1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.

Slides:



Advertisements
Similar presentations
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Privacy of Communications: Snail Mail to Telephones.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
1 Book Cover Here Chapter 10 INTERROGATION OF SUSPECTS AND HOSTILE WITNESSES Guidelines and Procedures Criminal Investigation: A Method for Reconstructing.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Your Rights Under the Internet Law By: Sannita S. Lam.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Criminal.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 3 THE CRIME SCENE Discovery, Preservation, Collection, and Transmission of.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 4 PEOPLE AS A SOURCE OF INFORMATION Criminal Investigation: A Method for.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
AJ 104 Chapter 13 Electronic Surveillance and Other Searches.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Class 11 Internet Privacy Law Government Surveillance.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
1 Book Cover Here Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition SECTION II APPLYING THE PRINCIPLES TO CRIMINAL INVESTIGATION.
From Surveillance to Records and Files Chapter 8.
The Bill of Rights The First Fundamental Changes of the Constitution.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Police and the Constitution: The Rules of Law Enforcement.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter # 9 Operational Supervision Security Supervision and Management Theory and.
Understanding the Criminal Justice System Chapter 6: Police and the Constitution.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 14 RECONSTRUCTING THE PAST Methods, Evidence, Examples Criminal Investigation:
Welcome to Unit #4 Seminar Please feel free to chat with each other until class starts. I will attempt to use the microphone again, so keep your speakers.
1 Book Cover Here Chapter 12 CRIME ANALYSIS AND COMING ATTRACTIONS IN THE INVESTIGATOR’S TOOLBOX Criminal Investigation: A Method for Reconstructing the.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
Criminal Investigation Unit 4 Lecture Surveillance and Constitutional Issues Instructor: Joe Yocum.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Presentation subhead Criminal Investigation Unit 4 Seminar Lecturer: Fred D. Collie.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Obtaining Evidence from Computers, or by Use of Search Warrants, Wiretapping, or Dogs Trained to Indicate an Alert Chapter 15.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 7 Search Incident to a Lawful Arrest, Hot Pursuit Criminal Justice Procedure.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 6 Exceptions to the Warrant Requirement: Plain View, Open Fields, Abandoned.
CLASS NO. 2 4 TH Amendment. Review Incorporation Doctrine Retroactivity –Gen. Rule: Decisions are not retroactive for habeas corpus cases –Exceptions:
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 3 Arrests Criminal Justice Procedure 8 th Edition.
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Criminal Investigation Unit 4- 1st Lecture
The University of Adelaide, School of Computer Science
Legal Implications.
Surveillance.
APPLYING THE PRINCIPLES TO CRIMINAL INVESTIGATION
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Intercepting Communications
Laws Governing Police Surveillance
The University of Adelaide, School of Computer Science
A Gift of Fire Third edition Sara Baase
Texas Search and Seizure
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
The Right to Privacy vs. National Security
Presentation transcript:

1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition

2 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 8 SURVEILLANCE A Fact-finding Tool – Legality and Practice Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition

3 Copyright © 2014, Elsevier Inc. All Rights Reserved Surveillance Surveillance is expensive (long work hours, equipment, and time must be invested) Requires a high degree of expertise Private eyes “Street smart” detectives Investigators Court ordered surveillance actions

4 Copyright © 2014, Elsevier Inc. All Rights Reserved Surveillance Stationary or Fixed Moving – Vehicle – Foot – Underwater Electronic or Technical – Eavesdropping – Tracking – Visual and infra-red optical devices

5 Copyright © 2014, Elsevier Inc. All Rights Reserved Surveillance: The Legality Issue Fixed and Moving Surveillance Electronic and Technical Surveillance and the USA PATRIOT Act – Wiretapping – Mail Covers – Bugs, Pen Registers, Beepers Monitoring Conversations Monitoring Telephone Usage Monitoring Movement of Vehicles and Items of Commerce – Visual and Sound Enhancement Devices

6 Copyright © 2014, Elsevier Inc. All Rights Reserved Wiretapping 1928 Supreme Court decision concluded wiretapping did not constitute unlawful search and seizure Federal Communications Act of 1934, specifically Section Omnibus Crime Control and Safe Streets Act – For the first time, law enforcement personnel were authorized to wiretap and conduct other kinds of electronic surveillance

7 Copyright © 2014, Elsevier Inc. All Rights Reserved Monitoring Phone Usage Pen registers record all numbers dialed on a phone by monitoring electrical impulses 1977 Supreme Court Decision; Federal Rule Crim. Proc. 41 Smith v. Maryland: use of a pen register is not a search and no warrant is required Comments made within jail, overheard by electronic monitor, are admissible in court

8 Copyright © 2014, Elsevier Inc. All Rights Reserved Practical Considerations Surveillance is seldom the task of one person Strength of technology needed for surveillance is based on the type of investigation and size of department Attributes to consider when selecting members of a surveillance team – Exceptional common sense and good judgment – An ability to operate both independently and as a team member – A proven track record as to dependability and presence of mind in times of high stress – “Street savvy,” a “gift of the gab,” extreme patience

9 Copyright © 2014, Elsevier Inc. All Rights Reserved Tactics Loose Surveillance Close Surveillance Stop and Frisk Planning Preparation – Familiarization – Equipment – Blending In Discontinuing the Surveillance

10 Copyright © 2014, Elsevier Inc. All Rights Reserved Tactics Loose Surveillance – Objective is to locate a suspect by tailing his or her relatives and friends – The surveillant exercises great caution while observing the subject, preferring to drop the tail rather than risk detection or exposure Close Surveillance – Aim is to avoid losing the subject regardless of risk of detection or exposure – Particularly useful on those who are only peripherally connected with the subject or the crime

11 Copyright © 2014, Elsevier Inc. All Rights Reserved Electronic Surveillance Procedure for Interception of Wire or Oral Communications – Electronic Communications Privacy Act of 1986 Computer Surveillance – Monitoring bulletin boards, chat rooms, social networking sites, etc.

12 Copyright © 2014, Elsevier Inc. All Rights Reserved Conclusion Surveillance used to be more of an “art” … now more of a “science” Technology enhances “shoe leather” investigative techniques Combination of tools and techniques critical to quality investigation