Investigative Resources

Slides:



Advertisements
Similar presentations
SCIENCE PROCESS SKILLS
Advertisements

Chapter 12 Decision Support Systems
Chapter 5 Evaluation, Feedback, and Reward of Individual Behavior
Field Notes and Investigating Reporting
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
LEADS Law Enforcement Agencies Data System
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Criminal Profiling Establishment of the FBI Behavioural Science Unit and now the Violent Criminal Investigation Unit (VI-CAP) in Researchers like.
Indianapolis, Indiana Offender Notification Meetings.
1 2 Note: The following slides represent suggestions to enhance the writing of a SAR narrative. This information should be used in conjunction with the.
Welcome to CJ 325 Psychology for Law Enforcement Unit 7 Seminar.
Organization Change and Development
Criminal Justice 2011 Chapter 10: ROBBERY
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Chapter 30 CRC Press: Forensic Science, James and Nordby, 2nd Edition 1# Forensic Science An Introduction to Scientific and Investigative Techniques Stuart.
Chapter 30 CRC Press: Forensic Science, James and Nordby, 2nd Edition1 Chapter 30 Serial Offenders: Linking Cases by Modus Operandi and Signature.
Personal genetics in policy and social issues: Crime and forensics Personal genetics in policy and social issues: Crime and forensics.
Arizona Criminal Justice Information System
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
Innovations in Justice Information Sharing Strategies and Best Practices February 2007 Melissa R. Johnson, CCA Communications Director, International Association.
Crimes Committed in the Presence of Children Proposed Methodology for 2008 Study.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School - Wu Laboratory
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Targeting Offenders Prospects, Practices and Concerns June
Internationally known in 1986 for the ‘offender profile’ that helped police to catch ‘ Railway Rapist’ John Duffy. This was the first time such help had.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Criminal Profiling. Criminal Psychology refers to the study of the mental and behavioral characteristics of people who break laws Criminal/Forensic psychologists.
The National Intelligence Model (NIM)
McGraw-Hill © 2006 The McGraw-Hill Companies, Inc. All rights reserved. The Nature of Research Chapter One.
Police Administration: Structures, Processes, and Behavior
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Criminal Justice Information Systems and Case Management Systems.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Innovations in Justice Information Sharing Strategies and Best Practices November 30, 2006 Lisa M. Palmieri, CCA-Supervisory Intelligence Analyst President,
Copyright 2010, The World Bank Group. All Rights Reserved. Prosecution Statistics Part 1 Crime, Justice & Security Statistics Produced in Collaboration.
Offender profiling Definitions, approaches and developing a profile.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Assignment Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits.
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Essay Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits and.
Chapter 15 Criminal Profiling
FORENSIC PROFILING Forensic Science. Forensic Profiling is… an educated attempt to provide investigative agencies with specific information about the.
1 Criminal Investigative Analysis. 2 A Comprehensive Investigative Aid Indirect Personality Assessments Equivocal Death Analysis Investigative Suggestions.
How do we use DNA in law enforcement and forensics? How do we use DNA in law enforcement and forensics? Personal Genetics Education Project Harvard Medical.
Jess Thornton Unit 9. Unit 9 Chores DiscussionQuiz Unit 9 Project (Look under unit 9 for direction) Seminar.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Julie McDonald And Alli Hicks. Criminal Profiling The analysis of the behavior and circumstances associated with serious crimes in an effort to identify.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
The Follow-Up Investigation and Investigative Resources
FBI Method of Profiling Violent Serial Offenders
Introduction to Forensic Psychology
Psychology and Investigations Chapter 12. Psychologist’s Contributions  Investigative inferences  Offender profiling, geographical profiling, correlates.
Criminal Profiling. Psychological Profiling Involves investigating the offender’s BehaviorMotivesBackground As a guide for what direction the Investigation.
N ational Q ualifications F ramework N Q F Quality Center National Accreditation Committee.
Scenario Project: Investigative Plan
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Introductory Criminal Analysis: Crime Prevention and Intervention Strategies Domestic Violence.
Introductory Criminal Analysis: Crime Prevention and Intervention Strategies Criminal Investigative Analysis: Serial Rapist.
Investigative Issues  Identification of a Serial Murder Series Leadership Task Force Organization Resource Augmentation Communication Data Management.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Introductory Criminal Analysis Thomas E. Baker PRENTICE Hall ©2005 Pearson Education, Inc. Male Serial Killers.
7 Training Employees What Do I Need to Know?
7. Develop a plan to strengthen employer relationships
Julie McDonald And Alli Hicks
Chapter 15 Criminal Profiling
Investigative Resources
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Presentation transcript:

