5. Identifying Suspects Flashcards
(7 cards)
What is a suspect identified through?
Witness accounts, forensic evidence, intelligence gathering, and surveillance
These methods ensure a comprehensive approach to suspect identification.
What are examples of suspect descriptions?
Information gathered from witnesses, CCTV footage, and forensic evidence
These sources provide crucial details that aid in identifying suspects.
What are intelligence databases used by police for suspect identification?
PNC (Police National Computer), ANPR (Automatic Number Plate Recognition), and facial recognition systems
These databases help track and identify suspects efficiently.
What types of forensic links are used in suspect identification?
DNA, fingerprints, blood samples, and ballistic reports
Forensic evidence is critical in establishing connections to criminal activities.
What are digital footprints in the context of suspect identification?
Phone records, social media activity, and banking transactions
Digital footprints can provide valuable insights into a suspect’s activities and connections.
What must officers do once enough evidence is obtained to arrest a suspect?
Conduct an arrest under PACE 1984 and provide a caution
PACE 1984 outlines the legal framework for police procedures in the UK.
Fill in the blank: A suspect is identified through _______.
witness accounts, forensic evidence, intelligence gathering, and surveillance