McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Career Opportunities
PowerPoint Presentations
Spotlight on Terrorism
Chapter Overview
Chapter Outline
Chapter Objectives
Multiple Choice Quiz
Flashcards
Internet Exercises
Interactive Exercise
Feedback
Help Center


Swanson, Criminal Investigation 8/e
Criminal Investigation, 8/e
Charles R. Swanson, University of Georgia
Neil C. Chamelin, Assistant State Attorney, Second Judicial Circuit
Leonard Territo, University of South Florida- Tampa

Investigative Resources

Chapter Outline

I. CRIMINAL INTELLIGENCE UNITS

A. More police agencies are turning towards an intelligence-led model, which can be used to support any type of philosophy.

B. Whether law enforcement executives choose the "beefing up" or separate analytical unit model depends on the history, mission, and preference of the person making the decision.

C. The reality is that there are so many analytical needs for agencies that even with a centralized intelligence/analytical capacity, various types of analysis are being carried on throughout the department, although it often lacks the sophistication which can be achieved by a trained and experienced analyst.

II. THE INTELLIGENCE/ANALYTICAL CYCLE (See Slides 8-2 and 8-3)

The intelligence/analytical cycle is a five-step process which is continuous:

A. Planning and Direction. The intelligence/analytical process must be managed from identifying the focus of the intelligence effort to delivering the finished product to the police unit requesting it.

B. Collection and Management. Collection is the gathering and managing of raw data/information which is then analyzed to produce the finished product.

C. Processing. Processing is how raw information from all sources is converted into a form which can be used by analysts.

D. Analysis and Production. Analysis and production is how the conversion of the data which has been processed is translated into the finished intelligence product.

E. Dissemination. The last element the five-step intelligence cycle is the dissemination of the finished intelligence report back to the end-used who requested it.

III. ANALYTICAL AND INVESTIGATIVE TOOLS (See Slide 8-4)

A. Crime Analysis. Crime analysis is the process of using systematic analytical methods to acquire timely and pertinent information on crime patterns and trend correlations. There are three general types of crime analysis by which analysts link crimes:

1. Tactical. Tactical analysis is used to promote a quick response to field problems

2. Strategic. Concerned with long-range problems and making projections about likely increases or decreases in crime rates and trends.

3. Administrative. Focuses on providing economic, social, geographic, or other information to administrators.

B. Elements Focused on to Link Crimes

1. Trends. Trends are generally crimes committed across a large geographic area over an extended period of time.

2. Patterns. A group of the same crimes committed over a shorter period of time, sometimes, but not always, committed by the same offender.

3. Series. In a series, the same type of crime is committed over a shorter period of time, probably by the same offender.

4. Spree. A group of kids walking through a neighborhood vandalizing cars by spray painting their license plates read is an example of a spree.

5. Hot Spot. A hot spot is a geographic location where various crimes are committed on a regular basis.

6. Crimogen. A crimogen is defined as an individually known offender who is responsible for a large number of crimes or one victim reporting a large number of crimes.

C. Crime Bulletins. One method by which crime analysts can disseminate general interest information is through the publication of a series of bulletins. (See Slide 8-5)

D. Time Event Charting. One of the most useful and quickly learned methods of analyzing crime is the time event chart (TEC), which displays events in chronological order. (See Slide 8-6)

E. Telephone Record Analysis. The single most requested type of intelligence analytical products is telephone toll analysis.

F. E-Mail Intercepts. As in the case with a number of investigative procedures, there is controversy regarding law enforcement’s capability to intercept e-mail.

1. The FBI’s Carnivore software is a "sniffer" program, which can be employed, pursuant to a showing of probably cause and obtaining legal authority to use it.

2. The September 11 attacks and the subsequent enactment of the USA Patriot Act of 2001 provides law enforcement with new, broadened electronic surveillance authority.

G. Criminal Profiling. "The process of inferring distinctive personality characteristics of individuals responsible for committing crimes has commonly been referred to as criminal profiling. (See Slide 8-7)

1. Criticisms of Profiling. Despite its successes, profiling as a field is not without criticisms. Include in these criticisms are untrained or inadequately trained profilers, promising too much and delivering too little, relying on inadequate or dated databases, overstating the meaning of physical evidence.

2. The Mad Bomber. Criminal profiling has a history of about 50 years, with its most important milestones coming in the past quarter century. Noteworthy among early events is the work of New York City criminal psychiatrist James Brussels on the "Mad Bomber case."

3. Methods of Profiling. Because profiling was regarded as unconventional and documented successes, were isolated events, profiling did not make much progress for the roughly 20 years following the apprehension of the Mad Bomber.

H. The Organized/Disorganized Offender Model. The organized/disorganized offender is an FBI model. The organized/disorganized offender dichotomy has a strong crime scene focus. (See Slides 8-8 and 8-9)

1. Stage 1: Collecting inputs, which are essential for accurate profiling.

2. State 2: Using Decision Process Models, which is the process of organizing and arranging the inputs into meaning patterns.

3. Stage 3: making the crime assessment, which is the reconstruction of the sequence of events and the behavior of both the victim and the offender.

4. Stage 4: Developing the criminal profile, a process which addresses the type of person who committed the crime and that individual’s behavioral organization in relation to the crime, including background information, physical characteristics, habits, beliefs, values, pre-offense behavior leading to the crime and post-offense behavior.

5. Stage 5: Continuing the on-going investigation by those assigned to it, with the profiler making adjustments in the profile if fresh information warrants it and being available to discuss the case with those assigned on an as-needed basis.

