1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic...
-
Upload
marvin-warren -
Category
Documents
-
view
213 -
download
0
Transcript of 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic...
![Page 1: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/1.jpg)
1.2 Assess the use of investigative techniques in criminal investigations
• Techniques• Forensic• Surveillance techniques• Profiling techniques• Use of intelligence databases e.g. National DNA
Database• Interview– Eye witnesses– Other witnesses
![Page 2: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/2.jpg)
1.2 Assess the use of investigative techniques in criminal investigations
Use of Techniques• Situation– Crime Scene– Laboratory– Police station– ‘Street’
• Type of Crime– Violent crime– E-crime
• Property crime
![Page 3: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/3.jpg)
UK Surveillance
Surveillance Techniques• The UK is reported to be the most intrusive society in
history• What evidence is there of state surveillance? • Survey their local area, research media sources and collect
evidence of different surveillance techniques. Guest speakers from local Police and Neighborhood Watch
• Learners to report on their findings to show what sort of evidence is collected and how it might be used in criminal investigations
• See the Regulation of Investigatory Powers Act 2000
![Page 4: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/4.jpg)
Regulation of Investigatory Powers Act 2000 (RIP / RIPA)
• Act of the Parliament of UK, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications.
• Introduced to take account of technological change such as the growth of the Internet and strong encryption.
![Page 5: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/5.jpg)
Regulation of Investigatory Powers Act 2000 (RIP / RIPA)
• Bill was introduced in the House of Commons on 9 February 2000 and completed its Parliamentary passage on 26 July.
• Parliament approved new additions in December 2003, April 2005, July 2006 and February 2010
![Page 6: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/6.jpg)
Regulation of Investigatory Powers Act 2000
• interception of communications• acquisition of communications data (eg billing data)• intrusive surveillance (on residential premises/in
private vehicles)• covert surveillance in the course of specific
operations• the use of covert human intelligence sources
(agents, informants, undercover officers)• access to encrypted data
![Page 7: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/7.jpg)
Edward Snowden GCHQ leaks
• The leaked document details a range of programs designed to collect and store public postings from Facebook, Twitter, LinkedIn and Google+ and to make automated postings on several of the social networks.
• http://www.telegraph.co.uk/technology/internet/10974012/The-Government-is-trying-to-create-a-surveillance-state.html
![Page 8: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence.](https://reader035.fdocuments.us/reader035/viewer/2022072010/56649db95503460f94aa9770/html5/thumbnails/8.jpg)
Offender profiling
• using famous cases –• Jack the Ripper, The Zodiac Killer• Research these cases - British approach to
profiling