McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. Criminal Investigation Criminal Investigation Swanson Chamelin Territo eighth.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO PSYCHOLOGY
Advertisements

Government of the Republic of Serbia Ministry of Labor and Social Policy GENERAL AND SPECIAL PROTOCOL ON CHILD PROTECTION FROM ABUSE AND NEGLECT.
STAFF and INMATE RELATIONSHIPS
Building A Safe Workplace: Preventing Workplace Violence.
1 ICOTS (Interstate Compact Offender Tracking System) Attachments Training.
Module 3: Developing Plans
Objective: Students will identify the warning signs of dating violence and understand how they can protect themselves.
Domestic Violence 101. APC is committed to providing safe shelter, advocacy, and supportive services for victims of domestic violence, rape, sexual assault,
11-1 MFIRS 11 Arson Module ObjectivesObjectives The participants will be able to: –describe when the Arson Module (NFIRS 11) is to be used. –demonstrate.
© 2011 National Safety Council Fires and Burns About 4,200 deaths every year 416,000 injuries lead to emergency department visit Most occur in the home.
Abuse Prevention and Response Protocol.
INCIDENT REPORTING for Resource Parents 1 September 2012.
Self Study Module for the Child Protection Intake Process Part II: Analyzing a report Developed by North Dakota Department of Human Services, Children.
Child Abuse Recognition
Missing and Abducted Persons Chapter 12:
Assault, Domestic Violence, Stalking and Elder Abuse
Safeguarding Children.. What has this to do with me? Protecting children is everyone’s responsibility If you aware of anything that may impair an adult’s.
Chapter 19 SEX CRIMES Criminal Investigation:
Chapter 29 Sexual Assault Copyright © 2014, 2010, 2006 by Saunders, an imprint of Elsevier Inc.
Sex Offender Registration and Community Notification Meeting The purpose of community notification is to provide information to protect you and your family,
MANDATED REPORTING, Adjunct Professor Monica Bogucki Copyright 2013 Monica Bogucki.
Chapter 21: People with Special Needs. 446 AMERICAN RED CROSS FIRST AID–RESPONDING TO EMERGENCIES FOURTH EDITION Copyright © 2005 by The American National.
Duty to Report Child Abuse, Neglect, and Dependency in North Carolina Janet Mason Institute of Government The University of North Carolina at Chapel Hill.
Sex Offender Residency NYSCOPA Presentation for NYSAC.
Criminal Violence: Patterns, Causes and Prevention Riedel and Welsh, Ch. 8 “Family Violence”
ABUSE1 Elder Abuse, Neglect and Exploitation Training for Professionals Please Sign In.
Clinton Community School District August 26, 2011.
Chapter 10 Crimes against Children. Extent of the Problem Since 1986, the number of children who are reported to be abused, neglected and endangered every.
Child Abuse Lecture 5.  Abuse can involve children, women, men and the elderly.  The dental team can assist in early detection of someone being abused.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
Intimate and Family Murder Higgins O’Brien Spring 2012.
Bridgeport Safe Start Initiative Update Meeting September 23, 2004 Bridgeport Holiday Inn.
6 th Grade.  Burns  Heat Cramps  Heat exhaustion  Heat Stroke  Hypothermia  Frostbite.
Crimes Against Children. LEARNING OBJECTIVES  Recognize types an patterns of burn injuries found in child abuse  Define and discuss shaken-baby syndrome.
