Preview

Bomb Threat and Explosion Investigation

Good Essays
Open Document
Open Document
1485 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bomb Threat and Explosion Investigation
In addition, other law enforcement agencies may have specific information value. The Intelligence Service, Armed Forces of the Philippines (ISAFP), Police Intelligence Group (PIG) and National Intelligence Coordinating Agency (NICA) maintains files on individuals who make threats against political leaders. The Bureau of Customs (BOC) may provide information of imported goods; the Bureau of Immigration and Deportation (BID) can provide information on individuals entering or leaving the country; the Firearms and Explosive Division, Civil Security Group, Philippine National Police (FED, CSG, PNP) maintains records on firearms and explosives; the Bureau of Corrections (BUCOR) maintains records on fugitives; the Philippine Postal Corporation (PHILPOST) may assist in matters related to the mails; the National Anti-Kidnapping Task Force (NAKTAF) may, have files of information and intelligence because they have primary jurisdiction in kidnap-for-ransom cases.

On the local level, the local police authorities frequently maintain individual photo or “mug” files, alias files, business indexes, modus operandi (MO) files, victimization records and crime patterns. In addition, court records, probation and parole files, and other municipal records such as utilities, may prove valuable. Records of businesses, such as the telephone, electric and water companies, may also be helpful.

Surveillance and stakeouts are important components of kidnap-for-ransom investigations. These activities may require various forms of electronic surveillance, including wiretapping, eavesdropping, automobile locator systems, videotaping and photography. Such efforts may require assistance from other agencies. The investigator should be familiar, not only with the use of such equipment, but also with the laws surrounding their application. The investigator must know when a court order is necessary for the use of electronic surveillance. In no case should an investigator use extralegal means to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Forensics Lab

    • 289 Words
    • 2 Pages

    3) Obtaining dental records can help in the identification of an unknown body by the name of the suspect, and many more information would be along with thos records.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    On April 15, 2013, during the Boston Marathon, homemade explosions were detonated near the finish line taking the life of 3 Americans and injuring more than 260. The explosive devices were determined to be two pressure cookers strategically set to detonate 210 yards apart at 13 second intervals. The investigation lead was taken over by the Federal Bureau of Investigation (FBI) who released photographs and surveillance footage of two particular suspects on April 18. The two individuals were categorized as Chechen brother named Dzhokhar and Tamerlan Tsarnaev. Once these photos were released to the public, the two brothers took the life of an MIT police officer, carjacked a sport utility vehicle and exchanged gun fire with the Watertown police. The shoot out resulted in a second officer being critically injured while one of the suspects Tamerlan Tsarnaev was determined dead at the scene, younger brother Dzhokhar escaped with injuries. A Watertown manhunt followed the April 19 event with thousands of law enforcement personnel converging on a cordoned 20 block search area. Throughout the day long search, Watertown and nearby residents were warned to stay indoors with many public establishments closed. Later that day, the “shelter in place” advisory was lifted for the Watertown area. Shortly after these statements, a Watertown resident found the alleged suspect hiding in his back yard inside the family boat. Police forces converged on the area and arrested Dzhokhar. He was transported to the hospital with serious injuries. At the hospital, an initial questioning took place. Dzhokhar claimed his brother was the brains behind the incident and they were personally motivated because of the Afghan and Iraqi wars. They were indoctrinated with extremist Islamic beliefs and proclaimed as self-radicalized and had no outsourced connections to any terror groups around the globe. The brothers…

    • 2096 Words
    • 9 Pages
    Better Essays
  • Good Essays

    There are many different ways law enforcement agencies fight crime and solve them. The continuous usage of technology is one of those major ways. Law enforcement agencies uses different technologies that are needed depending on the situation and the outcome of it. Some examples of technology that police use Today are GPS systems(global…

    • 834 Words
    • 4 Pages
    Good Essays
  • Good Essays

    10 Mary Street is a poem by Peter Skrzynecki, appearing in Migrant Chronicle. The poem discusses family, connection to place and the impacts of Peter’s own migrant experience. Skrzynecki details richly impassioned recounts told in snippets of symbolism, imagery and throwbacks to the pre-war European environment Skrzynecki’s family belonged in.…

