Download presentation
Presentation is loading. Please wait.
Published byWesley McDaniel Modified over 9 years ago
1
Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues
2
Please Remember!
3
Midterm Essay Exam Respond to each of the following four questions with detailed insightful responses based primarily on the course text and supported by other relevant, academically reliable sources if appropriate. 1. What are methods of inquiry and how are they used in criminal investigation? 2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest? 3. What is the scientific method and how is it applied to criminal investigation by criminal investigators? 4. Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.
4
Midterm Essay Exam In addition to fulfilling the specifics of the assignment, a successful paper must also meet the following criteria: Each response should be at least one paragraph (6-8 sentences) in length. Each response should include practical examples that demonstrate a practical understanding of the questions posed. Directions for Submitting Your Project Compose your paper in Microsoft Word and save it in the following format: Last name First name Assignment. (Example: SmithJohn Unit 5 Midterm). Submit your assignment by selecting the Unit 5: Assignment Dropbox by the end of Unit 5.
5
Where do I get the information that I need to do well on the Mid-term? Chapter 13 in your text has all of the information that you will need to do well on the Mid-term. Just add explanation and examples.
6
(Osterburg & Ward, 2007, pp. 315-339) 1.What are methods of inquiry and how are they used in criminal investigation? 2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest? 3. What is the scientific method and how is it applied to criminal investigation by criminal investigators? 4. Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.
7
How to respond to questions well: Define Explain Provide Examples
8
Chapter 9 Surveillance: A Fact-Finding Tool —Legality and Practice Osterburg & Ward, 2007
9
“Justice may be blind, but she has very sophisticated listening devices.” -Edgar Argo
10
Fixed Surveillance surveillant remains in fixed location Moving Surveillance subject moves about and surveillance follows Technical Surveillance involves electronic eavesdropping device and/or optical devices Kinds of Surveillance Osterburg & Ward, 2007
11
Wiretaps Bugs, pen registers, beepers Monitoring conversations Monitoring telephone usage Monitoring movements of vehicles and items of commerce Visual enhancement devices Technical Surveillance Techniques Osterburg & Ward, 2007
12
Safety and Security Measures During a mobile surveillance, do not take unnecessary risks to keep up with a subject speeding, running red lights, or otherwise driving recklessly. While stationary, keep the vehicle windows closed and the doors locked. Regularly scan rear view mirrors to observe anyone or any activity to the rear. Alert other team members to any suspicious or unusual persons or activity in the area. In high-crime areas and in hours of darkness, remain in a heightened state of alert. http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htmhttp://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/19/090)
13
Safety and Security Measures Position vehicle to enable a rapid response to assist others if needed. Ensure vehicle has emergency equipment lights, siren, and first-aid kit. Keep identification, weapon, and ballistic vest assessable. Know and use challenge, password, and other appropriate safety measures to prevent friendly fire situation from developing. When leaving a vehicle to go on foot surveillance, fully secure the vehicle and equipment inside. http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htmhttp://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/19/090)
14
Chapter 10 Eyewitness Identification: Guidelines and Procedures Osterburg & Ward, 2007
15
Use random number of photographs (6 or more) Do not give clues to witnesses Allow only one witness at a time to view Do not allow witnesses to communicate with one another Conduct lineup after positive identification is made Make record of all photos shown to witnesses Using the Rogues Gallery Osterburg & Ward, 2007
16
Photo Array
21
Witness must have adequate opportunity to observe the crime Witness must have the capacity to observe the suspect commit the crime Witness must be sufficiently attentive to the actions of the suspect Identification must be completely the result of the witness’s own memory Eyewitness Identifications: Court Requirements Osterburg & Ward, 2007
22
Composite Drawings In 1993 a bicyclist in Riverside Park in Manhattan discovered a suitcase containing the body of a young female. Two days prior to that, a witness had observed a local homeless man and another male dragging a shopping cart containing a suitcase towards the park. She found it rather strange and got a good look at the male that accompanied the homeless male. The witness was taken to Police Headquarters where a composite drawing of this male was made with one of NYPD's more experienced artists. Several days later the male was arrested and charged for the homicide. He was subsequently convicted. http://www.homicidesquad.com/identification_tools.htm David Berkowitz (Son Of Sam, 1976). The attacks occurred during the evening to early morning hours where darkness hinders identifications. The identification of a perpetrator can be tough, a composite sketch maybe even tougher for both witnesses and artist.
23
Computer-Generated Composites http://www.identikit.net
24
Key Terms Loose Surveillance: A cautious surveillance; also termed discreet surveillance because the loss of the subject is preferred over possible exposure. Obtaining information about a subject through tailing his or her associates when there is reason to believe the subject suspects there is a surveillance. A burglary gang “casing” banks to select their next job. Shadow: To follow secretly; place a person under surveillance Osterburg & Ward, 2007
25
Key Terms Pen Register: A device that records all numbers dialed on a telephone; it is generally installed at the telephones company’s central office Neither overhears conversations nor indicates whether a call was completed
26
Key Terms Identi-Kit- A powerful investigative tool that creates accurate photo realistic facial composite sketches based on verbal descriptions provided by a witness or victim. Make customized wanted posters, transmit the composite sketch via the web, email or fax, or export the composite sketch to other imaging programs. Identi-Kit ® facial composite software is available on CD or the internet as a hosted application. http://www.identikit.net/ Composite Images- An image of a suspect produced by an artist or kit using witness descriptions Osterburg & Ward, 2007
27
Computer-Generated Composites
28
Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.