Forensic Surveillance techniques Profiling techniques

Slides:



Advertisements
Similar presentations
SURVEILLANCE: opportunities and pitfall David Matthias QC and Ryan Kohli.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Welcome to CJ 325 Psychology for Law Enforcement Unit 7 Seminar.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
Criminal Investigations. Investigators should approach the crime scene investigation as if it will be their only opportunity to preserve and recover…
1 ICN Cartel Workshop 2013 South Africa Plenary I: Alternative Means of Cartel Detection (AGENCY ONLY) Stephen Blake Senior Director - Cartels and Criminal.
Michael Strong Director, Police Integrity Victoria, Australia.
INTRODUCTION TO INVESTIGATION Mr. Cappello Sir Robert Borden High School Specialist High Skills Major Program.
RIPA & The Protection of Freedoms Act 2012 Tim Glews
Criminal Intelligence and Surveillance Operations
CRIMINOLOGY THIS IS A COURSEWORK ASSESSED COURSE.
RIPA John Riddell Weightmans LLP 12 th February 2015.
Starting a Police Investigation What happens when there is a crime?
BTEC Level 3 Certificate in Applied Science BTEC Level 3 Subsidiary Diploma in Applied Science (Forensic Science) All units are taught in an applied science.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
The National Intelligence Model (NIM)
Fire Investigator e-book. Fire Investigators collect and analyze evidence from the scene of a fire.
Use of telecommunications data in fighting crime legally and effectively.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
10 March 2015 Barbora Bukovska, ARTICLE 19 Freedom of Expression: Jurisprudential trends Focus on surveillance.
Powered by (How) do you use social Media?ESO/Cancer World survey Friday, November 14, 2014.
Anti Corruption Investigation and Prosecution Mongolia Roger Smart Stephen Foster.
B CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL WHY WE NEED THIS CRUCIAL LEGISLATION IN SA.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Assignment Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
INTRODUCTION TO FORENSICS Let’s get started!. What is forensics? The application of science to law.
Behavioural Investigative Advice in the U.K. - Emerging Issues
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
MLA FOR ASSET TRACING & RECOVERY INVESTIGATIONS: INTELLIGENCE & EVIDENCE.
Surveillance techniques Essential surveillance techniques available to landlords, providing evidential footage for civil and criminal cases when tackling.
Communication & Technology UK POLICE. The TAZER Available for All authorised Firearms officers since September 2004 (technology around since 1960’s) This.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
The 5 th IAACA Seminar 22 – 24 June 2013 Jinan, Shandong Province, China Chapter VI of UNCAC: Technical Assistance and Information Exchange Kevin P. Zervos,
Criminal Investigation: An Overview
Myths of Crime Scene Forensics There are many popular Television programs that are based on Crime Scene Forensics. Don’t be fooled however, solving crimes.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
Instructor: Mary Louise Ryan Norwell, J.D.. Contact Information Professor Mary Lou Norwell Office Hours:
Chapter 22: The DNA Databases.  Developed to assist in solving violent crimes by creating a network for the exchange of information  Compare DNA profiles.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
* Fingerprint technicians typically work in a crime laboratory or within law enforcement agencies. * A fingerprint technician works to recreate the circumstances.
Computing, Ethics and The Law
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
DR BETHAN LOFTUS Invisible Policing: Inside the World of Covert Surveillance.
The presentation was made by student Daria Voitovich Group 31 Moscow Law College Teacher: Avdeeva G.Y.
Cell Phone Forensics Investigator - ICFECI
SEC 430 OUTLET The learning interface/sec430outletdotcom.
Unit 5b Databases January 2011 Miss Collins. Unit Objectives Analysing data and asking questions: using complex searches You will learn –What is a database?
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Law School Privacy and Security on the Internet: the Balance between National Interest, Individual Civil Liberties and the Global Society Ian King Law.
1 Forensic Science II: Interrogation and Forensic Reporting, Chapter 2 © 2012 Cengage Learning. All Rights Reserved Interviewing Techniques.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Using Social Media in the Job Search Online Branding Google yourself Is everything that comes up professional? Anything you found, an employer.
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
DRAFT POLICY GUIDELINES
Building a Narcotics Case
Rights and Responsibilities
Published Date: 24 February, 2016
Tele2 & Watson: What now? European Criminal Law Association IALS
INVESTIGATION PROCESS AND TECHNIQUE
Regulation of Investigatory Powers Act 2000
Eye Witness Testimony Line-up.
Additional Exam Questions from other sources and some I made up!
Forensic Science on Trial: How Worthy is DNA Profiling? Rebecca Rhodes 22 nd June
Presentation transcript:

1.2 Assess the use of investigative techniques in criminal investigations Forensic Surveillance techniques Profiling techniques Use of intelligence databases e.g. National DNA Database Interview Eye witnesses Other witnesses

1.2 Assess the use of investigative techniques in criminal investigations Use of Techniques Situation Crime Scene Laboratory Police station ‘Street’ Type of Crime Violent crime E-crime Property crime

UK Surveillance Surveillance Techniques The UK is reported to be the most intrusive society in history What evidence is there of state surveillance? Survey their local area, research media sources and collect evidence of different surveillance techniques. Guest speakers from local Police and Neighborhood Watch Learners to report on their findings to show what sort of evidence is collected and how it might be used in criminal investigations See the Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 (RIP / RIPA)  Act of the Parliament of UK, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications. Introduced to take account of technological change such as the growth of the Internet and strong encryption.

Regulation of Investigatory Powers Act 2000 (RIP / RIPA) Bill was introduced in the House of Commons on 9 February 2000 and completed its Parliamentary passage on 26 July. Parliament approved new additions in December 2003, April 2005, July 2006 and February 2010

Regulation of Investigatory Powers Act 2000 interception of communications acquisition of communications data (eg billing data) intrusive surveillance (on residential premises/in private vehicles) covert surveillance in the course of specific operations the use of covert human intelligence sources (agents, informants, undercover officers) access to encrypted data

Edward Snowden GCHQ leaks The leaked document details a range of programs designed to collect and store public postings from Facebook, Twitter, LinkedIn and Google+ and to make automated postings on several of the social networks. http://www.telegraph.co.uk/technology/internet/10974012/The-Government-is-trying-to-create-a-surveillance-state.html

Offender profiling using famous cases – Jack the Ripper, The Zodiac Killer Research these cases - British approach to profiling