Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.

Slides:



Advertisements
Similar presentations
Welcome to CJ 325 Psychology for Law Enforcement Unit 7 Seminar.
Advertisements

USC Health and Safety Training Workplace Violence.
Chapter 19 SEX CRIMES Criminal Investigation:
Report Writing Law Enforcement II.
Chapter 30 CRC Press: Forensic Science, James and Nordby, 2nd Edition 1# Forensic Science An Introduction to Scientific and Investigative Techniques Stuart.
Chapter 30 CRC Press: Forensic Science, James and Nordby, 2nd Edition1 Chapter 30 Serial Offenders: Linking Cases by Modus Operandi and Signature.
Forensic Psychology. Summary Forensic Psychology  Eyewitness Testimony  History of Forensic Psychology  Psychological Testing Forensic Psychiatry Serial.
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
Essential Qualities of an Investigator
Take out your notes – we are going to lecture on Ch. 2.  Be sure to turn in your Ch. 2 HW! While you are waiting, respond to the following: 1. What is.
Law Enforcement Response to Abuse, Neglect or Exploitation of Older Adults and Persons with Disabilities 1.
Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 4 PEOPLE AS A SOURCE OF INFORMATION Criminal Investigation: A Method for.
Police Technology Chapter Twelve
Forensic Science Uses multiple science specialties The main three are: Biology Chemistry Medicine.
INTRODUCTION TO THE LAW OF EVIDENCE
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Internationally known in 1986 for the ‘offender profile’ that helped police to catch ‘ Railway Rapist’ John Duffy. This was the first time such help had.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Criminal Profiling. Criminal Psychology refers to the study of the mental and behavioral characteristics of people who break laws Criminal/Forensic psychologists.
1 Book Cover Here Chapter 20 BURGLARY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Crime Analysis with Crime Mapping Chapter 10: Identifying Useful and Meaningful Patterns Prepared by: Dr. Rachel Boba (August 2008)
Chapter 12 Burglary.
Introduction to Criminal Justice
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Particular Crimes Section 3.2.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Assignment Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits.
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Essay Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits and.
Chapter 15 Criminal Profiling
Identifying and Arresting Suspects
Unit 2 Review Criminal and Juvenile Justice. Strict Liability Does not require intent Strict liability offenses make the act a crime regardless of the.
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
© 2003 Wadsworth Publishing Co. Chapter 3 The Nature and Extent of Crime Criminology 8 th Edition Larry J. Siegel.
Use of force Ocga
FORENSIC PROFILING Forensic Science. Forensic Profiling is… an educated attempt to provide investigative agencies with specific information about the.
1 Criminal Investigative Analysis. 2 A Comprehensive Investigative Aid Indirect Personality Assessments Equivocal Death Analysis Investigative Suggestions.
CRIME SCENE. Defining a Crime Scene The only thing consistent about crime scenes is their inconsistency.
Foundation of Forensics Modus Operandi Corpus Delicti.
Crime Scene Processing.  Any questions before we begin about anything?  Unit 2 Seminar -Chain of Custody -Modus Operandi (MO) -Criminal Profiling -Importance.
MFIRS 11 Arson Module. 2 Objectives The participants will be able to: The participants will be able to: describe when the Arson Module (NFIRS 11) is to.
Chapter 3 Criminal Law. Crime: An act against the public good.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 14 RECONSTRUCTING THE PAST Methods, Evidence, Examples Criminal Investigation:
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
12/17/ Geographic Profiling Geographic Profiling Charles L. Feer, JD, MPA Bakersfield College.
FBI Method of Profiling Violent Serial Offenders
Psychology and Investigations Chapter 12. Psychologist’s Contributions  Investigative inferences  Offender profiling, geographical profiling, correlates.
Criminal Profiling. Psychological Profiling Involves investigating the offender’s BehaviorMotivesBackground As a guide for what direction the Investigation.
1 ICAOS Mini Training Rule Mandatory Retaking Violent Offenders and Violent Crimes & Rules & Absconders Presented by: Training.
 Understanding the Texas Criminal Legal System. Definitions  Your individually responsible for looking up definitions of words, that I have put in red.
Psychlotron.org.uk What does this crime scene tell you about the offender responsible?
Search Warrants. A search warrant… is a legal order, signed by a judge, allowing law enforcement to search a particular area or premises. Search warrants.
CJ 425 Crime Mapping Unit 6 Seminar “Patterns”. Outline Repeat Incidents Tactical Analysis – Definition – Information Used 7 types of Patterns Inductive/Deductive.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Particular Crimes Section 3.2.
Unit 4 Dr. Marie Mele. Topics to Discuss Ability of people to make rational choices How people weigh the risks and rewards of engaging in crime How the.
Seminar 2 TOPICS Organization of the Crime Scene Crime Scene Problems Modus Operandi Rules/Approaches to Criminal Investigations Documentation Search Methods.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 7 Search Incident to a Lawful Arrest, Hot Pursuit Criminal Justice Procedure.
Information Resources Criminal Investigation CJUS 201 Part 12.
CJ I / Critical Thinking 3/13/16 Why do you think it is important that law enforcement agencies have limited authority? What do you think are the key benefits.
Crime Scene Investigation. “There is not only the effect of the criminal on the scene to be considered, but also the manner in which the scene may have.
Criminal Justice Today CHAPTER 2 Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights.
Criminal Investigation Basic Perspectives CHAPTER Copyright © 2016, 2012, 2009 by Pearson Education, Inc. All Rights Reserved Criminal Investigation: Basic.
Chapter 12 Robbery Hess Introduction Robbery has plagued the human race throughout history Robbery is one of the three most violent crimes against.
Forensic Psychology.
Criminal Evidence Chapter 3
Criminal Psychology & Psychological Profiling
OPINION RULE.
Report Writing Law Enforcement I.
Criminal Profiling.
Introduction to Forensic Science and the Law
Presentation transcript:

