Stephen E. Braude: Follow-Up Investigation of the Felix Circle
The Follow-Up Investigation and Investigative Resources.
-
Upload
duane-gibbs -
Category
Documents
-
view
218 -
download
0
Transcript of The Follow-Up Investigation and Investigative Resources.
The Follow-Up Investigation and Investigative Resources
LEARNING OBJECTIVES
Describe the use of solvability factors. Explain the preparation of a case file. Discuss reinterviewing victims and witnesses. Describe the purpose and use of NamUs. Summarize NCIC files and capabilities. Explain LeadsOnLine. Identify behaviors in which investigators should
not engage with informants. State the purposes of physical surveillance. Describe how a photo lineup should be conducted. Identify three potential indicators of a staged
crime.
© 2012 McGraw-Hill Higher Education. All rights reserved. 2
LEARNING OBJECTIVES continued
Describe the intelligence cycle. Summarize the use of facial recognition
software by law-enforcement agencies. Identify the ways crime analysts link crimes. Explain the role of the scientific method in crime
scene reconstruction. Describe the four factors on which criminal
profiling focuses. Summarize geographical profiling. Provide four examples of remote sensing. Identify four ways investigators use the internet.
© 2012 McGraw-Hill Higher Education. All rights reserved. 3
The Decision to Initiate a Follow-up Investigation When an incident report is referred to the
investigation division, it is screened to determine whether a follow-up investigation is warranted.
This determination may be done by judgment or by applying mathematical weights to the presence or absence of certain factors in the incident report, such as: Is the suspect named? Can the suspect be identified? Is there a detailed description of the suspect?
© 2012 McGraw-Hill Higher Education. All rights reserved. 4
The Follow-up Investigation Process1. Prepare a case file
2. Read the offense report and any supplemental reports
3. Get criminal histories of named suspects
4. Obtain credit histories if necessary
5. Visit the crime scene and review visual documentation
6. Review other incidental reports
7. Attempt to link suspects to other crimes by M.O. analysis
8. Examine physical evidence and lab results
9. Contact victims and witnesses for interviews© 2012 McGraw-Hill Higher Education. All rights reserved. 5
The Follow-up Investigation Process, continued10. Assess the credibility of witnesses
11. Deliver death notices if necessary
12. Arrange for a drawing/likeness of suspect
13. Reevaluate the case periodically
14. Disseminate information about the crime and suspects within the agency
15. Coordinate with other jurisdictions
16. Explore lines of inquiry and pursue leads
© 2012 McGraw-Hill Higher Education. All rights reserved. 6
The Follow-up Investigation Process, continued17. Identify and interview known associates of
the suspect
18. Obtain documentary evidence
19. Conduct a custodial interrogation
20. Talk to informants as needed
21. Use specialized investigative procedures
22. Prepare affidavits, apply for warrants
23. Identify, locate, and apprehend suspect
© 2012 McGraw-Hill Higher Education. All rights reserved. 7
The Follow-up Investigation Process, continued24. Recover stolen property
25. Determine if the suspect’s auto or other property is subject to seizure
26. File supplemental reports
27. Keep records organized
28. Keep victim/victim’s family informed
29. Meet with the prosecuting attorney
© 2012 McGraw-Hill Higher Education. All rights reserved. 8
Reviewing the Incidental and Supplemental Reports
These reports may answer: How, when, and where the crime was
committed, including a chronological description of the events
The victim’s identity and if appropriate, his/her medical condition and statement
The number of suspects, if any are in custody, whether they are in the jail or a hospital, and their descriptions or identities
© 2012 McGraw-Hill Higher Education. All rights reserved. 9
Reviewing the Incidental and Supplemental Reports, cont. Whether composite sketches of suspects at large have
been prepared and distributed The words spoken by suspects during the commission
of the crime, spontaneous statements made by them following their arrest, and any post-Miranda statements made by them to the arresting officer
The identities and statements of witnesses and any conditions noted, such any degree of drinking or appearance of having been using drugs
The nature and value of the property stolen The types of physical evidence seized Description of any vehicles involved or a copy of an
impound report for vehicles seized.
© 2012 McGraw-Hill Higher Education. All rights reserved. 10
Jail Booking Report
Created when a subject is in-processed at a jail
Often computer generated May have an incident report integrated into
it May have a color photo, fingerprints, and
details about suspect’s health and medications and mental state
May have a description of the suspect, including physical details, employment and home addresses, aliases, etc.
