Criminal Investigation Part 4 Records as an Investigative Aid.

Slides:



Advertisements
Similar presentations
History of Vital Records Presented by Deborah Little-Bowser March 5, 2008.
Advertisements

 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Shared-Residency Verification Procedures
Basic Banking Services - Activity 1
The Cabinet Posts State treaties executive agreements ambassadors/embassies.
Your Income Tax March 17, 2010 Sarah Gustafson VITA Volunteer
18 October Computers in Government. Sign up for Impacts Meeting Work with your partner to find a time to meet with me (45 minutes) Send me with.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Protecting your money: Identity Theft
Vital Records and Documents Everyone Should Have in Order A Public Service Presentation provided by the Society of Certified Senior Advisors.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
What Are Taxes Taxes are required contributions to national and state revenue, levied by the government on personal income and business profits Added to.
Card A. Risk 12/ Lance L. Lancer12/12 Credit: History, Types, Dangers Chapter 10.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
PAYCHECKS Personal Finance PAYING EMPLOYEES There are 3 methods employers may use to pay employees: Paycheck – payment given with a paper check.
Credit: History, Types, Dangers
Taxes. What are Taxes? Taxes are payments people are required to pay to local, state and national governments. Taxes are used to pay for services provided.
Unit 03: Financial Literacy Vocabulary. Available Balance The amount available in an account for a person, business, or organization to spend. How much.
1 Book Cover Here Chapter 20 BURGLARY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Family Financial Management Annie’s Project January 23, 2007 Coweta Oklahoma.
Recordkeeping Presented by (Name, CPA) Member, The Ohio Society of CPAs 9/10/
CREDIT – Part 2 Business Issues. Credit Cards Paid over a variable amount of time Finance charge (interest) is called annual percentage rate (APR) expressed.
Financial Planning. Income Minimum Wage - $ 8.10 hourly Associates Degree – $ 40,000 Bachelor Degree – $ 50,000 Masters – $ 45,000 - $ 85,000 Doctorate.
Data and You. Computer Crime Less Cash money Credit cards types credit, debit, cash cards, and checks ATMs.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Consumer Reports & Scores Quiz Game Test your knowledge A Consumer Action Training Game © 2010.
CHAPTER 5 In this world nothing can be said to be certain, except death and taxes. Benjamin Franklin.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
 College or University to attend:  The Ohio State  * Tuition  19,926 (1 year)  79,704(4 years)  * Major  Medical terminology or one of the life.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
29 September Computers in Government. Current Event Anne Brannon.
Create a system for maintaining personal financial records. Learning Objective # 2.
4.01 FORMS OF COMPENSATION / PAY. MONETARY COMPENSATION Wage - The amount of money paid for a specified quantity of labor. Salary - A set amount of money.
What’s Next? Checking and Savings Accounts. Opening a Checking Account Name some items you should bring with you to open a checking account.   Identification.
Ethical Issues1 Ethics. Ethical Issues2 Modern Problems Change in cost of duplication of information –before xerox & computer disks vs. after Change in.
 The commuter lounge is located in the tunnel level of the Richard E. Winter '42 Student Center.  It is open to any student looking for a place to relax.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
To Accompany Consumer Finance Unit 3 Standards FACS-CF-5 a-d By Kindra Watters and Kayla Calhoun Adapted in part from Utah State Office of Education materials.
You. are at risk for the fastest growing crimes crime.
“The entire essence of America is the hope to first make money—then make money with money—then make lots of money with lots of money.” Paul Erdman.
Teens lesson fourteen consumer privacy presentation slides 03/08.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Credit Terms and Conditions What happens when you overspend and cannot pay…
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
MANUAL – CHAPTER 1 THE NJ DRIVER – LICENSE SYSTEM.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Information Resources Criminal Investigation CJUS 201 Part 12.
“Gotcha!” Investigative Research on the Web Suzanne R. Graham University of Georgia School of Law Library.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Chapter 16 Credit in America. What is Credit?  Money borrowed to buy something now, with the agreement to pay for it later  Over 80% of all purchases.
Public Records Databases
College lesson ten consumer privacy presentation slides 04/09.
Objectives: Financial Paperwork Loan Options Home Options Home Ownership Mortgage Application Process.
privacy and information
Teresa Brown Open Records Supervisor Plano Police Department
Documenting Life in the UK
Understanding Credit Reports
CHAPTER 1 The NJ Driver License System
Understanding Credit Reports
DOCUMENTS NEEDED TO COMPLETE CARELINK APPLICATIONS
Computers and Data Collection
Privacy and Information
Understanding Credit Reports
My Budget Project Personal Finance Period:_____
CHAPTER 1 The NJ Driver License System
Teens lesson fourteen consumer privacy presentation slides 03/08.
Understanding Credit Reports
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Criminal Investigation Part 4 Records as an Investigative Aid

Records: From Birth Until Death 1.Impossible in modern society - trail of past activity - a paper trail 2.Starts at birth -doctor visits -hospital visit -the birth - medications - mother / father

Elementary School 1.Includes: -name / date of birth / address / phone number / parent names 2.Records follow: - school to school - past locations -where information sent -locate student / parent

High School 1.Photograph in year-book 2.Activities participated in 3.Social Security Number 4.Driver’s license / vehicle identification 5.Part-time employment

Continues into Adult Life 1.Business certificates -classified / professional 2.Credit card purchases -date / time / location -stores / businesses / items purchased 3.Service accounts -lawyer / stockbroker / accountant / stores 4.Military -photo / fingerprints / physicals / training

Every stage of life 1.Government / business records - note a persons life 2.Life can be reconstructed - diligent / informed effort 3.Find old friend - left school 10 th grade 4.Find a criminal suspect

Sources of Information 1.High school 2.College 3.Military 4.Professional 5.Business checks 6.Internet

Materials on Record 1.Ownership of private property -auto -house - gun 2.Required licenses -drivers / marriage - professional - dog - hunting / fishing

Materials, cont. 3.Business transactions -purchase or sale of property -checking / saving accounts 4.Utility services -gas / electric / telephone / cable 5.Transportation - airlines / car rentals / travel companies

Why are records sought? 1.Link person to object 2.Link one person to another 3.Link person to a place 4.Link person to a time period 5.Discover something about a person’s life 6.Know social history of a person

Potential of records 1.Follow-up / additional leads 2.Identify suspect / person sought 3.Trace criminals / victims / witnesses 4.Recover stolen property 5.Facts on ownership

Types / Sources of Recorded Information 1.Law Enforcement Agencies - greatest amount of identification information a. Fingerprints / arrest information / method of operation / mug shot b. Wanted fugitives / property report / pawn brokers / habitual criminals / aliases / FI cards

Sources, cont. 2.Penal records -information regarding an inmate / probationer / parolee -names of visitors / cell mates / other friends 3.Federal government -ATF / US Customs / IRS / INS / DEA/ Coast Guard / FCC / FAA / HUD / Medicare / TSA / etc.

Sources, cont. 4.State government - property tax / licenses / certificates - welfare / unemployment / medical records 5.Local government - licenses / utilities / taxes