Presentation is loading. Please wait.

Presentation is loading. Please wait.

Forensic Surveillance techniques Profiling techniques

Similar presentations


Presentation on theme: "Forensic Surveillance techniques Profiling techniques"— Presentation transcript:

1 1.2 Assess the use of investigative techniques in criminal investigations
Forensic Surveillance techniques Profiling techniques Use of intelligence databases e.g. National DNA Database Interview Eye witnesses Other witnesses

2 1.2 Assess the use of investigative techniques in criminal investigations
Use of Techniques Situation Crime Scene Laboratory Police station ‘Street’ Type of Crime Violent crime E-crime Property crime

3 UK Surveillance Surveillance Techniques
The UK is reported to be the most intrusive society in history What evidence is there of state surveillance? Survey their local area, research media sources and collect evidence of different surveillance techniques. Guest speakers from local Police and Neighborhood Watch Learners to report on their findings to show what sort of evidence is collected and how it might be used in criminal investigations See the Regulation of Investigatory Powers Act 2000

4 Regulation of Investigatory Powers Act 2000 (RIP / RIPA)
 Act of the Parliament of UK, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications. Introduced to take account of technological change such as the growth of the Internet and strong encryption.

5 Regulation of Investigatory Powers Act 2000 (RIP / RIPA)
Bill was introduced in the House of Commons on 9 February 2000 and completed its Parliamentary passage on 26 July. Parliament approved new additions in December 2003, April 2005, July 2006 and February 2010

6 Regulation of Investigatory Powers Act 2000
interception of communications acquisition of communications data (eg billing data) intrusive surveillance (on residential premises/in private vehicles) covert surveillance in the course of specific operations the use of covert human intelligence sources (agents, informants, undercover officers) access to encrypted data

7 Edward Snowden GCHQ leaks
The leaked document details a range of programs designed to collect and store public postings from Facebook, Twitter, LinkedIn and Google+ and to make automated postings on several of the social networks.

8 Offender profiling using famous cases –
Jack the Ripper, The Zodiac Killer Research these cases - British approach to profiling


Download ppt "Forensic Surveillance techniques Profiling techniques"

Similar presentations


Ads by Google