Criminal Investigation
Professor Hall Jr.
Chapter 6
1. Explain how field contact reports are generated and how this information is used as a basic investigative lead. a Record the stop-and-frisk interviews with persons stopped in their cars or on foot because of their suspicious appearance or actions. b These reports place in police records the names and the descriptions of the person’s coming to police attention and the time, date, and place they were seen and interviewed. c These reports are confidential in that they are not disclosed to the public but are filed in police records systems for the use of investigators 2. Photographs of known criminals are taken every time an offender is arrested and booked. Explain
the importance of taking photographs of known criminals even if they are repeat offenders and their photographs are already on file. 3. Explain what an investigator can do to guard against the pitfalls of working closely with informants.
a Informing is a dirty business because informants may lie to implicate innocent persons or to exculpate a favored crime partner. Inherent in some forms of snitching is that the snitch trades his or her version of what happened during a crime for immunity to prosecution, a reduced charge, or leniency at the time of sentencing Fill-in 4. The relationship between the victim in homicides and persons who might benefit from the death are the most productive investigative leads. 5. Field Contact Reports record interviews with persons stopped because of their suspicious appearance or actions. 6. The choice of a particular crime to commit and the selection of a method of committing it is the Modus Operandi of a criminal. 7. The distinctive methods used to commit a crime is a Signature. 8. The NCIC system disseminates information to the general public about kidnappers and sexual predators and their vehicles via highway signs, television and radio broadcasts. 9. Wiretapping and electronic eavesdropping are the primary forms of Audio Surveillance. 10. Places or people may be wired for sound and this practice is known as Bugging
11. Consensual electronic surveillance is known as Participant monitoring.
12. Contact Surveillance techniques are based on the capability of certain fluorescent preparations to stain a person’s hands upon contact and thus offer observable proof of a connection between the stained person and the object under surveillance. 13. Intelligence is the secret or clandestine collecting and evaluation of information about crime and criminals not normally available to investigators.