May include an inventory of personal effects© 2012 McGraw-Hill Higher Education. All rights reserved. 11
Field Interview/Information Reports A field interview/
information card (FIR) is filled out when patrolling officers identify persons or vehicles that are suspicious to them but are not connected to any particular offense.
(Source: Courtesy Springfield, Missouri, Police Department)
© 2012 McGraw-Hill Higher Education. All rights reserved. 12
Using Databases
International National
Regional Information Sharing Systems (RISS)
State and Local Systems Nonprofit and Private Sources
© 2012 McGraw-Hill Higher Education. All rights reserved. 13
Surveillance
Purpose of surveillance Establishing the existence of a crime Obtaining probable cause for a search warrant application Apprehending suspects as they commit a crime Identifying the associates of criminals and the places they
frequent Determining the reliability of informants Providing protection for undercover officers and informants Locating people, places, and things Gathering intelligence about targets and premises prior to serving
a warrant Gathering intelligence on the activities of illegal groups and gangs Preventing a crime by signaling police awareness of specific
subjects
© 2012 McGraw-Hill Higher Education. All rights reserved. 14
Procedures For Photo And Live Lineups Include only one suspect in each
identification procedure. Select “fillers” (nonsuspects) who
generally match the witness’ description of the perpetrator.
If multiple photos of the suspect are available, use the one made closest to the time when the crime was committed.
Lineups should include a minimum of five fillers.
If there are multiple witnesses, consider placing the suspect in different positions each time a lineup shows to a witness.
© 2012 McGraw-Hill Higher Education. All rights reserved. 15
Procedures For Lineups continued If a new suspect is developed, avoid using
fillers which have been used in a previous lineup for the same witness
Make sure that no writing or information about the suspect's previous criminal history can be seen by the witness
Before the witness views the lineup, check again to make sure the suspect doesn’t unduly standout
Record the presentation order or the lineup and handle the original photographs as evidence
Write a supplemental report which chronologically describes what happened
© 2012 McGraw-Hill Higher Education. All rights reserved. 16
Staged Crime Scenes
Purpose: to misdirect investigators Investigation requires:
What act is the staging intended to conceal?
What was the motive?
© 2012 McGraw-Hill Higher Education. All rights reserved. 17
Fusion Centers
Turning information and intelligence into actionable knowledge
The fundamental process by which homeland security and crime-related information and intelligence are shared
About 70 fusion centers are operational
© 2012 McGraw-Hill Higher Education. All rights reserved. 18
Intelligence Units
Four types: Indicative intelligence Tactical intelligence Strategic intelligence Evidential intelligence
© 2012 McGraw-Hill Higher Education. All rights reserved. 19
The Intelligence/Analytical Cycle The intelligence/analytical cycle is a
five-step process which is continuous: Planning and direction Collection Processing Analysis and Production Dissemination Reevaluation
© 2012 McGraw-Hill Higher Education. All rights reserved. 20
Analytical and Investigative Tools Crime Analysis: the process of
using systematic analytical methods to acquire timely and pertinent information on crime patterns and trend correlations.
© 2012 McGraw-Hill Higher Education. All rights reserved. 21
Analytical and Investigative Tools There are three general types of
crime analysis by which analysts link crimes:1. Tactical2. Strategic3. Administrative
© 2012 McGraw-Hill Higher Education. All rights reserved. 22
Crime Analysis
Commonly used methods to link crimes: Trends Patterns Series Sprees Hot Spots Crimogens
© 2012 McGraw-Hill Higher Education. All rights reserved. 23
Crime Scene Differences
© 2012 McGraw-Hill Higher Education. All rights reserved. 24
Time-Event Chart
© 2012 McGraw-Hill Higher Education. All rights reserved. 25
Link Analysis
© 2012 McGraw-Hill Higher Education. All rights reserved. 26
The Internet Appealing to the public for information about
specific crimes, often through “crime-stopper” programs.
Requesting information about missing children and adults.
Posting federal, state, and local most-wanted lists. Soliciting information about individuals who are
wanted as fugitives. Alerting the public about jail and prison escapees
and requesting information if they are sighted. Requesting information about the identities of
unknown subjects (“unsubs”). Showing photographs of recovered stolen property
so that the owners can identify and claim it. Providing crime-mapping capabilities so that
investigators can approach their work with better information and citizens can be informed.
© 2012 McGraw-Hill Higher Education. All rights reserved. 27