Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2...

25
Criminal Patterns Chapter 5

Transcript of Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2...

Page 1: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Criminal Patterns

Chapter 5

Page 2: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

2

Crime Patterns & Human Behavior

• Human beings are largely creatures of habit and comfort and are, to some extent, predictable in their behavior.

• Most criminal behavior is not the result of random acts, and certain types of criminals engage in certain kinds of criminal behavior for similar reasons, or motives.– Motive - A wrongdoer’s

reason(s) for committing a crime.

Page 3: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

3

Modus Operandi• Modus operandi (M.O.) – The method of operation that a criminal uses to

commit a crime.– Latin term for “mode of operation.”– It was once believed that every criminal followed a

particular M.O. and would rarely, if ever, change the type of crime committed or the method of committing it.

– Inferences drawn from the M.O. are not certainties, but they can greatly assist investigators in their pursuit of criminals.

Page 4: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

4

Deductions from Modus Operandi Data

• The M.O. file is an orderly method of recording and coding information designed to reveal habits, traits, or practices of criminal suspects.

• Leads regarding M.O. should be weighed according to the degree of probability they will lead to a suspect.

Page 5: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

5

Deductions that may result from a review of M.O. data

• A theft by stealth rather than by violence or fraud may indicate either that:– the criminal is physically non-aggressive and lacks

confidence in his or her powers of persuasion– or that the theft was more easily accomplished by stealth

• A theft by stealth may mean:– the thief is known to the victim– or intends to remain in the community and might be

recognized later should contact be made with the victim during the crime

• Well-planned crimes generally eliminate the emotionally unstable as suspects.

Page 6: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

6

Deductions that may result from a review of M.O. data

• A certain type of premises might be selected:– not only because of the type of business conducted– but also because the criminal is familiar with the victim’s habits and

manner of conducting business• A burglary of a residence may suggest:

– a criminal with knowledge of the activities of persons who frequent that area at a certain time (the victim, neighbors, police, and so on)

– and with knowledge of the probable whereabouts of the people living in the residence

• The occupation or previous experience of the criminal may be indicated by the tools selected for the crime as well as by the skill with which they are employed.

Page 7: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

7

Deductions that may result from a review of M.O. data

• Burglaries where more vandalism than theft occurs usually indicate amateur juvenile burglars rather than adult professionals.

• Crimes committed in areas frequented only by people working or living in that vicinity usually indicate a local criminal.

• The point of entry (window, rear door, skylight, and so on) may have been chosen because of observation of a burglar alarm system outside the premises.

Page 8: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

8

Deductions that may result from a review of M.O. data

• Prior “casing” of the victimized target may have been needed because of conditions at the location or precautionary measures taken by the owner or manager.

• A suspect with physical disabilities may be eliminated if the type of crime calls for an agile person, unless evidence of a more physically fit accomplice is developed.

Page 9: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

9

Uses of Modus Operandi Data

• Identification – A process in which physical characteristics and

qualities are used to definitely know or recognize a person.

• Apprehension – The act of seizing or arresting a criminal offender.

Page 10: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

10

Uses of Modus Operandi Data• Modus operandi data can indicate a likely time

and location for future criminal activity.• Repression

• The act of suppressing or preventing an action from taking place.

Page 11: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

11

The Modus Operandi Parts of a Report

1. Time of Attack, or Date and Time Committed2. Person Attacked (Type of Victim)3. Property Attacked, or Type of Premises Entered4. How Attacked (Point of Entry)5. Means of Attack (Tool or Equipment Used in

Committing the Crime)6. Objective of Attack (Why the Crime Was Committed

or Attempted)7. Trademark or Peculiarity

Page 12: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

12

The Modus Operandi Parts of a Report

8. What Suspect Said9. Written Words or Symbols10. Transportation Used or Observed

Page 13: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

13

How to Report Modus Operandi Data

• Details of the offense• Modus operandi factors would include such acts

as:– lying in wait– luring the victim– drugging the victim– detouring a vehicle– casing a target– establishing the confidence of victims– purchasing or acquiring equipment

Page 14: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

14

How to Report Modus Operandi Data

• Modus operandi files are typically organized into two major categories of information: Information pertaining to crimes committed by

unidentified offenders Information concerning crimes committed by

identified and apprehended offenders• In many police agencies, data that pertain to the modus

operandi of a reported crime are entered into the department’s computer information management system.

Page 15: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

15

How to Report Modus Operandi Data

• Legally, the modus operandi can be used only as an investigative lead.

• It can be introduced in court only as evidence to show the common purpose and design of the criminal when a series of crimes have been committed and linked to the defendant.

Page 16: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

16

Common Occult and

Satanic Symbols

Page 17: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

17

Modus Operandi Parts of a Report

Page 18: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

18

Psychological Profiling• One of the main objectives in any criminal

investigation is to identify a suspect in the crime.• Comparing the manner in which a crime was

committed with available modus operandi files is one way of identifying a possible suspect.

• Psychological profiling – A method of suspect identification that seeks to identify an

individual’s mental, emotional, and personality characteristics as manifested in things done or left behind at the crime scene.

Page 19: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

19

Psychological Profiling

• Profiling is a method of suspect identification that seeks to identify an individual’s mental, emotional, and personality characteristics as manifested in things done or artifacts left behind at the crime scene.

• It is typically used in crimes of violence, such as homicides, sex crimes, ritualistic crimes, and arsons in which there are no apparent motives or there are a series of crimes.

Page 20: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

20

Psychological Profiling

• Profiles provide investigators with corroborative evidence in cases with unknown suspects or with clues about likely suspects.

• Profiles do not immediately lead investigators to a specific offender.

• They do point to the type of person most likely to commit the crime under investigation and, thereby, may narrow the field of potential suspects.

Page 21: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

21

Psychological Profiling• The seven basic steps to profiling

1. Evaluate the criminal act itself.2. Analyze evidence from, and conditions at, the crime

scene.3. Consider characteristics and, when available, statements

of the victim.4. Analyze all information from the preliminary reports.5. Evaluate the medical examiner’s autopsy protocol or the

physician’s physical examination report.6. Develop a profile of the offender’s psychological and

personality characteristics.7. Make investigative suggestions to investigators based on

the profile.

Page 22: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

22

Geographic Profiling• Geographic profiling – A computer-assisted investigative method that uses

locations of a series of crimes to determine the most likely area where an offender may be found.

– Geographic profiling has been applied in a variety of types of cases including serial murder, rape, arson, robbery, and even bombings.

– Geographic profiling uses a mathematical algorithm based on a psychological theory known as the least-effort principle.

Page 23: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

23

Geographic Profiling

• This principle suggests that an individual will try to adapt to the environment or will try to change the environment to suit his or her needs, whichever is easier.

• Criminals tend to commit crimes within a certain comfort zone, an area located near— but not too close—to their own residence.

Page 24: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

24

National Law Enforcement Telecommunications System

• (NLETS) is a computer-controlled message switching network linking local, state, and federal agencies together to exchange information.

• The law enforcement agencies are linked together by means of:– Computers– Terminals– Communication lines

Page 25: Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved.

25

National Law Enforcement Telecommunications System

• Officers can access the network through mobile data terminals linked to a departmental central computer, which is part of a state network tied into NLETS.

• The system is operational 24 hours per day, 7 days a week.