Ch 6 Flashcards
BASIC LEADS
Victim’s Background
Benefit
Opportunity
Knowledge
Field
Contact Reports
Vehicles
Weapons
Fingerprints
Stolen Property
Modus Operandi
Computer Databases
Offender Registration
Photographs of Known Criminals
Composite Sketches
Injured Suspects
Linkage with Crime Partners
WHAT HAPPENED?
Crime scene, victims, witnesses
Knowledge of possible suspects
persons who might know their way about the premises and about the presence and location of articles of value.
persons who knew of the routine of the victim or the business
- Persons who have access to the premises at which the crime occurred or who are familiar with them
- Persons who knew of the value and place of storage of property or the routine of the victim or the business victimized, such as: a. any present employee or spouse b. any former employee or spouse c. service and maintenance personnel (those employed in the area or the building, or those making frequent service deliveries) d. neighbors e. criminals with contacts among the persons with knowledge
- Persons noticed in the area or on the premises recently who were: a. acting strangely (sex cases, fires, homicides) b. applying for work, soliciting sales, conducting surveys, etc.
Finger prints at scene
Crime-scene fingerprints are compared with the imprints of persons who are legally at the scene: victim, witnesses, police, and other known visitors.
- Fingerprints on file are searched to identify the suspect making the crime-scene fingerprint(s):
a. request search. The investigator assigned to the case names one or more suspects and asks for a search.
b. Single-digit search. Identification technicians search such files as those containing other crime-scene fingerprints or the ten-digit fingerprints of repeat or career criminals.
c. Cold search. Identification technicians search through an entire ten-digit fingerprint file. Unless the police agency is small or has a computerized search capability, the scope of this cold search should be reduced to (1) known criminals operating in the same geographical area or with the same modus operandi and (2) recent arrestees.
linkages between persons engaged in criminal activity:
- Neighborhood friendships. These friendships may date from early childhood, such as from membership in a youth gang, or the social interactions among neighboring families and members of ethnic groups.
- Juvenile hall and prison contacts. Incarceration in a correctional facility brings persons who are convicted of a crime, or who are adjudicated as delinquents and made wards of a children’s court, into close contact. Many of these contacts ripen into friendships that can be traced through juvenile institutions to prisons for adult offenders. Inmates band together with others they trust.
- Family relationships. Many persons have a strong sense of family trust and loyalty, which may be extended to persons without kinship linkage who have exercised some form of unofficial parental control, guidance, or support.
- Coethnic contacts. In ghetto neighborhoods, juvenile halls, and prisons, each ethnic group tends to band together, which is similar emotionally to family relationships.
- Buyer–seller interactions. This is a business relationship between the person wanting the crime committed for profit and the criminal actor. The common types of buyer–seller relationships are the business owner and the torch, the planner of a murder and the hit man, and the receiver of stolen property and the thief.
- Lovers. An identifiable and often easily traced relationship is one between husband and wife (legal or common law); a triangle relationship in which a lover of either sex is added to the husband–wife duo; and heterosexuals or homosexuals living together or otherwise identified as lovers.
TYPE OF INFORMANT - Basic Lead
Crime
Identity: suspect Whereabouts: suspect Circumstances: crime
Ie: woman scorned
TYPE OF INFORMANT - Participant
Buy or sting
Introduction: drug seller Participant: drug “buy” Persuasion: drug seller/thief
Ie: arrest is made on a minor charge of possessing or selling illegal drugs and the arresting officer persuades the arrestee to cooperate in identifying his or her source of drugs—in effect, to assist in a more important arrest— in return for some consideration by police, prosecutor, or court.
TYPE OF INFORMANT - Covert
Terrorism Organized crime
Plans: crime Operations: daily Identity: members
TYPE OF INFORMANT - Accomplice Witness
Trial
Testimony
Visual Surveillance
Leapfrog Technique
One person falls back, another takes over
moving visual surveillance—a tail (shadow)
may be on foot, may be in a vehicle, or may use a combination of walking and riding. The suspect being followed is often alert and may take evasive action. Suspects “double door” the trailing investigator by entering a street-level shop and leaving by a rear, side, or basement entrance.
Search Warrants
certify that normal investigative techniques have been tried and failed, are reasonably unlikely to succeed, or are too dangerous to attempt.
Six Stages of the Police intelligence Process.
Needs
Collection
Evaluation and Collation
Analysis and Interpretation
Dissemination
Reevaluation
Appropriate Corrective Action
6 Stages
Needs. Clear needs for information develop as police investigate unsolved crimes and attempt to block the commission of planned crimes. Police personnel demonstrating such needs are the users of police intelligence.
6 Stages
Collection. The gathering of information on matters of interest, in response to user needs, is investigatory reporting: raw intelligence (information) is reported along with a field evaluation of the information, its source, and how access to the information reported is gained. The overt collection of information is conducted by public sources or nonintelligence police personnel; covert collection of information is conducted by sources such as undercover police agents and confidential informants, or it is acquired through various types of surveillance of unaware targets.