Download presentation
Presentation is loading. Please wait.
Published byMarjory Hancock Modified over 9 years ago
1
Criminal Investigation Unit 4 Lecture Surveillance and Constitutional Issues Instructor: Joe Yocum
2
Attention - Please Remember! No Seminar Next Week! “Midterm Week” I Will Hold Regular Office Hours
3
Midterm Essay Exam (Due by the end of Unit 5 – 3/8/2011) Respond to each of the following four questions with detailed insightful responses based primarily on the course text and supported by other relevant, academically reliable sources if appropriate:
4
Midterm Essay Exam (Due by the end of Unit 5 – 3/8/2011) What are methods of inquiry and how are they used in criminal investigation? What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest? What is the scientific method and how is it applied to criminal investigation by criminal investigators? Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.
5
Midterm Essay Exam (Due by the end of Unit 5 – 3/8/2011) In addition to fulfilling the specifics of the assignment, a successful paper must also meet the following criteria: Each response should be at least one paragraph (6-8 sentences) in length. Each response should include practical examples that demonstrate a practical understanding of the questions posed..
6
Midterm Essay Exam (Due by the end of Unit 5 – 3/8/2010) Directions for Submitting Your Project: Compose your paper in Microsoft Word and save it in the following format: Last name First name Assignment. (Example: SmithJohn Unit 5 Midterm). Submit your assignment by selecting the Unit 5 Midterm Essay Exam in the Dropbox window. Be sure to submit your essay by March 8, 2011.
7
Chapter 9 Surveillance: A Fact-Finding Tool —Legality and Practice Osterburg & Ward, 2007
8
Fixed Surveillance Fixed Surveillance surveillant remains in fixed locationsurveillant remains in fixed location Moving Surveillance Moving Surveillance subject moves about and surveillance followssubject moves about and surveillance follows Technical Surveillance Technical Surveillance involves electronic eavesdropping device and/or optical devicesinvolves electronic eavesdropping device and/or optical devices Kinds of Surveillance Osterburg & Ward, 2007
9
Wiretaps Wiretaps Bugs, pen registers, beepers Bugs, pen registers, beepers Monitoring conversationsMonitoring conversations Monitoring telephone usageMonitoring telephone usage Monitoring movements of vehicles and items of commerceMonitoring movements of vehicles and items of commerce Visual enhancement devices Visual enhancement devices Technical Surveillance Techniques Osterburg & Ward, 2007
10
Safety and Security Measures Position vehicle to enable a rapid response to assist others if needed. Position vehicle to enable a rapid response to assist others if needed. Ensure vehicle has emergency equipment lights, siren, and first-aid kit. Ensure vehicle has emergency equipment lights, siren, and first-aid kit. Keep identification, weapon, and ballistic vest accessible. Keep identification, weapon, and ballistic vest accessible. Know and use challenge, password, and other appropriate safety measures to prevent friendly fire situation from developing. Know and use challenge, password, and other appropriate safety measures to prevent friendly fire situation from developing. When leaving a vehicle to go on foot surveillance, fully secure the vehicle and equipment inside. When leaving a vehicle to go on foot surveillance, fully secure the vehicle and equipment inside. http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htmhttp://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/23/10) http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm
11
Chapter 10 Eyewitness Identification: Guidelines and Procedures Osterburg & Ward, 2007
12
Use random number of photographs (6 or more) Use random number of photographs (6 or more) Do not give clues to witnesses Do not give clues to witnesses Allow only one witness at a time to view Allow only one witness at a time to view Do not allow witnesses to communicate with one another Do not allow witnesses to communicate with one another Conduct lineup after positive identification is made Conduct lineup after positive identification is made Make record of all photos shown to witnesses Make record of all photos shown to witnesses Using the Rogues Gallery Osterburg & Ward, 2007
13
Photo Array
15
Witness must have adequate opportunity to observe the crime Witness must have adequate opportunity to observe the crime Witness must have the capacity to observe the suspect commit the crime Witness must have the capacity to observe the suspect commit the crime Witness must be sufficiently attentive to the actions of the suspect Witness must be sufficiently attentive to the actions of the suspect Identification must be completely the result of the witness’s own memory Identification must be completely the result of the witness’s own memory Eyewitness Identifications: Court Requirements Osterburg & Ward, 2007
16
Composite Drawings In 1993 a bicyclist in Riverside Park in Manhattan discovered a suitcase containing the body of a young female. Two days prior to that, a witness had observed a local homeless man and another male dragging a shopping cart containing a suitcase towards the park. She found it rather strange and got a good look at the male that accompanied the homeless male. The witness was taken to Police Headquarters where a composite drawing of this male was made with one of NYPD's more experienced artists. Several days later the male was arrested and charged for the homicide. He was subsequently convicted. http://www.homicidesquad.com/identification_tools.htm
17
Composite Drawings http://www.homicidesquad.com/identification_tools.htm David Berkowitz (Son Of Sam, 1976). The attacks occurred during the evening to early morning hours where darkness hinders identifications. The identification of a perpetrator can be tough, a composite sketch maybe even tougher for both witnesses and artist.