Child Abuse and Neglect – What Is It?
Sutton Public Schools Anti-Bullying Law Overview.
Chapter 4 Ethics and Laws Copyright © 2012 by Mosby, an imprint of Elsevier Inc. All rights reserved.
Area Agency on Aging for North Florida, Inc. Case Manager Training June 22 – 23, 2010.
Sexual Assault A presentation for: BIO269 Human Reproduction Katie Aukes Jessica Brickner David Krystowiak Jane Preston.
Chapter 14 Violence and Abuse in Relationships Key Terms.
Snohomish County Sheriff’s Office Special Investigations Unit n 98% of our investigations involve crimes where the victim has been assaulted by someone.
Chapter Eight Child Victims. Victimology: Legal, Psychological, and Social Perspectives, 3 rd ed. Wallace and Roberson © 2011 Pearson Higher Education,
Assault Chapter 11. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 OVERVIEW OF ASSAULT An assault is an unlawful attempt or threat.
American Probation and Parole Association The Scope and Nature of Sexual Violence in South Carolina Austin, Texas January 2006.
18-1 © 2011 Pearson Education, Inc. All rights reserved. Nutrition, Health, and Safety for Young Children: Promoting Wellness, 1e Sorte, Daeschel, Amador.
Intentional Injury. An injury resulting from an act intended to inflict injury. –Examples??? Intentional Injury patterns –Access to firearms, maleness,
©2012 Cengage Learning. All Rights Reserved. Chapter 10 Maltreatment of Children: Abuse and Neglect.
PRENTICE HALL ©2005 Pearson Education, Inc. Criminal Analysis: Crime Prevention and Intervention Strategies Criminal Investigative Analysis: Child Predators.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Click the mouse button or press the space bar to display information. 1.Discuss the steps needed to access valid health information, products, and services.
FBI Method of Profiling Violent Serial Offenders
Unit 7 CHILD/ELDERLY ABUSE. Any questions? CHILD ABUSE.
Medical Law and Ethics, Second Edition Bonnie F. Fremgen ©2006 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Public Duties.
Unit 4. Why is murder so fascinating? Excessive exposure as dysfunctional Desensitize to human suffering Appears more widespread than it is.
Building Vocabulary homicide assault rape victim LESSON 1 Understanding Violence BIG IDEA Violence is a major health problem in our society. I can explain.
Social Roles and Correlates as Influences on Human Behavior.
Name/Office Symbol/(703) XXX-XXXX (DSN XXX)/ address300800RJUN2011 UNCLASSIFIED 1 of 21 Family Advocacy Program Annual Troop Education Brief Instructor.
Creating Safe and Successful Spaces for Our Youth Recognizing Child Abuse © 2005 The University of CaliforniaCreated by the 4-H Policy Advisory Committee.
Youth First Initiative National Survey Results and Analysis.
Chapter 11 Crimes against Children Hess Introduction Throughout history, children have endured physical violence During the industrial, urban and.
Copyright © 2016 by Elsevier, Inc. All rights reserved. Common Legal and Ethical Issues.
Sexual Offenders Chapter 6.
Crimes against Children: Child Abuse and Child Fatalities
Child Maltreatment and Unintentional Injury
Diversity/Abuse Dee Matecki EdD,RN.
Patterns National Survey of Violence Against Women (NSVAW)
Connections Abuse Prevention Plan 2018.
Abuse in the Family Chapter 8.
Crimes Against Children
Presentation transcript:

