Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright.

Slides:



Advertisements
Similar presentations
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 2:
Advertisements

Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Phases of a Criminal Drug Case From Start to Finish.
ISRCL- Young Lawyers Anthony Gett Barrister & Senior Legal Officer Commonwealth Director of Public Prosecutions (Australia)
Police Operations Patrol Function Categories  Crime prevention - pro-active deterrence  Law Enforcement - reactive deterrence  Order Maintenance -
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Missing and Abducted Persons Chapter 12:
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 5: Interviews and Interrogations.
Criminal Justice 2011 Chapter 18: Preparation for Court Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 6 INTERVIEWS Obtaining Information from Witnesses (Acquiring information.
Criminal Justice 2011 Chapter 10: ROBBERY
INTRODUCTION TO INVESTIGATION Mr. Cappello Sir Robert Borden High School Specialist High Skills Major Program.
Criminal Intelligence and Surveillance Operations
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 15: Professionalism and Preparation for Court.
Criminal Justice 2011 Chapter 2: The Crime Scene: Field Notes, Documenting, and Reporting Criminal Investigation The Art and the Science by Michael D.
The American Justice System Essential Questions: What are the steps of the criminal justice system? What do police do? What are the pre-trial steps of.
Crimes Against Children: Child Abuse Chapter 13: and Child Fatalities
Criminal Justice 2011 Chapter 6: Interviews and Interrogations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Class Name, Instructor Name Date, Semester Criminal Justice Today Chapter 1 What is Criminal Justice?
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Introduction to Investigation
Written by Elizabeth Salyers. Lawyer Police/Detective Criminal Investigator/Special Agents.
Aliecia Palomo Estep-7 10/15/13. Requirements For This Career This type of career requires at least a high school diploma, college degree or higher.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
The Investigative Process The responsibility of all who work within the field of criminal justice, both public and private investigators.
Criminal Investigations. Wayne W. Bennett and Karen M. Hess Wadsworth Publisher CSI.
Criminal Justice Today Twelfth Edition CHAPTER Criminal Justice Today: An Introductory Text for the 21st Century, 12e Frank Schmalleger Copyright © 2014.
Chapter 1 Introduction to Forensic Science and the Law.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 6 INTERVIEWS Obtaining Information from Witnesses Criminal Investigation:
Forensic Science: Fundamentals & Investigations, Chapter 2 1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Forensic Science: Fundamentals & Investigations, Chapter 2 1 What Makes a Good Observer? 1.Describe how I moved the first 3 objects in detail. 2.How many.
The Warrant Process Chapter Three All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
How do we use DNA in law enforcement and forensics? How do we use DNA in law enforcement and forensics? Personal Genetics Education Project Harvard Medical.
1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: o Summarize Locard’s exchange principle o.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
Criminal Justice 2011 Class Name, Instructor Name Date, Semester Chapter 2: Investigation Basics.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Thinking Critically Questions Chapter Four. Self-Incrimination Should a person be allowed to take the “fifth?” Does a defendant have the right not to.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 8: ROBBERY.
Forensic Science: Fundamentals & Investigations, Chapter 2 1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you.
A dream and a possibility. A dream career for me would be to become a pediatrician. I would really like to become a pediatrician because I love helping.
1 Introduction to Forensic Science and the Law Fourth amendment protects citizens against “unreasonable search and seizures” Police and crime scene investigators.
All rights Reserved Cengage/NGL/South-Western © 2016.
Seminar 2 TOPICS Organization of the Crime Scene Crime Scene Problems Modus Operandi Rules/Approaches to Criminal Investigations Documentation Search Methods.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
Forensic Science: Fundamentals & Investigations, 2e Chapter 1 1 All rights Reserved Cengage/NGL/South-Western © 2016.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 3 Arrests Criminal Justice Procedure 8 th Edition.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
All rights Reserved Cengage/NGL/South-Western © 2016.
Criminal Evidence Chapter 3
The Criminal Justice System
The University of Adelaide, School of Computer Science
College of Adult & Professional Studies Criminal Justice Program
All rights Reserved Cengage/NGL/South-Western © 2016.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
7 Criminal Intelligence and Surveillance Operations.
Investigating Shipping Pollution Violations
All rights Reserved Cengage/NGL/South-Western © 2016.
Criminal Justice and the Law
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
Criminal Justice and the Law
Private Investigations vs. Public Investigations
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Chapter 12: Organized Crime Control in Theory: Theoretical Overview, Concepts, Objectives, & Strategies.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Public Safety What is it?.
Presentation transcript:

Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

8.1 Describe the types of people used as informants. 8.2 Identify various areas of concern in the use of informants. 8.3 Understand the various motivations of informants. 8.4 Document and process an informant properly. 8.5 Maintain control of an informant during an investigation. 8.6 Protect an informant’s identity. 8.7 Understand the problems most commonly associated with the use of informants. 8.8 Understand the usefulness of undercover investigations. CHAPTER SUMMARY

Describe the types of people used as informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.1

Police officers Types of Informants 8.1 Informants

Identify various areas of concern in the use of informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.2

Informant Issues 8.2 First, informants are often difficult to control.

Informant Issues 8.2 Second, an informant can become a source of public embarrassment for the law enforcement agency.

Informant Issues 8.2 A third area of concern is the informant’s questionable credibility in court.

Understand the various motivations of informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.3

Informant Motivation 8.3 The fearful informant.

Informant Motivation 8.3 The financially motivated informant. “Mercenary” informants give information in exchange for a fee. The financially motivated informant. “Mercenary” informants give information in exchange for a fee.

Informant Motivation 8.3 The revengeful informant.

Informant Motivation 8.3 The egotistical informant.

Informant Motivation 8.3 The perversely motivated informant.

Document and process an informant properly. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.4

Using Informants Report on “inside” information Report observations Introduce undercover Officers

Step Four: Search warrant Step Four: Search warrant Step Three: Controlled buy Step Three: Controlled buy Step Two: Verify facts Step Two: Verify facts Step One: Interview Step One: Interview Informant Reliability Flow Chart 8.4

Maintain control of an informant during an investigation. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.5

Managing Informants 8.5

Protect an informant’s identity. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.6

Type of Informants 8.6 AnonymousConfidential vs.

Informant Motivation Review… Why do they do it? 8.6 Trying to stay out of prison Getting paid (mercenary) Good citizen Revenge, ego, or other personal motives

Understand the problems most commonly associated with the use of informants. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.7

Informant Problems 8.7 Investigators becoming too friendly with informants.

Informant Problems 8.7 Informants of the opposite sex

Informant Problems 8.7 Crimes committed by the informant.

Informant Problems 8.7 Officers who “own” their informants

Why Use informants 8.7 Prosecution Unfettered Crime vs.

Understand the usefulness of undercover investigations. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 8.8

Undercover Operations 8.8 Defined as assuming a fictitious identity and associating with criminals for the purpose of collecting information or evidence on criminal activity. Defined as assuming a fictitious identity and associating with criminals for the purpose of collecting information or evidence on criminal activity.

Undercover Operations 8.8 Undercover work and surveillance are viable options for police investigators because they provide considerable information Undercover work and surveillance are viable options for police investigators because they provide considerable information

Undercover Operations 8.8 Typically, undercover work has been associated with drug enforcement, but it is a tool that can be useful in the investigation of a number of criminal activities. Typically, undercover work has been associated with drug enforcement, but it is a tool that can be useful in the investigation of a number of criminal activities.

The Process…. 8.8 UC Photo placeholder

The Process 8.8 Step 4: Introduction and infiltration Step 4: Introduction and infiltration Step 3: Develop a cover story Step 3: Develop a cover story Step 2: Data Collection Step 2: Data Collection Step 1: Select the Target Step 1: Select the Target

8.1 Describe the types of people used as informants. 8.2 Identify various areas of concern in the use of informants. 8.3 Understand the various motivations of informants. 8.4 Document and process an informant properly. 8.5 Maintain control of an informant during an investigation. 8.6 Protect an informant’s identity. 8.7 Understand the problems most commonly associated with the use of informants. 8.8 Understand the usefulness of undercover investigations. CHAPTER SUMMARY