Investigative Resources EIGHT Investigative Resources

LEARNING OBJECTIVES Outline the intelligence/analytical cycle Understand various components of crime analysis Assess criminal profiling and its criticisms Discuss the organized/disorganized offender model Explain the practice of investigative psychology Describe behavioral evidence analysis Discuss the practice of geoprofiling Recognize financial difficulty indicators used in financial analysis Identify three major components of NCAVC and the services they provide Describe the functions of NCIC and CODIS 8-1

THE INTELLIGENCE/ANALYTICAL CYCLE The intelligence/analytical cycle is a five-step process which is continuous: Planning and Direction. The intelligence/analytical process must be managed from identifying the focus of the intelligence effort to delivering the finished product to the police unit requesting it. Collection and Management. Collection is the gathering and managing of raw data/information which is then analyzed to produce the finished product. 8-2(a)

THE INTELLIGENCE/ANALYTICAL CYCLE (cont'd) Processing. Processing is how raw information from all sources is converted into a form which can be used by analysts. Analysis and Production. Analysis and production is how the conversion of the data which has been processed is translated into the finished intelligence product. Dissemination. The last element the five-step intelligence cycle is the dissemination of the finished intelligence report back to the end-used who requested it. 8-2(b)

THE INTELLIGENCE CYCLE Consists of five steps Is continuous (Source: Marilyn B. Peterson, Bob Morehouse, and Richard Wright, eds., Intelligence 2000: Revising the Basic Elements (New Jersey: International Association of Law Enforcement Analysts, 2000), p. 8.) 8-3

TYPES OF CRIME ANAYLSIS These are common sources of blood and DNA evidence that investigators need to be aware of in conducting crime scene searches. Type Description Tactical Provides analytical information used to assist operations and investigative personnel in identifying specific, present crime trends, thereby giving them an informed basis for making rapid, effective responses to field problems (e.g. a series of pharmacy robberies) Strategic Involves analyzing long-range problems and making projections about likely increases or decreases in crime rates and trends; also includes preparing crime statistic reports and providing data for use in allocation of personnel. Administrative Focuses on providing economic, social, geographic, and other information to administrators; includes doing feasibility studies, special research projects, grant proposals, and reports to county commissions or city councils (e.g. in answer to the question, Why is crime decreasing?) (Source: Steven Goettlieb, Sheldon Arenberg, and Raj Singh, Crime Analysis from First Report to Final Arrest (Montclair, CA: Alpha Publishing, 1994), pp. 13-24.) 8-4

CRIME BULLETINS One method by which crime analysts can disseminate general interest information is through the publication of a series of bulletins Some crime bulletins deal with sex offenders 8-5

TIME-EVENT CHART One of the most useful and quickly learned methods of analyzing crime is the time event chart (TEC), which displays events in chronological order. Offender paroled from state prison Stops meeting with parole officer Informant says he is frequent crack user Robs tourist Robs Stop-n-Go Robs pharmacy Robs bank, wounds guard 7 months 3 months 3 weeks 2 weeks 11 days 5 days 8-6

