Ch 6 Flashcards

1
Q

BASIC LEADS

A

Victim’s Background
Benefit
Opportunity
Knowledge
Field
Contact Reports
Vehicles
Weapons
Fingerprints
Stolen Property
Modus Operandi
Computer Databases
Offender Registration
Photographs of Known Criminals
Composite Sketches
Injured Suspects
Linkage with Crime Partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT HAPPENED?

A

Crime scene, victims, witnesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Knowledge of possible suspects

A

persons who might know their way about the premises and about the presence and location of articles of value.

persons who knew of the routine of the victim or the business

  1. Persons who have access to the premises at which the crime occurred or who are familiar with them
  2. Persons who knew of the value and place of storage of property or the routine of the victim or the business victimized, such as: a. any present employee or spouse b. any former employee or spouse c. service and maintenance personnel (those employed in the area or the building, or those making frequent service deliveries) d. neighbors e. criminals with contacts among the persons with knowledge
  3. Persons noticed in the area or on the premises recently who were: a. acting strangely (sex cases, fires, homicides) b. applying for work, soliciting sales, conducting surveys, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Finger prints at scene

A

Crime-scene fingerprints are compared with the imprints of persons who are legally at the scene: victim, witnesses, police, and other known visitors.

  1. Fingerprints on file are searched to identify the suspect making the crime-scene fingerprint(s):

a. request search. The investigator assigned to the case names one or more suspects and asks for a search.
b. Single-digit search. Identification technicians search such files as those containing other crime-scene fingerprints or the ten-digit fingerprints of repeat or career criminals.
c. Cold search. Identification technicians search through an entire ten-digit fingerprint file. Unless the police agency is small or has a computerized search capability, the scope of this cold search should be reduced to (1) known criminals operating in the same geographical area or with the same modus operandi and (2) recent arrestees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

linkages between persons engaged in criminal activity:

A
  1. Neighborhood friendships. These friendships may date from early childhood, such as from membership in a youth gang, or the social interactions among neighboring families and members of ethnic groups.
  2. Juvenile hall and prison contacts. Incarceration in a correctional facility brings persons who are convicted of a crime, or who are adjudicated as delinquents and made wards of a children’s court, into close contact. Many of these contacts ripen into friendships that can be traced through juvenile institutions to prisons for adult offenders. Inmates band together with others they trust.
  3. Family relationships. Many persons have a strong sense of family trust and loyalty, which may be extended to persons without kinship linkage who have exercised some form of unofficial parental control, guidance, or support.
  4. Coethnic contacts. In ghetto neighborhoods, juvenile halls, and prisons, each ethnic group tends to band together, which is similar emotionally to family relationships.
  5. Buyer–seller interactions. This is a business relationship between the person wanting the crime committed for profit and the criminal actor. The common types of buyer–seller relationships are the business owner and the torch, the planner of a murder and the hit man, and the receiver of stolen property and the thief.
  6. Lovers. An identifiable and often easily traced relationship is one between husband and wife (legal or common law); a triangle relationship in which a lover of either sex is added to the husband–wife duo; and heterosexuals or homosexuals living together or otherwise identified as lovers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TYPE OF INFORMANT - Basic Lead

A

Crime

Identity: suspect Whereabouts: suspect Circumstances: crime

Ie: woman scorned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TYPE OF INFORMANT - Participant

A

Buy or sting

Introduction: drug seller Participant: drug “buy” Persuasion: drug seller/thief

Ie: arrest is made on a minor charge of possessing or selling illegal drugs and the arresting officer persuades the arrestee to cooperate in identifying his or her source of drugs—in effect, to assist in a more important arrest— in return for some consideration by police, prosecutor, or court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TYPE OF INFORMANT - Covert

A

Terrorism Organized crime

Plans: crime Operations: daily Identity: members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TYPE OF INFORMANT - Accomplice Witness

A

Trial

Testimony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Visual Surveillance

A

Leapfrog Technique

One person falls back, another takes over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

moving visual surveillance—a tail (shadow)

A

may be on foot, may be in a vehicle, or may use a combination of walking and riding. The suspect being followed is often alert and may take evasive action. Suspects “double door” the trailing investigator by entering a street-level shop and leaving by a rear, side, or basement entrance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Search Warrants

A

certify that normal investigative techniques have been tried and failed, are reasonably unlikely to succeed, or are too dangerous to attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Six Stages of the Police intelligence Process.

A

Needs

Collection

Evaluation and Collation

Analysis and Interpretation

Dissemination

Reevaluation

Appropriate Corrective Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

6 Stages

A

Needs. Clear needs for information develop as police investigate unsolved crimes and attempt to block the commission of planned crimes. Police personnel demonstrating such needs are the users of police intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

6 Stages

A

Collection. The gathering of information on matters of interest, in response to user needs, is investigatory reporting: raw intelligence (information) is reported along with a field evaluation of the information, its source, and how access to the information reported is gained. The overt collection of information is conducted by public sources or nonintelligence police personnel; covert collection of information is conducted by sources such as undercover police agents and confidential informants, or it is acquired through various types of surveillance of unaware targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

6 Stages

A

Evaluation and collation. The evaluation of information screens out useless, incorrect, irrelevant, and unreliable information. Collation of evaluated information consists of its orderly arrangement, cross-indexing, and filing so that meaningful relationships can be developed between apparently unconnected bits and pieces of information.

17
Q

6 Stages

A

Analysis–interpretation. This is the core area of the police intelligence process. This activity converts information into intelligence. Unanalyzed raw information gives little data about a developing pattern of criminal activity or a target suspect. As a result of analysis, a new recognition of the significance, meaning, and interrelationships of incoming information can be developed. interpretation is an inseparable part of analysis—it is how collated information is related to problems requiring solutions. Interpretation also encompasses development of a hypothesis and a tentative statement about the meaning of the information involved.

18
Q

6 Stages

A

Dissemination. Police intelligence reports are released to users only with a legitimate need for such intelligence. This need-to-know factor must be credibly established and strictly enforced. Unused or misused police intelligence reports sabotage a criminal investigation technique that is unique and often the only means of disclosing to police information as to ongoing and planned crimes.

19
Q

6 Stages

A

Reevaluation. This is a postmortem review of the effectiveness of police intelligence reports and of subsequent action likely to improve the process and its effectiveness.