Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Follow-Up Investigation and Investigative Resources

Similar presentations


Presentation on theme: "The Follow-Up Investigation and Investigative Resources"— Presentation transcript:

1 The Follow-Up Investigation and Investigative Resources
Chapter 7

2 LEARNING OBJECTIVES Describe the use of solvability factors.
Explain the preparation of a case file. Discuss reinterviewing victims and witnesses. Describe the purpose and use of NamUs. Summarize NCIC files and capabilities. Explain LeadsOnLine. Identify behaviors in which investigators should not engage with informants. State the purposes of physical surveillance. Describe how a photo lineup should be conducted. Identify three potential indicators of a staged crime. © 2012 McGraw-Hill Higher Education. All rights reserved.

3 LEARNING OBJECTIVES continued
Describe the intelligence cycle. Summarize the use of facial recognition software by law- enforcement agencies. Identify the ways crime analysts link crimes. Explain the role of the scientific method in crime scene reconstruction. Describe the four factors on which criminal profiling focuses. Summarize geographical profiling. Provide four examples of remote sensing. Identify four ways investigators use the internet. © 2012 McGraw-Hill Higher Education. All rights reserved.

4 The Decision to Initiate a Follow-up Investigation
When an incident report is referred to the investigation division, it is screened to determine whether a follow-up investigation is warranted. This determination may be done by judgment or by applying mathematical weights to the presence or absence of certain factors in the incident report, such as: Is the suspect named? Can the suspect be identified? Is there a detailed description of the suspect? © 2012 McGraw-Hill Higher Education. All rights reserved.

5 The Follow-up Investigation Process
Prepare a case file Read the offense report and any supplemental reports Get criminal histories of named suspects Obtain credit histories if necessary Visit the crime scene and review visual documentation Review other incidental reports Attempt to link suspects to other crimes by M.O. analysis Examine physical evidence and lab results Contact victims and witnesses for interviews © 2012 McGraw-Hill Higher Education. All rights reserved.

6 The Follow-up Investigation Process, continued
Assess the credibility of witnesses Deliver death notices if necessary Arrange for a drawing/likeness of suspect Reevaluate the case periodically Disseminate information about the crime and suspects within the agency Coordinate with other jurisdictions Explore lines of inquiry and pursue leads © 2012 McGraw-Hill Higher Education. All rights reserved.

7 The Follow-up Investigation Process, continued
Identify and interview known associates of the suspect Obtain documentary evidence Conduct a custodial interrogation Talk to informants as needed Use specialized investigative procedures Prepare affidavits, apply for warrants Identify, locate, and apprehend suspect © 2012 McGraw-Hill Higher Education. All rights reserved.

8 The Follow-up Investigation Process, continued
Recover stolen property Determine if the suspect’s auto or other property is subject to seizure File supplemental reports Keep records organized Keep victim/victim’s family informed Meet with the prosecuting attorney © 2012 McGraw-Hill Higher Education. All rights reserved.

9 Reviewing the Incidental and Supplemental Reports
These reports may answer: How, when, and where the crime was committed, including a chronological description of the events The victim’s identity and if appropriate, his/her medical condition and statement The number of suspects, if any are in custody, whether they are in the jail or a hospital, and their descriptions or identities © 2012 McGraw-Hill Higher Education. All rights reserved.

10 Reviewing the Incidental and Supplemental Reports, cont.
Whether composite sketches of suspects at large have been prepared and distributed The words spoken by suspects during the commission of the crime, spontaneous statements made by them following their arrest, and any post-Miranda statements made by them to the arresting officer The identities and statements of witnesses and any conditions noted, such any degree of drinking or appearance of having been using drugs The nature and value of the property stolen The types of physical evidence seized Description of any vehicles involved or a copy of an impound report for vehicles seized. © 2012 McGraw-Hill Higher Education. All rights reserved.

11 Jail Booking Report Created when a subject is in-processed at a jail
Often computer generated May have an incident report integrated into it May have a color photo, fingerprints, and details about suspect’s health and medications and mental state May have a description of the suspect, including physical details, employment and home addresses, aliases, etc. May include an inventory of personal effects © 2012 McGraw-Hill Higher Education. All rights reserved.