CRIMINAL PROFILING Criminal Profiling. The process of inferring distinctive personality characteristics of individuals responsible for committing crimes has commonly been referred to as criminal profiling (See Slide 8-7) Criticisms of Profiling. Despite its successes, profiling as a field is not without criticisms. Include in these criticisms are: untrained or inadequately trained profilers promising too much and delivering too little relying on inadequate or dated databases overstating the meaning of physical evidence 8-7

THE ORGANIZED/DISORGANIZED OFFENDER The organized/disorganized offender is an FBI model. The organized/disorganized offender dichotomy has a strong crime scene focus. Stage 1: Collecting inputs, which are essential for accurate profiling State 2: Using Decision Process Models, which is the process of organizing and arranging the inputs into meaning patterns Stage 3: making the crime assessment, which is the reconstruction of the sequence of events and the behavior of both the victim and the offender 8-8(a)

THE ORGANIZED/DISORGANIZED OFFENDER (cont'd) Stage 4: Developing the criminal profile, a process which addresses the type of person who committed the crime and that individual's behavioral organization in relation to the crime, including background information, physical characteristics, habits, beliefs, values, pre-offense behavior leading to the crime and post-offense behavior Stage 5: Continuing the on-going investigation by those assigned to it, with the profiler making adjustments in the profile if fresh information warrants it and being available to discuss the case with those assigned on an as-needed basis Stage 6: Following the apprehension, reviewing the agreement between the outcome and the various stages of the profiling process are examined 8-8(b)

PROFILE CHARACTERISTICS OF ORGANIZED AND DISORGANIZED MURDERS Average or above-average IQ Below-average IQ Socially adept Socially inadequate, often never married, fearful of people, may have developed well-defined delusional system Skilled-occupation employment history, but uneven work history, sometimes has job below abilities Poor work history Sexually competent Sexually incompetent, may never have achieved sexual intimacy High birth order in family, often first son Low birth order in family Father’s work generally stable Father’s work history unstable Parental discipline perceived by offender as inconsistent Harsh parental discipline May feel angry or depressed at time of crime, but reports himself as calm during it Recurring obsessional and/or primitive throughts, at time of crime is confused and distressed, acts impulsively under stress May use alcohol prior to crime Limited use of alcohol Precipitating situational stress, e.g. financial, marital, relationships with females, and employment problems Minimal situational stress Usually living with partner Lives alone or with parental figure Likely to have car in good condition Usually finds victims in his geographic area, lives in close proximity to scene Follows crime in newspapers, clippings about crimes committed often found at offender’s home, may take souvenirs from victim or scene Little interest in news media (Source: Robert Ressler, Ann W. Burgess, and John E. Douglas, Sexual Homicides: Patterns and Motives (New York: Free Press, 1992), pp. 121-122, 130.) 8-9

INVESTIGATIVE PSYCHOLOGY Although more than a few psychologists and psychiatrists are involved in profiling, investigative psychology is associated with the work of Englishman David Canter Canter, an environmental psychologist, was asked by New Scotland Yard in 1985 to integrate investigative and psychological concepts The model he developed rests on five factors Interpersonal Coherence assumes that offenders will deal with their victims in a manner similar to the way they treat people in their day-to-day lives 8-10(a)

INVESTIGATIVE PSYCHOLOGY (cont'd) The Significance of Time and Place may provide analysts with clues about the offender's mobility and even his residence Criminal Characteristics are used by researchers and analysts to place offenders into broad categories, from which subcategories can be selected or developed Criminal Career is an assessment as to whether the offender may have engaged in criminal activity before and what type of activity it most likely was Forensic Awareness draws in part from Step 4 above, criminal career. It is an assessment of the scene and evidence to determine if the offender has any special knowledge of evidence gathering procedures used by the police 8-10(b)

BEHAVIORAL EVIDENCE ANALYSIS BEA is a deductive criminal profiling method. In operation, BEA is a four-step process: Equivocal Forensic Analysis. “Equivocal forensic analysis” refers to a review of all physical evidence which questions all assumptions and conclusions Victimology. Victimology is the thorough study and analysis of the victim's characteristics 8-11(a)