Criminal Patterns Chapter 5

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely creatures of habit and comfort and are, to some extent, predictable in their behavior. Most criminal behavior is not the result of random acts, and certain types of criminals engage in certain kinds of criminal behavior for similar reasons, or motives. – Motive - A wrongdoer’s reason(s) for committing a crime.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 3 Modus Operandi Modus operandi (M.O.) – The method of operation that a criminal uses to commit a crime. – Latin term for “mode of operation.” – It was once believed that every criminal followed a particular M.O. and would rarely, if ever, change the type of crime committed or the method of committing it. – Inferences drawn from the M.O. are not certainties, but they can greatly assist investigators in their pursuit of criminals.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 4 Deductions from Modus Operandi Data The M.O. file is an orderly method of recording and coding information designed to reveal habits, traits, or practices of criminal suspects. Leads regarding M.O. should be weighed according to the degree of probability they will lead to a suspect.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 5 Deductions that may result from a review of M.O. data A theft by stealth rather than by violence or fraud may indicate either that: – the criminal is physically non-aggressive and lacks confidence in his or her powers of persuasion – or that the theft was more easily accomplished by stealth A theft by stealth may mean: – the thief is known to the victim – or intends to remain in the community and might be recognized later should contact be made with the victim during the crime Well-planned crimes generally eliminate the emotionally unstable as suspects.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 6 Deductions that may result from a review of M.O. data A certain type of premises might be selected: – not only because of the type of business conducted – but also because the criminal is familiar with the victim’s habits and manner of conducting business A burglary of a residence may suggest: – a criminal with knowledge of the activities of persons who frequent that area at a certain time (the victim, neighbors, police, and so on) – and with knowledge of the probable whereabouts of the people living in the residence The occupation or previous experience of the criminal may be indicated by the tools selected for the crime as well as by the skill with which they are employed.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 7 Deductions that may result from a review of M.O. data Burglaries where more vandalism than theft occurs usually indicate amateur juvenile burglars rather than adult professionals. Crimes committed in areas frequented only by people working or living in that vicinity usually indicate a local criminal. The point of entry (window, rear door, skylight, and so on) may have been chosen because of observation of a burglar alarm system outside the premises.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 8 Deductions that may result from a review of M.O. data Prior “casing” of the victimized target may have been needed because of conditions at the location or precautionary measures taken by the owner or manager. A suspect with physical disabilities may be eliminated if the type of crime calls for an agile person, unless evidence of a more physically fit accomplice is developed.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 9 Uses of Modus Operandi Data Identification – A process in which physical characteristics and qualities are used to definitely know or recognize a person. Apprehension – The act of seizing or arresting a criminal offender.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 10 Uses of Modus Operandi Data Modus operandi data can indicate a likely time and location for future criminal activity. Repression The act of suppressing or preventing an action from taking place.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 11 The Modus Operandi Parts of a Report 1. Time of Attack, or Date and Time Committed 2. Person Attacked (Type of Victim) 3. Property Attacked, or Type of Premises Entered 4. How Attacked (Point of Entry) 5. Means of Attack (Tool or Equipment Used in Committing the Crime) 6. Objective of Attack (Why the Crime Was Committed or Attempted) 7. Trademark or Peculiarity