6. Stage 6: Following the apprehension, reviewing the agreement between the outcome and the various stages of the profiling process are examined.

I. Mixed Organized-Disorganized Homicides. While many offenders may fit neatly into the organized or disorganized pattern, some crimes may reflect aspects of both patterns for a number of reasons.

J. Investigative Psychology. (See Slide 8-10) Although more than a few psychologists and psychiatrists are involved in profiling, investigative psychology is associated with the work of Englishman David Canter, an environmental psychologist, who was asked by New Scotland Yard in 1985 to integrate investigative and psychological concepts. The model he developed rests on five factors.

1. Interpersonal Coherence assumes that offenders will deal with their victims in a manner similar to the way they treat people in their day-to-day lives.

2. The Significance of Time and Place may provide analysts with clues about the offender’s mobility and even his residence.

3. Criminal Characteristics are used by researchers and analysts to place offenders into broad categories, from which subcategories can be selected or developed.

4. Criminal Career is an assessment as to whether the offender may have engaged in criminal activity before and what type of activity it most likely was.

5. Forensic Awareness draws in part from Step 4 above, criminal career. It is an assessment of the scene and evidence to determine if the offender has any special knowledge of evidence gathering procedures used by the police.

K. Behavioral Evidence Analysis. BEA is a deductive criminal profiling method. In operation, BEA is a four-step process: (See Slide 8-11)

1. Equivocal Forensic Analysis. "The word ‘equivocal’ refers to anything that cane be interpreted in more than one way or when the interpretation is questioned. "Equivocal forensic analysis" refers to a review of all physical evidence which questions all assumptions and conclusions.

2. Victimology. Victimology is the thorough study and analysis of the victim’s characteristics.

3. Crime Scene Characteristics. These characteristics may include, among many other things, method of approach, method of attack, method of controlling the victim, location, nature, type, and sequence of sexual acts, materials used, verbal statements, and precautionary acts taken by the offender.

4. Deduction of Offender Characteristics. The first three steps are for the most part based on the scientific tenets of crime scene reconstruction and established forensic sciences; however, while relaying on these inputs, the fourth step is more artful and therefore a matter of expertise rather than science. Offender characteristics fall into two categories: "hard" and "soft."

L. Geographic Profiling. Geographic information system (GIS) software provides the capability to superimpose different types of data on a map. (See Slide 8-12)

1. Geoprofiling/GP is an investigative strategy that uses the locations of a series of crimes to determine the most probable area of the offenders residence.

2. GP does not "solve" crimes; it does prioritize suspects and their likely addresses, thereby allowing investigators to focus their resources and strategies, e.g., saturation patrol, surveillance, and neighborhood canvasses, where they have the highest probability of being successful.

M. Financial - Financial investigations can be relatively modest, such as a credit card fraud involving two transactions and a total of $50, or as complex as money laundering schemes involving multiple corporate shells and banks in a dozen countries across the world.

1. Business Indicators of Financial Difficulty. Examples include but are not limited to: (See Slide 8-13)

Decreasing Revenue.

Increasing production costs, e.g., labor and material.

Increased competition, better products available.

Costly rental and lease agreements.

2. Personal Indicators of Financial Difficulty. Examples include:

Bounced Checks

Costly rental and lease agreements

Inability to pay current bills, e.g., utilities

Lenders impose or refuse loans or credit

Payment of bills by cashier’s check, certified check, or money order

3. Financial Crimes Enforcement Network. FinCen is located within the U.S. Department of Treasury and is one of the primary agencies tasked to prevent and detect money laundering by arms dealers, terrorists, drug dealers, criminal enterprises, and others.

N. The National Center for the Analysis of Violent Crime. (See Slide 8-14) NCAVC, which is operated by the FBI, is organized into three components:

1. The Behavioral Analysis Unit, whose mission is providing behavior-based investigative and operational support for complex and time sensitive cases typically involving threats and acts of violence.

2. The Child Abduction and Serial Murder Investigative Resources Center (CASMIRC), which was mandated by the Congress in 1998.

3. The Violent Criminal Apprehension Program (VICAP), the function of which is to facilitate cooperation, coordination, and communication among enforcement in support of their efforts to investigate, identify, track, apprehend, and prosecute violent serial offenders.

O. The National Crime Information Center. (See Slide 8-15) Since its inception in 1967, NCIC which provides a nation-wide telecommunication link between police agencies has repeatedly demonstrated its value to federal, state, and local agencies.

1. As time passes and new technologies and capabilities become available, it is essential that information systems take advantage of them and are responsive to new client needs.

2. This is was that in mid-1999 that the newest version of the FBI’s system, NCIC 2000, came on line. (See Slide 8-16)

P. CODIS. (See Slide 8-17) With the marrying of DNA and computer technology, a counterpart of Automated Fingerprint Identification System (AFIS) could be created.

1. By 1998, the FBI’s Combined DAN Index System (CODIS) was fully operational, tying together a three-tier hierarchy of local, state, and federal DNA files.

Q. The Internet. The internet has transformed how people communicate and how often they communicate. The possibilities of the internet has not escaped the police, who have also been quick to use ti for investigative, administrative, and public information purposes.

R. Law Enforcement Online (LEO) is a secure intranet system built and maintained by the FBI as a tool to communicate, obtain mission critical information, provide or participate in online educational programs, and participate in professional interest or topically focused dialog.