BEHAVIORAL EVIDENCE ANALYSIS (cont'd) Crime Scene Characteristics. These characteristics may include, among many other things, method of approach, method of attack, method of controlling the victim, location, nature, type, and sequence of sexual acts, materials used, verbal statements, and precautionary acts taken by the offender. Deduction of Offender Characteristics. The fourth step is more artful and therefore a matter of expertise rather than science. Offender characteristics fall into two categories: “hard” and “soft.” 8-11(b)

GEOGRAPHIC PROFILING Geographic information system (GIS) software provides the capability to superimpose different types of data on a map Geoprofiling/GP is an investigative strategy that uses the locations of a series of crimes to determine the most probable area of the offenders residence GP does not “solve” crimes; it does prioritize suspects and their likely addresses This allows investigators to focus their resources and strategies, e.g., saturation patrol, surveillance, and neighborhood canvasses 8-12

FINANCIAL DIFFICULTY INDICATORS Business Indicators of Financial Difficulty. Examples include but are not limited to: Decreasing Revenue Increasing production costs, e.g., labor and material Increased competition, better products available Costly rental and lease agreements 8-13(a)

FINANCIAL DIFFICULTY INDICATORS (cont'd) Personal Indicators of Financial Difficulty. Examples include: Bounced Checks Costly rental and lease agreements Inability to pay current bills, e.g., utilities Lenders impose or refuse loans or credit Payment of bills by cashier's check, certified check, or money order 8-13(b)

THE NATIONAL CENTER FOR THE ANALYSIS OF VIOLENT CRIME NCAVC, which is operated by the FBI, is organized into three components: The Behavioral Analysis Unit provides investigative and operational support for complex and time sensitive cases typically involving threats and acts of violence The Child Abduction and Serial Murder Investigative Resources Center (CASMIRC), mandated by the Congress in 1998 The Violent Criminal Apprehension Program (VICAP), facilitates cooperation, coordination, and communication among law enforcement investigations, violent serial offenders 8-14

THE NATIONAL CRIME INFORMATION CENTER NCIC has been operated by the FBI since 1967 NCIC which provides a nation-wide telecommunication link between police agencies has repeatedly demonstrated its value to federal, state, and local agencies The newest version of the FBI’S system, NCIC 2000, came on line. 8-15

NCIC 2000 DATABASES The new NCIC 2000 has dramatically improved the prior system As a result law enforcement will have more information available in a timely fashion Databases Continued from NCIC Additional NCIC 2000 Services Stolen Articles Foreign Fugitives Stolen Guns Criminal History Queries Stolen License Plates Deported Felons Missing Persons Criminal Justice Agency Identifier Stolen Securities Stolen Boats Gang and Terrorist Members Unidentified Persons U.S. Secret Service Protective File Stolen Vehicles Persons Subject to Protection Orders Wanted Persons Canadian Police Information Center Enhanced name search (searches all derivatives of names, such as Jeff, Geoff, Jeffrey) Search of right-index-finger prints Mug shots Other identifying images (such as scars, tattoos, and images of vehicles (e.g. Ford Mustang)) Convicted Sexual Offender Registry Convicted Persons on Supervised Release Database Persons Incarcerated in Federal Prisons User manuals available online Information linking (all information related to a case will be returned on a single inquiry; e.g. if guns are in a stolen vehicle, a query on the vehicle will return information on the stolen guns as well) Improved data quality Online ad hoc searches to support criminal investigations Maintains five days of system inquiries to allow agencies to be notified if they are looking for information on the same individual or stolen property (Source: Louis Freeh (director of the FBI), NCIC 2000 press release, July 15, 1999, p. 2.) 8-16

CODIS With the marrying of DNA and computer technology, a counterpart of Automated Fingerprint Identification System (AFIS) could be created By 1998, the FBI’S Combined DAN Index System (CODIS) was fully operational, tying together local, state, and federal DNA files States enacted laws requiring the collection of DNA samples from certain categories of offenders 8-17