysis.

1. Determining whether suspected criminal activity exists. 2. Gathering intelligence on illegal activities by individuals, groups, and organizations. 3. Obtaining probable cause for a search warrant. 4. Apprehending suspects by warrant or as they commit a crime. 5. Identifying the associates of criminals, their vehicles, homes, and places/people they frequent. 6. Determining the reliability of informants. 7. Providing security for undercover officers. 8. Locating people, places, and things. 9. Gathering intelligence about targets and premises prior to serving warrants. 10. Preventing a crime by allowing suspects to become aware they are being closely watched. 11. Gathering information for an on-going investigation.

The purposes of surveillance

National Tracing Center

This establishes the origin of guns recovered in law enforcement investigations to provide leads

National Counter-Improvised Explosives Device Capabilities Analysis Database (NCCAD)

This is a DHS program is the National Counter-Improvised Explosives Device Capabilities Analysis Database (NCCAD), that seeks ways to improve the capabilities, training, and equipment of those responsible for responding to (improvised explosive device) IED threats. These improvements are aimed at: (1) the IED responders at the unit, local, state, regional, and national levels and (2) informing decision-makers on policy decisions, resource allocation, and crisis management

LeadsOnLine

This is a private subscription service used by more than 1,600 law enforcement agencies. It provides access to transactions from thousands of reporting businesses, including scrap metal processors, secondhand stores, Internet drop-off stores, pawnshops, and eBay

jail booking report

This is created when a subject is in-processed at a jail

Violent Criminal Apprehension Program (ViCAP)

This is part of NCAVC and provides advice and support for a range of cases, including child abductions, serial rapes and murders, and cybercrime.

Next Generation Identification (NGI) Program

This is producing the world's largest set of biometric data to supplement its fingerprint records and is part of the FBI

scientific method

This is the heart of all approaches of crime scene reconstruction

crime scene reconstruction

This is the use of scientific methods, physical evidence, deductive reasoning, and their interrelationship to gain explicit knowledge of the series of events that surround the commission of a crime This is also the analysis of more complex scenes, integrates data from varied sources, and uses a more rigorous methodology to reach its conclusions

staged crime scene

This is used to misdirect investigators usually away from the actual perpetrator of a crime. It may also be done other reasons such as protecting family, from embarrassment or financial hardship

Field Contact/Information Report

This is where a patrol officer documents notes about a person or vehicle that seems suspicious but is not connected with any particular offense.

National Drug Pointer Index (NDPI)

This promotes DEA agent safety and prevents duplication of effort. Although EPIC cannot access this database, permitted system users can make sure they are not running investigations on the same subjects and operations.

-Advanced Fingerprint Identification Technology (AFIT), which replaced Automated Fingerprint Identification System (AFIS) and -RapBack (notifies employers if someone like a teacher, daycare worker, etc. who is in special trust by of parents of their children who have been arrested and/or are undergoing criminal investigation/supervision

Two NGI programs

-tactical crime analysis *deals with immediate criminal offenses -strategic crime analysis *deals with entrenched crime problems and emerging crime/criminal trends -administrative crime analysis *informing relevant audiences with summary/aggregate information about crime conditions

Types of crime analysis

-Primary fusion center *Provides information sharing and analysis for an entire state. These centers are the highest priority for the allocation of available federal resources, including the deployment of personnel and connectivity with federal data systems -Recognized fusion center * Provides information sharing and analysis for a major urban area *is any fusion center that is not a primary fusion center

Types of fusion centers

-Sources of Information (SOI). *Persons or organizations not under the direction of a specific police officer. A source of information furnishes information without compensation and will not take an active part in an investigation. When a source of information seeks compensation or becomes an active part of an investigation, their status changes to confidential informant. SOIs do not require registration. -Confidential Informants (CI). *Persons under the direction of a specific police officer giving information or other lawful assistance on criminal activity. Confidential informants take active parts in investigations and/or receive compensation. Register all CIs. -Confidential Defendant Informants (CDI). *Confidential informants who are current defendants in pending court cases and expect compensation in the form of judicial or prosecutorial considerations. Register all CDIs. -Inactive Confidential Informant. *Confidential informants not debriefed within a year or declared inactive by the control officer. -Debriefing. *Initial and continued questioning of confidential informants. Intelligence gathering on backgrounds, motives, limitations, and other information they have on all types of criminal activity. -Compensation. *Money or judicial/prosecutorial considerations. -Informant Control Officer (ICO). *Officer controlling the confidential informant. -Informant Secondary Officer (ISO). *Serves as a contact for the confidential informant

Types of informant definitions

-Indicative intelligence. *Focuses on new and emerging criminal developments. -Tactical intelligence. *Immediately actionable and often results in arrests. -Strategic intelligence. *Gathered and analyzed over time and usually confirms newly discovered patterns of criminal activity. -Evidential intelligence. *Factual, precise information that can be presented in court.

Types of intelligence

-Casual surveillance *Includes taking note of cars present, persons seen, and so forth each time you happen to drive by the surveillance area, and it doesn't require any additional personnel and equipment. The chief disadvantage is that it takes a long time to accumulate intelligence. -Formal surveillance *Requires some planning and lasts from a few hours to a longer period. Careful planning is essential and physical surveillance ordinarily requires more personnel than technical/electronic surveillance. -Long-term surveillance *Is an ongoing, indefinite proposition whose end is often determined by the value of what raw intelligence is being collected. If, for example, for several weeks you are getting some really good stuff and then little or nothing, you've been made and it's time to shut it down

Types of physical surveillance

(1) a show-up, (2) a photo array/lineup, and (3) a "live" lineup

Ways eyewitnesses may be requested to see if they can recognize anyone connected with the crime

The "why" in crime(s)

What does crime scene reconstruction not deal with unlike criminal profiling?


Conjuntos de estudio relacionados

Email English Common Mistakes 1b

View Set

Internal Med EOR: CARDIOVASCULAR

View Set

2214 Data Structures and Alogrithms- Test 2

View Set

Early Stream of Consciousness and Feminism in Fiction Instruction & Assignment

View Set

ATI - PN Fundamentals Online Practice 2020 A

View Set

Interpersonal Communication Chapter 2

View Set