18
Computer-Generated Composites http://www.identikit.net
19
Key Terms Loose Surveillance: A cautious surveillance; also termed discreet surveillance because the loss of the subject is preferred over possible exposure. A cautious surveillance; also termed discreet surveillance because the loss of the subject is preferred over possible exposure. Obtaining information about a subject through tailing his or her associates when there is reason to believe the subject suspects there is a surveillance. Obtaining information about a subject through tailing his or her associates when there is reason to believe the subject suspects there is a surveillance. A burglary gang “casing” banks to select their next job. A burglary gang “casing” banks to select their next job.Shadow: To follow secretly; place a person under surveillance To follow secretly; place a person under surveillance Osterburg & Ward, 2007
20
Key Terms Pen Register: A device that records all numbers dialed on a telephone; it is generally installed at the telephones company’s central office A device that records all numbers dialed on a telephone; it is generally installed at the telephones company’s central office Neither overhears conversations nor indicates whether a call was completed Neither overhears conversations nor indicates whether a call was completed
21
Key Terms Identi-Kit- A powerful investigative tool that creates accurate photo realistic facial composite sketches based on verbal descriptions provided by a witness or victim. Make customized wanted posters, transmit the composite sketch via the web, email or fax, or export the composite sketch to other imaging programs. Identi-Kit ® facial composite software is available on CD or the internet as a hosted application. http://www.identikit.net/ Identi-Kit- A powerful investigative tool that creates accurate photo realistic facial composite sketches based on verbal descriptions provided by a witness or victim. Make customized wanted posters, transmit the composite sketch via the web, email or fax, or export the composite sketch to other imaging programs. Identi-Kit ® facial composite software is available on CD or the internet as a hosted application. http://www.identikit.net/ Composite Images- An image of a suspect produced by an artist or kit using witness descriptions Composite Images- An image of a suspect produced by an artist or kit using witness descriptions Osterburg & Ward, 2007
22
Lightening Round ???
23
T/F Each response in the Midterm Exam should be at least one paragraph (6-8 sentences) in length? T/F Each response should include practical examples that demonstrate a practical understanding of the questions posed? Review Questions
24
T/F During moving or mobile surveillance, it’s okay to run red lights and speed since you’ll be driving an undercover car and you’re immune from prosecution since you are the police? What is the term used to describe an assembly of photographs consisting of individuals with similar characteristics as those of the suspect in the case you’re investigating? What is the term used to describe an assembly of photographs consisting of individuals with similar characteristics as those of the suspect in the case you’re investigating? Review Questions
25
Describe one court requirement relating to eyewitness identification of a suspect. What is a composite drawing and what useful purpose does it serve in an investigation? What is the term used to describe an in person assembly of individuals with similar characteristics as those of the suspect in the case you’re investigating? Review Questions
26
Discussion Board participation Unit 4 Quiz Begin work on Midterm Essay questions Review Unit 1-4 assignments and ensure all components are completed by the end of Unit 5 (March 8, 2011) Questions? Assignment
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.