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. Criminal Investigation Criminal Investigation Swanson Chamelin Territo eighth edition ELEVEN Crimes Against Children

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. LEARNING OBJECTIVES Recognize types an patterns of burn injuries found in child abuse Define and discuss shaken-baby syndrome Explain Munchausen syndrome by proxy Identify types of child molesters, and explain investigative and interview techniques for cases of child molestation Outline types of child pornography Define incest and outline profiles of incestuous fathers Describe the profile of infant abductors Outline the assessments and investigative procedures used to determine whether a child has run away or has been abducted Discuss sex-offender registration and community notification laws Recognize threat assessment factors and levels of risk in committing school crime 11-1

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. ASSAULTS AGAINST CHILDREN The most common cause of children's death is physical abuse, often by their own parents The clinical term commonly used to describe physically abused children is the battered-child syndrome Abuse of children takes various forms, from minor assaults to flagrant physical torture Although abusers use a wide variety of instruments, the two most common are the belt and electric cord 11-2

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. BURN INJURIES AND CHILD ABUSE Typologies of Burns. A burn may be classified by how severe or deep it is, or by how the injury occurred. Medical Classification of Burn Severity. Physicians primarily categorize burns as having either partial thickness or full thickness. Causes of Burn Injuries –Scald burns occur when the child comes into contact with hot liquid –Contact burns occur when the child encounters a hot solid object or flame 11-3

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. CLASSIFICATION OF BURNS Physicians classify burns as having: –partial thickness –or full thickness 11-4 ClassificationCharacteristics First degreePartial-thickness burns: Erythema (localized redness) Sunburnlike Not included when calculating burn size Usually heal by themselves Second degreePartial-thickness burns: Part of skin damaged Have blisters containing clear fluid Pink underlying tissue Often heal by themselves Third degreeFull-thickness burns: Full skin destroyed Deep red tissue underlying blister Presence of bloody blister fluid Muscle and bone possibly destroyed Require professional treatment Fourth degreeFull-thickness burns: Penetrate deep tissue to fat, muscle, bone Require immediate professional treatment

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. CIGARETTE BURNS If an investigator sees burns such as those pictured, they should: –become highly suspicious –look for other signs of abuse –question the parents/guardians 11-5 (Courtesy Milwaukee County Department of Social Service)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. SHAKEN BABY SYNDROME Shaken-baby syndrome (SBS) is the severe intentional application of violent force (shaking), in one or more episodes, that results in intracranial injuries to the child. The mechanism of injury in SBS is thought to result from a combination of physical factors, including the proportionately large cranial size of infants, the laxity of their neck muscles, and the vulnerability of their intracranial bridging veins. 11-6

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. MUNCHAUSENS SYNDROME BY PROXY Munchausen syndrome is a psychological disorder in which the patient fabricates the symptoms of disease or injury in order to undergo medical tests, hospitalization, or even medical or surgical treatment In cases of Munchausen syndrome by proxy (MSBP), a parent or caretaker suffering from Munchausen syndrome attempts to bring medical attention to himself or herself by injuring or inducing illness in a child 11-7

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. SITUATIONAL CHILD MOLESTORS For purposes of discussion Kenneth V. Landing of the FBI divides child molesters into two categories. –situational –preferential 11-8 Regressed Morally Indiscriminate Sexually IndiscriminateInadequate Basic characteristics Poor coping skillsUser of people Sexual experimentation Social misfit Motivation SubstitutionWhy not?Boredom Insecurity and curiosity Victim criteria Availability Vulnerability and opportunity New and differentNonthreatening Method of operation Coercion Lure, force, or manipulation Involve in existing activity Exploits size, advantage Pornography collection Possible Sadomasochistic; detective magazines Highly likely; varied nature Likely (Source: Kenneth V. Lanning, Child Molesters: A Behavioral Analysis for Law Enforcement Officers Investigating Cases of Child Sexual Exploitation, 3 rd ed. (Arlington: VA: National Center for Missing and Exploited Children, 1992), p. 10. Reprinted with permission of the National Centers for Missing and Exploited Children (NCMEC). Copyright 1986, 1987, and 1992, NCMEC. All rights reserved.)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. PREFERENTIAL CHILD MOLESTERS 11-9 SeductionIntrovertedSadistic Common characteristics Sexual preference for children; child pornography or erotica Motivation IdentificationFear of communicationNeed to inflict pain Victim criteria Age and gender preferences Strangers or very young Age and gender preferences Method of operation Seduction processNonverbal sexual contactLure or force (Source: Kenneth V. Lanning, Child Molesters: A Behavioral Analysis for Law Enforcement Officers Investigating Cases of Child Sexual Exploitation, 3 rd ed. (Arlington: VA: National Center for Missing and Exploited Children, 1992), p. 10. Reprinted with permission of the National Centers for Missing and Exploited Children (NCMEC). Copyright 1986, 1987, and 1992, NCMEC. All rights reserved.)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. INTERVIEWING MOLESTED CHILDREN Common sense and formal research agree that children are not merely miniature adults Waterman has identified three types of developmental issues that are important when allegations of sexual abuse arise –First the child's developmental level relative to other children in his or her age group –Second is the child's development level with regard to sexuality –Third is the child's ability to respond adequately to interviews and to testify in court 11-10(a)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. INTERVIEWING MOLESTED CHILDREN When anatomically detailed dolls were first introduced in the late 1970s they were widely hailed as an important advance in techniques for communicating with troubled children One alternative that is being used by some police agencies either in connection with or instead of an anatomically detailed doll is to have the child draw his or her own picture As with the anatomical dolls, leading questions are widely used as a courtroom technique to assist child witnesses 11-10(b)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. ANATOMICALLY DETAILED DOLLS These dolls are used by some investigators They show all body parts including genitals Some experts disagree at to their overall usefulness (Courtesy Eymann Anatomically Correct Dolls, Sacramento, California)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. CHILD PORNOGRAPHY Commercial Child Pornography –Commercial child pornography is that which is produced and intended for commercial sale Homemade Child Pornography –Contrary to what its name implies, the quality of homemade child pornography can be as good if not better than the quality of any commercial pornography Use of the Computer and the Internet in Child Pornography –The ubiquity of the computer, and by extension the Internet, is an unfortunate asset to the child pornographer