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 12 The Modus Operandi Parts of a Report 8. What Suspect Said 9. Written Words or Symbols 10. Transportation Used or Observed

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 13 How to Report Modus Operandi Data Details of the offense Modus operandi factors would include such acts as: – lying in wait – luring the victim – drugging the victim – detouring a vehicle – casing a target – establishing the confidence of victims – purchasing or acquiring equipment

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 14 How to Report Modus Operandi Data Modus operandi files are typically organized into two major categories of information: Information pertaining to crimes committed by unidentified offenders Information concerning crimes committed by identified and apprehended offenders In many police agencies, data that pertain to the modus operandi of a reported crime are entered into the department’s computer information management system.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 15 How to Report Modus Operandi Data Legally, the modus operandi can be used only as an investigative lead. It can be introduced in court only as evidence to show the common purpose and design of the criminal when a series of crimes have been committed and linked to the defendant.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 16 Common Occult and Satanic Symbols

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 17 Modus Operandi Parts of a Report

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 18 Psychological Profiling One of the main objectives in any criminal investigation is to identify a suspect in the crime. Comparing the manner in which a crime was committed with available modus operandi files is one way of identifying a possible suspect. Psychological profiling – A method of suspect identification that seeks to identify an individual’s mental, emotional, and personality characteristics as manifested in things done or left behind at the crime scene.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 19 Psychological Profiling Profiling is a method of suspect identification that seeks to identify an individual’s mental, emotional, and personality characteristics as manifested in things done or artifacts left behind at the crime scene. It is typically used in crimes of violence, such as homicides, sex crimes, ritualistic crimes, and arsons in which there are no apparent motives or there are a series of crimes.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 20 Psychological Profiling Profiles provide investigators with corroborative evidence in cases with unknown suspects or with clues about likely suspects. Profiles do not immediately lead investigators to a specific offender. They do point to the type of person most likely to commit the crime under investigation and, thereby, may narrow the field of potential suspects.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 21 Psychological Profiling The seven basic steps to profiling 1.Evaluate the criminal act itself. 2.Analyze evidence from, and conditions at, the crime scene. 3.Consider characteristics and, when available, statements of the victim. 4.Analyze all information from the preliminary reports. 5.Evaluate the medical examiner’s autopsy protocol or the physician’s physical examination report. 6.Develop a profile of the offender’s psychological and personality characteristics. 7.Make investigative suggestions to investigators based on the profile.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 22 Geographic Profiling Geographic profiling – A computer-assisted investigative method that uses locations of a series of crimes to determine the most likely area where an offender may be found. – Geographic profiling has been applied in a variety of types of cases including serial murder, rape, arson, robbery, and even bombings. – Geographic profiling uses a mathematical algorithm based on a psychological theory known as the least-effort principle.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 23 Geographic Profiling This principle suggests that an individual will try to adapt to the environment or will try to change the environment to suit his or her needs, whichever is easier. Criminals tend to commit crimes within a certain comfort zone, an area located near— but not too close—to their own residence.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 24 National Law Enforcement Telecommunications System (NLETS) is a computer-controlled message switching network linking local, state, and federal agencies together to exchange information. The law enforcement agencies are linked together by means of: – Computers – Terminals – Communication lines

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 25 National Law Enforcement Telecommunications System Officers can access the network through mobile data terminals linked to a departmental central computer, which is part of a state network tied into NLETS. The system is operational 24 hours per day, 7 days a week.