    • 345 Words
    • 2 Pages
    Good Essays
  • Good Essays

    One line that I thought was pure ingenuity from the author was when he wrote one-liners in this novel that seemed to foreshadow the oncoming events and add onto the theme of the story. One of these lines were, "Hatred is blind, anger is foolhardy, and he who pours out vengeance risks having to drink a bitter draft." This line was very powerful in the sense that it foreshadows the series of events that occurs within the book. Edmond Dantes, the main character of the book, was stripped of his innocence by 3 conspirators, which he had called friends, and was sent off to Chateau d'If, an infamous jail in which the worst criminals go. He miraculously escaped, became wealthy, and sought vengeance against these 3 men who had taken his youth and innocence and turned it into something horrible... the Count of Monte Cristo, the sly, vindictive, mysteriously wealthy character which everyone is humbled by because of his simple fashion and mystique. He speaks with his ex-fiance's son's friend, Franz, who warns Dantes ahead of time that everything that goes around comes around. This line means that if one seeks to have his revenge, he shall get the disadvantages of what he does. Dantes is still "blinded by hatred," and says that only the poor and inept may pay for their discrepancies, but the rich and clever are the ones that will always reap the benefits. He learns later on in the book that his theory was not veritable in any sense, for he had a great deal of remorse and regret for what he had done and wanted to punish himself. But Haydee, his loyal servant, had loved him greatly, no matter what he had done, and gave him a reason to live, a reason to seek penance from God through living and repent throughout his life. He found out that what his former friend had told him would be what he needed to hear in the end.…

    • 582 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Clay Dillow’s essay “To Catch a Bombmaker” emerged in October 2015 in Popular Science. This was a well written article whose main purpose was to inform the audience about a “little-known FBI forensics lab” (Dillow 54). His use of critical thinking in all eight elements only made his argument more valid and additionally convincing. Each one of these elements was covered thoroughly along with the use of strategies such as ethos and logos, which further the evidence that he was presenting. By utilizing his professional tone and moreover unveiling factual events, Dillow was able to produce a successful essay.…

    • 99 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 2 Part 2

    • 983 Words
    • 4 Pages

    TMA 01 – With the help of examples from the surveillance film, outline the ways in which surveillance is used to deliver crime control and social welfare (600-800 words).…

    • 983 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. What do you think would be the most challenging part of investigating a fire or explosion crime scene? Why?…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Criminal history records can be searched at the agency’s website by fingerprint or name. The information available on a “rap sheet” may be accessed by the public – this information may include information regarding criminal charges, convictions, dispositions, and dismissals. Also included in rap sheets is arrest information, such as the date of an arrest, the arresting agency, the case number, whether the charge is a misdemeanor or felony, and the number of counts at the time the arrest takes…

    • 841 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Another factor to consider was the cartels ability to intercept encrypted radio traffic over open airways. This posed a serious problem safeguarding information in reference to law enforcement positioning and travel routes. Radio traffic was minimized using code to describe law enforcement locations or actions during the trial. As Incident Commander, I initiated specific radio codes to be used as descriptors regarding law enforcement movement and activities over open airways. This was a very effective method of safeguarding sensitive information from possible radio traffic monitoring. The Los Zetas also had scouts driving by the courthouse at random times throughout the day, especially during the time the court was in session. In order to curtail this type of activity all FPS patrol vehicles were instructed to immediately contact the command center when surveillance was noted by vehicle or from a distant building. The command post made direct notification to Laredo and Webb County Police Departments. Local law enforcement immediately responded to the last known area reported and conducted a traffic stop on the vehicle in question or checked the facility that surveillance was being noted. All occupants of the suspicious vehicle were questioned and ran through NCIC for wants or warrants. The information obtained from the occupants was then checked for local gang or cartel affiliation. All field…

    • 1301 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Why Is Tda 2.2 Safeguarding

    • 4747 Words
    • 19 Pages

    The police also maintain databases for management of individuals that pose a risk to the public. For example the Vetting and Barring Scheme relies on regularly updated…

    • 4747 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Techno corrections are currently a trending topic as well as a growing practice. There are a few different examples of techno corrections such as all-in-one drug detection spray, ground- penetrating radar, heartbeat monitoring, and personal alarm location system. However there are other more familiar practices such as electronic tracking and location systems. This tracking can be done either with the common bracelets, which are based off of cellular and satellite tracking. Some of these methods, especially electronic tracking are said to be intrusive on the privacy of the inmates. This raises the questions of inmate’s privacy versus security. Some individuals may argue that even though inmates have broken the law and have forgone the rights…

    • 659 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. What are the similarities and differences between an arson investigation and a bombing investigation?…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Arson: Mass Bombing

    • 342 Words
    • 2 Pages

    Arson destroys neighborhoods as surely as mass bombing. Only a few people commit the crime, but all residents must suffer the consequences.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Arson And Bombing Essay

    • 655 Words
    • 3 Pages

    6. List and discuss the various clues that flames and smoke can offer the investigator in the arson ivestigation.…

    • 655 Words
    • 3 Pages
    Good Essays