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. INCEST Incest is defined broadly to include any sexual abuse of a minor child by an adult perceived by the child to be a family member

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. CHARACTERISTICS OF INCESTUOUS FAMILIES The incestuous family is often reclusive Overt incest is an example of tension-reducing acting out in a dysfunctional family Serious disorganization in family roles often occurs before the beginning of the incestuous relationship It is not uncommon for more than one child to be sexually exploited in the same family 11-14

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. TYPOLOGIES OF INCESTUOUS FATHERS (FINKELHOR AND WILLIAMS) Type 1-The sexually preoccupied –These men had a clear and conscious (often obsessive) sexual interest in their daughters Type 1-subcategory-Early sexualizers –Among the sexually preoccupied fathers, many regarded their daughters as sex objects almost from birth Type 2 - Adolescent regressives –About one-third of the fathers - 33 percent - became sexually interested in their daughters when the girls entered puberty 11-15(a)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. TYPOLOGIES OF INCESTUOUS FATHERS (FINKELHOR AND WILLIAMS) (cont'd) Type 3 - Instrumental self-gratifiers –They described their daughters in terms that were nonerotic Type 4 - The emotionally dependent –These fathers were emotionally needy, lonely, depressed Type 5 - Angry retaliators –These fathers were the most likely to have criminal histories of assault and rape 11-15(b)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. SUDDEN INFANT DEATH SYNDROME Simply defined, SIDS is the sudden and unexpected death of an apparently health infant that remains unexplained after the performance of a complete autopsy 11-16

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. CHARACTERISTICS OF SIDS VICTIMS Appearance –Usually normal state of nutrition and hydration –Blood-tinged, frothy fluids around mouth and nostrils, indicative of pulmonary edema –Vomitus on the face –Diaper wet and full of stool –Bruise like marks on the head or body limbs (postmortem pooling or settling of blood in dependant body parts) 11-17

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. ELECTRONIC MONITORING DEVICE USED TO PREVENT SIDS Device used to prevent SIDS Monitors heart and respiration rates Parents alerted by light and audible alarm (Courtesy Joseph and Karin Venero)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. INFANT ABDUCTION Infant abduction is the taking of a child less than one year old by a nonfamily member Infant abductions do not appear to be motivated by: –desire for money –sex –revenge –custody 11-19

