Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues.
-
Upload
wesley-mcdaniel -
Category
Documents
-
view
215 -
download
0
Transcript of Criminal Investigation (CJ 210) Unit 4 Lecture Surveillance and Constitutional Issues.
Criminal Investigation (CJ 210) Unit 4 Lecture
Surveillance and Constitutional Issues
Please Remember!
Midterm Essay Exam
Respond to each of the following four questions with detailed insightful
responses based primarily on the course text and supported by other relevant, academically reliable sources if appropriate.
1. What are methods of inquiry and how are they used in criminal investigation?
2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest?
3. What is the scientific method and how is it applied to criminal investigation by criminal investigators?
4. Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.
Midterm Essay ExamIn addition to fulfilling the specifics of the assignment, a successful paper
must also meet the following criteria: Each response should be at least one paragraph (6-8 sentences) in length. Each response should include practical examples that demonstrate a
practical understanding of the questions posed.
Directions for Submitting Your Project Compose your paper in Microsoft Word and save it in the following
format: Last name First name Assignment. (Example: SmithJohn Unit 5 Midterm). Submit your assignment by selecting the Unit 5: Assignment Dropbox by the end of Unit 5.
Where do I get the information that I need to do well on the Mid-term?
Chapter 13 in your text has all of the information that
you will need to do well on the Mid-term. Just add
explanation and examples.
(Osterburg & Ward, 2007, pp. 315-339)
1.What are methods of inquiry and how are they used in criminal investigation?
2. What is the optimal mindset of an investigator and how are the concepts associated with the optimal mindset of an investigator manifest?
3. What is the scientific method and how is it applied to criminal investigation by criminal investigators?
4. Discuss four important sources of information for criminal investigators and provide detailed practical examples of each source listed.
How to respond to questions well:
DefineExplainProvide Examples
Chapter 9
Surveillance:A Fact-Finding Tool—Legality and Practice
Osterburg & Ward, 2007
“Justice may be blind, but she has very sophisticated listening devices.”
-Edgar Argo
Fixed Surveillance surveillant remains in fixed location
Moving Surveillance subject moves about and surveillance follows
Technical Surveillance involves electronic eavesdropping device and/or
optical devices
Kinds of Surveillance
Osterburg & Ward, 2007
Wiretaps
Bugs, pen registers, beepers Monitoring conversations
Monitoring telephone usage
Monitoring movements of vehicles and items of commerce
Visual enhancement devices
Technical Surveillance Techniques
Osterburg & Ward, 2007
Safety and Security Measures During a mobile surveillance, do not take unnecessary risks to keep up with
a subject speeding, running red lights, or otherwise driving recklessly.
While stationary, keep the vehicle windows closed and the doors locked.
Regularly scan rear view mirrors to observe anyone or any activity to the rear.
Alert other team members to any suspicious or unusual persons or activity in the area.
In high-crime areas and in hours of darkness, remain in a heightened state of alert.
http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/19/090)
Safety and Security Measures Position vehicle to enable a rapid response to assist others if needed.
Ensure vehicle has emergency equipment lights, siren, and first-aid kit.
Keep identification, weapon, and ballistic vest assessable.
Know and use challenge, password, and other appropriate safety measures to prevent friendly fire situation from developing.
When leaving a vehicle to go on foot surveillance, fully secure the vehicle and equipment inside.
http://www.fbi.gov/publications/leb/2004/may2004/may04leb.htm (Accessed 3/19/090)
Chapter 10
Eyewitness Identification: Guidelines and Procedures
Osterburg & Ward, 2007
Use random number of photographs (6 or more)
Do not give clues to witnesses Allow only one witness at a time to view Do not allow witnesses to communicate
with one another Conduct lineup after positive identification
is made Make record of all photos shown to witnesses
Using the Rogues Gallery
Osterburg & Ward, 2007
Photo Array
Photo Array
Witness must have adequate opportunity to observe the crime
Witness must have the capacity to observe the suspect commit the crime
Witness must be sufficiently attentive to the actions of the suspect
Identification must be completely the result of the witness’s own memory
Eyewitness Identifications:Court Requirements
Osterburg & Ward, 2007
Composite DrawingsIn 1993 a bicyclist in Riverside Park in Manhattan discovered a suitcase containing the body of a young female. Two days prior to that, a witness had observed a local homeless man and another male dragging a shopping cart containing a suitcase towards the park. She found it rather strange and got a good look at the male that accompanied the homeless male. The witness was taken to Police Headquarters where a composite drawing of this male was made with one of NYPD's more experienced artists. Several days later the male was arrested and charged for the homicide. He was subsequently convicted.
http://www.homicidesquad.com/identification_tools.htm
David Berkowitz (Son Of Sam, 1976). The attacks occurred during the evening to early morning hours where darkness hinders identifications. The identification of a perpetrator can be tough, a composite sketch maybe even tougher for both witnesses and artist.
Computer-Generated Composites
http://www.identikit.net
Key TermsLoose Surveillance: A cautious surveillance; also termed discreet surveillance because the loss
of the subject is preferred over possible exposure. Obtaining information about a subject through tailing his or her
associates when there is reason to believe the subject suspects there is a surveillance.
A burglary gang “casing” banks to select their next job.
Shadow: To follow secretly; place a person under surveillance
Osterburg & Ward, 2007
Key TermsPen Register: A device that records all numbers dialed on a
telephone; it is generally installed at the telephones company’s central office
Neither overhears conversations nor indicates whether a call was completed
Key Terms Identi-Kit- A powerful investigative tool that creates
accurate photo realistic facial composite sketches based on verbal descriptions provided by a witness or victim. Make customized wanted posters, transmit the composite sketch via the web, email or fax, or export the composite sketch to other imaging programs. Identi-Kit® facial composite software is available on CD or the internet as a hosted application. http://www.identikit.net/
Composite Images- An image of a suspect produced by an artist or kit using witness descriptions
Osterburg & Ward, 2007
Computer-Generated Composites
Criminal Investigation (CJ 210) Unit 4 Lecture
Surveillance and Constitutional Issues