12 Field Interview/Information Reports
A field interview/ information card (FIR) is filled out when patrolling officers identify persons or vehicles that are suspicious to them but are not connected to any particular offense. (Source: Courtesy Springfield, Missouri, Police Department) © 2012 McGraw-Hill Higher Education. All rights reserved.

13 Using Databases International National
Regional Information Sharing Systems (RISS) State and Local Systems Nonprofit and Private Sources © 2012 McGraw-Hill Higher Education. All rights reserved.

14 Surveillance Purpose of surveillance
Establishing the existence of a crime Obtaining probable cause for a search warrant application Apprehending suspects as they commit a crime Identifying the associates of criminals and the places they frequent Determining the reliability of informants Providing protection for undercover officers and informants Locating people, places, and things Gathering intelligence about targets and premises prior to serving a warrant Gathering intelligence on the activities of illegal groups and gangs Preventing a crime by signaling police awareness of specific subjects © 2012 McGraw-Hill Higher Education. All rights reserved.

15 Procedures For Photo And Live Lineups
Include only one suspect in each identification procedure. Select “fillers” (nonsuspects) who generally match the witness’ description of the perpetrator. If multiple photos of the suspect are available, use the one made closest to the time when the crime was committed. Lineups should include a minimum of five fillers. If there are multiple witnesses, consider placing the suspect in different positions each time a lineup shows to a witness. © 2012 McGraw-Hill Higher Education. All rights reserved.

16 Procedures For Lineups continued
If a new suspect is developed, avoid using fillers which have been used in a previous lineup for the same witness Make sure that no writing or information about the suspect's previous criminal history can be seen by the witness Before the witness views the lineup, check again to make sure the suspect doesn’t unduly standout Record the presentation order or the lineup and handle the original photographs as evidence Write a supplemental report which chronologically describes what happened © 2012 McGraw-Hill Higher Education. All rights reserved.

17 Staged Crime Scenes Purpose: to misdirect investigators
Investigation requires: What act is the staging intended to conceal? What was the motive? © 2012 McGraw-Hill Higher Education. All rights reserved.

18 Fusion Centers Turning information and intelligence into actionable knowledge The fundamental process by which homeland security and crime-related information and intelligence are shared About 70 fusion centers are operational © 2012 McGraw-Hill Higher Education. All rights reserved.

19 Intelligence Units Four types: Indicative intelligence
Tactical intelligence Strategic intelligence Evidential intelligence © 2012 McGraw-Hill Higher Education. All rights reserved.

20 The Intelligence/Analytical Cycle
The intelligence/analytical cycle is a five-step process which is continuous: Planning and direction Collection Processing Analysis and Production Dissemination Reevaluation © 2012 McGraw-Hill Higher Education. All rights reserved.

21 Analytical and Investigative Tools
Crime Analysis: the process of using systematic analytical methods to acquire timely and pertinent information on crime patterns and trend correlations. © 2012 McGraw-Hill Higher Education. All rights reserved.

22 Analytical and Investigative Tools
There are three general types of crime analysis by which analysts link crimes: Tactical Strategic Administrative © 2012 McGraw-Hill Higher Education. All rights reserved.

23 Crime Analysis Commonly used methods to link crimes: Trends Patterns
Series Sprees Hot Spots Crimogens © 2012 McGraw-Hill Higher Education. All rights reserved.

24 Crime Scene Differences
© 2012 McGraw-Hill Higher Education. All rights reserved.

25 Time-Event Chart © 2012 McGraw-Hill Higher Education. All rights reserved.

26 Link Analysis © 2012 McGraw-Hill Higher Education. All rights reserved.

27 The Internet Appealing to the public for information about specific crimes, often through “crime-stopper” programs. Requesting information about missing children and adults. Posting federal, state, and local most-wanted lists. Soliciting information about individuals who are wanted as fugitives. Alerting the public about jail and prison escapees and requesting information if they are sighted. Requesting information about the identities of unknown subjects (“unsubs”). Showing photographs of recovered stolen property so that the owners can identify and claim it. Providing crime-mapping capabilities so that investigators can approach their work with better information and citizens can be informed. © 2012 McGraw-Hill Higher Education. All rights reserved.


Download ppt "The Follow-Up Investigation and Investigative Resources"

Similar presentations


Ads by Google