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. PROFILE OF THE INFANT ABDUCTOR Infant abductors are usually women Women account for 141 of the 145 cases analyzed Ages ranged from 14 to 48 years old –average age 28 years old 11-20(a)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. PROFILE OF THE INFANT ABDUCTOR (cont'd) Race was determined in 142 cases: –63 offenders were white –54 offenders were black –25 offenders were Hispanic Typical abductor does not have criminal record If a criminal record does exist, it will likely consist of nonviolent offenses 11-20(b)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. USE OF AGE-PROGRESSION TECHNOLOGY TO SEARCH FOR MISSING CHILDREN In recent years, computer technology has been used to age-enhance photographs of missing children. Information collected on the missing child including: –Full frontal photographs of the child –Videotapes of the child, if available –Information regarding identifying marks –Hair color and style –Traditional information 11-21(a)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. USE OF AGE-PROGRESSION TECHNOLOGY TO SEARCH FOR MISSING CHILDREN (cont'd) Photographs of the parents and siblings at the comparable age of enhancement are also valuable Computerized records of photographs and details are created and stored 11-21(b)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. AGE PROGRESSION COMPUTER TECHNOLOGY This technology was built by using the expertise and techniques of: –The FBI –Experienced police artists (Courtesy National Center for Missing and Exploited Children)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. INVESTIGATIVE DETERMINATION OF RUNAWAY OR ABDUCTION Runaway or abduction cases The Parental Interview –The need to interview parents separately from other family members and reporting parties remains critical Victimology –To understand if the child's absence in consistent with established patterns of behavior, officers first must understand the childS normal actions prior to the disappearance Resources –To successfully sustain a voluntary long-term absence, the runaway child must have access to resources that will satisfy basic needs, such as food, shelter, and transportation 11-23(a)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. INVESTIGATIVE DETERMINATION OF RUNAWAY OR ABDUCTION (cont'd) Scene Assessment –A search of the missing child's residence can provide useful information to investigators Time Factors –Statistics indicate that the majority of runaway children cannot sustain an absence for more than two weeks 11-23(b)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. SEX OFFENDER REGISTRATION AND COMMUNITY NOTIFICATION The Laws –In 1994, Congress passed the Jacob Wetterling Crimes Against Children and Sexuality Violent Offender Registration Act (The Jacob Wetterling Act) –The act required that states create sex offender registries within three years or lose 10 percent of their funding under the Edward Byrne Memorial Program –The Pam Lychner Sexual Offender Tracking and Identification Act of 1996 amended the Jacob Wetterling Act by establishing a national sex offender database, which the FBI maintains 11-24(a)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. SEX OFFENDER REGISTRATION AND COMMUNITY NOTIFICATION (cont'd) Registration Requirements –Although sex offender registration requirements vary according to state laws, some common features exist in registries across the country –For example, a state agency (i.e., state police) maintain the registry for the state Notification Features –The most basic form of notification, sometimes referred to as passive notification, allows inquiring citizens to access registry information at their local law enforcement agencies 11-24(b)

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. SCHOOL CRIME: FACTORS IN THREAT ASSESSMENT Specific, plausible details are a critical factor in evaluating a threat The emotional content of a threat can be an important clue to the threateners mental state Precipitating stressors are incidents, circumstances, reactions, or situations which can trigger a threat Pre-disposing factors. Underlying personality traits, characteristics, and temperament that predispose an adolescent to fantasize about violence or act violently 11-25

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. LEVELS OF RISK IN SCHOOL CRIME Low level of threat. A threat which poses a minimal risk to the victim and public safety. Medium level of threat. A threat which could be carried out, although it may not appear entirely realistic. High level of threat. A threat that appears to pose an imminent and serious danger to the safety of others

McGraw-Hill © 2003, The McGraw-Hill Companies, Inc. All rights reserved. WEAPON DETECTION PROGRAMS Weapon detectors are now used in some schools These systems are expensive These systems also require a security guard to be present (Courtesy Chester A. Higgins, Jr., and the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice)