Presentation is loading. Please wait.

Presentation is loading. Please wait.

Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues.

Similar presentations


Presentation on theme: "Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues."— Presentation transcript:

1 Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues

2 Please Remember!

3 Midterm Essay Exam Respond to each of the following four questions with detailed insightful responses based primarily on the course text and supported by other relevant, academically reliable sources if appropriate. 1. What are methods of inquiry and how are they used in criminal investigation? 2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest? 3. What is the scientific method and how is it applied to criminal investigation by criminal investigators? 4. Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.

4 Midterm Essay Exam In addition to fulfilling the specifics of the assignment, a successful paper must also meet the following criteria:  Each response should be at least one paragraph (6-8 sentences) in length.  Each response should include practical examples that demonstrate a practical understanding of the questions posed. Directions for Submitting Your Project  Compose your paper in Microsoft Word and save it in the following format: Last name First name Assignment. (Example: SmithJohn Unit 5 Midterm). Submit your assignment by selecting the Unit 5: Assignment Dropbox by the end of Unit 5.

5 Where do I get the information that I need to do well on the Mid-term? Chapter 13 in your text has all of the information that you will need to do well on the Mid-term. Just add explanation and examples.

6 (Osterburg & Ward, 2007, pp. 315-339) 1.What are methods of inquiry and how are they used in criminal investigation? 2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest? 3. What is the scientific method and how is it applied to criminal investigation by criminal investigators? 4. Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.

7 How to respond to questions well:  Define  Explain  Provide Examples

8 Chapter 9 Surveillance: A Fact-Finding Tool —Legality and Practice Osterburg & Ward, 2007

9 “Justice may be blind, but she has very sophisticated listening devices.” -Edgar Argo

10  Fixed Surveillance surveillant remains in fixed location  Moving Surveillance subject moves about and surveillance follows  Technical Surveillance involves electronic eavesdropping device and/or optical devices Kinds of Surveillance Osterburg & Ward, 2007

11  Wiretaps  Bugs, pen registers, beepers Monitoring conversations Monitoring telephone usage Monitoring movements of vehicles and items of commerce  Visual enhancement devices Technical Surveillance Techniques Osterburg & Ward, 2007

12 Safety and Security Measures  During a mobile surveillance, do not take unnecessary risks to keep up with a subject speeding, running red lights, or otherwise driving recklessly.  While stationary, keep the vehicle windows closed and the doors locked.  Regularly scan rear view mirrors to observe anyone or any activity to the rear.  Alert other team members to any suspicious or unusual persons or activity in the area.  In high-crime areas and in hours of darkness, remain in a heightened state of alert. http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htmhttp://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/19/090) 

13 Safety and Security Measures  Position vehicle to enable a rapid response to assist others if needed.  Ensure vehicle has emergency equipment lights, siren, and first-aid kit.  Keep identification, weapon, and ballistic vest assessable.  Know and use challenge, password, and other appropriate safety measures to prevent friendly fire situation from developing.  When leaving a vehicle to go on foot surveillance, fully secure the vehicle and equipment inside. http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htmhttp://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/19/090)

14 Chapter 10 Eyewitness Identification: Guidelines and Procedures Osterburg & Ward, 2007

15  Use random number of photographs (6 or more)  Do not give clues to witnesses  Allow only one witness at a time to view  Do not allow witnesses to communicate with one another  Conduct lineup after positive identification is made  Make record of all photos shown to witnesses Using the Rogues Gallery Osterburg & Ward, 2007

16 Photo Array

17

18

19

20

21  Witness must have adequate opportunity to observe the crime  Witness must have the capacity to observe the suspect commit the crime  Witness must be sufficiently attentive to the actions of the suspect  Identification must be completely the result of the witness’s own memory Eyewitness Identifications: Court Requirements Osterburg & Ward, 2007

22 Composite Drawings In 1993 a bicyclist in Riverside Park in Manhattan discovered a suitcase containing the body of a young female. Two days prior to that, a witness had observed a local homeless man and another male dragging a shopping cart containing a suitcase towards the park. She found it rather strange and got a good look at the male that accompanied the homeless male. The witness was taken to Police Headquarters where a composite drawing of this male was made with one of NYPD's more experienced artists. Several days later the male was arrested and charged for the homicide. He was subsequently convicted. http://www.homicidesquad.com/identification_tools.htm David Berkowitz (Son Of Sam, 1976). The attacks occurred during the evening to early morning hours where darkness hinders identifications. The identification of a perpetrator can be tough, a composite sketch maybe even tougher for both witnesses and artist.

23 Computer-Generated Composites http://www.identikit.net

24 Key Terms Loose Surveillance:  A cautious surveillance; also termed discreet surveillance because the loss of the subject is preferred over possible exposure.  Obtaining information about a subject through tailing his or her associates when there is reason to believe the subject suspects there is a surveillance.  A burglary gang “casing” banks to select their next job. Shadow:  To follow secretly; place a person under surveillance Osterburg & Ward, 2007

25 Key Terms Pen Register:  A device that records all numbers dialed on a telephone; it is generally installed at the telephones company’s central office  Neither overhears conversations nor indicates whether a call was completed

26 Key Terms  Identi-Kit- A powerful investigative tool that creates accurate photo realistic facial composite sketches based on verbal descriptions provided by a witness or victim. Make customized wanted posters, transmit the composite sketch via the web, email or fax, or export the composite sketch to other imaging programs. Identi-Kit ® facial composite software is available on CD or the internet as a hosted application. http://www.identikit.net/  Composite Images- An image of a suspect produced by an artist or kit using witness descriptions Osterburg & Ward, 2007

27 Computer-Generated Composites

28 Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues


Download ppt "Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues."

Similar presentations


Ads by Google